微軟 | 9月多個產品漏洞通告
發布時間 2020-09-090x00 漏洞概述
2020年09月08日星期二,Microsoft發布了9月的安全更新。本次安全更新共修復了129個漏洞,涉及Microsoft Windows、Internet Explorer、Microsoft Office、Microsoft Exchange Serve等,目前尚沒有一個漏洞被在野利用。其中有23個漏洞為嚴重漏洞,105個為高危漏洞。
0x01 漏洞詳情
2020年9月安全更新涉及以下組件:
lMicrosoft Windows
lMicrosoft Edge (EdgeHTML-based)
lMicrosoft Edge (Chromium-based)
lMicrosoft ChakraCore
lnternet Explorer
lSQL Server
lMicrosoft JET Database Engine
lMicrosoft Office and Microsoft Office Services and Web Apps
lMicrosoft Dynamics
lVisual Studio
lMicrosoft Exchange Server
lSQL Server
lASP.NET
lMicrosoft OneDrive
lAzure DevOps
部分受影響的版本如下:
CVE編號 | 影響版本 |
CVE-2020-0664 | Windows Server 2008 for 32-bit SystemsService Pack 2 Windows Server 2008 for 32-bit SystemsService Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation)
|
CVE-2020-0922 CVE-2020-1252 CVE-2020-1285 | Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-basedSystems Windows 10 Version 1709 for 32-bit Systems Windows 10 Version 1709 for ARM64-based Systems Windows 10 Version 1709 for x64-basedSystems Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for ARM64-based Systems Windows 10 Version 1803 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1903 for 32-bit Systems Windows 10 Version 1903 for ARM64-based Systems Windows 10 Version 1903 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for x64-based Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) |
CVE-2020-1129 | Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1709 for 32-bit Systems Windows 10 Version 1709 for ARM64-based Systems Windows 10 Version 1709 for x64-based Systems Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for ARM64-based Systems Windows 10 Version 1803 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1903 for 32-bit Systems Windows 10 Version 1903 for ARM64-based Systems Windows 10 Version 1903 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for x64-based Systems Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) |
CVE-2020-1200 | Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2010 Service Pack 2 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 |
CVE-2020-1210 | Microsoft Business Productivity Servers 2010 Service Pack 2 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Server 2010 Service Pack 2 Microsoft SharePoint Server 2019 |
CVE-2020-1319 | Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1709 for 32-bit Systems Windows 10 Version 1709 for ARM64-based Systems Windows 10 Version 1709 for x64-based Systems Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for ARM64-based Systems Windows 10 Version 1803 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1903 for 32-bit Systems Windows 10 Version 1903 for ARM64-based Systems Windows 10 Version 1903 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for x64-based Systems Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) |
CVE-2020-1452 CVE-2020-1453 CVE-2020-1460 | Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2010 Service Pack 2 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 |
CVE-2020-1576 | Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2010 Service Pack 2 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2010 Service Pack 2 Microsoft SharePoint Server 2019 |
CVE-2020-1595 | Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 |
部分漏洞詳情:
1.Microsoft COM 遠程代碼執行漏洞(CVE-2020-0922)
Windows的Microsoft COM處理內存對象的方式中存在一個遠程代碼執行漏洞。
攻擊者引誘用戶訪問一個帶有惡意JavaScript的網站可利用此漏洞,成功利用此漏洞的攻擊者可以在目標系統上執行任意代碼。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922
2.Microsoft SharePoint遠程代碼執行多個安全漏洞
當軟件無法檢查應用程序包的源標記時,Microsoft SharePoint中將存在一個遠程代碼執行漏洞。
攻擊者需要上傳一個惡意的SharePoint應用程序包到受影響的SharePoint版本來利用此漏洞,成功利用此漏洞的攻擊者可以在SharePoint應用程序池和SharePoint服務器帳戶中運行任意代碼。
本次Microsoft修復了Sharepoint 2010年至2019年版本中的7個其他嚴重漏洞。分別為:CVE-2020-1200、CVE-2020-1210、CVE-2020-1452、CVE-2020-1453、CVE-2020-1576、CVE-2020-1460和CVE-2020-1595。
1.CVE-2020-1200
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200
2.CVE-2020-1210
CVE-2020-1210是受支持版本的Microsoft Sharepoint文檔管理軟件中的遠程代碼執行漏洞。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1210
3.CVE-2020-1452
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1452
4.CVE-2020-1453
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1453
5.CVE-2020-1460
當Microsoft SharePoint Server無法正確識別和過濾不安全的ASP.Net Web控件時,它會存在一個遠程代碼執行漏洞。
攻擊者通過在受影響的Microsoft SharePoint Server版本上創建并調用特制頁面來利用此漏洞,成功利用此漏洞并經過身份驗證的攻擊者可以使用特制頁面在SharePoint應用程序池進程安全方面執行操作。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460
6.CVE-2020-1576
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1576
7.CVE-2020-1595
Microsoft SharePoint中存在一個遠程代碼執行漏洞,由于沒有防護策略來使API免受不安全數據輸入的攻擊。攻擊者通過在受影響的SharePoint版本上使用特殊格式的輸入訪問易受感染的API來利用此漏洞。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595
3.Microsoft Windows Codecs 庫遠程代碼執行漏洞(CVE-2020-1319)
Microsoft Windows Codecs 庫處理內存中的對象時,存在一處遠程代碼執行漏洞。
成功利用此漏洞的攻擊者可以控制受影響的系統,如安裝程序、查看、更改或刪除數據,或創建具有完全用戶權限的新帳戶。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1319
4.Dynamics 365(on-premises)遠程代碼執行漏洞
1. Microsoft Dynamics 365 for Finance and Operations(on-premises)遠程代碼執行漏洞(CVE-2020-16857)
Microsoft Dynamics 365 for Finance and Operations(on-premises)版本10.0.11中存在一個遠程代碼執行漏洞。經過身份驗證的、具有導入和導出數據特權的攻擊者可以通過將惡意文件發送到易受攻擊的Dynamics服務器來利用此漏洞,成功利用此漏洞的攻擊者可以通過在受害者服務器上執行服務器端腳本來實現遠程代碼執行。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16857
2. Microsoft Dynamics 365(on-premises)遠程代碼執行漏洞(CVE-2020-16862)
當服務器無法正確對待受影響的Dynamics服務器的Web請求時,Microsoft Dynamics 365(on-premises)中將存在一個遠程代碼執行漏洞。經過身份驗證的攻擊者可以通過將惡意請求發送到易受攻擊的Dynamics服務器來利用此漏洞,成功利用此漏洞的攻擊者可以在SQL服務帳戶中運行任意代碼。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16862
5.Microsoft Exchange Server遠程代碼執行漏洞(CVE-2020-16875 )
由于對cmdlet參數的驗證不正確,Microsoft Exchange服務器中存在一個遠程代碼執行漏洞。成功利用此漏洞的攻擊者可以在受影響的系統上執行任意代碼。
詳細信息及補丁下載地址:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875
0x02 處置建議
微軟官方已于2020年09月08日發布了相關軟件的安全更新,建議用戶及時更新相關補丁。
下載地址:
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep
0x03 相關新聞
https://krebsonsecurity.com/2020/09/microsoft-patch-tuesday-sept-2020-edition/
https://blog.qualys.com/vulnerabilities-research/2020/09/08/september-2020-patch-tuesday-129-vulnerabilities-23-critical-sharepoint-exchange-windows-codecs-adobe-vulns
0x04 參考鏈接
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep
0x05 時間線
2020-09-08微軟官方發布安全更新
2020-09-09 VSRC發布安全通告