¡¾Â©¶´Í¨¸æ¡¿Î¢Èí10Ô¶à¸öÄþ¾²Â©¶´
Ðû²¼Ê±¼ä 2023-10-11Ò»¡¢Â©¶´¸ÅÊö
2023Äê10ÔÂ10ÈÕ£¬Î¢ÈíÐû²¼ÁË10ÔÂÄþ¾²¸üУ¬±¾´Î¸üй²ÐÞ¸´ÁË104¸ö©¶´£¨²»°üÂÞMicrosoft Edge-Chromium©¶´£©£¬ÆäÖаüÂÞ3¸öÒѱ»ÀûÓõÄ©¶´¡¢45¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´ÒÔ¼°12¸öÆÀ¼¶ÎªÑÏÖØµÄ©¶´¡£
±¾´ÎÐÞ¸´µÄ©¶´ÖУ¬Â©¶´ÀàÐͰüÂÞÌØÈ¨ÌáÉý©¶´¡¢Ô¶³Ì´úÂëÖ´ÐЩ¶´¡¢ÐÅϢй¶©¶´¡¢¾Ü¾ø·þÎñ©¶´¡¢Äþ¾²¹¦Ð§Èƹý©¶´ºÍÆÛÆÂ©¶´µÈ¡£
΢Èí±¾´Î¹²ÐÞ¸´ÁË3¸öÒѱ»ÀûÓõÄ©¶´£º
CVE-2023-41763£ºSkype for Business ȨÏÞÌáÉý©¶´
¸Ã©¶´µÄCVSSv3ÆÀ·ÖΪ5.3£¬Ô¶³ÌÍþвÕß¿ÉÒÔ¶ÔÄ¿±ê Skype for Business ·þÎñÆ÷½øÐÐÌØÖÆÍøÂçµ÷Óã¬Õâ¿ÉÄܵ¼Ö½âÎöÏòÈÎÒâµØÖ··¢³öµÄ http ÇëÇ󣬴Ӷø¿ÉÄܵ¼ÖÂIP µØÖ·»ò¶Ë¿ÚºÅµÈÃô¸ÐÐÅϢй¶£¬ÍþвÕß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢À´·ÃÎÊÄÚ²¿ÍøÂ硣Ŀǰ¸Ã©¶´ÒѾ¹ûÈ»Åû¶£¬ÇÒÒÑ·¢ÏÖ±»ÀûÓá£
CVE-2023-36563£ºMicrosoft WordPad ÐÅϢй¶©¶´
¸Ã©¶´µÄCVSSv3ÆÀ·ÖΪ6.5£¬ÍþвÕß¿ÉÒÔͨ¹ýµÇ¼ϵͳÔËÐÐÌØÖÆµÄÓ¦Ó÷¨Ê½»òÕßÓÕµ¼µ±µØÓû§´ò¿ª¶ñÒâÎļþÀ´ÀûÓøÃ©¶´£¬ÀÖ³ÉÀûÓøÃ©¶´¿ÉÄܵ¼Ö NTLM ¹þϣֵй¶¡£Ä¿Ç°¸Ã©¶´ÒѾ¹ûÈ»Åû¶£¬ÇÒÒÑ·¢ÏÖ±»ÀûÓá£
MITRE£ºCVE-2023-44487-HTTP/2 ¿ìËÙÖØÖù¥»÷
΢ÈíÒÑÐû²¼Õë¶ÔHTTP/2 µÄÂþÑÜʽ¾Ü¾ø·þÎñ (DDoS) ¹¥»÷£¨³ÆÎª¡°HTTP/2 Rapid Reset¡±£¬×·×ÙΪCVE-2023-44487£©µÄ»º½â´ëÊ©£¬¸Ã¹¥»÷ͨ¹ýÀÄÓà HTTP/2 µÄÇëÇóÈ¡Ïû¹¦Ð§£¬¿ÉÄܵ¼Ö·þÎñÆ÷×ÊÔ´ºÄ¾¡£¬Ôì³É¾Ü¾ø·þÎñ¡£¸Ã©¶´×Ô8ÔÂÒÔÀ´Òѱ»¹ã·ºÀûÓá£
΢Èí±¾´Î¸üÐÂÐÞ¸´µÄ12¸öÆÀ¼¶Îª¡°ÑÏÖØ¡±µÄ©¶´°üÂÞ£º
9¸öΪµÚ2²ãËíµÀÐÒéÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-41770¡¢CVE-2023-41765¡¢CVE-2023-41767¡¢CVE-2023-38166¡¢CVE-2023-41774¡¢CVE-2023-41773¡¢CVE-2023-41771¡¢CVE-2023-41769ºÍCVE-2023-41768£©£¬Î´¾Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉÒÔÏò·ÓɺÍÔ¶³Ì·ÃÎÊ·þÎñ (RRAS) ·þÎñÆ÷·¢ËÍÌØÖÆµÄÐÒéÏûÏ¢£¬¿ÉÄܵ¼Ö RAS ·þÎñÆ÷¼ÆËã»úÉϵÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬µ«ÀûÓÃÕâЩ©¶´¿ÉÄÜÐèÒªÓ®µÃ¾ºÕùÌõ¼þ¡£
2¸öΪMicrosoftÏûÏ¢ÐÐÁÐÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-35349ºÍCVE-2023-36697£©£¬ÀÖ³ÉÀûÓÃCVE-2023-35349¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÍþвÕßÔÚÄ¿±ê·þÎñÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂë¡£ÀÖ³ÉÀûÓÃCVE-2023-36697¿ÉÄܵ¼Ö¾¹ýÉí·ÝÑéÖ¤µÄÓòÓû§ÔÚÄ¿±ê·þÎñÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂ룬µ«ÍþвÕßÐèÒªÓÕµ¼Ä¿±ê¼ÆËã»úÉϵÄÓû§Á¬½Óµ½¶ñÒâ·þÎñÆ÷£¬»òÕßÆÆ»µºÏ·¨µÄMSMQ·þÎñÆ÷Ö÷»ú£¬Ê¹Æä×÷Ϊ¶ñÒâ·þÎñÆ÷ÔËÐС£Windows ÏûÏ¢ÐÐÁзþÎñÊÇ Windows ×é¼þ£¬¿ÉÒÔͨ¹ý¼ì²éÊÇ·ñÓÐÃûΪMessage QueuingµÄ·þÎñÔÚÔËÐУ¬ÒÔ¼°¼ÆËã»úÉÏÊÇ·ñÕìÌýTCP ¶Ë¿Ú1801¡£
ÒÔ¼°MicrosoftÐéÄâ¿ÉÐÅÆ½Ì¨Ä£¿é£¨TPM£©Ô¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-36718£©£¬ÀÖ³ÉÀûÓøÃ©¶´¿ÉÄܵ¼ÖÂÈÎÒâ´úÂëÖ´ÐУ¬µ«ÍþвÕß±ØÐëͨ¹ýguestģʽÓû§µÄÉí·ÝÑéÖ¤²ÅÆøÌÓÀëÐéÄâ»ú¡£
΢Èí10Ô¸üÐÂÉæ¼°µÄÍêÕû©¶´ÁбíÈçÏ£º
CVE ID | CVE ±êÌâ | ÑÏÖØÐÔ |
CVE-2023-41770 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41765 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41767 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-38166 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41774 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41773 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41771 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41769 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-41768 | Layer 2 Tunneling Protocol Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-35349 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-36697 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-36718 | Microsoft Virtual Trusted Platform Module Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ÑÏÖØ |
CVE-2023-36722 | Active DirectoryÓò·þÎñÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36737 | Azure Network Watcher VM Agent ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36419 | Azure HDInsight Apache Oozie ÊÂÇéÁ÷µ÷Öη¨Ê½ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36561 | Azure DevOps ·þÎñÆ÷ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36418 | Azure RTOS GUIX Studio Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36414 | Azure Identity SDK Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36415 | Azure Identity SDK Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-41766 | Windows ¿Í»§¶Ë·þÎñÆ÷ÔËÐÐʱ×Óϵͳ (CSRSS) ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-44487 | MITRE£ºCVE-2023-44487 HTTP/2 ¿ìËÙÖØÖù¥»÷ | ¸ßΣ |
CVE-2023-36566 | Microsoft ͨÓÃÊý¾ÝÄ£ÐÍ SDK ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36429 | Microsoft Dynamics 365£¨On-Premises£©ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36416 | Microsoft Dynamics 365£¨On-Premises£©¿çÕ¾½Å±¾Â©¶´ | ¸ßΣ |
CVE-2023-36433 | Microsoft Dynamics 365£¨On-Premises£©ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36778 | Microsoft Exchange Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36594 | Windows Graphics Component ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-38159 | Windows Graphics Component ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36565 | Microsoft Office Graphics ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36569 | Microsoft Office ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36568 | Microsoft Office Click-To-Run ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-38171 | Microsoft QUIC ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36435 | Microsoft QUIC ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36577 | Microsoft WDAC OLE DB provider for SQL Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36710 | Windows Media Foundation Core Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36564 | Windows Search Äþ¾²¹¦Ð§Èƹý©¶´ | ¸ßΣ |
CVE-2023-36563 | Microsoft WordPad ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36786 | Skype for Business Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36780 | Skype for Business Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36789 | Skype for Business Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-41763 | Skype for Business ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36728 | Microsoft SQL Server ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36417 | Microsoft SQL ODBC Çý¶¯·¨Ê½Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36785 | Microsoft ODBC Driver for SQL Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36598 | Microsoft WDAC ODBC Çý¶¯·¨Ê½Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36730 | Microsoft ODBC Driver for SQL Server Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36420 | Microsoft ODBC Driver for SQL Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36585 | Active Template Library ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36709 | Microsoft AllJoyn API ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36902 | Windows Runtime Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36713 | Windows Common Log File System Driver ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36723 | Windows Container Manager Service ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36707 | Windows Deployment ·þÎñ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36567 | Windows Deployment ·þÎñÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36706 | Windows Deployment ·þÎñÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36703 | DHCP Server Service ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36721 | Windows ´íÎó³ÂËß·þÎñÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36436 | Windows MSHTMLƽ̨Զ³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36557 | PrintHTML API Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36434 | Windows IIS ·þÎñÆ÷ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36726 | Windows Internet ÃÜÔ¿½»»» (IKE) À©Õ¹ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36576 | Windows ÄÚºËÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36712 | Windows ÄÚºËÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36698 | Windows ÄÚºËÄþ¾²¹¦Ð§Èƹý©¶´ | ¸ßΣ |
CVE-2023-36584 | Windows Mark of the Web Äþ¾²¹¦Ð§Èƹý©¶´ | ¸ßΣ |
CVE-2023-36571 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36570 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36431 | Microsoft Message Queuing ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36591 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36590 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36589 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36583 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36592 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36606 | Microsoft Message Queuing ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36593 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36582 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36574 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36575 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36573 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36572 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36581 | Microsoft Message Queuing ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36579 | Microsoft Message Queuing ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36578 | Microsoft Message Queuing Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36702 | Microsoft DirectMusic Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36720 | Windows Mixed Reality Developer Tools ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36729 | Named Pipe File System ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36605 | Windows Named Pipe Filesystem ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36725 | Windows ÄÚºËÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36724 | Windows µçÔ´¹ÜÀí·þÎñÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36790 | Windows RDP Encoder Mirror Driver ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-29348 | Windows Remote Desktop Gateway (RD Gateway)ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36596 | Remote Procedure Call ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36701 | Microsoft µ¯ÐÔÎļþϵͳ (ReFS) ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36711 | Windows Runtime C++ Template Library ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36704 | Windows Setup Files Cleanup Ô¶³Ì´úÂëÖ´ÐЩ¶´ | ¸ßΣ |
CVE-2023-36438 | Windows TCP/IP ÐÅϢй¶©¶´ | ¸ßΣ |
CVE-2023-36603 | Windows TCP/IP ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36602 | Windows TCP/IP ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36717 | Windows Virtual Trusted Platform Module ¾Ü¾ø·þÎñ©¶´ | ¸ßΣ |
CVE-2023-36731 | Win32k ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36732 | Win32k ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36776 | Win32k ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-36743 | Win32k ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-41772 | Win32k ÌØÈ¨ÌáÉý©¶´ | ¸ßΣ |
CVE-2023-5346 | Chromium£ºCVE-2023-5346 V8 ÖеÄÀàÐÍ»ìÏý | δ֪ |
¶þ¡¢Ó°Ï췶Χ
ÊÜÓ°ÏìµÄ²úÎï/¹¦Ð§/·þÎñ/×é¼þ°üÂÞ£º
Windows RDP
Windows Message Queuing
Azure SDK
Microsoft Dynamics
SQL Server
Azure Real Time Operating System
Azure
Windows IIS
Microsoft QUIC
Windows HTML Platform
Windows TCP/IP
Azure DevOps
Microsoft WordPad
Microsoft Windows Search Component
Microsoft Office
Microsoft Common Data Model SDK
Windows Deployment Services
Windows Kernel
Microsoft WDAC OLE DB provider for SQL
Windows Mark of the Web (MOTW)
Windows Active Template Library
Microsoft Graphics Component
Windows Remote Procedure Call
Windows Named Pipe File System
Windows Resilient File System (ReFS)
Windows Microsoft DirectMusic
Windows DHCP Server
Windows Setup Files Cleanup
Windows AllJoyn API
Microsoft Windows Media Foundation
Windows Runtime C++ Template Library
Windows Common Log File System Driver
Windows TPM
Windows Virtual Trusted Platform Module
Windows Mixed Reality Developer Tools
Windows Error Reporting
Active Directory Domain Services
Windows Container Manager Service
Windows Power Management Service
Windows NT OS Kernel
Windows IKE Extension
Windows Win32K
Microsoft Exchange Server
Skype for Business
Windows Client/Server Runtime Subsystem
Windows Layer 2 Tunneling Protocol
Client Server Run-time Subsystem (CSRSS)
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
Ŀǰ΢ÈíÒÑÐû²¼Ïà¹ØÄþ¾²¸üУ¬½¨ÒéÊÜÓ°ÏìµÄÓû§¾¡¿ìÐÞ¸´¡£
£¨Ò»£© Windows Update×Ô¶¯¸üÐÂ
Microsoft UpdateĬÈÏÆôÓ㬵±ÏµÍ³¼ì²âµ½¿ÉÓøüÐÂʱ£¬½«»á×Ô¶¯ÏÂÔØ¸üв¢ÔÚÏÂÒ»´ÎÆô¶¯Ê±°²×°¡£Ò²¿ÉÑ¡Ôñͨ¹ýÒÔϲ½ÖèÊÖ¶¯½øÐиüУº
1¡¢µã»÷¡°¿ªÊ¼²Ëµ¥¡±»ò°´Windows¿ì½Ý¼ü£¬µã»÷½øÈë¡°ÉèÖá±
2¡¢Ñ¡Ôñ¡°¸üкÍÄþ¾²¡±£¬½øÈë¡°Windows¸üС±£¨Windows 8¡¢Windows 8.1¡¢Windows Server 2012ÒÔ¼°Windows Server 2012 R2¿Éͨ¹ý¿ØÖÆÃæ°å½øÈë¡°Windows¸üС±£¬¾ßÌå²½ÖèΪ¡°¿ØÖÆÃæ°å¡±->¡°ÏµÍ³ºÍÄþ¾²¡±->¡°Windows¸üС±£©
3¡¢Ñ¡Ôñ¡°¼ì²é¸üС±£¬ÆÚ´ýϵͳ×Ô¶¯¼ì²é²¢ÏÂÔØ¿ÉÓøüС£
4¡¢¸üÐÂÍê³ÉºóÖØÆô¼ÆËã»ú£¬¿Éͨ¹ý½øÈë¡°Windows¸üС±->¡°¼ì²ì¸üÐÂÀúÊ·¼Ç¼¡±¼ì²ìÊÇ·ñÀֳɰ²×°Á˸üС£¶ÔÓÚûÓÐÀֳɰ²×°µÄ¸üУ¬¿ÉÒÔµã»÷¸Ã¸üÐÂÃû³Æ½øÈë΢Èí¹Ù·½¸üÐÂÃèÊöÁ´½Ó£¬µã»÷×îеÄSSUÃû³Æ²¢ÔÚÐÂÁ´½ÓÖеã»÷¡°Microsoft ¸üÐÂĿ¼¡±£¬È»ºóÔÚÐÂÁ´½ÓÖÐÑ¡ÔñÊÊÓÃÓÚÄ¿±êϵͳµÄ²¹¶¡½øÐÐÏÂÔØ²¢°²×°¡£
£¨¶þ£© ÊÖ¶¯°²×°¸üÐÂ
Microsoft¹Ù·½ÏÂÔØÏàÓ¦²¹¶¡½øÐиüС£
2023Äê10ÔÂÄþ¾²¸üÐÂÏÂÔØÁ´½Ó£º
https://msrc.microsoft.com/update-guide/releaseNote/2023-oct
²¹¶¡ÏÂÔØÊ¾Àý£º
1.´ò¿ªÉÏÊöÏÂÔØÁ´½Ó£¬µã»÷©¶´ÁбíÖÐÒªÐÞ¸´µÄCVEÁ´½Ó¡£
Àý1£ºÎ¢Èí©¶´ÁÐÌåÏÖÀý£¨2022Äê2Ô£©
2.ÔÚ΢Èíͨ¸æÒ³Ãæµ×²¿×ó²à¡¾²úÎï¡¿Ñ¡ÔñÏàÓ¦µÄϵͳÀàÐÍ£¬µã»÷ÓҲࡾÏÂÔØ¡¿´¦´ò¿ª²¹¶¡ÏÂÔØÁ´½Ó¡£
Àý2£ºCVE-2022-21989²¹¶¡ÏÂÔØÊ¾Àý
3.µã»÷¡¾Äþ¾²¸üС¿£¬´ò¿ª²¹¶¡ÏÂÔØÒ³Ãæ£¬ÏÂÔØÏàÓ¦²¹¶¡²¢½øÐа²×°¡£
Àý3£º²¹¶¡ÏÂÔØ½çÃæ
4.°²×°Íê³ÉºóÖØÆô¼ÆËã»ú¡£
3.2 ÁÙʱ´ëÊ©
¹ØÓÚHTTP/2 ¿ìËÙÖØÖù¥»÷£¨CVE-2023-44487£©Â©¶´£¬Î¢ÈíµÄ»º½â´ëÊ©¿É²Î¿¼£º
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
Cloudflare¡¢Google¡¢AWS¡¢NGINXµÈÕë¶Ô¸Ã©¶´µÄ»º½âºÍÏìÓ¦¿É²Î¿¼£º
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://msrc.microsoft.com/update-guide/releaseNote/2023-oct
https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2023-patch-tuesday-fixes-3-zero-days-104-flaws/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-10-11 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶¶È¦Îª¶Ä¶øÉú¼ò½é
¶¶È¦Îª¶Ä¶øÉú½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶¶È¦Îª¶Ä¶øÉú´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶¶È¦Îª¶Ä¶øÉúÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶¶È¦Îª¶Ä¶øÉú
¶¶È¦Îª¶Ä¶øÉúÄþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º