漏洞公告
微软官方发布了10月安全更新公告,包含了Microsoft Office、Skype for Business、SQL Server、Windows Kernel、Windows Win32K等微软家族多个软件的安全更新补丁。请相关用户及时更新对应补丁修复漏洞。
漏洞信息
1、 Windows 图形组件特权提升漏洞(CVE-2023-36594)
漏洞标题 | Windows 图形组件特权提升漏洞 | ||
应急响应等级 | 3级 | ||
漏洞类型 | 权限提升 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Windows Graphics Component | ||
影响版本 |
Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 |
||
漏洞编号 | CVE编号 | CVE-2023-36594 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202306-002717 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 7.8 | 危害等级 | 高危 |
CVSS向量 | 访问途径(AV) | 本地 | |
攻击复杂度(AC) | 低 | ||
所需权限(PR) | 低 | ||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 高 | ||
完整性影响(I) | 高 | ||
可用性影响(A) | 高 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 未发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
2、Windows 图形组件特权提升漏洞(CVE-2023-38159)
漏洞标题 | Windows 图形组件特权提升漏洞 |
||
应急响应等级 | 3级 | ||
漏洞类型 | 权限提升 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Windows Graphics Component | ||
影响版本 | Windows Server 2016 (Server Core installation)
|
||
漏洞编号 | CVE编号 | CVE-2023-38159 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202307-001088 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 7.0 | 危害等级 | 高危 |
CVSS向量 | 访问途径(AV) | 本地 | |
攻击复杂度(AC) | 高 | ||
所需权限(PR) | 低 | ||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 高 | ||
完整性影响(I) | 高 | ||
可用性影响(A) | 高 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 未发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
3、Windows Common Log File System Driver 信息泄漏漏洞(CVE-2023-36713)
漏洞标题 | Windows Common Log File System Driver 信息泄漏漏洞 | ||
应急响应等级 | 3级 | ||
漏洞类型 | 信息泄漏 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Windows Common Log File System Driver | ||
影响版本 | Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
||
漏洞编号 | CVE编号 | CVE-2023-36713 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202306-002847 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 5.5 | 危害等级 | 中危 |
CVSS向量 | 访问途径(AV) | 本地 | |
攻击复杂度(AC) | 低 | ||
所需权限(PR) | 低 | ||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 高 | ||
完整性影响(I) | 无 | ||
可用性影响(A) | 无 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 未发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
4、Win32k 特权提升漏洞(CVE-2023-36731)
漏洞标题 | Win32k 特权提升漏洞 | ||
应急响应等级 | 3级 | ||
漏洞类型 | 权限提升 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Windows Win32K | ||
影响版本 |
Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
||
漏洞编号 | CVE编号 | CVE-2023-36731 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202306-002865 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 7.8 | 危害等级 | 高危 |
CVSS向量 | 访问途径(AV) | 本地 | |
攻击复杂度(AC) | 低 | ||
所需权限(PR) | 低 | ||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 高 | ||
完整性影响(I) | 高 | ||
可用性影响(A) | 高 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 未发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
5、Win32k 特权提升漏洞(CVE-2023-36743)
|
|
||
|
|
||
|
|
||
|
|
|
|
|
|
||
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
||
|
|
|
|
|
|
||
|
|
||
|
|
||
|
|
||
|
|
|
|
|
|
|
|
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
|
|
|
|
||
|
|
||
|
|
||
|
|
|
|
|
|
||
|
|
漏洞标题 | Win32k 特权提升漏洞 | ||
应急响应等级 | 3级 | ||
漏洞类型 | 权限提升 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Windows Win32K | ||
影响版本 |
Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
||
漏洞编号 | CVE编号 | CVE-2023-36776 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202306-002943 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 7.0 | 危害等级 | 高危 |
CVSS向量 | 访问途径(AV) | 本地 | |
攻击复杂度(AC) | 高 | ||
所需权限(PR) | 低 | ||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 高 | ||
完整性影响(I) | 高 | ||
可用性影响(A) | 高 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 未发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
7、Microsoft WordPad 信息泄露漏洞(CVE-2023-36563)
漏洞标题 | Microsoft WordPad 信息泄露漏洞 | ||
应急响应等级 | 3级 | ||
漏洞类型 | 信息泄漏 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Microsoft WordPad | ||
影响版本 |
Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows 11 version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
||
漏洞编号 | CVE编号 | CVE-2023-36563 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202306-002686 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 6.5 | 危害等级 | 高危 |
CVSS向量 | 访问途径(AV) | 网络 | |
攻击复杂度(AC) | 低 | ||
所需权限(PR) | 无需任何权限 |
||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 高 | ||
完整性影响(I) | 无 | ||
可用性影响(A) | 无 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 已发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
8、Skype for Business 权限提升漏洞(CVE-2023-41763)
漏洞标题 | Skype for Business 权限提升漏洞 | ||
应急响应等级 | 3级 | ||
漏洞类型 | 权限提升 | ||
影响目标 | 影响厂商 | Microsoft | |
影响产品 | Skype for Business | ||
影响版本 |
Skype for Business Server 2019 CU7 Skype for Business Server 2015 CU13 |
||
漏洞编号 | CVE编号 | CVE-2023-41763 | |
CNVD编号 | 未分配 | ||
CNNVD编号 | 未分配 | ||
安恒CERT编号 | DM-202309-000032 | ||
漏洞标签 | Microsoft | ||
CVSS3.1评分 | 5.3 | 危害等级 | 中危 |
CVSS向量 | 访问途径(AV) | 网络 | |
攻击复杂度(AC) | 低 | ||
所需权限(PR) | 无需任何权限 | ||
用户交互(UI) | 不需要用户交互 | ||
影响范围(S) | 不变 | ||
机密性影响(C) | 低 | ||
完整性影响(I) | 无 | ||
可用性影响(A) | 无 | ||
威胁状态 | Poc情况 | 未发现 |
|
Exp情况 | 未发现 | ||
在野利用 | 已发现 | ||
研究情况 | 分析中 | ||
舆情热度 | 公众号 | 低 | |
低 | |||
微博 | 低 |
修复方案
参考资料
技术支持
如有漏洞相关需求支持请联系400-6777-677获取相关能力支撑
安恒信息CERT
2023年10月
原文始发于微信公众号(安恒信息CERT):【风险通告】微软10月安全更新补丁和多个高危漏洞风险提示
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论