微软发布严重远程代码漏洞,请及时修复处理

作者/来源: 发布时间:2019-08-14

2019年8月13日,MSRC(微软安全应急响应中心)发布了安全通告修复了关于远程桌面服务的漏洞,其中包含两个严重的远程代码执行漏洞(CVE-2019-1181,CVE-2019-1182)。

据了解,要利用该漏洞需要攻击者通过RDP向目标系统远程桌面服务发送精心构造的请求,成功利用该漏洞的攻击者可以在目标系统上执行任意代码。可在未经身份验证和用户交互的情况下被利用,极易被攻击者利用于传播蠕虫病毒。

 

风险等级:高危

预警等级:蓝色预警(一般事件)

 

影响范围

·          

受影响的版本如下:

·          

Windows10 for 32-bit Systems

Windows10 for x64-based Systems

Windows10 Version 1607 for 32-bit Systems

Windows10 Version 1607 for x64-based Systems

Windows10 Version 1703 for 32-bit Systems

Windows10 Version 1703 for x64-based Systems

Windows10 Version 1709 for 32-bit Systems

Windows10 Version 1709 for 64-based Systems

Windows10 Version 1709 for ARM64-based Systems

Windows10 Version 1803 for 32-bit Systems

Windows10 Version 1803 for ARM64-based Systems

Windows10 Version 1803 for x64-based Systems

Windows10 Version 1809 for 32-bit Systems

Windows10 Version 1809 for ARM64-based Systems

Windows10 Version 1809 for x64-based Systems

Windows10 Version 1903 for 32-bit Systems

Windows10 Version 1903 for ARM64-based Systems

Windows10 Version 1903 for x64-based Systems

Windows7 for 32-bit Systems Service Pack 1

Windows7 for x64-based Systems Service Pack 1

Windows8.1 for 32-bit systems

Windows8.1 for x64-based systems

WindowsRT 8.1

WindowsServer 2008 R2 for Itanium-Based Systems Service Pack 1

WindowsServer 2008 R2 for x64-based Systems Service Pack 1

WindowsServer 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

WindowsServer 2012

WindowsServer 2012 (Server Core installation)

WindowsServer 2012 R2

WindowsServer 2012 R2 (Server Core installation)

WindowsServer 2016

WindowsServer 2016 (Server Core installation)

WindowsServer 2019

WindowsServer 2019 (Server Core installation)

WindowsServer, version 1803 (Server Core Installation)

WindowsServer, version 1903 (Server Core installation)

 

·          

以下版本并不受影响:

·          

Windows XP

Windows Sereer 2003

Windows Server 2008

 

处置建议

 

·          

修复建议:

·         1. 微软官方目前已发布补丁以修复这些漏洞,请及时进行修复。https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181

·          

缓解措施:

·         1. 如不需要使用远程桌面服务,请禁用该服务。2. 在运行Windows 7,Windows Server 2008和Windows Server 2008 R2的受支持版本的系统上启用网络级别身份验证(NLA)。3. 在企业外围防火墙上关闭3389端口。

参考资料

 

[1].https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181

[2].https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182

[3].https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/

热门标签

为您提供出众的上云实践机会和全面的尊贵服务

立即注册
7*24 多渠道服务与支持
意见 反馈与投诉建议
1V1 专项服务
退款 7天无理由退款
免费领主机
人工客服
在线客服   
售前咨询
咨询热线400-0505-565