微软 | 9月多个产品漏洞通告

admin 2020年9月10日11:00:42评论158 views字数 9617阅读32分3秒阅读模式

0x00 漏洞概述

2020年09月08日星期二,Microsoft发布了9月的安全更新。本次安全更新共修复了129个漏洞,涉及Microsoft Windows、Internet Explorer、Microsoft Office、Microsoft Exchange Serve等,目前尚没有一个漏洞被在野利用。其中有23个漏洞为严重漏洞,105个为高危漏洞。 

0x01 漏洞详情

微软 | 9月多个产品漏洞通告


 

 2020年9月安全更新涉及以下组件:

lMicrosoft Windows

lMicrosoft Edge (EdgeHTML-based)

lMicrosoft Edge (Chromium-based)

lMicrosoft ChakraCore

lInternet Explorer

lSQL Server

lMicrosoft JET Database Engine

lMicrosoft Office and Microsoft Office Services and Web Apps

lMicrosoft Dynamics

lVisual Studio

lMicrosoft Exchange Server

lSQL Server

lASP.NET

lMicrosoft OneDrive

lAzure DevOps


 部分受影响的版本如下:


CVE编号

影响版本

CVE-2020-0664

Windows Server 2008 for 32-bit SystemsService Pack 2

Windows Server 2008 for 32-bit SystemsService Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

 

CVE-2020-0922

CVE-2020-1252

CVE-2020-1285

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-basedSystems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-basedSystems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core   installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server   Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1   (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016  (Server   Core installation)

Windows Server 2019

Windows Server 2019  (Server   Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server, version 2004 (Server Core installation)

CVE-2020-1129

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows Server 2016

Windows Server 2016  (Server   Core installation)

Windows Server 2019

Windows Server 2019  (Server   Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server, version 2004 (Server Core installation)

CVE-2020-1200

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

CVE-2020-1210

Microsoft Business Productivity Servers 2010 Service Pack 2

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Server 2010 Service Pack 2

Microsoft SharePoint Server 2019

CVE-2020-1319

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows Server 2016

Windows Server 2016  (Server   Core installation)

Windows Server 2019

Windows Server 2019  (Server   Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server, version 2004 (Server Core installation)

CVE-2020-1452

CVE-2020-1453

CVE-2020-1460

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

CVE-2020-1576

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2010 Service Pack 2

Microsoft SharePoint Server 2019

CVE-2020-1595

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019


部分漏洞详情


1.Microsoft COM 远程代码执行漏洞(CVE-2020-0922)

 Windows的Microsoft COM处理内存对象的方式中存在一个远程代码执行漏洞。

攻击者引诱用户访问一个带有恶意JavaScript的网站利用此漏洞,成功利用此漏洞的攻击者可以在目标系统上执行任意代码。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922

 

2.Microsoft SharePoint远程代码执行多个安全漏洞

当软件无法检查应用程序包的源标记时,Microsoft SharePoint中将存在一个远程代码执行漏洞。

攻击者需要上传一个恶意的SharePoint应用程序包到受影响的SharePoint版本来利用此漏洞,成功利用此漏洞的攻击者可以在SharePoint应用程序池和SharePoint服务器帐户中运行任意代码。

本次Microsoft修复了Sharepoint 2010年至2019年版本中的7个其他严重漏洞。分别为:CVE-2020-1200、CVE-2020-1210、CVE-2020-1452、CVE-2020-1453、CVE-2020-1576、CVE-2020-1460CVE-2020-1595。

1.CVE-2020-1200

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200

2.CVE-2020-1210

CVE-2020-1210是受支持版本的Microsoft Sharepoint文档管理软件中的远程代码执行漏洞。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1210

3.CVE-2020-1452

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1452

4.CVE-2020-1453

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1453

5.CVE-2020-1460

Microsoft SharePoint Server无法正确识别和过滤不安全的ASP.Net Web控件时,它会存在一个远程代码执行漏洞。

攻击者通过在受影响的Microsoft SharePoint Server版本上创建并调用特制页面来利用此漏洞,成功利用此漏洞并经过身份验证的攻击者可以使用特制页面在SharePoint应用程序池进程安全方面执行操作。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460

6.CVE-2020-1576

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1576

7.CVE-2020-1595

Microsoft SharePoint中存在一个远程代码执行漏洞,由于没有防护策略来使API免受不安全数据输入的攻击。攻击者通过在受影响的SharePoint版本上使用特殊格式的输入访问易受感染的API来利用此漏洞。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595

 

3.Microsoft Windows Codecs 库远程代码执行漏洞(CVE-2020-1319)

Microsoft Windows Codecs 库处理内存中的对象时,存在一处远程代码执行漏洞。

成功利用此漏洞的攻击者可以控制受影响的系统,如安装程序、查看、更改或删除数据,或创建具有完全用户权限的新帐户。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1319

 

4.Dynamics 365(on-premises)远程代码执行漏洞

1. Microsoft Dynamics 365 for Finance and Operations(on-premises)远程代码执行漏洞(CVE-2020-16857)

Microsoft Dynamics 365 for Finance and Operations(on-premises)版本10.0.11中存在一个远程代码执行漏洞。经过身份验证的、具有导入和导出数据特权的攻击者可以通过将恶意文件发送到易受攻击的Dynamics服务器来利用此漏洞,成功利用此漏洞的攻击者可以通过在受害者服务器上执行服务器端脚本来实现远程代码执行。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16857

2. Microsoft Dynamics 365(on-premises)远程代码执行漏洞(CVE-2020-16862)

当服务器无法正确对待受影响的Dynamics服务器的Web请求时,Microsoft Dynamics 365(on-premises)中将存在一个远程代码执行漏洞。经过身份验证的攻击者可以通过将恶意请求发送到易受攻击的Dynamics服务器来利用此漏洞,成功利用此漏洞的攻击者可以在SQL服务帐户中运行任意代码。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16862

 

5.Microsoft Exchange Server远程代码执行漏洞(CVE-2020-16875 )

由于对cmdlet参数的验证不正确,Microsoft Exchange服务器中存在一个远程代码执行漏洞。成功利用此漏洞的攻击者可以在受影响的系统上执行任意代码。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875

0x02 处置建议

微软官方已于2020年09月08日发布了相关软件的安全更新,建议用户及时更新相关补丁。

下载地址:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep

0x03 相关新闻

https://krebsonsecurity.com/2020/09/microsoft-patch-tuesday-sept-2020-edition/

https://blog.qualys.com/vulnerabilities-research/2020/09/08/september-2020-patch-tuesday-129-vulnerabilities-23-critical-sharepoint-exchange-windows-codecs-adobe-vulns

0x04 参考链接

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep

0x05 时间线

2020-09-08 微软官方发布安全更新

2020-09-09 VSRC发布安全通告

 

 


微软 | 9月多个产品漏洞通告


 

 

 


  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2020年9月10日11:00:42
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   微软 | 9月多个产品漏洞通告http://cn-sec.com/archives/128111.html

发表评论

匿名网友 填写信息