描述:
Microsoft 发布了安全性更新以应对数个影响 Microsoft 产品或元件的多个漏洞。有关安全性更新的列表,请参考以下网址:
https://support.microsoft.com/en-us/help/20200811/security-update-deployment-information-august-11-2020
有报告观察到针对 Windows仿冒诈骗漏洞 (CVE-2020-1464) 及 Internet Explorer远端执行程式码漏洞 (CVE-2020-1380) 的攻击。系统管理员应立即为受影响的系统安装修补程式,以免增加受到网络攻击的风险。
针对 Microsoft Netlogon 权限提升漏洞(CVE-2020-1472)的概念验证和完全可行的程序代码已被公开,该漏洞可影响Windows Server 2008 R2及之后版本。系统管理员应立即为受影响的系统安装修补程序,以减低受到网络攻击的风险。
受影响的系统:
- Microsoft Internet Explorer 9, 11
- Microsoft Edge (EdgeHTML-based)
- Microsoft Windows 7, 8.1, RT 8.1, 10
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
- Microsoft Windows Server, version 1903, version 1909, version 2004
- Microsoft 365 Apps for Enterprise
- Microsoft Office 2010, 2013, 2013 Click-to-Run, 2013 RT, 2016, 2016 for Mac, 2019, 2019 for Mac
- Microsoft Office Online Server
- Microsoft Office Web Apps 2010, 2013
- Microsoft Excel 2010, 2013, 2013 RT, 2016
- Microsoft Word 2010, 2013, 2013 RT, 2016
- Microsoft Outlook 2010, 2013, 2013 RT, 2016
- Microsoft Access 2010, 2013, 2016
- Microsoft Dynamics 365 (on-premises) version 9.0
- Microsoft SharePoint Foundation 2010, 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2010, 2019
- Microsoft Visual Studio 2017, 2019
- Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8
- ASP.NET Core 2.1, 3.1
- ChakraCore
- Office Online Server
- SQL Server Management Studio 18.6
- Visual Studio Code
影响:
成功利用这些漏洞可以导致远端执行程式码、提高权限、服务受阻断、泄漏资讯及仿冒诈骗,视乎攻击者利用哪个漏洞而定。
建议:
受影响产品的修补程式可在 Windows Update 或 Microsoft Update Catalog 获取。受影响系统的用户应遵从产品供应商的建议,立即采取行动以降低风险。
进一步信息:
https://support.microsoft.com/en-hk/help/4578013/security-update-for-windows-8-1-rt-8-1-and-server-2012-r2
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1530
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1537
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Aug
https://www.hkcert.org/my_url/zh/alert/20081201
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/microsoft-releases-august-2020-security-updates
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/microsoft-addresses-rce-and-spoofing-vulnerabilities-under-active
https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472
https://www.secura.com/blog/zero-logon
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1377 (to CVE-2020-1380)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472 (to CVE-2020-1480)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1483 (to CVE-2020-1490)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1492 (to CVE-2020-1505)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1509 (to CVE-2020-1522)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1524 (to CVE-2020-1531)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1533 (to CVE-2020-1558)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1560 (to CVE-2020-1571)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1577 (to CVE-2020-1585)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1597