微軟 |4月多個安全漏洞通告
發布時間 2020-04-160x00 漏洞概述
產品 |
CVE ID |
類 型 |
漏洞等級 |
遠程利用 |
Windows OneDrive |
CVE-2020-0935 |
EoP |
嚴重 |
否 |
Adobe Font Manager |
CVE-2020-1020 |
RCE |
嚴重 |
是 |
Adobe Font Manager |
CVE-2020-0938 |
RCE |
嚴重 |
是 |
0x01 漏洞詳情
微軟于周二發布了4月安全更新補丁,發布了針對113個漏洞的修復程序。在這些漏洞中,有15個被分類為嚴重,93個被分類為重要,3個被分類為中等,2個被歸類為低危。微軟表示有兩個0day先前已被公開披露,包括Windows OneDrive特權提升漏洞(CVE-2020-0935)和Adobe Font Manager庫遠程執行代碼漏洞(CVE-2020-1020),并且后者和另一個漏洞(Adobe Font Manager庫遠程執行代碼漏洞CVE-2020-0938)已在野外被利用。
CVE-2020-0935 是Windows OneDrive 權限提升漏洞。OneDrive for Windows Desktop 應用程序無法正確處理符號鏈接時,存在特權提升漏洞。成功利用此漏洞的攻擊者可能會覆蓋導致升高狀態的目標文件。要利用此漏洞,攻擊者首先必須登錄系統。然后,攻擊者可以運行一個為利用此漏洞而經特殊設計的應用程序,從而控制受影響的系統。
CVE-2020-1020和CVE-2020-0938是Adobe字體管理器庫遠程代碼執行漏洞。當 Windows Adobe Type Manager 庫未正確處理經特殊設計的多主機 Adobe Type 1 PostScript 格式字體時,Microsoft Windows 中存在遠程代碼執行漏洞。對于除 Windows 10 之外的所有系統,成功利用此漏洞的攻擊者可以遠程執行代碼。對于運行 Windows 10 的系統,成功利用此漏洞的攻擊者可以利用受限的特權和功能在 AppContainer 沙盒上下文中執行代碼。攻擊者可隨后安裝程序;查看、更改或刪除數據;或者創建擁有完全用戶權限的新帳戶。攻擊者可通過多種方式利用此漏洞,包括誘使用戶打開經特殊設計文檔或在 Windows 預覽窗格中查看。
0x02 影響范圍
漏洞編號 |
受影響產品版本 |
CVE-2020-0935 |
OneDrive for Windows |
CVE-2020-1020 CVE-2020-0938 |
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1709 for 32-bit Systems Windows 10 Version 1709 for ARM64-based Systems Windows 10 Version 1709 for x64-based Systems Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for ARM64-based Systems Windows 10 Version 1803 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1903 for 32-bit Systems Windows 10 Version 1903 for ARM64-based Systems Windows 10 Version 1903 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for Itanium-Based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1803 (Server Core Installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation) |
0x03 處置建議
微軟官方已經發布補丁修復了上述漏洞,下載鏈接:
https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/CVE-2020-0935
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1020
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-0938
0x04 相關新聞
https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2020-patch-tuesday-fixes-3-zero-days-15-critical-flaws/
0x05 參考鏈接
https://portal.msrc.microsoft.com/zh-cn/security-guidance
0x06 時間線
2020-04-14 微軟官方發布漏洞