【漏洞通告】微软5月安全更新多个产品高危漏洞通告

【漏洞通告】微软5月安全更新多个产品高危漏洞通告

威胁对抗能力部 [绿盟科技安全情报](javascript:void(0)😉 今天

通告编号:NS-2020-0032

2020-05-13

TAG:安全更新、Windows、IE、Office、Edge、Visual Studio
漏洞危害:攻击者利用本次安全更新中的漏洞,可造成信息泄露、特权提升、远程代码执行等。
版本:1.0

1

漏洞概述

北京时间5月13日,微软发布5月安全更新补丁,修复了111个安全问题,涉及Microsoft Windows、Internet Explorer、Microsoft Edge、.NET Framework、Microsoft Office、Visual Studio等广泛使用的产品,其中包括特权提升和远程代码执行等高危漏洞类型。

本月微软月度更新修复的漏洞中,严重程度为关键(Critical)的漏洞共有16个,重要(Important)漏洞有95个。其中Win32k 特权提升(CVE-2020-1054)漏洞的PoC已公开,请相关用户及时更新补丁进行防护,详细漏洞列表请参考附录。

参考链接:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-May

SEE MORE →

2重点漏洞简述

根据产品流行度和漏洞重要性筛选出此次更新中包含影响较大的漏洞,请相关用户重点进行关注:

CVE-2020-1054(PoC已公开)/CVE-2020-1143**:**Win32k 特权提升漏洞

由于Windows kernel-mode driver未能正确处理内存中的对象,导致存在两个特权提升漏洞。攻击者可通过登录目标系统并运行特制的应用程序来进行利用,成功利用此漏洞的攻击者可以在系统内核模式中执行任意代码。

官方通告链接:

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1054

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1143

CVE-2020-1067**:**Windows 远程执行代码漏洞

Windows 在处理内存对象的过程中存在远程执行代码漏洞。具有域用户帐户的攻击者通过发送特殊的请求,从而使 Windows 执行提升权限的任意代码。成功利用此漏洞可以在受影响的Windows上以更高的权限执行任意代码。

官方通告链接:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1067

CVE-2020-1153**:**Microsoft 图形组件远程代码执行漏洞

Microsoft Graphics Components在处理内存对象的过程中存在远程代码执行漏洞。攻击者可通过诱导用户打开特制文件来利用此漏洞,成功利用此漏洞的攻击者可在目标系统上执行任意代码。

官方通告链接:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1153

CVE-2020-1062**:**Internet Explorer 内存损坏漏洞

当 Internet Explorer 不正确地访问内存中的对象时,存在远程执行代码漏洞。该漏洞可能以一种攻击者可以在当前用户的上下文中执行任意代码的方式损坏内存。成功利用该漏洞的攻击者可以获得与当前用户相同的用户权限。当用户访问一个特别设计的、由攻击者控制的web页面时,可能会触发此漏洞。

官方通告链接:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1062

CVE-2020-1023**、CVE-2020-1024CVE-2020–1102CVE-2020-1069:**Microsoft SharePoint 远程执行代码漏洞

以上4个为微软SharePoint中的远程代码执行漏洞。攻击者可以利用此类漏洞获得在受影响终端或服务器上执行任意代码的能力。由于SharePoint无法检查应用程序包的源标记,前3个漏洞可以诱导用户打开一个特别制作的SharePoint应用程序文件从而进行利用。由于SharePoint Server无法正确识别和筛选不安全的 ASP.NET Web 控件,经过身份验证的攻击者通过上传一个特别制作的页面到SharePoint服务器,可成功利用CVE-2020-1069漏洞。

官方通告链接:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069

CVE-2020-0901**:**Microsoft Excel 远程执行代码漏洞

由于Microsoft Excel无法正确处理内存中的对象,导致存在远程执行代码漏洞。攻击者通过诱使用户使用受影响版本的Microsoft Excel打开经过特殊设计的文件进行利用。成功利用此漏洞的攻击者可以获得与当前用户相同的系统控制权限。

官方通告链接:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0901

3影响范围

以下为重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。

漏洞编号受影响产品版本
CVE-2020-1054CVE-2020-1143CVE-2020-1067CVE-2020-1153Windows 10 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1607 for x64-based SystemsWindows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1709 for ARM64-based SystemsWindows 10 Version 1709 for x64-based SystemsWindows 10 Version 1803 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 1803 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows 10 Version 1909 for x64-based SystemsWindows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems Service Pack 1Windows 8.1 for 32-bit systemsWindows 8.1 for x64-based systemsWindows RT 8.1Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for Itanium-Based Systems Service Pack 2Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2012 R2Windows Server 2012 R2 (Server Core installation)Windows Server 2016Windows Server 2016 (Server Core installation)Windows Server 2019Windows Server 2019 (Server Core installation)Windows Server, version 1803 (Server Core Installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation)
CVE-2020-1062Internet Explorer 11:Windows 10 Version 1803 for 32-bit SystemsWindows 10 Version 1803 for x64-based SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for ARM64-based SystemsWindows Server 2019Windows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1709 for x64-based SystemsWindows 10 Version 1709 for ARM64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1607 for x64-based SystemsWindows Server 2016Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems Service Pack 1Windows 8.1 for 32-bit systemsWindows 8.1 for x64-based systemsWindows RT 8.1Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2012Windows Server 2012 R2
Internet Explorer 9:Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems Service Pack 2
CVE-2020-1023CVE-2020-1024CVE-2020-1069Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2019
CVE-2020–1102Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Server 2019
CVE-2020-0901Microsoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Excel 2010 Service Pack 2 (32-bit editions)Microsoft Excel 2010 Service Pack 2 (64-bit editions)Microsoft Excel 2013 RT Service Pack 1Microsoft Excel 2013 Service Pack 1 (32-bit editions)Microsoft Excel 2013 Service Pack 1 (64-bit editions)Microsoft Excel 2016 (32-bit edition)Microsoft Excel 2016 (64-bit edition)Microsoft Office 2016 for MacMicrosoft Office 2019 for 32-bit editionsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for Mac

4漏洞防护

4.1 补丁更新

目前微软官方已针对受支持的产品版本发布了修复以上漏洞的安全补丁,强烈建议受影响用户尽快安装补丁进行防护,官方下载链接:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-May

注:由于网络问题、计算机环境问题等原因,Windows Update的补丁更新可能出现失败。用户在安装补丁后,应及时检查补丁是否成功更新。

右键点击Windows图标,选择“设置(N)”,选择“更新和安全”-“Windows更新”,查看该页面上的提示信息,也可点击“查看更新历史记录”查看历史更新情况。

针对未成功安装的更新,可点击更新名称跳转到微软官方下载页面,建议用户点击该页面上的链接,转到“Microsoft更新目录”网站下载独立程序包并安装。

附录:漏洞列表

影响产品CVE 编号漏洞标题严重程度
Microsoft Graphics ComponentCVE-2020-1117Microsoft Color Management 远程代码执行漏洞Critical
Microsoft Graphics ComponentCVE-2020-1153Microsoft Graphics Components 远程代码执行漏洞Critical
Microsoft Office SharePointCVE-2020-1023Microsoft SharePoint 远程代码执行漏洞Critical
Microsoft Office SharePointCVE-2020-1024Microsoft SharePoint 远程代码执行漏洞Critical
Microsoft Scripting EngineCVE-2020-1037Chakra Scripting Engine 内存破坏漏洞Critical
Microsoft Office SharePointCVE-2020-1069Microsoft SharePoint Server 远程代码执行漏洞Critical
Microsoft Office SharePointCVE-2020-1102Microsoft SharePoint 远程代码执行漏洞Critical
Microsoft Scripting EngineCVE-2020-1065Scripting Engine 内存破坏漏洞Critical
Microsoft WindowsCVE-2020-1028Media Foundation 内存破坏漏洞Critical
Microsoft WindowsCVE-2020-1126Media Foundation 内存破坏漏洞Critical
Microsoft WindowsCVE-2020-1136Media Foundation 内存破坏漏洞Critical
Visual StudioCVE-2020-1192Visual Studio Code Python Extension 远程代码执行漏洞Critical
Internet ExplorerCVE-2020-1064MSHTML Engine 远程代码执行漏洞Critical
Internet ExplorerCVE-2020-1093VBScript 远程代码执行漏洞Critical
Microsoft EdgeCVE-2020-1056Microsoft Edge 特权提升漏洞Critical
Internet ExplorerCVE-2020-1062Internet Explorer 内存破坏漏洞Critical
.NET CoreCVE-2020-1108.NET Core & .NET Framework 拒绝服务漏洞Important
.NET CoreCVE-2020-1161ASP.NET Core 拒绝服务漏洞Important
.NET FrameworkCVE-2020-1066.NET Framework 特权提升漏洞Important
Active DirectoryCVE-2020-1055Microsoft Active Directory Federation Services 跨站脚本漏洞Important
Common Log File System DriverCVE-2020-1154Windows Common Log File System Driver 特权提升漏洞Important
Microsoft DynamicsCVE-2020-1063Microsoft Dynamics 365 (On-Premise) Cross Site Scripting VulnerabilityImportant
Microsoft EdgeCVE-2020-1059Microsoft Edge 欺骗漏洞Important
Microsoft EdgeCVE-2020-1096Microsoft Edge PDF 远程代码执行漏洞Important
Microsoft Graphics ComponentCVE-2020-0963Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2020-1054Win32k 特权提升漏洞Important
Microsoft Graphics ComponentCVE-2020-1135Windows Graphics Component 特权提升漏洞Important
Microsoft Graphics ComponentCVE-2020-1140DirectX 特权提升漏洞Important
Microsoft Graphics ComponentCVE-2020-1179Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2020-1141Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2020-1142Windows GDI 特权提升漏洞Important
Microsoft Graphics ComponentCVE-2020-1145Windows GDI 信息泄露漏洞Important
Microsoft JET Database EngineCVE-2020-1175Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2020-1051Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2020-1174Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2020-1176Jet Database Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2020-0901Microsoft Excel 远程代码执行漏洞Important
Microsoft Office SharePointCVE-2020-1099Microsoft Office SharePoint XSS VulnerabilityImportant
Microsoft Office SharePointCVE-2020-1101Microsoft Office SharePoint XSS VulnerabilityImportant
Microsoft Office SharePointCVE-2020-1107Microsoft SharePoint 欺骗漏洞Important
Microsoft Office SharePointCVE-2020-1100Microsoft Office SharePoint XSS VulnerabilityImportant
Microsoft Office SharePointCVE-2020-1103Microsoft SharePoint 信息泄露漏洞Important
Microsoft Office SharePointCVE-2020-1104Microsoft SharePoint 欺骗漏洞Important
Microsoft Office SharePointCVE-2020-1105Microsoft SharePoint 欺骗漏洞Important
Microsoft Office SharePointCVE-2020-1106Microsoft Office SharePoint XSS VulnerabilityImportant
Microsoft WindowsCVE-2020-1021Windows Error Reporting 特权提升漏洞Important
Microsoft WindowsCVE-2020-1010Microsoft Windows 特权提升漏洞Important
Microsoft WindowsCVE-2020-1048Windows Print Spooler 特权提升漏洞Important
Microsoft WindowsCVE-2020-1071Windows Remote Access Common Dialog 特权提升漏洞Important
Microsoft WindowsCVE-2020-1076Windows 拒绝服务漏洞Important
Microsoft WindowsCVE-2020-1078Windows Installer 特权提升漏洞Important
Microsoft WindowsCVE-2020-1084Connected User Experiences and Telemetry Service 拒绝服务漏洞Important
Microsoft WindowsCVE-2020-1116Windows CSRSS 信息泄露漏洞Important
Microsoft WindowsCVE-2020-1118Microsoft Windows Transport Layer Security 拒绝服务漏洞Important
Microsoft WindowsCVE-2020-1124Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1134Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1137Windows Push Notification Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1138Windows Storage Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1143Win32k 特权提升漏洞Important
Microsoft WindowsCVE-2020-1144Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1149Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1150Media Foundation 内存破坏漏洞Important
Microsoft WindowsCVE-2020-1151Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1155Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1156Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1157Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1158Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1186Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1189Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1190Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1067Windows 远程代码执行漏洞Important
Microsoft WindowsCVE-2020-1068Microsoft Windows 特权提升漏洞Important
Microsoft WindowsCVE-2020-1070Windows Print Spooler 特权提升漏洞Important
Microsoft WindowsCVE-2020-1072Windows Kernel 信息泄露漏洞Important
Microsoft WindowsCVE-2020-1077Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1079Microsoft Windows 特权提升漏洞Important
Microsoft WindowsCVE-2020-1081Windows Printer Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1082Windows Error Reporting 特权提升漏洞Important
Microsoft WindowsCVE-2020-1086Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1088Windows Error Reporting 特权提升漏洞Important
Microsoft WindowsCVE-2020-1090Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1111Windows Clipboard Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1112Windows Background Intelligent Transfer Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1121Windows Clipboard Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1123Connected User Experiences and Telemetry Service 拒绝服务漏洞Important
Microsoft WindowsCVE-2020-1125Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1131Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1132Windows Error Reporting Manager 特权提升漏洞Important
Microsoft WindowsCVE-2020-1139Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1164Windows Runtime 特权提升漏洞Important
Microsoft WindowsCVE-2020-1165Windows Clipboard Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1166Windows Clipboard Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1184Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1185Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1187Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1188Windows State Repository Service 特权提升漏洞Important
Microsoft WindowsCVE-2020-1191Windows State Repository Service 特权提升漏洞Important
Power BICVE-2020-1173Microsoft Power BI Report Server 欺骗漏洞Important
Visual StudioCVE-2020-1171Visual Studio Code Python Extension 远程代码执行漏洞Important
Windows Hyper-VCVE-2020-0909Windows Hyper-V 拒绝服务漏洞Important
Windows KernelCVE-2020-1114Windows Kernel 特权提升漏洞Important
Windows KernelCVE-2020-1087Windows Kernel 特权提升漏洞Important
Windows ScriptingCVE-2020-1061Microsoft Script Runtime 远程代码执行漏洞Important
Windows Subsystem for LinuxCVE-2020-1075Windows Subsystem for Linux 信息泄露漏洞Important
Windows Task SchedulerCVE-2020-1113Windows Task Scheduler 安全功能绕过漏洞Important
Windows Update StackCVE-2020-1110Windows Update Stack 特权提升漏洞Important
Windows Update StackCVE-2020-1109Windows Update Stack 特权提升漏洞Important
Internet ExplorerCVE-2020-1092Internet Explorer 内存破坏漏洞Important
Microsoft Scripting EngineCVE-2020-1035VBScript 远程代码执行漏洞Important
Microsoft Scripting EngineCVE-2020-1058VBScript 远程代码执行漏洞Important
Microsoft Scripting EngineCVE-2020-1060VBScript 远程代码执行漏洞Important

转载自https://mp.weixin.qq.com/s/FdEQbtW357t_ms6ilUnZiA

admin-root 系统安全 web安全 安全架构
每个人都可以成为黑客,也许他就在你身边,也许...那就是未来的你
┃  ┏┃┃┃┏┛
┃  ━┛━┛┏┛  
━┛ ❤️  ━┛
本人小菜鸟一枚,公众号里有粉丝群和我的联系方式,有问题我会尽力解答的