<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    微軟8月份補丁日重點漏洞預警

    Ann2021-08-12 14:39:22

    一、漏洞情況

    8月11日,微軟發布8月安全更新公告,修復了Microsoft Office、Windows NTLM、Windows TCP/IP、.NET Core & Visual Studio、ASP .NET等多個關鍵組件存在44個安全漏洞,其中,7個被微軟標記為“嚴重”級別漏洞,37個標記為“重要”級別漏洞。目前廠商已發布漏洞修復補丁,建議廣大用戶及時下載并安裝修復補丁進行防護,做好資產自查以及預防工作,以免遭受黑客攻擊。

    二、漏洞等級

    高危

    三、漏洞描述

    根據產品流行度和漏洞重要性篩選出此次更新中包含影響較大的漏洞,請相關用戶重點進行關注:

    1.NFS ONCRPC XDR驅動的Windows服務遠程代碼執行漏洞(CVE-2021-26432)

    未經身份驗證的攻擊者可遠程利用該漏洞在目標主機上執行任意代碼,可導致目標主機被攻擊者控制。

    2.遠程桌面客戶端遠程代碼執行漏洞(CVE-2021-34535)

    該漏洞僅影響RDP客戶端,當攻擊者控制RDP服務器時可利用該漏洞通過遠程桌面客戶端在客戶計算機上觸發遠程代碼執行,造成客戶端機器被入侵。

    3.Windows Print Spooler遠程代碼執行漏洞(CVE-2021-36936)

    具備低權限的攻擊者利用該漏洞可在目標主機遠程執行任意代碼,可導致目標主機被攻擊者控制。

    4.Windows LSA欺騙漏洞(CVE-2021-36942)

    該漏洞允許攻擊者調用LSARPC接口的方法,使域控用NTLM對另一個服務器進行身份驗證,該利用過程無需用戶交互。

    5.Windows Update Medic服務權限提升漏洞(CVE-2021-36948)

    攻擊者需要登錄受影響的系統并運行特制的程序來提升權限。

    6.Windows TCP/IP遠程代碼執行漏洞(CVE-2021-26424)

    攻擊者可通過發送ipv6 ping觸發該漏洞,可在目標系統執行任意代碼。

    四、影響范圍

    1.CVE-2021-26432:

    • Windows 10 Version 1607 for x64-based Systems
    • Windows 10 Version 1607 for 32-bit Systems
    • Windows 10 for x64-based Systems
    • Windows 10 for 32-bit Systems
    • Windows Server, version 20H2 (Server Core Installation)
    • Windows 10 Version 20H2 for ARM64-based Systems
    • Windows 10 Version 20H2 for 32-bit Systems
    • Windows 10 Version 20H2 for x64-based Systems
    • Windows Server, version 2004 (Server Core installation)
    • Windows 10 Version 2004 for x64-based Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 21H1 for 32-bit Systems
    • Windows 10 Version 21H1 for ARM64-based Systems
    • Windows 10 Version 21H1 for x64-based Systems
    • Windows 10 Version 1909 for ARM64-based Systems
    • Windows 10 Version 1909 for x64-based Systems
    • Windows 10 Version 1909 for 32-bit Systems
    • Windows Server 2019 (Server Core installation)
    • Windows Server 2019
    • Windows 10 Version 1809 for ARM64-based Systems
    • Windows 10 Version 1809 for x64-based Systems
    • Windows 10 Version 1809 for 32-bit Systems
    • Windows Server 2012 R2 (Server Core installation)
    • Windows Server 2012 R2
    • Windows Server 2012 (Server Core installation)
    • Windows Server 2012
    • Windows RT 8.1
    • Windows 8.1 for x64-based systems
    • Windows 8.1 for 32-bit systems
    • Windows Server 2016 (Server Core installation)
    • Windows Server 2016

    2.CVE-2021-34535:

    • Windows 10 Version 20H2 for x64-based Systems
    • Windows 10 Version 2004 for x64-based Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 21H1 for 32-bit Systems
    • Windows 10 Version 21H1 for ARM64-based Systems
    • Windows 10 Version 21H1 for x64-based Systems
    • Remote Desktop client for Windows Desktop
    • Windows 10 Version 1909 for ARM64-based Systems
    • Windows 10 Version 1909 for x64-based Systems
    • Windows 10 Version 1909 for 32-bit Systems
    • Windows Server 2019
    • Windows 10 for x64-based Systems
    • Windows 10 for 32-bit Systems
    • Windows 10 Version 20H2 for ARM64-based Systems
    • Windows 10 Version 20H2 for 32-bit Systems
    • Windows Server 2012
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1
    • Windows RT 8.1
    • Windows 8.1 for x64-based systems
    • Windows 8.1 for 32-bit systems
    • Windows 7 for x64-based Systems Service Pack 1
    • Windows 7 for 32-bit Systems Service Pack 1
    • Windows Server 2016
    • Windows 10 Version 1607 for x64-based Systems
    • Windows 10 Version 1607 for 32-bit Systems
    • Windows Server 2012 R2
    • Windows 10 Version 1809 for ARM64-based Systems
    • Windows 10 Version 1809 for x64-based Systems
    • Windows 10 Version 1809 for 32-bit Systems

    3.CVE-2021-36936:

    • Windows Server 2012 R2 (Server Core installation)
    • Windows Server 2012 R2
    • Windows RT 8.1
    • Windows 8.1 for x64-based systems
    • Windows 8.1 for 32-bit systems
    • Windows 7 for x64-based Systems Service Pack 1
    • Windows 7 for 32-bit Systems Service Pack 1
    • Windows Server 2016 (Server Core installation)
    • Windows Server 2016
    • Windows 10 Version 1607 for x64-based Systems
    • Windows 10 Version 1607 for 32-bit Systems
    • Windows 10 for x64-based Systems
    • Windows 10 for 32-bit Systems
    • Windows Server, version 20H2 (Server Core Installation)
    • Windows 10 Version 20H2 for ARM64-based Systems
    • Windows 10 Version 20H2 for 32-bit Systems
    • Windows 10 Version 20H2 for x64-based Systems
    • Windows Server, version 2004 (Server Core installation)
    • Windows 10 Version 2004 for x64-based Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 21H1 for 32-bit Systems
    • Windows 10 Version 21H1 for ARM64-based Systems
    • Windows 10 Version 21H1 for x64-based Systems
    • Windows 10 Version 1909 for ARM64-based Systems
    • Windows 10 Version 1909 for x64-based Systems
    • Windows 10 Version 1909 for 32-bit Systems
    • Windows Server 2019 (Server Core installation)
    • Windows Server 2019
    • Windows 10 Version 1809 for ARM64-based Systems
    • Windows 10 Version 1809 for x64-based Systems
    • Windows 10 Version 1809 for 32-bit Systems
    • Windows Server 2012 (Server Core installation)
    • Windows Server 2012
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1
    • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
    • Windows Server 2008 for x64-based Systems Service Pack 2
    • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
    • Windows Server 2008 for 32-bit Systems Service Pack 2

    4.CVE-2021-36942:

    • Windows Server 2012 R2 (Server Core installation)
    • Windows Server 2012 R2
    • Windows Server 2012 (Server Core installation)
    • Windows Server 2012
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1
    • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
    • Windows Server 2008 for x64-based Systems Service Pack 2
    • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
    • Windows Server 2008 for 32-bit Systems Service Pack 2
    • Windows Server 2016 (Server Core installation)
    • Windows Server 2016
    • Windows Server, version 20H2 (Server Core Installation)
    • Windows Server, version 2004 (Server Core installation)
    • Windows Server 2019 (Server Core installation)
    • Windows Server 2019

    5.CVE-2021-36948:

    • Windows Server, version 20H2 (Server Core Installation)
    • Windows 10 Version 20H2 for ARM64-based Systems
    • Windows 10 Version 20H2 for 32-bit Systems
    • Windows 10 Version 20H2 for x64-based Systems
    • Windows Server, version 2004 (Server Core installation)
    • Windows 10 Version 2004 for x64-based Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 21H1 for 32-bit Systems
    • Windows 10 Version 21H1 for ARM64-based Systems
    • Windows 10 Version 21H1 for x64-based Systems
    • Windows 10 Version 1909 for ARM64-based Systems
    • Windows 10 Version 1909 for x64-based Systems
    • Windows 10 Version 1909 for 32-bit Systems
    • Windows Server 2019 (Server Core installation)
    • Windows Server 2019
    • Windows 10 Version 1809 for ARM64-based Systems
    • Windows 10 Version 1809 for x64-based Systems
    • Windows 10 Version 1809 for 32-bit Systems

    6.CVE-2021-26424:

    • Windows 7 for x64-based Systems Service Pack 1
    • Windows 10 Version 21H1 for x64-based Systems
    • Windows 10 Version 1909 for ARM64-based Systems
    • Windows 10 Version 1909 for x64-based Systems
    • Windows 10 Version 1909 for 32-bit Systems
    • Windows Server 2019 (Server Core installation)
    • Windows Server 2012 R2 (Server Core installation)
    • Windows Server 2012 R2
    • Windows Server 2012 (Server Core installation)
    • Windows Server 2012
    • Windows Server 2019
    • Windows 10 Version 1809 for ARM64-based Systems
    • Windows 10 Version 1809 for x64-based Systems
    • Windows 10 Version 1809 for 32-bit Systems
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1
    • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
    • Windows Server 2008 for x64-based Systems Service Pack 2
    • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
    • Windows Server 2008 for 32-bit Systems Service Pack 2
    • Windows RT 8.1
    • Windows 8.1 for x64-based systems
    • Windows 8.1 for 32-bit systems
    • Windows 7 for 32-bit Systems Service Pack 1
    • Windows Server 2016 (Server Core installation)
    • Windows Server 2016
    • Windows 10 Version 1607 for x64-based Systems
    • Windows 10 Version 1607 for 32-bit Systems
    • Windows 10 for x64-based Systems
    • Windows 10 for 32-bit Systems
    • Windows Server, version 20H2 (Server Core Installation)
    • Windows 10 Version 20H2 for ARM64-based Systems
    • Windows 10 Version 20H2 for 32-bit Systems
    • Windows 10 Version 20H2 for x64-based Systems
    • Windows Server, version 2004 (Server Core installation)
    • Windows 10 Version 2004 for x64-based Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 21H1 for 32-bit Systems
    • Windows 10 Version 21H1 for ARM64-based Systems

    五、安全建議

    目前微軟官方已發布漏洞修復補丁,建議受影響用戶及時更新補丁并安裝。

    下載鏈接:

    • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26432
    • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34535
    • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36936
    • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942
    • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948
    • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424

    六、參考鏈接

    https://msrc.microsoft.com/update-guide/releaseNote/2021-Aug

    漏洞bit
    本作品采用《CC 協議》,轉載必須注明作者和本文鏈接
    Atlassian發布安全公告,修復了一個存在于 Atlassian? ?Bitbucket Data Center 中的代碼執行漏洞漏洞編號:CVE-2022-26133,漏洞威脅等級:嚴重,漏洞評分:10.0。
    網絡安全初創公司 BitSight 發現了中國 MiCODUS 制造的 GPS 追蹤器 MV720 的六個缺陷。據 BitSight 的 IT 安全研究人員稱,主要用于跟蹤車隊的 MV720 GPS 跟蹤器中存在嚴重的安全漏洞。這些漏洞可以讓黑客遠程跟蹤、停止和控制車輛。
    360漏洞云已復現HTTP Protocol Stack遠程代碼執行漏洞漏洞編號:CVE-2022-21907,漏洞威脅等級:嚴重,漏洞評分:9.8。
    近日,360漏洞云監測該CVE-2022-26923漏洞的細節及PoC已在互聯網公開。當Active Directory證書服務在域上運行時,經過身份驗證的攻擊者可以在證書請求中包含特制的數據。
    Win32k組件最初的設計和編寫是完全建立的用戶層上的,但是微軟在 Windows NT 4.0 的改變中將 Win32k.sys 作為改變的一部分而引入,用以提升圖形繪制性能并減少 Windows 應用程序的內存需求。窗口管理器(User)和圖形設備接口(GDI)在極大程度上被移出客戶端/服務端運行時子系統(CSRSS)并被落實在它自身的一個內核模塊中。
    SCADAfence表示,這是首次將CVE標識符分配給Alerton產品中的漏洞。正義獎賞計劃是美國國務院的一項計劃,獎勵與影響美國國家安全的威脅行為者相關的信息。消息人士稱,沙特阿拉伯和以色列公司之間日益增長的秘密網絡間諜關系將為所謂的CyberIC計劃鋪平道路,該計劃旨在保護沙特王國的網絡安全部門。
    MiCODUS MV720全球定位系統 (GPS) 跟蹤器中的多個缺陷 可讓黑客遠程入侵超過 150 萬輛汽車。 美國網絡安全和基礎設施安全局 (CISA) 發布公告,警告 超過 150 萬輛汽車使用的MiCODUS MV720全球定位系統 (GPS) 跟蹤器存在多個安全漏洞。
    隨著全球加密貨幣規模正在超高速的增長,加密貨幣的安全存儲成為了關鍵的一環。去年一年,加密貨幣行業已逐步從2022年的丑聞、市場暴跌中復蘇過來,市場熱度也逐步回升。與此同時,與加密貨幣有關的網絡犯罪也再度活躍。
    IP Spoofing也叫IP欺騙,其原理是攻擊者機器A利用軟件構造一個虛假不存在的IP地址,并以此不存在地址為源IP地址向受害者機器B發送SYN報文,請求建立TCP/IP連接。目標機器B接收到這個SYN報文后,會將收到的SYN報文中的源IP地址提取出來,并將此IP作為目的IP,回復一個ACK/SYN確認報文給B,并等待接收來自B的確認報文。
    日前,BitDefender 宣稱發現首個通過 Log4Shell 漏洞直接安裝的勒索軟件,該漏洞利用程序會下載一個 Java 類hxxp://3.145.115[.]94/Main.class(該類由 Log4j 應用程序加載和執行)文件。加載后,它會從同一臺服務器下載一個 .NET 二進制文件,該文件是一個安裝名為“Khonsari”的新勒索軟件。
    Ann
    暫無描述
      亚洲 欧美 自拍 唯美 另类