TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Stuxnet's Legacy Lives on in New Windows Bug

187 pointsby whiteyfordabout 5 years ago

10 comments

barbegalabout 5 years ago
It&#x27;s worth reading the full technical analysis <a href="https:&#x2F;&#x2F;windows-internals.com&#x2F;printdemon-cve-2020-1048&#x2F;" rel="nofollow">https:&#x2F;&#x2F;windows-internals.com&#x2F;printdemon-cve-2020-1048&#x2F;</a><p>It&#x27;s well written and easy to follow even for someone that doesn&#x27;t know much about Windows security.<p>And if you didn&#x27;t read it the bug comes from the fact that the Powershell command Add-PrinterPort can be used to add a printer port as a file that you don&#x27;t have access to. After restarting the spooler service you can then use this port to write to that file.
评论 #23189765 未加载
评论 #23182383 未加载
ciarannolanabout 5 years ago
I thought Countdown to Zero Day: Stuxnet and the Launch of the World&#x27;s First Digital Weapon was a fantastic chronicle of Stuxnet.<p>For those not interested in the whole narrative, it&#x27;s still interesting to browse one or two chapters of interest.<p><a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Countdown-Zero-Day-Stuxnet-Digital&#x2F;dp&#x2F;0770436196" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Countdown-Zero-Day-Stuxnet-Digital&#x2F;dp...</a>
评论 #23180671 未加载
评论 #23184295 未加载
Jonnaxabout 5 years ago
Why&#x27;s it so difficult to write a print spooler?<p>I&#x27;m not too familar with what it does exactly. But I presume it&#x27;s a queue of documents to send to a printer and some level of conversation of the data from a print document format to what the printer driver understands.<p>This seems like quite a crazy bug. Also today, a lot of home printers are network printers so it shouldn&#x27;t even require higher privilages to send the document to the printer, right?<p>Or is printing in Windows a huge can of worms like its use of UTF-16?
评论 #23181078 未加载
评论 #23181330 未加载
评论 #23194141 未加载
s_devabout 5 years ago
I&#x27;m still in awe of stuxnet:<p><a href="https:&#x2F;&#x2F;www.quora.com&#x2F;What-is-the-most-sophisticated-piece-of-software-ever-written-1?share=1" rel="nofollow">https:&#x2F;&#x2F;www.quora.com&#x2F;What-is-the-most-sophisticated-piece-o...</a><p>Almost certainly an NSA product.
评论 #23180411 未加载
jstriebabout 5 years ago
For a recent take on the geopolitical effects of Stuxnet and many other cyber attacks, I can recommend <i>The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics</i> by Dr. Ben Buchanan.<p>I found it to be a fascinating account of international cyber attacks with a clear, well-argued thesis.<p><a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Hacker-State-Attacks-Normal-Geopolitics&#x2F;dp&#x2F;0674987551" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Hacker-State-Attacks-Normal-Geopoliti...</a>
jakozaurabout 5 years ago
Stuxnet is a masterpiece in terms of achieving goals while attacking hard to hit, network isolated facilities.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Stuxnet" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Stuxnet</a><p>It would be very interesting to see the next Stuxnet class viruses, sponsored by major companies&#x2F;countries. I&#x27;m fairly sure there are some already running in the wild.
cyptusabout 5 years ago
See also on <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23178247" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23178247</a>
cafabout 5 years ago
I&#x27;m pretty sure I recall the &quot;Generic &#x2F; Text-Only&quot; printer driver from Windows 3.0 days.
mrlonglongabout 5 years ago
Isn&#x27;t Alex Ionescu also the chap working on ReactOS, a clone of Windows?
lostmsuabout 5 years ago
TL;DR; there was a local privilege escalation bug in Print Spooler (fixed yesterday). The article calls it &quot;Stuxnet&#x27;s Legacy&quot; because Stuxnet hit the same component. But Stuxnet bug was a remote code execution (10 years ago).
评论 #23179999 未加载