Windows TCP/IP远程代码执行漏洞(CVE-2022-34718)

admin 2022-12-13 01:58:04 CNNVD预警 来源:ZONE.CI 全球网 0 阅读模式

       漏洞描述:

       该漏洞允许远程攻击者在系统上执行任意代码。由于在 Windows TCP/IP 中对用户输入没有进行充分的验证,远程攻击者可以发送一个特制的 IPv6数据包,触发漏洞,并在目标系统上执行任意代码。

       漏洞影响版本:

       Windows Server 2008 for 32-bit Systems Service Pack 2
       Windows RT 8.1
       Windows 10 Version 21H1 for ARM64-based Systems
       Windows 10 Version 21H1 for x64-based Systems
       Windows Server 2019 (Server Core installation)
       Windows Server 2019
       Windows 10 Version 1809 for ARM64-based Systems
       Windows 10 Version 1809 for x64-based Systems
       Windows 10 Version 1809 for 32-bit Systems
       Windows 8.1 for x64-based systems
       Windows 8.1 for 32-bit systems
       Windows 7 for x64-based Systems Service Pack 1
       Windows 7 for 32-bit Systems Service Pack 1
       Windows Server 2022 Azure Edition Core Hotpatch
       Windows Server 2022 (Server Core installation)
       Windows Server 2022
       Windows 10 Version 21H1 for 32-bit Systems
       Windows Server 2012 R2 (Server Core installation)
       Windows Server 2012 R2
       Windows Server 2012 (Server Core installation)
       Windows Server 2012
       Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
       Windows Server 2008 R2 for x64-based Systems Service Pack 1
       Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
       Windows Server 2008 for x64-based Systems Service Pack 2
       Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
       Windows Server 2016 (Server Core installation)
       Windows Server 2016
       Windows 10 Version 1607 for x64-based Systems
       Windows 10 Version 1607 for 32-bit Systems
       Windows 10 for x64-based Systems
       Windows 10 for 32-bit Systems
       Windows 10 Version 21H2 for x64-based Systems
       Windows 10 Version 21H2 for ARM64-based Systems
       Windows 10 Version 21H2 for 32-bit Systems
       Windows 11 for ARM64-based Systems
       Windows 11 for x64-based Systems
       Windows 10 Version 20H2 for ARM64-based Systems
       Windows 10 Version 20H2 for 32-bit Systems
       Windows 10 Version 20H2 for x64-based Systems     

       漏洞在野情况:

       poc与利用细节已经公开。

       漏洞修复方式:

       通用修复建议:
       采用以下官方解决方案及缓解方案来防护此漏洞:
       Windows自动更新:
       Windows系统默认启用 Microsoft Update,当检测到可用更新时,将会自动下载更新并在下一次启动时安装。还可通过以下步骤快速安装更新:
       1、点击“开始菜单”或按Windows快捷键,点击进入“设置”
       2、选择“更新和安全”,进入“Windows更新”(可通过控制面板进入“Windows更新”,步骤为“控制面板”-> “系统和安全”->“Windows更新”)
       3、选择“检查更新”,等待系统将自动检查并下载可用更新
       4、重启计算机,安装更新
       系统重新启动后,可通过进入“Windows更新”->“查看更新历史记录”查看是否成功安装了更新。对于没有成功安装的更新,可以点击该更新名称进入微软官方更新描述链接,点击最新的SSU名称并在新链接中点击“Microsoft 更新目录”,然后在新链接中选择适用于目标系统的补丁进行下载并安装。

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
OpenSSL 缓冲区溢出漏洞通报 CNNVD预警

OpenSSL 缓冲区溢出漏洞通报

暂无关联的漏洞编号一、漏洞概况 近日,微步在线获取到 OpenSSL 缓冲区溢出漏洞(CVE-2022-3602)相关情报,攻击 者可以利用该漏洞造成缓冲区溢出, 可能造成远程
评论:0   参与:  0