新华三盾山实验室
2023/04/12
2023年4月,新华三盾山实验室监测发现Microsoft官方发布了4月安全更新,此次安全更新共发布了97个漏洞的补丁,主要修复了Windows Server 2022、Visual Studio Code等产品中的漏洞。在此次更新的补丁中,有7个漏洞被微软标记为严重漏洞,且发现Windows 通用日志文件系统驱动程序权限提升漏洞(CVE-2023-28252)存在在野利用。由于影响较大,新华三盾山实验室建议广大用户及时做好资产自查以及预防工作,以免遭受黑客攻击。
该漏洞由于Microsoft消息排队中未对用户提供的数据进行过滤,当启用Windows 组件中的Windows 消息队列服务时,恶意攻击者通过构造并发送恶意的MSMQ 数据包,成功利用此漏洞可在目标服务器上执行任意代码,获取目标服务器的控制权限。
严重等级:严重 评分:9.8
该漏洞由于Windows Pragmatic General Multicast (PGM)未对用户提供的数据进行过滤,当启用Windows消息队列服务时,恶意攻击者通过发送特制的文件,成功利用此漏洞可在目标服务器上执行任意代码。
严重等级:严重 评分:9.8
Windows CLFS 驱动程序中存在越界写入漏洞,具有低权限用户的恶意攻击者可以通过基本日志文件(.blf文件扩展名)的操作来触发该漏洞,成功利用此漏洞可将普通用户权限提升至SYSTEM权限。
严重等级:高危 评分:8.1
由于在Windows点对点隧道协议未对用户提供的数据进行过滤,恶意攻击者通过将构造的特殊数据发送给应用程序,成功利用此漏洞可在目标系统上执行任意代码。
严重等级:高危 评分:7.5
Windows的第二层隧道协议中存在条件竞争,未经身份验证的恶意攻击者通过向RAS服务器发送特殊请求,成功利用此漏洞可在目标系统上执行任意代码。
严重等级:高危 评分:8.1
CVE编号 | 受影响产品 |
CVE-2023-21554 CVE-2023-28219 CVE-2023-28220 CVE-2023-28232 CVE-2023-28250 CVE-2023-28252 CVE-2023-28285 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
CVE-2023-28231 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 |
CVE-2023-28291 | Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems |
CVE-2023-28311 | Microsoft Office LTSC for Mac 2021 Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Office 2019 for Mac |
目前,微软官方已经发布针对此漏洞的补丁程序,建议用户通过以下链接尽快安装补丁程序:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Apr
https://msrc.microsoft.com/update-guide/releaseNote/2023-Apr