[German]ACROS Security has released a micropatch for the vulnerability CVE-2020-1337 (Windows Print Spooler Elevation of Privilege) for Windows 7 and Server 2008 R2 (without ESU license).
Vulnerability CVE-2020-1337
CVE-2020-1337 was issued for a privilege escalation vulnerability in the Windows print spooler service. The vulnerability exists because the Windows print spooler service incorrectly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated system privileges. An attacker could then install programs, view, modify, or delete data, or create new accounts with full user privileges.
To exploit this vulnerability, an attacker would have to log on to an affected system and execute a specially crafted script or application. I had addressed the vulnerability in the blog post Windows PrintDaemon vulnerability CVE-2020-1337 details.
Microsoft released security updates for Windows 7 through Windows 10 on August 11, 2020. However, users of Windows 7 SP1 and Windows Server 2008 R2 who do not have an ESU license will no longer receive the security updates released by Microsoft.
0patch-Fix for Windows 7 SP1/Server 2008 R2
ACROS Security has developed a micropatch for the vulnerability CVE-2020-1337. I got aware of the information about the release of the micropatch for Windows 7 SP1 and Windows Server 2008 R2 via Twitter.
(0patch Fix for CVE-2020-1337 )
This micropatch is now available for 0patch users with PRO license and is already applied to all online computers with 0patch Agent (except in non-standard enterprise configurations). As always, there is no need to restart the computer and users' work is not interrupted.
For information on how the 0patch Agent works, which loads the micro-patches into memory at runtime of an application, please refer to the blog posts (e.g. here) I have linked below.
Similar articles:
Windows 7: Forcing February 2020 Security Updates – Part 1
Windows 7: Securing with the 0patch solution – Part 2
Windows 7/Server 2008/R2: 0patch delivers security patches after support ends
Project: Windows 7/Server 2008/R2 Life Extension & 0patch one month trial
0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674
0patch: Fix for Windows Installer flaw CVE-2020-0683
0patch fix for Windows GDI+ vulnerability CVE-2020-0881
0-day vulnerability in Windows Adobe Type Library
0patch fixes CVE-2020-0687 in Windows 7/Server 2008 R2
0patch fixes CVE-2020-1048 in Windows 7/Server 2008 R2
0patch fixes CVE-2020-1015 in Windows 7/Server 2008 R2
0patch for 0-day RCE vulnerability in Zoom for Windows
Windows Server 2008 R2: 0patch fixes SIGRed vulnerability
0patch fixes CVE-2020-1113 in Windows 7/Server 2008 R2