漏洞公告
近日,中国电信SRC监测到微软官方发布5月安全更新补丁漏洞,包括Windows NFS、Windows PGM、Windows LDAP、Windows OLE、Windows SSTP等多个CVE安全漏洞补丁,当前官方已发布相关补丁,建议用户及时更新对应补丁修复漏洞。
参考链接:
https://msrc.microsoft.com/update-guide/
一、影响版本
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows OLE 远程代码执行漏洞(CVE-2023-29325):
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 安全套接字隧道协议 (SSTP) 远程代码执行漏洞
(CVE-2023-24903):Microsoft SharePoint Server Subscription Edition
Microsoft SharePoint Server 2019
Microsoft SharePoint Enterprise Server 2016
二、漏洞描述
Windows 网络文件系统(NFS)远程代码执行漏洞(CVE-2023-24941):cvss3.1评分:9.8(超危);攻击者通过对网络文件系统 (NFS) 服务进行未经身份验证的特制调用以触发远程代码执行 (RCE)。
细节是否公开 |
POC状态 |
EXP状态 |
在野利用 |
否 |
未公开 |
未公开 |
未公开 |
Windows Pragmatic General Multicast (PGM) 远程代码执行漏洞(CVE-2023-24943):cvss3.1评分:9.8(超危);Windows Pragmatic General Multicast (PGM) 远程代码执行漏洞,由于Windows Pragmatic General Multicast (PGM)中对用户提供的输入验证不足,当 Windows Message Queuing 服务在 PGM Server 环境中运行时,未经身份验证的远程攻击者通过网络发送经特别设计的文件,成功利用该漏洞后可以执行恶意代码。
细节是否公开 |
POC状态 |
EXP状态 |
在野利用 |
否 |
未公开 |
未公开 |
未公开 |
细节是否公开 |
POC状态 |
EXP状态 |
在野利用 |
否 |
未公开 |
未公开 |
未公开 |
细节是否公开 |
POC状态 |
EXP状态 |
在野利用 |
否 |
未公开 |
未公开 |
未公开 |
细节是否公开 |
POC状态 |
EXP状态 |
在野利用 |
否 |
未公开 |
未公开 |
未公开 |
三、修复措施
官方建议:
Windows Network File System远程代码执行漏洞(CVE-2023-24941)临时缓解措施:此漏洞在 NFSV2.0 或 NFSV3.0 中不可利用。在更新可抵御此漏洞的 Windows 版本之前,您可以通过禁用 NFSV4.1 来减轻攻击。这可能会对您的生态系统产生不利影响,只能用作临时缓解措施。除非您已安装 2022 年 5 月的 Windows 安全更新,否则不应应用此缓解措施。这些更新解决了CVE-2022-26937,这是 NFSV2.0 和 NFSV3.0 中的一个严重漏洞。