Microsoft 发布了安全性更新以应对多个影响 Microsoft 产品或元件的多个漏洞。有关安全性更新的列表,请参考以下网址:
https://support.microsoft.com/en-us/help/20200512/security-update-deployment-information-may-12-2020
成功利用这些漏洞可以导致远端执行程式码、提高权限、服务受阻断、泄漏资讯、仿冒诈骗及绕过保安功能,视乎攻击者利用哪个漏洞而定。
受影响产品的修补程式可在 Windows Update 或 Microsoft Update Catalog 获取。受影响系统的用户应遵从产品供应商的建议,立即采取行动以降低风险。
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-May
https://support.microsoft.com/en-us/help/20200512/security-update-deployment-information-may-12-2020
https://www.hkcert.org/my_url/zh/alert/20051301
https://www.us-cert.gov/ncas/current-activity/2020/05/12/microsoft-releases-may-2020-security-updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1060 (to CVE-2020-1072)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1075 (to CVE-2020-1079)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1086 (to CVE-2020-1088)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1099 (to CVE-2020-1114)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1116 (to CVE-2020-1118)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1123 (to CVE-2020-1126)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1134 (to CVE-2020-1145)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1153 (to CVE-2020-1158)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1164 (to CVE-2020-1166)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1173 (to CVE-2020-1176)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1184 (to CVE-2020-1192)