微软1月补丁日
多个高危安全漏洞
1月11日,微软官方发布了本月的安全更新通告,对多个产品中的安全漏洞进行了修复:
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jan
其中值得关注的可远程利用的服务端漏洞包括 CVE-2022-21907 HTTP 协议栈远程代码执行漏洞,CVE-2022-21846、CVE-2022-21855、CVE-2022-21969 Microsoft Exchange Server 远程代码执行漏洞,以及 CVE-2022-21857 AD 域服务权限提升漏洞。
漏洞描述
CVE-2022-21907 HTTP 协议栈远程代码执行漏洞
攻击者可通过向使用 HTTP 协议栈(http.sys)的系统发送特定的恶意数据包来利用此漏洞,从而达到远程代码执行的危害。此漏洞的利用无需用户交互,也无需授权,因此被认为是可蠕虫的漏洞。目前此漏洞尚未有公开的细节。
CVE-2022-21846、CVE-2022-21855、CVE-2022-21969 Microsoft Exchange Server 远程代码执行漏洞
此次安全更新中共包含3个 Exchange Server 的远程代码执行漏洞(CVE-2022-21846、CVE-2022-21855、CVE-2022-21969)。其中 CVE-2022-21846 危害评级为严重,另外两个 CVE-2022-21855 和 CVE-2022-21969 评级为重要。这三个漏洞 CVSS 评分均为 9.0。远程的攻击者通过利用这些漏洞可在目标 Exchange Server 上执行恶意代码。这3个漏洞的利用均要求攻击者与目标网络相邻(通常指在同一内网环境中,无法直接通过互联网远程利用),且需要攻击者具有一定的权限。目前这些漏洞尚未有公开的细节。
CVE-2022-21857 AD 域服务权限提升漏洞
攻击者在某些条件下利用此漏洞,可打破 AD 域的信任边界,进行权限提升。通常认为这类漏洞的利用需要攻击者已经获得域内普通成员主机的权限。目前此漏洞尚未有公开的细节。
影响范围
CVE |
影响系统范围 |
CVE-2022-21907 HTTP 协议栈远程代码执行漏洞 |
Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
CVE-2022-21846、CVE-2022-21855、CVE-2022-21969 Microsoft Exchange Server 远程代码执行漏洞 |
Microsoft Exchange Server 2019 Cumulative Update 10 Microsoft Exchange Server 2016 Cumulative Update 21 Microsoft Exchange Server 2013 Cumulative Update 23 Microsoft Exchange Server 2019 Cumulative Update 11 Microsoft Exchange Server 2016 Cumulative Update 22 |
CVE-2022-21857 AD 域服务权限提升漏洞 |
Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows RT 8.1 Windows 8.1 for x64-based systems Windows 8.1 for 32-bit systems Windows 7 for x64-based Systems Service Pack 1 Windows 7 for 32-bit Systems Service Pack 1 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
解决方案
微软官方已发布相应的补丁修复漏洞,Windows 系统用户可通过默认开启的安全更新检查进行漏洞修复更新,也可以访问以下链接手动安装相关的漏洞补丁:
参考资料
-
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jan
-
https://www.zerodayinitiative.com/blog/2022/1/11/the-january-2022-security-update-review
原文始发于微信公众号(长亭安全课堂):漏洞风险提示 | 微软1月补丁日:多个高危安全漏洞
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论