Microsoft 6Ô¶à¸öÄþ¾²Â©¶´
Ðû²¼Ê±¼ä 2021-06-090x00 ©¶´¸ÅÊö
2021Äê06ÔÂ08ÈÕ£¬MicrosoftÐû²¼ÁË6Ô·ݵÄÄþ¾²¸üУ¬±¾´ÎÐû²¼µÄÄþ¾²¸üй²¼ÆÐÞ¸´ÁË50¸öÄþ¾²Â©¶´£¬ÆäÖÐÓÐ5¸ö©¶´ÆÀ¼¶ÎªÑÏÖØ£¬45¸ö©¶´ÆÀ¼¶Îª¸ßΣ£¬ÆäÖаüÂÞ7¸ö0 day©¶´¡£
0x01 ©¶´ÏêÇé
±¾´ÎÐû²¼µÄÄþ¾²¸üÐÂÉæ¼°.NET Core & Visual Studio¡¢Microsoft Office¡¢Excel¡¢SharePoint¡¢Outlook¡¢Microsoft Windows Codecs Library¡¢Microsoft Scripting Engine¡¢Windows TCP/IP¡¢Windows Remote Desktop¡¢Windows Kernel ºÍWindows DefenderµÈ¶à¸ö²úÎïºÍ×é¼þ¡£ÆäÖУ¬5¸öÆÀ¼¶ÎªÑÏÖصÄ©¶´ÈçÏÂ:
Microsoft Defender Ô¶³Ì´úÂëÖ´ÐЩ¶´(CVE-2021-31985)
¸Ã©¶´ÊÇMicrosoft DefenderÖеÄRCE©¶´£¬ÆäCVSSv3ÆÀ·ÖΪ7.8¡£¸Ã©¶´ÀûÓÃÅÓ´ó¶ÈµÍ£¬²»ÐèÒªÌØÊâȨÏÞ¼´¿Éµ±µØÀûÓ㬵«ÐèÒªÓû§½»»¥£¬MicrosoftµÄ¿ÉÀûÓÃÐÔÆÀ¹ÀΪ¡°¿ÉÄܱ»ÀûÓᱡ£
Scripting EngineÄÚ´æËð»µÂ©¶´£¨CVE-2021-31959£©
¸Ã©¶´ÊÇChakra JScript ½Å±¾ÒýÇæÖеÄÄÚ´æËð»µÂ©¶´£¬ÆäCVSSv3ÆÀ·ÖΪ6.4¡£´Ë©¶´Ó°Ïì Windows 7¡¢Windows 8¡¢Windows 10¡¢Windows Server 2008 R2¡¢Windows Server 2012 (R2) ºÍ Windows Server 2016µÈËùÓÐÊÜÖ§³ÖµÄMicrosoft Windows °æ±¾¡£¸Ã©¶´ÀûÓÃÅÓ´ó¶È½Ï¸ß£¬²»ÐèÒªÌØÊâȨÏÞ¼´¿ÉÔ¶³ÌÀûÓ㬵«ÐèÒªÓû§½»»¥¡£
Microsoft SharePoint Server Ô¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-31963£©
¸Ã©¶´ÊÇMicrosoft SharePoint Server ÖеÄRCE©¶´£¬ÆäCVSSv3ÆÀ·ÖΪ7.1¡£¸Ã©¶´ÎÞÐèÓû§½»»¥¼´¿ÉÔ¶³ÌÀûÓ㬵«Â©¶´ÀûÓÃÅÓ´ó¶È½Ï¸ß¡£
VP9 Video ExtensionsÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-31967£©
¸Ã©¶´ÊÇVP9 ÊÓƵÀ©Õ¹ÖеÄRCE©¶´£¬ÆäCVSSv3ÆÀ·ÖΪ7.8¡£¸Ã©¶´ÀûÓÃÅÓ´ó¶ÈµÍ£¬²»ÐèÒªÌØÊâȨÏÞ¼´¿Éµ±µØÀûÓ㬵«ÐèÒªÓû§½»»¥¡£Ä¿Ç°´Ë©¶´ÒÑÔÚÓ¦Ó÷¨Ê½°ü°æ±¾1.0.41182.0¼°¸ü¸ß°æ±¾ÖÐÐÞ¸´£¬Óû§¿ÉÒÔÔÚ PowerShell Öмì²éÈí¼þ°ü°æ±¾£º
Get-AppxPackage -Name Microsoft.VP9VideoExtensions
Windows MSHTML ƽ̨Զ³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-33742£©
¸Ã©¶´ÊÇWindows MSHTML ƽ̨ÖеÄRCE©¶´£¬ÆäCVSSv3ÆÀ·ÖΪ7.5¡£¸Ã©¶´ÎÞÐèÌØÊâȨÏÞ¼´¿ÉÔ¶³ÌÀûÓ㬵«Â©¶´ÀûÓÃÅÓ´ó¶È½Ï¸ß£¬ÇÒÐèÓëÓû§½»»¥£¬Ä¿Ç°´Ë©¶´ÒÑ·¢ÏÖÔÚÒ°ÀûÓá£
MicrosoftÐÞ¸´µÄ7¸ö0 day©¶´ÖУ¬6¸öÒѱ»ÔÚÒ°ÀûÓõÄ©¶´ÈçÏ£º
CVE-2021-31955 - Windows KernelÐÅϢ鶩¶´
CVE-2021-31956 - Windows NTFS ȨÏÞÌáÉý©¶´
CVE-2021-33739 - Microsoft DWM ºËÐÄ¿âȨÏÞÌáÉý©¶´
CVE-2021-33742 - Windows MSHTML ƽ̨Զ³Ì´úÂëÖ´ÐЩ¶´
CVE-2021-31199 - Microsoft ÔöÇ¿ÐͼÓÃÜÌṩ·¨Ê½È¨ÏÞÌáÉý©¶´
CVE-2021-31201 - Microsoft ÔöÇ¿ÐͼÓÃÜÌṩ·¨Ê½È¨ÏÞÌáÉý©¶´
´ËÍ⣬ CVE-2021-31968 (Windows Ô¶³Ì×ÀÃæ·þÎñ¾Ü¾ø·þÎñ©¶´)ÒѾ¹ûÈ»Åû¶£¬µ«ÉÐδ·¢ÏÖÔÚÒ°ÀûÓá£
Microsoft 6Ô²¹¶¡ÐÞ¸´µÄÍêÕû©¶´ÁбíÈçÏ£º
±êÇ© | CVE ID | CVE ±êÌâ | ÑÏÖØÐÔ |
.NET Core & Visual Studio | CVE-2021-31957 | .NET Core ºÍ Visual Studio ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
3D Viewer | CVE-2021-31942 | 3D ViewerÔ¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
3D Viewer | CVE-2021-31943 | 3D ViewerÔ¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
3D Viewer | CVE-2021-31944 | 3D ViewerÐÅϢ鶩¶´ | ¸ßΣ |
Microsoft DWM Core Library | CVE-2021-33739 | Microsoft DWM ºËÐÄ¿âȨÏÞÌáÉý©¶´ | ¸ßΣ |
Microsoft Edge (Chromium-based) | CVE-2021-33741 | Microsoft Edge£¨»ùÓÚ Chromium£©È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Microsoft Intune | CVE-2021-31980 | Microsoft Intune ¹ÜÀíÀ©Õ¹Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Office | CVE-2021-31940 | Microsoft Office Graphics Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Office | CVE-2021-31941 | Microsoft Office Graphics Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Office Excel | CVE-2021-31939 | Microsoft Excel Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Office Outlook | CVE-2021-31949 | Microsoft Outlook Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Office SharePoint | CVE-2021-31964 | Microsoft SharePoint Server ÆÛÆ©¶´ | ¸ßΣ |
Microsoft Office SharePoint | CVE-2021-31963 | Microsoft SharePoint Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
Microsoft Office SharePoint | CVE-2021-31950 | Microsoft SharePoint Server ÆÛÆ©¶´ | ¸ßΣ |
Microsoft Office SharePoint | CVE-2021-31948 | Microsoft SharePoint Server ÆÛÆ©¶´ | ¸ßΣ |
Microsoft Office SharePoint | CVE-2021-31966 | Microsoft SharePoint Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Office SharePoint | CVE-2021-31965 | Microsoft SharePoint Server ÐÅϢ鶩¶´ | ¸ßΣ |
Microsoft Office SharePoint | CVE-2021-26420 | Microsoft SharePoint Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Microsoft Scripting Engine | CVE-2021-31959 | ½Å±¾ÒýÇæÄÚ´æËð»µÂ©¶´ | ÑÏÖØ |
Microsoft Windows Codecs Library | CVE-2021-31967 | VP9 ÊÓƵÀ©Õ¹Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
Paint 3D | CVE-2021-31946 | Paint 3D Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Paint 3D | CVE-2021-31983 | Paint 3D Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Paint 3D | CVE-2021-31945 | Paint 3D Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
Role: Hyper-V | CVE-2021-31977 | Windows Hyper-V ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
Visual Studio Code - Kubernetes Tools | CVE-2021-31938 | Microsoft VsCode Kubernetes ¹¤¾ßÀ©Õ¹È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Bind Filter Driver | CVE-2021-31960 | Windows °ó¶¨É¸Ñ¡Æ÷Çý¶¯·¨Ê½ÐÅϢ鶩¶´ | ¸ßΣ |
Windows Common Log File System Driver | CVE-2021-31954 | Windows ͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯·¨Ê½È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Cryptographic Services | CVE-2021-31201 | Microsoft ÔöÇ¿ÐͼÓÃÜÌṩ·¨Ê½È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Cryptographic Services | CVE-2021-31199 | Microsoft ÔöÇ¿ÐͼÓÃÜÌṩ·¨Ê½È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows DCOM Server | CVE-2021-26414 | Windows DCOM ·þÎñÆ÷Äþ¾²¹¦Ð§Èƹý | ¸ßΣ |
Windows Defender | CVE-2021-31978 | Microsoft Defender ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
Windows Defender | CVE-2021-31985 | Microsoft Defender Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
Windows Drivers | CVE-2021-31969 | Windows ÔÆÎļþÃÔÄã¹ýÂËÆ÷Çý¶¯È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Event Logging Service | CVE-2021-31972 | Windows ÐÅϢ鶩¶´µÄʼþ¸ú×Ù | ¸ßΣ |
Windows Filter Manager | CVE-2021-31953 | Windows ¹ýÂËÆ÷¹ÜÀíÆ÷ȨÏÞÌáÉý©¶´ | ¸ßΣ |
Windows HTML Platform | CVE-2021-31971 | Windows HTML ƽ̨Äþ¾²¹¦Ð§Èƹý©¶´ | ¸ßΣ |
Windows Installer | CVE-2021-31973 | Windows GPSVC ȨÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Kerberos | CVE-2021-31962 | Kerberos AppContainer Äþ¾²¹¦Ð§Èƹý©¶´ | ¸ßΣ |
Windows Kernel | CVE-2021-31951 | Windows ÄÚºËȨÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Kernel | CVE-2021-31955 | Windows ÄÚºËÐÅϢ鶩¶´ | ¸ßΣ |
Windows Kernel-Mode Drivers | CVE-2021-31952 | Windows ÄÚºËģʽÇý¶¯·¨Ê½È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows MSHTML Platform | CVE-2021-33742 | Windows MSHTML ƽ̨Զ³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
Windows Network File System | CVE-2021-31975 | NFS ÐÅϢ鶩¶´·þÎñÆ÷ | ¸ßΣ |
Windows Network File System | CVE-2021-31974 | NFS ¾Ü¾ø·þÎñ©¶´·þÎñÆ÷ | ¸ßΣ |
Windows Network File System | CVE-2021-31976 | NFS ÐÅϢ鶩¶´·þÎñÆ÷ | ¸ßΣ |
Windows NTFS | CVE-2021-31956 | Windows NTFS ȨÏÞÌáÉý©¶´ | ¸ßΣ |
Windows NTLM | CVE-2021-31958 | Windows NTLM ȨÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Print Spooler Components | CVE-2021-1675 | Windows ´òÓ¡ºǫ́´¦Ö÷¨Ê½È¨ÏÞÌáÉý©¶´ | ¸ßΣ |
Windows Remote Desktop | CVE-2021-31968 | Windows Ô¶³Ì×ÀÃæ·þÎñ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
Windows TCP/IP | CVE-2021-31970 | Windows TCP/IP Çý¶¯·¨Ê½Äþ¾²¹¦Ð§Èƹý©¶´ | ¸ßΣ |
0x02 ´¦Öý¨Òé
Ä¿Ç°MicrosoftÒÑÐû²¼Ïà¹ØÄþ¾²¸üУ¬½¨Ò龡¿ìÐÞ¸´¡£
£¨Ò»£© Windows update¸üÐÂ
×Ô¶¯¸üУº
Microsoft UpdateĬÈÏÆôÓ㬵±ÏµÍ³¼ì²âµ½¿ÉÓøüÐÂʱ£¬½«»á×Ô¶¯ÏÂÔظüв¢ÔÚÏÂÒ»´ÎÆô¶¯Ê±°²×°¡£
ÊÖ¶¯¸üУº
1¡¢µã»÷¡°¿ªÊ¼²Ëµ¥¡±»ò°´Windows¿ì½Ý¼ü£¬µã»÷½øÈë¡°ÉèÖá±
2¡¢Ñ¡Ôñ¡°¸üкÍÄþ¾²¡±£¬½øÈë¡°Windows¸üС±£¨Windows 8¡¢Windows 8.1¡¢Windows Server 2012ÒÔ¼°Windows Server 2012 R2¿Éͨ¹ý¿ØÖÆÃæ°å½øÈë¡°Windows¸üС±£¬¾ßÌå²½ÖèΪ¡°¿ØÖÆÃæ°å¡±->¡°ÏµÍ³ºÍÄþ¾²¡±->¡°Windows¸üС±£©
3¡¢Ñ¡Ôñ¡°¼ì²é¸üС±£¬ÆÚ´ýϵͳ½«×Ô¶¯¼ì²é²¢ÏÂÔØ¿ÉÓøüС£
4¡¢ÖØÆô¼ÆËã»ú£¬°²×°¸üÐÂϵͳÖØÐÂÆô¶¯ºó£¬¿Éͨ¹ý½øÈë¡°Windows¸üС±->¡°¼ì²ì¸üÐÂÀúÊ·¼Ç¼¡±¼ì²ìÊÇ·ñÀֳɰ²×°Á˸üС£¶ÔÓÚûÓÐÀֳɰ²×°µÄ¸üУ¬¿ÉÒÔµã»÷¸Ã¸üÐÂÃû³Æ½øÈë΢Èí¹Ù·½¸üÐÂÃèÊöÁ´½Ó£¬µã»÷×îеÄSSUÃû³Æ²¢ÔÚÐÂÁ´½ÓÖеã»÷¡°Microsoft ¸üÐÂĿ¼¡±£¬È»ºóÔÚÐÂÁ´½ÓÖÐÑ¡ÔñÊÊÓÃÓÚÄ¿±êϵͳµÄ²¹¶¡½øÐÐÏÂÔز¢°²×°¡£
£¨¶þ£© ÊÖ¶¯°²×°¸üÐÂ
Microsoft¹Ù·½ÏÂÔØÏàÓ¦²¹¶¡½øÐиüС£
ÏÂÔØÁ´½Ó£º
https://msrc.microsoft.com/update-guide/
0x03 ²Î¿¼Á´½Ó
https://msrc.microsoft.com/update-guide/vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31963
https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2021-patch-tuesday-fixes-6-exploited-zero-days-50-flaws/
0x04 ʱ¼äÏß
2021-06-08 MicrosoftÐû²¼Äþ¾²¸üÐÂ
2021-06-09 VSRCÐû²¼Äþ¾²Í¨¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö³ß¶È¹ÙÍø£ºhttp://www.first.org/cvss/