• 产品与解决方案
  • 行业解决方案
  • 服务
  • 支持
  • 合作伙伴
  • 新华三人才研学中心
  • 关于我们
docurl=/cn/Products___Technology/Products/IP_Security/Security_Research/Home/Notice/Notice/202309/1931121_30003_0.htm

微软9月补丁日安全通告

【发布时间:2023-09-18】

新华三盾山实验室

2023/09/13

1. 漏洞综述

1.1 漏洞背景

2023年9月,新华三盾山实验室监测发现Microsoft官方发布了9月安全更新,共发布59个漏洞的补丁信息,主要修复了Microsoft Office、Microsoft Exchange Server、Microsoft Visual Studio 等产品中的漏洞。在此次更新的补丁中,有5个漏洞被微软标记为严重漏洞,且部分漏洞存在在野利用,由于影响较大,新华三盾山实验室建议广大用户及时做好资产自查以及预防工作,以免遭受黑客攻击。

1.2 重点漏洞

CVE-2023-36761 Windows Word信息泄露漏洞

Microsoft Word存在信息泄露漏洞,未经身份验证的恶意攻击者通过诱导用户打开特制文件,成功利用此漏洞可获取到受害者的NTLM 哈希值。(使用预览窗格对文件进行预览也会触发此漏洞)

严重等级:中危 评分:6.2

CVE-2023-36802 Microsoft流式处理代理权限提升漏洞

Microsoft 流式处理代理中存在特权提升漏洞,Microsoft 流式处理代理存在特权提升漏洞,由于Microsoft Streaming Service Proxy中的边界错误导致,攻击者利用此漏洞可获得SYSTEM权限。

严重等级:高危 评分:7.8

CVE-2023-36792/CVE-2023-36793 Visual Studio 远程代码执行漏洞

Visual Studio存在远程代码执行漏洞,由于Visual Studio 中未对用户输入的数据进行过滤,恶意远程攻击者通过诱骗受害者打开特制的程序包文件,成功利用此漏洞可在目标系统上执行任意代码。

严重等级:高危 评分:7.8

CVE-2023-38142 Windows内核权限提升漏洞

Windows内核上存在权限提升漏洞,经过身份验证的恶意攻击者成功利用此漏洞可将普通权限提升至SYSTEM权限。

严重等级:高危 评分:7.8

CVE-2023-36745 Microsoft Exchange Server 远程代码执行漏洞

Microsoft Exchange Server 存在远程代码执行漏洞,恶意攻击者通过反序列化不受信任的数据,利用已知(类型 4)UnitySerializationHolder gadget 来利用此漏洞,成功利用此漏洞可在目标系统上执行任意代码。

严重等级:高危 评分:8.0

2. 影响范围

CVE编号

受影响产品

CVE-2023-36745

CVE-2023-36777

CVE-2023-36744

CVE-2023-36756

Microsoft Exchange Server 2016 Cumulative Update 23

Microsoft Exchange Server 2019 Cumulative Update 12

Microsoft Exchange Server 2019 Cumulative Update 13

CVE-2023-36761

Microsoft Word 2013 Service Pack 1 (64-bit editions)

Microsoft Word 2013 Service Pack 1 (32-bit editions)

Microsoft Word 2013 RT Service Pack 1

Microsoft Word 2016 (64-bit edition)

Microsoft Word 2016 (32-bit edition)

Microsoft Office LTSC 2021 for 32-bit editions

Microsoft Office LTSC 2021 for 64-bit editions

Microsoft 365 Apps for Enterprise for 64-bit Systems

Microsoft 365 Apps for Enterprise for 32-bit Systems

Microsoft Office 2019 for 64-bit editions

Microsoft Office 2019 for 32-bit editions

CVE-2023-36802

CVE-2023-36804

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 version 21H2 for x64-based Systems

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

CVE-2023-38142

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 version 21H2 for x64-based Systems

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

3. 处置方法

3.1官方补丁

目前,微软官方已经发布针对此漏洞的补丁程序,建议用户通过以下链接尽快安装补丁程序:

https://msrc.microsoft.com/update-guide/releaseNote/2023-Sep

4. 参考链接

https://msrc.microsoft.com/update-guide/releaseNote/2023-Sep

新华三官网
联系我们