描述:
Microsoft 發布了安全性更新以應對數個影響 Microsoft 產品或元件的多個漏洞。有關安全性更新的列表,請參考以下網址:
https://support.microsoft.com/en-us/help/20200811/security-update-deployment-information-august-11-2020
有報告觀察到針對 Windows仿冒詐騙漏洞 (CVE-2020-1464) 及 Internet Explorer遠端執行程式碼漏洞 (CVE-2020-1380) 的攻擊。系統管理員應立即為受影響的系統安裝修補程式,以免增加受到網絡攻擊的風險。
針對 Microsoft Netlogon 權限提升漏洞(CVE-2020-1472)的概念驗證和完全可行的程式碼已被公開,該漏洞可影響Windows Server 2008 R2及之後版本。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- Microsoft Internet Explorer 9, 11
- Microsoft Edge (EdgeHTML-based)
- Microsoft Windows 7, 8.1, RT 8.1, 10
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
- Microsoft Windows Server, version 1903, version 1909, version 2004
- Microsoft 365 Apps for Enterprise
- Microsoft Office 2010, 2013, 2013 Click-to-Run, 2013 RT, 2016, 2016 for Mac, 2019, 2019 for Mac
- Microsoft Office Online Server
- Microsoft Office Web Apps 2010, 2013
- Microsoft Excel 2010, 2013, 2013 RT, 2016
- Microsoft Word 2010, 2013, 2013 RT, 2016
- Microsoft Outlook 2010, 2013, 2013 RT, 2016
- Microsoft Access 2010, 2013, 2016
- Microsoft Dynamics 365 (on-premises) version 9.0
- Microsoft SharePoint Foundation 2010, 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2010, 2019
- Microsoft Visual Studio 2017, 2019
- Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8
- ASP.NET Core 2.1, 3.1
- ChakraCore
- Office Online Server
- SQL Server Management Studio 18.6
- Visual Studio Code
影響:
成功利用這些漏洞可以導致遠端執行程式碼、提高權限、服務受阻斷、泄漏資訊及仿冒詐騙,視乎攻擊者利用哪個漏洞而定。
建議:
受影響產品的修補程式可在 Windows Update 或 Microsoft Update Catalog 獲取。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。
進一步資訊:
https://support.microsoft.com/en-hk/help/4578013/security-update-for-windows-8-1-rt-8-1-and-server-2012-r2
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1530
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1537
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Aug
https://www.hkcert.org/my_url/zh/alert/20081201
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/microsoft-releases-august-2020-security-updates
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/microsoft-addresses-rce-and-spoofing-vulnerabilities-under-active
https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472
https://www.secura.com/blog/zero-logon
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1377 (to CVE-2020-1380)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472 (to CVE-2020-1480)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1483 (to CVE-2020-1490)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1492 (to CVE-2020-1505)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1509 (to CVE-2020-1522)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1524 (to CVE-2020-1531)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1533 (to CVE-2020-1558)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1560 (to CVE-2020-1571)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1577 (to CVE-2020-1585)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1597