WebClientPrint Processor 2.0.15.109 Updates Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 23 Aug 2017.

  1. Packet Storm

    Packet Storm Guest

    RedTeam Pentesting discovered that rogue updates trigger a remote code execution vulnerability in WebClientPrint Processor (WCPP). These updates may be distributed through specially crafted websites and are processed without any user interaction as soon as the website is accessed. However, the browser must run with administrative privileges. Version 2.0.15.109 is affected.

    Continue reading...
     

Share This Page

Loading...