久久综合人妻AV四区|国产乱伦手机av片免费|作爱视频在线观看免费|黄色免费三级片高清|国产黄色在线播放|久久精品丝袜噜噜丝袜|国模激情128p|欧美黄片免费视频|草碰日产人人一级爱|日韩欧美亚洲综合在线观看

官方公告

了解金山云最新公告

公告 > 安全公告 > 【風險通告】關于微軟多個產(chǎn)品高危漏洞的通告
【風險通告】關于微軟多個產(chǎn)品高危漏洞的通告

2020-05-14 00:00:00

2020年5月13日,微軟發(fā)布5月軟件安全更新。修復了111個安全問題,涉及Microsoft Windows、Internet Explorer、Microsoft Edge、.NET Framework、Microsoft Office、Visual Studio等廣泛使用的產(chǎn)品,其中包括特權提升和遠程代碼執(zhí)行等高危漏洞類型。本月微軟月度更新修復的漏洞中,嚴重程度為關鍵(Critical)的漏洞共有16個,重要(Important)漏洞有95個。其中Win32k 特權提升(CVE-2020-1054)漏洞的PoC已公開,請相關用戶及時更新補丁進行防護。

 

漏洞描述


1.       CVE-2020-1153:Microsoft圖形組件遠程代碼執(zhí)行漏洞

Graphics Components是Microsoft Windows操作系統(tǒng)和Microsoft Windows Server操作系統(tǒng)的一個圖形組件。Microsoft Graphics Components在處理內存對象的過程中存在遠程代碼執(zhí)行漏洞。攻擊者可通過誘導用戶打開特制文件來利用此漏洞,成功利用此漏洞的攻擊者可在目標系統(tǒng)上執(zhí)行任意代碼。

危害等級:嚴重

官方通告:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1153

 

2.       CVE-2020-1062:Internet Explorer 內存損壞漏洞

當 Internet Explorer 不正確地訪問內存中的對象時,存在遠程執(zhí)行代碼漏洞。該漏洞可能以一種攻擊者可以在當前用戶的上下文中執(zhí)行任意代碼的方式損壞內存。成功利用該漏洞的攻擊者可以獲得與當前用戶相同的用戶權限。當用戶訪問一個特別設計的、由攻擊者控制的web頁面時,可能會觸發(fā)此漏洞。

危害等級:嚴重

官方通告:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1062

 

3.       CVE-2020-1023、CVE-2020-1024、CVE-2020–1102和CVE-2020-1069:Microsoft SharePoint 遠程執(zhí)行代碼漏洞

以上4個為微軟SharePoint中的遠程代碼執(zhí)行漏洞。攻擊者可以利用此類漏洞獲得在受影響終端或服務器上執(zhí)行任意代碼的能力。由于SharePoint無法檢查應用程序包的源標記,前3個漏洞可以誘導用戶打開一個特別制作的SharePoint應用程序文件從而進行利用。由于SharePoint Server無法正確識別和篩選不安全的 ASP.NET Web 控件,經(jīng)過身份驗證的攻擊者通過上傳一個特別制作的頁面到SharePoint服務器,可成功利用CVE-2020-1069漏洞。

危害等級:嚴重

官方通告:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069

 

4.       CVE-2020-1054(PoC已公開)/CVE-2020-1143:Win32k特權提升漏洞

由于Windows kernel-mode driver未能正確處理內存中的對象,導致存在兩個特權提升漏洞。攻擊者可通過登錄目標系統(tǒng)并運行特制的應用程序來進行利用,成功利用此漏洞的攻擊者可以在系統(tǒng)內核模式中執(zhí)行任意代碼。

危害等級:高危

官方通告:

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1054

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1143

 

5.       CVE-2020-1067:Windows 遠程執(zhí)行代碼漏洞

Windows 在處理內存對象的過程中存在遠程執(zhí)行代碼漏洞。具有域用戶帳戶的攻擊者通過發(fā)送特殊的請求,從而使 Windows執(zhí)行提升權限的任意代碼。成功利用此漏洞可以在受影響的Windows上以更高的權限執(zhí)行任意代碼。

危害等級:高危

官方通告:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1067

 

6.       CVE-2020-0901:Microsoft Excel遠程執(zhí)行代碼漏洞

由于Microsoft Excel無法正確處理內存中的對象,導致存在遠程執(zhí)行代碼漏洞。攻擊者通過誘使用戶使用受影響版本的Microsoft Excel打開經(jīng)過特殊設計的文件進行利用。成功利用此漏洞的攻擊者可以獲得與當前用戶相同的系統(tǒng)控制權限。

危害等級:高危

官方通告:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0901

 

影響版本


重點關注以下漏洞,更多請查閱官方通告鏈接:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-May

 

1.       CVE-2020-1054、CVE-2020-1143、CVE-2020-1067、CVE-2020-1153

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for Itanium-Based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server, version 1803 (Server Core Installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

 

2.       CVE-2020-1062

Internet Explorer 11:

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows Server 2019

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows Server 2016

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2012

Windows Server 2012 R2

 

Internet Explorer 9:

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

 

3.       CVE-2020-1023、CVE-2020-1024、CVE-2020-1069

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

 

4.       CVE-2020-1102

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Server 2019

 

5.       CVE-2020-0901

Microsoft 365 Apps for Enterprise for 32-bit Systems

Microsoft 365 Apps for Enterprise for 64-bit Systems

Microsoft Excel 2010 Service Pack 2 (32-bit editions)

Microsoft Excel 2010 Service Pack 2 (64-bit editions)

Microsoft Excel 2013 RT Service Pack 1

Microsoft Excel 2013 Service Pack 1 (32-bit editions)

Microsoft Excel 2013 Service Pack 1 (64-bit editions)

Microsoft Excel 2016 (32-bit edition)

Microsoft Excel 2016 (64-bit edition)

Microsoft Office 2016 for Mac

Microsoft Office 2019 for 32-bit editions

Microsoft Office 2019 for 64-bit editions

Microsoft Office 2019 for Mac

 

修復方案


方法一:

在windows的安全中心進行在線下載安裝更新補?。?/p>

 

方法二:

由于系統(tǒng)環(huán)境以及網(wǎng)絡環(huán)境的原因,方法一(在線更新)可能會出現(xiàn)升級失敗的問題,可以點擊瀏覽官方公告,然后點擊更新名稱跳轉到微軟官方的下載頁面,之后下載安全更新獨立程序包進行安裝。

 

官方公告:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-May

 

 

 


北京金山云網(wǎng)絡技術有限公司

2020/5/14