Microsoft releases update KB5004956 deployment on Windows Server 2012

0


Microsoft released update KB5004956 for Windows Server 2012 overnight. The update includes improvements and fixes that were part of KB4503697 for Windows Server 2012, dated June 8, 2021. CVE-2021-34527 Microsoft resolves security vulnerabilities in the Windows Print Spoiler service. After you install this update and subsequent updates, non-administrator users can only install signed printer drivers on the print server. Microsoft recommends installing this update on all Windows clients and servers, starting with devices that currently act as the print server. A list of known issues is available from Microsoft. The update can now be downloaded from the Windows Update, Microsoft Update, or Windows Server Update Services and Microsoft Update list. More information about this update can be found below or through Microsoft.

Download -> Download KB5004956 Update for Windows Server 2012

The KB5004956 update roll is now available for download from Microsoft:

The update includes the following improvements and bug fixes:

As documented in CVE-2021-34527, remote code activation on a Windows print spoiler service called “Print Nightmare” refers to exploitation. After you install this Windows update and later versions, non-administrator users can only install signature print drivers on the print server. By default, administrators can install signed and unsigned printer drivers on the print server. Root certificates installed on trusted root CAs of the system trust signed drivers. Microsoft recommends that you immediately install this update on all supported Windows client and server operating systems, starting with devices that currently offer the print server role. You can configure the RestrictDriverInstallationToAd administrators registry to prevent non-administrators from installing signature printer drivers on the print server. For more information, see KB5005010.

Additional information about KB5004956 for Windows Server 2012 is available from Microsoft.

CVE-2021-34527 | Vulnerability in remote code activation of Windows Ax spool

Unscheduled security updates for Windows can now be downloaded:

Going through Windows Server 2012 update history


Leave A Reply

Your email address will not be published.