Now sudo linuxgatlanbleepingcomputer fixed: If you’re one of the many Linux enthusiasts out there who’s been waiting to use your new computer because you didn’t fix it with sudo linuxgatlanbleepingcomputer, you’re in luck. On May 15, Microsoft released a free micropatch that fixes a local Privilege Escalation (LPE) vulnerability in the Windows administration tool PsExec. This problem affects many Linux based systems and many users have not been able to login to their computers or install packages due to this problem.
Remote code execution error in Microsoft’s Windows PsExec management tool
PsExec is a Microsoft Windows administration tool that allows system administrators to run programs remotely. However, there is a known remote code execution vulnerability that could allow an attacker to gain privileges on a Windows-based system. This problem is caused by a bug in the Common Log File System (CLFS). Although Microsoft has fixed the vulnerability, it is possible that the tool could still be exploited.
The vulnerability, known as Named Pipe Hijack, allows an attacker to run arbitrary processes on a Windows system. These applications can be malicious or legitimate. They can also be used to take over the target system. To exploit this flaw, an attacker must already have access to the system.
This vulnerability not only allows an attacker to run arbitrary processes, but also allows local escalation of privileges. This means that an attacker who can successfully run code on a system could elevate their privileges to the local system account. During this privilege elevation, an attacker could then take control of vulnerable, unprivileged services. An attacker who can elevate their privileges could then establish an RDP session as a domain user.
Based on community feedback to Microsoft, the company may release an update to address this issue. Until then, there are tools that can be used to protect against these types of attacks. One of the best options is to use an open source program, PAExec. Another alternative is to avoid using PsExec altogether. For more information, see the July 2004 issue of Windows IT Pro Magazine.
Free micropatch that fixes the Local Privilege Escalation (LPE) vulnerability in Microsoft’s Windows management tool PsExec
The Microsoft Windows administration tool PsExec is affected by a local privilege escalation vulnerability. This could allow an attacker to run malicious code on a remote computer. If you’re using PsExec, you might want to consider a micropatch to fix this.
PsExec is a free tool that allows users to launch programs on other computers. It was originally developed by SysInternals and acquired by Microsoft. Today, most Windows administrators use it to manage and run programs on their computers.
Although PsExec has been vulnerable to local escalation of privilege since its initial release in 2006, Microsoft has not released a patch for this vulnerability. However, third party patch providers have created free micropatches to fix this problem. For now, the best thing to do is wait for the latest Microsoft security patch.
CVE-2021-24084 is a local elevation of privilege vulnerability in the Microsoft administration tool PsExec. Although there is no official vendor fix for this issue, a third party patch vendor called 0patch has developed a free micropatch to fix the issue.
An anonymous attacker could exploit the issue by impersonating an identification-level token. It can elevate its privileges by enumerating local system account ticket cache. Alternatively, it can launch its own executable using a system process.
Another method to exploit the problem is to create a symbolic link to the printer spooler folder on your system and then create a SYSTEM folder with the symbolic link. Using this method, the attacker can create arbitrary files and redirect printers to a predefined spooler folder with misconfigured spooler folders.
Several proof-of-concept scripts and exploits are available. They can be used to bypass group policies and gain permissions