¡¾Îó²îͨ¸æ¡¿Î¢Èí3Ô¶à¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2023-03-15Ò»¡¢Îó²î¸ÅÊö
2023Äê3ÔÂ14ÈÕ£¬Î¢ÈíÐû²¼ÁË3ÔÂÇå¾²¸üУ¬±¾´Î¸üÐÂÐÞ¸´Á˰üÀ¨2¸ö0 dayÎó²îÔÚÄÚµÄ83¸öÇå¾²Îó²î£¨²»°üÀ¨Microsoft EdgeÎó²î£©£¬ÆäÖÐÓÐ9¸öÎó²îÆÀ¼¶Îª¡°ÑÏÖØ¡±¡£
Îó²îÏêÇé
±¾´ÎÐÞ¸´µÄÎó²îÖУ¬Îó²îÀàÐͰüÀ¨ÌØÈ¨ÌáÉýÎó²î¡¢Ô¶³Ì´úÂëÖ´ÐÐÎó²î¡¢ÐÅϢй¶Îó²î¡¢¾Ü¾ø·þÎñÎó²î¡¢Çå¾²¹¦Ð§ÈƹýÎó²îºÍÓÕÆÎó²îµÈ¡£
΢Èí±¾´Î¹²ÐÞ¸´ÁË2¸ö±»Æð¾¢Ê¹ÓõÄ0 dayÎó²î£¨Ö¸Îó²îÒѱ»¹ûÕæÅû¶»ò±»Æð¾¢Ê¹Óõ«Ã»ÓпÉÓõĹٷ½ÐÞ¸´³ÌÐò£©£¬ÈçÏ£º
CVE-2023-23397£ºMicrosoft Outlook ÌØÈ¨ÌáÉýÎó²î
¸ÃÎó²îÊÇMicrosoft Outlook for WindowsÖеÄÌØÈ¨ÌáÉýÎó²î£¬ ÆäCVSSv3ÆÀ·ÖΪ9.8¡£¿ÉÒÔͨ¹ý·¢ËÍÌØÖÆµÄµç×ÓÓʼþÀ´Ê¹ÓøÃÎó²î£¬¸Ãµç×ÓÓʼþÔÚOutlook ¿Í»§¶Ë¼ìË÷ºÍ´¦Öóͷ£Ê±×Ô¶¯´¥·¢£¬¿ÉÄܵ¼ÖÂÊܺ¦ÕßÅþÁ¬µ½ÍþвÕß¿ØÖƵÄÍⲿ UNC λÖ㬴Ӷøµ¼ÖÂÊܺ¦ÕßµÄ Net-NTLMv2 ¹þϣй¶£¬ÍþвÕß¿ÉÒÔ½«Æäת·¢¸øÁíÒ»¸ö·þÎñ£¬²¢ÒÔÊܺ¦ÕßµÄÉí·Ý¾ÙÐÐÈÏÖ¤¡£¸ÃÎó²îÏÖÔÚÔÝδ¹ûÕæÅû¶£¬µ«ÒÑ·¢Ã÷±»ºÚ¿Í×éÖ¯STRONTIUM ʹÓá£
CVE-2023-24880£ºWindows SmartScreen Çå¾²¹¦Ð§ÈƹýÎó²î
¿ÉÒÔͨ¹ýÖÆ×÷¶ñÒâÎļþÀ´Ì Web ±ê¼Ç (MOTW) ·ÀÓù£¬´Ó¶øµ¼ÖÂÇå¾²¹¦Ð§£¨ÀýÈç Microsoft Office ÖеÄÊܱ£»¤ÊÓͼ£©Êܵ½Ë𻵣¬ÕâЩ¹¦Ð§ÒÀÀµÓÚ MOTW ±ê¼Ç¡£¸ÃÎó²îÏÖÔÚÒѾ¹ûÕæÅû¶£¬ÇÒÒÑ·¢Ã÷±»Magniber ÀÕË÷Èí¼þʹÓ㬹ȸèTAGÌåÏÖ¸ÃÎó²îΪ΢Èí2022Äê12ÔÂÐÞ¸´µÄCVE-2022-44698£¨Windows SmartScreen Çå¾²¹¦Ð§ÈƹýÎó²î£©µÄÈÆ¹ý¡£
±¾´ÎÇå¾²¸üÐÂÖÐÆÀ¼¶ÎªÑÏÖØµÄ9¸öÎó²î°üÀ¨£º
l CVE-2023-23415£º»¥ÁªÍø¿ØÖÆÐÂÎÅÐÒé (ICMP) Ô¶³Ì´úÂëÖ´ÐÐÎó²î
¸ÃÎó²îµÄCVSSv3ÆÀ·ÖΪ9.8£¬¿ÉÒÔÏòÄ¿µÄÖ÷»ú·¢ËÍÒ»¸ö³õ¼¶ÐÒé¹ýʧ£¬ÔÚÁíÒ»¸öICMPÊý¾Ý°üµÄ±¨Í·ÖаüÀ¨Ò»¸öË鯬IPÊý¾Ý°ü¡£Òª´¥·¢Ò×Êܹ¥»÷µÄ´úÂë·¾¶£¬Ä¿µÄÖ÷»úÉϵÄÓ¦ÓóÌÐò±ØÐè°ó¶¨µ½ÔʼÌ×½Ó×Ö¡£
l CVE-2023-23397£ºMicrosoft Outlook ÌØÈ¨ÌáÉýÎó²î
l CVE-2023-23404£ºWindows µã¶ÔµãËíµÀÐÒéÔ¶³Ì´úÂëÖ´ÐÐÎó²î
¸ÃÎó²îµÄCVSSv3ÆÀ·ÖΪ8.1£¬Î´¾Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉÒÔÏò RAS ·þÎñÆ÷·¢ËÍÌØÖÆÅþÁ¬ÇëÇó£¬Õâ¿ÉÄܵ¼Ö RAS ·þÎñÆ÷ÅÌËã»úÉϵÄÔ¶³Ì´úÂëÖ´ÐС£µ«Ê¹ÓøÃÎó²îÐèÒªÓ®µÃ¾ºÕùÌõ¼þ¡£
l CVE-2023-23411£ºWindows Hyper-V ¾Ü¾ø·þÎñÎó²î
¸ÃÎó²îµÄCVSSv3ÆÀ·ÖΪ6.5£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÄܵ¼ÖÂHyper-V guestÓ°Ïì Hyper-V Ö÷»úµÄ¹¦Ð§¡£
l CVE-2023-23416£ºWindows ¼ÓÃÜ·þÎñÔ¶³Ì´úÂëÖ´ÐÐÎó²î
¸ÃÎó²îµÄCVSSv3ÆÀ·ÖΪ8.4£¬ÍþвÕß¿ÉÒÔͨ¹ýÓÕµ¼¾ÓÉÉí·ÝÑéÖ¤µÄÓû§ÔÚÊÜÓ°ÏìµÄϵͳÉϵ¼Èë¶ñÒâÖ¤ÊéÀ´Ê¹ÓøÃÎó²î£¬¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£
l CVE-2023-23392£ºHTTPÐÒéÕ»Ô¶³Ì´úÂëÖ´ÐÐÎó²î
¸ÃÎó²îµÄCVSSv3ÆÀ·ÖΪ9.8£¬Î´¾Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉÒÔͨ¹ý½«ÌØÖƵÄÊý¾Ý°ü·¢Ë͵½Ä¿µÄ·þÎñÆ÷£¬Ê¹Óà HTTP ÐÒéÕ» (http.sys) À´´¦Öóͷ£Êý¾Ý°ü¡£
l CVE-2023-21708£ºRemote Procedure Call RuntimeÔ¶³Ì´úÂëÖ´ÐÐÎó²î
¸ÃÎó²îµÄCVSSv3ÆÀ·ÖΪ9.8£¬Î´¾Éí·ÝÑéÖ¤µÄÍþвÕßÐèÒªÏò RPC Ö÷»ú·¢ËÍÌØÖÆµÄ RPC ŲÓÃÀ´Ê¹ÓøÃÎó²î£¬¿ÉÄܵ¼ÖÂÔÚ·þÎñÆ÷¶ËÒÔÓë RPC ·þÎñÏàͬµÄȨÏÞÖ´ÐÐÔ¶³Ì´úÂë¡£¿ÉÒÔͨ¹ýÔÚÆóÒµÍâΧ·À»ðǽÉÏ×è¶ÏTCP 135¶Ë¿ÚÀ´ïÔÌÕë¶Ô¸ÃÎó²îµÄ¹¥»÷¡£
l CERT/CC£ºCVE-2023-1017 TPM2.0 Ä£¿é¿âÌØÈ¨ÌáÉýÎó²î
¸ÃÎó²îΪµÚÈý·½Çý¶¯³ÌÐòÖеÄÎó²î£¬ÆäCVSSv3ÆÀ·ÖΪ8.8£¬¿ÉÄܵ¼Ö¸ù·ÖÇøÖеÄÔ½½çдÈë¡£
l CERT/CC£ºCVE-2023-1018 TPM2.0 Ä£¿é¿âÌØÈ¨ÌáÉýÎó²î
¸ÃÎó²îΪµÚÈý·½Çý¶¯³ÌÐòÖеÄÎó²î£¬ÆäCVSSv3ÆÀ·ÖΪ8.8¡£
΢Èí3Ô¸üÐÂÉæ¼°µÄÍêÕûÎó²îÁбíÈçÏ£º
CVE | CVE ÎÊÌâ | ÑÏÖØÐÔ |
CVE-2023-23415 | »¥ÁªÍø¿ØÖÆÐÂÎÅÐÒé (ICMP) Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ÑÏÖØ |
CVE-2023-23397 | Microsoft Outlook ÌØÈ¨ÌáÉýÎó²î | ÑÏÖØ |
CVE-2023-23404 | Windows µã¶ÔµãËíµÀÐÒéÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ÑÏÖØ |
CVE-2023-23411 | Windows Hyper-V ¾Ü¾ø·þÎñÎó²î | ÑÏÖØ |
CVE-2023-23416 | Windows ¼ÓÃÜ·þÎñÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ÑÏÖØ |
CVE-2023-23392 | HTTPÐÒéÕ»Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ÑÏÖØ |
CVE-2023-21708 | Remote Procedure Call RuntimeÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ÑÏÖØ |
CVE-2023-1017 | CERT/CC£ºCVE-2023-1017 TPM2.0 Ä£¿é¿âÌØÈ¨ÌáÉýÎó²î | ÑÏÖØ |
CVE-2023-1018 | CERT/CC£ºCVE-2023-1018 TPM2.0 Ä£¿é¿âÌØÈ¨ÌáÉýÎó²î | ÑÏÖØ |
CVE-2023-23408 | Azure Apache Ambari ÓÕÆÎó²î | ¸ßΣ |
CVE-2023-23409 | ¿Í»§¶Ë·þÎñÆ÷ÔËÐÐʱ×Óϵͳ (CSRSS) ÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-23394 | ¿Í»§¶Ë·þÎñÆ÷ÔËÐÐʱ×Óϵͳ (CSRSS) ÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-23388 | Windows À¶ÑÀÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24920 | Microsoft Dynamics 365 (on-premises) ¿çÕ¾¾ç±¾Îó²î | ¸ßΣ |
CVE-2023-24879 | Microsoft Dynamics 365 (on-premises) ¿çÕ¾¾ç±¾Îó²î | ¸ßΣ |
CVE-2023-24919 | Microsoft Dynamics 365 (on-premises) ¿çÕ¾¾ç±¾Îó²î | ¸ßΣ |
CVE-2023-24891 | Microsoft Dynamics 365 (on-premises) ¿çÕ¾¾ç±¾Îó²î | ¸ßΣ |
CVE-2023-24922 | Microsoft Dynamics 365 ÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24921 | Microsoft Dynamics 365 (on-premises) ¿çÕ¾¾ç±¾Îó²î | ¸ßΣ |
CVE-2023-24892 | Microsoft Edge£¨»ùÓÚ Chromium£©Webview2 ÓÕÆÎó²î | ¸ßΣ |
CVE-2023-24910 | Windows ͼÐÎ×é¼þÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23398 | Microsoft Excel ÓÕÆÎó²î | ¸ßΣ |
CVE-2023-23396 | Microsoft Excel ¾Ü¾ø·þÎñÎó²î | ¸ßΣ |
CVE-2023-23399 | Microsoft Excel Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23395 | Microsoft SharePoint Server ÓÕÆÎó²î | ¸ßΣ |
CVE-2023-24890 | Microsoft OneDrive for iOS Çå¾²¹¦Ð§ÈƹýÎó²î | ¸ßΣ |
CVE-2023-24930 | Microsoft OneDrive for MacOS ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24882 | Microsoft OneDrive for Android ÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24923 | Microsoft OneDrive for Android ÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24907 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24857 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24868 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24872 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24876 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24913 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24864 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24866 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24906 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24867 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24863 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24858 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24911 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24870 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24909 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23406 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23413 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24856 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-24865 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-23403 | Microsoft PostScript ºÍ PCL6 Àà´òÓ¡»úÇý¶¯³ÌÐòÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23401 | Windows Media Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23402 | Windows Media Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23391 | Office for Android ÓÕÆÎó²î | ¸ßΣ |
CVE-2023-23400 | Windows DNS ·þÎñÆ÷Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23383 | Service Fabric Explorer ÓÕÆÎó²î | ¸ßΣ |
CVE-2023-23618 | GitHub£ºCVE-2023-23618 Git for Windows Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-22743 | GitHub£ºCVE-2023-22743 Git for Windows Installer ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23946 | GitHub£ºCVE-2023-23946 mingit Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-22490 | GitHub£ºCVE-2023-22490 mingit ÐÅϢй¶Îó²î | ¸ßΣ |
CVE-2023-23412 | Windows ÕÊ»§Í¼Æ¬ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24871 | Windows À¶ÑÀ·þÎñÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23393 | Windows BrokerInfrastructure ·þÎñÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23389 | Microsoft Defender ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23410 | Windows HTTP.sys ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24859 | Windows Internet ÃÜÔ¿½»Á÷ (IKE) À©Õ¹¾Ü¾ø·þÎñÎó²î | ¸ßΣ |
CVE-2023-23420 | Windows ÄÚºËÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23422 | Windows ÄÚºËÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23421 | Windows ÄÚºËÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23423 | Windows ÄÚºËÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23417 | Windows ·ÖÇøÖÎÀíÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23407 | Windows ÒÔÌ«Íøµã¶ÔµãÐÒé (PPPoE) Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23385 | Windows ÒÔÌ«Íøµã¶ÔµãÐÒé (PPPoE) ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23414 | Windows ÒÔÌ«Íøµã¶ÔµãÐÒé (PPPoE) Ô¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23405 | Remote Procedure Call RuntimeÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24869 | Remote Procedure Call RuntimeÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-24908 | Remote Procedure Call RuntimeÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ¸ßΣ |
CVE-2023-23419 | Windows µ¯ÐÔÎļþϵͳ (ReFS) ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-23418 | Windows µ¯ÐÔÎļþϵͳ (ReFS) ÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24862 | Windows Ç徲ͨµÀ¾Ü¾ø·þÎñÎó²î | ¸ßΣ |
CVE-2023-24861 | Windows ͼÐÎ×é¼þÌØÈ¨ÌáÉýÎó²î | ¸ßΣ |
CVE-2023-24880 | Windows SmartScreen Çå¾²¹¦Ð§ÈƹýÎó²î | ÖÐΣ |
CVE-2023-0567 | PHP Password_verify()ÑéÖ¤¹ýʧÎó²î | δ֪ |
CVE-2023-20052 | ClamAV ÐÅϢй¶Îó²î | δ֪ |
CVE-2023-20032 | ClamAV Ô¶³Ì´úÂëÖ´ÐÐÎó²î | δ֪ |
CVE-2023-1236 | Chromium£ºCVE-2023-1236 ÄÚ²¿ÊµÏÖ²»µ± | δ֪ |
CVE-2023-1235 | Chromium£ºDevTools ÖÐµÄ CVE-2023-1235 ÀàÐÍ»ìÏý | δ֪ |
CVE-2023-1213 | Chromium£ºCVE-2023-1213 ÔÚ Swiftshader ÖÐÊͷźóʹÓà | δ֪ |
CVE-2023-1234 | Chromium£ºCVE-2023-1234 Intents ÖеIJ»µ±ÊµÑé | δ֪ |
CVE-2023-1223 | Chromium£ºCVE-2023-1223 ×Ô¶¯Ìî³äÖеÄÕ½ÂÔÖ´ÐÐȱ·¦ | δ֪ |
CVE-2023-1222 | Chromium£ºCVE-2023-1222 Web Audio API ÖеĶѻº³åÇøÒç³ö | δ֪ |
CVE-2023-1221 | Chromium£ºCVE-2023-1221 À©Õ¹ API ÖеÄÕ½ÂÔÖ´ÐÐȱ·¦ | δ֪ |
CVE-2023-1229 | Chromium£ºCVE-2023-1229 ÔÚPermission promptsÖÐʵÑé²»µ± | δ֪ |
CVE-2023-1228 | Chromium£ºCVE-2023-1228 IntentsÖеÄÕ½ÂÔÖ´ÐÐȱ·¦ | δ֪ |
CVE-2023-1224 | Chromium£ºCVE-2023-1224 Web Ö§¸¶ API ÖеÄÕ½ÂÔÖ´ÐÐȱ·¦ | δ֪ |
CVE-2023-1220 | Chromium£ºUMA ÖÐµÄ CVE-2023-1220 ¶Ñ»º³åÇøÒç³ö | δ֪ |
CVE-2023-1216 | Chromium£ºCVE-2023-1216 ÔÚ DevTools ÖÐÊͷźóʹÓà | δ֪ |
CVE-2023-1215 | Chromium£ºCVE-2023-1215 CSS ÖеÄÀàÐÍ»ìÏý | δ֪ |
CVE-2023-1214 | Chromium£ºV8 ÖÐµÄ CVE-2023-1214 ÀàÐÍ»ìÏý | δ֪ |
CVE-2023-1219 | Chromium£ºÖ¸±êÖÐµÄ CVE-2023-1219 ¶Ñ»º³åÇøÒç³ö | δ֪ |
CVE-2023-1218 | Chromium£ºCVE-2023-1218 ÔÚ WebRTC ÖÐÃâ·ÑʹÓà | δ֪ |
CVE-2023-1217 | Chromium£ºCVE-2023-217Í߽ⱨ¸æÖеĿÍÕ»»º³åÇøÒç³ö | δ֪ |
CVE-2023-1230 | Chromium£ºCVE-2023-1230 WebApp ×°ÖÃÖеIJ»µ±ÊµÑé | δ֪ |
CVE-2023-1232 | Chromium£ºCVE-2023-1232 Resource Timing ÖеÄÕ½ÂÔÖ´ÐÐȱ·¦ | δ֪ |
CVE-2023-1233 | Chromium£ºCVE-2023-1233 Resource Timing ÖеÄÕ½ÂÔÖ´ÐÐȱ·¦ | δ֪ |
CVE-2023-1231 | Chromium£ºCVE-2023-1231 ÔÚ×Ô¶¯Ìî³äÖÐʵÑé²»µ± | δ֪ |
¶þ¡¢Ó°Ïì¹æÄ£
ÊÜÓ°ÏìµÄ²úÆ·/¹¦Ð§/·þÎñ/×é¼þ°üÀ¨£º
Azure
Client Server Run-time Subsystem (CSRSS)
Internet Control Message Protocol (ICMP)
Microsoft Bluetooth Driver
Microsoft Dynamics
Microsoft Edge (Chromium-based)
Microsoft Graphics Component
Microsoft Office Excel
Microsoft Office Outlook
Microsoft Office SharePoint
Microsoft OneDrive
Microsoft PostScript Printer Driver
Microsoft Printer Drivers
Microsoft Windows Codecs Library
Office for Android
Remote Access Service Point-to-Point Tunneling Protocol
Role: DNS Server
Role: Windows Hyper-V
Service Fabric
Visual Studio
Windows Accounts Control
Windows Bluetooth Service
Windows Central Resource Manager
Windows Cryptographic Services
Windows Defender
Windows HTTP Protocol Stack
Windows HTTP.sys
Windows Internet Key Exchange (IKE) Protocol
Windows Kernel
Windows Partition Management Driver
Windows Point-to-Point Protocol over Ethernet (PPPoE)
Windows Remote Procedure Call
Windows Remote Procedure Call Runtime
Windows Resilient File System (ReFS)
Windows Secure Channel
Windows SmartScreen
Windows TPM
Windows Win32K
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚ΢ÈíÒÑÐû²¼Ïà¹ØÇå¾²¸üУ¬½¨ÒéÊÜÓ°ÏìµÄÓû§¾¡¿ìÐÞ¸´¡£
£¨Ò»£© Windows Update×Ô¶¯¸üÐÂ
Microsoft UpdateĬÈÏÆôÓ㬵±ÏµÍ³¼ì²âµ½¿ÉÓøüÐÂʱ£¬½«»á×Ô¶¯ÏÂÔØ¸üв¢ÔÚÏÂÒ»´ÎÆô¶¯Ê±×°Öá£Ò²¿ÉÑ¡Ôñͨ¹ýÒÔϰ취ÊÖ¶¯¾ÙÐиüУº
1¡¢µã»÷¡°×îÏȲ˵¥¡±»ò°´Windows¿ì½Ý¼ü£¬µã»÷½øÈë¡°ÉèÖá±
2¡¢Ñ¡Ôñ¡°¸üкÍÇå¾²¡±£¬½øÈë¡°Windows¸üС±£¨Windows 8¡¢Windows 8.1¡¢Windows Server 2012ÒÔ¼°Windows Server 2012 R2¿Éͨ¹ý¿ØÖÆÃæ°å½øÈë¡°Windows¸üС±£¬Ïêϸ°ì·¨Îª¡°¿ØÖÆÃæ°å¡±->¡°ÏµÍ³ºÍÇå¾²¡±->¡°Windows¸üС±£©
3¡¢Ñ¡Ôñ¡°¼ì²é¸üС±£¬ÆÚ´ýϵͳ×Ô¶¯¼ì²é²¢ÏÂÔØ¿ÉÓøüС£
4¡¢¸üÐÂÍê³ÉºóÖØÆôÅÌËã»ú£¬¿Éͨ¹ý½øÈë¡°Windows¸üС±->¡°Éó²é¸üÐÂÀúÊ·¼Í¼¡±Éó²éÊÇ·ñÀÖ³É×°ÖÃÁ˸üС£¹ØÓÚûÓÐÀÖ³É×°ÖõĸüУ¬¿ÉÒÔµã»÷¸Ã¸üÐÂÃû³Æ½øÈë΢Èí¹Ù·½¸üÐÂÐÎòÁ´½Ó£¬µã»÷×îеÄSSUÃû³Æ²¢ÔÚÐÂÁ´½ÓÖеã»÷¡°Microsoft ¸üÐÂĿ¼¡±£¬È»ºóÔÚÐÂÁ´½ÓÖÐÑ¡ÔñÊÊÓÃÓÚÄ¿µÄϵͳµÄ²¹¶¡¾ÙÐÐÏÂÔØ²¢×°Öá£
£¨¶þ£© ÊÖ¶¯×°ÖøüÐÂ
Microsoft¹Ù·½ÏÂÔØÏìÓ¦²¹¶¡¾ÙÐиüС£
2023Äê3ÔÂÇå¾²¸üÐÂÏÂÔØÁ´½Ó£º
https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar
²¹¶¡ÏÂÔØÊ¾Àý£º
1.·¿ªÉÏÊöÏÂÔØÁ´½Ó£¬µã»÷Îó²îÁбíÖÐÒªÐÞ¸´µÄCVEÁ´½Ó¡£

Àý1£ºÎ¢ÈíÎó²îÁÐÌåÏÖÀý£¨2022Äê2Ô£©
2.ÔÚ΢Èíͨ¸æÒ³Ãæµ×²¿×ó²à¡¾²úÆ·¡¿Ñ¡ÔñÏìÓ¦µÄϵͳÀàÐÍ£¬µã»÷ÓҲࡾÏÂÔØ¡¿´¦·¿ª²¹¶¡ÏÂÔØÁ´½Ó¡£

Àý2£ºCVE-2022-21989²¹¶¡ÏÂÔØÊ¾Àý
3.µã»÷¡¾Çå¾²¸üС¿£¬·¿ª²¹¶¡ÏÂÔØÒ³Ãæ£¬ÏÂÔØÏìÓ¦²¹¶¡²¢¾ÙÐÐ×°Öá£

Àý3£º²¹¶¡ÏÂÔØ½çÃæ
4.×°ÖÃÍê³ÉºóÖØÆôÅÌËã»ú¡£
3.2 ÔÝʱ²½·¥
Õë¶ÔCVE-2023-23397£¨Microsoft Outlook ÌØÈ¨ÌáÉýÎó²î£©£¬ÊÜÓ°ÏìÓû§¿É²Î¿¼¹Ù·½Í¨¸æÊµÊ±×°Öò¹¶¡£¬Ò²¿É²Î¿¼Î¢ÈíÇå¾²ÏìÓ¦ÖÐÐÄÐû²¼µÄ»º½âÖ¸ÄÏ¡£
https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬ïÔÌϵͳÎó²î£¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬Ð޸ķÀ»ðǽսÂÔ£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬ïÔ̽«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬ïÔ̹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397
https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2023-patch-tuesday-fixes-2-zero-days-83-flaws/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-03-15 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ×ðÁú¿Ê±¼ò½é
×ðÁú¿Ê±½¨ÉèÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Çå¾²·þÎñ½â¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°×ðÁú¿Ê±´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬×ðÁú¿Ê±ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£
5.2 ¹ØÓÚ×ðÁú¿Ê±
×ðÁú¿Ê±Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ