漏洞情报|2021年8月“微软补丁日” 多个产品高危漏洞风险通告
2021-08-11 18:17:49 Author: www.secpulse.com(查看原文) 阅读量:45 收藏

近日,腾讯云安全运营中心监测到,微软发布了2021年8月的例行安全更新公告,共涉及漏洞数44个,其中严重级别漏洞7个,重要级别37个。本次发布涉及Windows操作系统,Office,Windows Defender,Visual Studio,. NET,Edge等多个软件的安全更新。

为避免您的业务受影响,腾讯云安全建议您及时开展安全自查,如在受影响范围,请您及时进行更新修复,避免被外部攻击者入侵。

漏洞详情

此次公告中以下漏洞需要重点关注:

CVE-2021-36948(Windows Update Medic Service特权提升漏洞):

该漏洞允许通过 Windows Update Medic 服务进行本地权限提升,这是 Windows 10 中引入的一项新功能,旨在修复损坏的 Windows 更新组件,以便计算机可以继续接收更新。攻击者需要登录受影响的系统并运行特制的程序来提升权限。 

漏洞CVSS分数7.8。该漏洞微软已检测到有在野利用,请优先修补。

CVE-2021-34535(Remote Desktop Client远程代码执行漏洞):

该漏洞影响 RDP 客户端并非 RDP 服务器。当攻击者可以使受影响的 RDP 客户端连接到特制的 RDP 服务器时,则有可能控制该机器。

漏洞CVSS分数9.9,被微软标记为严重漏洞,需要重点关注。

CVE-2021-36942(Windows LSA 欺骗漏洞):

未经身份验证的攻击者可以调用 LSARPC 接口上的方法并强制域控制器使用 NTLM 对另一台服务器进行身份验证。恶意用户可以使用此漏洞完全控制windows域。

漏洞CVSS分数9.8。

CVE-2021-36936(Windows Print Spooler 远程代码执行漏洞):

漏洞CVSS分数8.8,此漏洞被微软标记为公开已知,尚未说明是否为PrintNightmare的变种。

CVE-2021-26424(Windows TCP/IP远程代码执行漏洞):

攻击者可以利用 TCP/IP 协议栈 (tcpip.sys) 向其主机发送特制的 TCP/IP 数据包来处理数据包。可由恶意 Hyper-V 来宾向 Hyper-V 主机发送 ipv6 ping 远程触发。

漏洞CVSS分数9.9,被微软标记为严重漏洞。

风险等级

高风险

影响版本

CVE-2021-36948:

Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019  (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems


CVE-2021-34535:

Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Remote Desktop client for Windows Desktop
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows Server 2012
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows 8.1 for 32-bit systems
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2012 R2
Windows Server 2012 R2
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems

及其他此次补丁更新日期前的所有相关软件版本

其他漏洞影响的组件可详细参考官方公告

修复建议

微软官方已发布漏洞修复更新,腾讯云安全建议您:

1)更新系统补丁:确保服务器打上了所需的补丁,打开Windows Update更新功能或下载修复补丁,点击“检查更新”
2)不要打开来历不明的文件或者链接:避免被攻击者利用在机器上执行恶意代码。


【备注】:建议您在安装补丁前做好数据备份工作,避免出现意外

漏洞参考

官方安全公告:

https://msrc.microsoft.com/update-guide/releaseNote/2021-Aug

本文作者:云鼎实验室

本文为安全脉搏专栏作者发布,转载请注明:https://www.secpulse.com/archives/164327.html


文章来源: https://www.secpulse.com/archives/164327.html
如有侵权请联系:admin#unsafe.sh