微軟 | 9月多個產品漏洞通告

發布時間 2020-09-09


0x00 漏洞概述

    2020年09月08日星期二,Microsoft發布了9月的安全更新。本次安全更新共修復了129個漏洞,涉及Microsoft Windows、Internet Explorer、Microsoft Office、Microsoft Exchange Serve等,目前尚沒有一個漏洞被在野利用。其中有23個漏洞為嚴重漏洞,105個為高危漏洞。

 

0x01 漏洞詳情

圖片12.png


2020年9月安全更新涉及以下組件:


    lMicrosoft Windows

    lMicrosoft Edge (EdgeHTML-based)

    lMicrosoft Edge (Chromium-based)

    lMicrosoft ChakraCore

    lnternet Explorer

    lSQL Server

    lMicrosoft JET Database Engine

    lMicrosoft Office and Microsoft Office Services and Web Apps

    lMicrosoft Dynamics

    lVisual Studio

    lMicrosoft Exchange Server

    lSQL Server

    lASP.NET

    lMicrosoft OneDrive

    lAzure DevOps



部分受影響的版本如下:



CVE編號

影響版本

CVE-2020-0664

Windows Server 2008 for 32-bit SystemsService Pack 2

Windows Server 2008 for 32-bit SystemsService Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

 

CVE-2020-0922

CVE-2020-1252

CVE-2020-1285

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-basedSystems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-basedSystems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core   installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server   Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1   (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016  (Server   Core installation)

Windows Server 2019

Windows Server 2019  (Server   Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server, version 2004 (Server Core installation)

CVE-2020-1129

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows Server 2016

Windows Server 2016  (Server   Core installation)

Windows Server 2019

Windows Server 2019  (Server   Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server, version 2004 (Server Core installation)

CVE-2020-1200

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

CVE-2020-1210

Microsoft Business Productivity Servers 2010 Service Pack 2

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Server 2010 Service Pack 2

Microsoft SharePoint Server 2019

CVE-2020-1319

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows Server 2016

Windows Server 2016  (Server   Core installation)

Windows Server 2019

Windows Server 2019  (Server   Core installation)

Windows Server, version 1903 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server, version 2004 (Server Core installation)

CVE-2020-1452

CVE-2020-1453

CVE-2020-1460

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

CVE-2020-1576

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2010 Service Pack 2

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2010 Service Pack 2

Microsoft SharePoint Server 2019

CVE-2020-1595

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019


部分漏洞詳情

1.Microsoft COM 遠程代碼執行漏洞(CVE-2020-0922)

 Windows的Microsoft COM處理內存對象的方式中存在一個遠程代碼執行漏洞。

攻擊者引誘用戶訪問一個帶有惡意JavaScript的網站利用此漏洞,成功利用此漏洞的攻擊者可以在目標系統上執行任意代碼。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922

 

2.Microsoft SharePoint遠程代碼執行多個安全漏洞

當軟件無法檢查應用程序包的源標記時,Microsoft SharePoint中將存在一個遠程代碼執行漏洞。

攻擊者需要上傳一個惡意的SharePoint應用程序包到受影響的SharePoint版本來利用此漏洞,成功利用此漏洞的攻擊者可以在SharePoint應用程序池和SharePoint服務器帳戶中運行任意代碼。

本次Microsoft修復了Sharepoint 2010年至2019年版本中的7個其他嚴重漏洞。分別為:CVE-2020-1200、CVE-2020-1210、CVE-2020-1452、CVE-2020-1453、CVE-2020-1576、CVE-2020-1460CVE-2020-1595。

1.CVE-2020-1200

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200

2.CVE-2020-1210

CVE-2020-1210是受支持版本的Microsoft Sharepoint文檔管理軟件中的遠程代碼執行漏洞。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1210

3.CVE-2020-1452

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1452

4.CVE-2020-1453

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1453

5.CVE-2020-1460

Microsoft SharePoint Server無法正確識別和過濾不安全的ASP.Net Web控件時,它會存在一個遠程代碼執行漏洞。

攻擊者通過在受影響的Microsoft SharePoint Server版本上創建并調用特制頁面來利用此漏洞,成功利用此漏洞并經過身份驗證的攻擊者可以使用特制頁面在SharePoint應用程序池進程安全方面執行操作。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460

6.CVE-2020-1576

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1576

7.CVE-2020-1595

Microsoft SharePoint中存在一個遠程代碼執行漏洞,由于沒有防護策略來使API免受不安全數據輸入的攻擊。攻擊者通過在受影響的SharePoint版本上使用特殊格式的輸入訪問易受感染的API來利用此漏洞。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595

 

3.Microsoft Windows Codecs 庫遠程代碼執行漏洞(CVE-2020-1319)

Microsoft Windows Codecs 庫處理內存中的對象時,存在一處遠程代碼執行漏洞。

成功利用此漏洞的攻擊者可以控制受影響的系統,如安裝程序、查看、更改或刪除數據,或創建具有完全用戶權限的新帳戶。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1319

 

4.Dynamics 365(on-premises)遠程代碼執行漏洞

1. Microsoft Dynamics 365 for Finance and Operations(on-premises)遠程代碼執行漏洞(CVE-2020-16857)

Microsoft Dynamics 365 for Finance and Operations(on-premises)版本10.0.11中存在一個遠程代碼執行漏洞。經過身份驗證的、具有導入和導出數據特權的攻擊者可以通過將惡意文件發送到易受攻擊的Dynamics服務器來利用此漏洞,成功利用此漏洞的攻擊者可以通過在受害者服務器上執行服務器端腳本來實現遠程代碼執行。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16857

2. Microsoft Dynamics 365(on-premises)遠程代碼執行漏洞(CVE-2020-16862)

當服務器無法正確對待受影響的Dynamics服務器的Web請求時,Microsoft Dynamics 365(on-premises)中將存在一個遠程代碼執行漏洞。經過身份驗證的攻擊者可以通過將惡意請求發送到易受攻擊的Dynamics服務器來利用此漏洞,成功利用此漏洞的攻擊者可以在SQL服務帳戶中運行任意代碼。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16862

 

5.Microsoft Exchange Server遠程代碼執行漏洞(CVE-2020-16875 )

由于對cmdlet參數的驗證不正確,Microsoft Exchange服務器中存在一個遠程代碼執行漏洞。成功利用此漏洞的攻擊者可以在受影響的系統上執行任意代碼。

詳細信息及補丁下載地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875

0x02 處置建議

微軟官方已于2020年09月08日發布了相關軟件的安全更新,建議用戶及時更新相關補丁。

下載地址:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep

0x03 相關新聞

https://krebsonsecurity.com/2020/09/microsoft-patch-tuesday-sept-2020-edition/

https://blog.qualys.com/vulnerabilities-research/2020/09/08/september-2020-patch-tuesday-129-vulnerabilities-23-critical-sharepoint-exchange-windows-codecs-adobe-vulns

0x04 參考鏈接

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep

0x05 時間線

2020-09-08微軟官方發布安全更新

2020-09-09 VSRC發布安全通告



圖片5.png