微软 | 9月多个产品漏洞通告

0x00 漏洞概述

    2020年09月08日星期二,Microsoft发布了9月的安全更新。本次安全更新共修复了129个漏洞,涉及Microsoft Windows、Internet Explorer、Microsoft Office、Microsoft Exchange Serve等,目前尚没有一个漏洞被在野利用。其中有23个漏洞为严重漏洞,105个为高危漏洞。

0x01 漏洞详情

图片12.png

2020年9月安全更新涉及以下组件:

    lMicrosoft Windows

    lMicrosoft Edge (EdgeHTML-based)

    lMicrosoft Edge (Chromium-based)

    lMicrosoft ChakraCore

    lnternet Explorer

    lSQL Server

    lMicrosoft JET Database Engine

    lMicrosoft Office and Microsoft Office Services and Web Apps

    lMicrosoft Dynamics

    lVisual Studio

    lMicrosoft Exchange Server

    lSQL Server

    lASP.NET

    lMicrosoft OneDrive

    lAzure DevOps

部分受影响的版本如下:

CVE编号影响版本
CVE-2020-0664Windows Server 2008 for 32-bit SystemsService Pack 2Windows Server 2008 for 32-bit SystemsService Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2012 R2Windows Server 2012 R2 (Server Core installation)Windows Server 2016Windows Server 2016 (Server Core installation)Windows Server 2019Windows Server 2019 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation) 
CVE-2020-0922CVE-2020-1252CVE-2020-1285Windows 10 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1607 for x64-basedSystemsWindows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1709 for ARM64-based SystemsWindows 10 Version 1709 for x64-basedSystemsWindows 10 Version 1803 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 1803 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 2004 for 32-bit SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 2004 for x64-based SystemsWindows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems Service Pack 1Windows 8.1 for 32-bit systemsWindows 8.1 for x64-based systemsWindows RT 8.1Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core   installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for x64-based Systems Service Pack 2 (Server   Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems Service Pack 1   (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2012 R2Windows Server 2012 R2 (Server Core installation)Windows Server 2016Windows Server 2016  (Server   Core installation)Windows Server 2019Windows Server 2019  (Server   Core installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation)Windows Server, version 2004 (Server Core installation)
CVE-2020-1129Windows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1607 for x64-based SystemsWindows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1709 for ARM64-based SystemsWindows 10 Version 1709 for x64-based SystemsWindows 10 Version 1803 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 1803 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 2004 for 32-bit SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 2004 for x64-based SystemsWindows Server 2016Windows Server 2016  (Server   Core installation)Windows Server 2019Windows Server 2019  (Server   Core installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation)Windows Server, version 2004 (Server Core installation)
CVE-2020-1200Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2010 Service Pack 2Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2019
CVE-2020-1210Microsoft Business Productivity Servers 2010 Service Pack 2Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Server 2010 Service Pack 2Microsoft SharePoint Server 2019
CVE-2020-1319Windows 10 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1607 for x64-based SystemsWindows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1709 for ARM64-based SystemsWindows 10 Version 1709 for x64-based SystemsWindows 10 Version 1803 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 1803 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 2004 for 32-bit SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 2004 for x64-based SystemsWindows Server 2016Windows Server 2016  (Server   Core installation)Windows Server 2019Windows Server 2019  (Server   Core installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation)Windows Server, version 2004 (Server Core installation)
CVE-2020-1452CVE-2020-1453CVE-2020-1460Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2010 Service Pack 2Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2019
CVE-2020-1576Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2010 Service Pack 2Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2010 Service Pack 2Microsoft SharePoint Server 2019
CVE-2020-1595Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2019

部分漏洞详情

1.Microsoft COM 远程代码执行漏洞(CVE-2020-0922)

 Windows的Microsoft COM处理内存对象的方式中存在一个远程代码执行漏洞。

攻击者引诱用户访问一个带有恶意JavaScript的网站可利用此漏洞,成功利用此漏洞的攻击者可以在目标系统上执行任意代码。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922

2.Microsoft SharePoint远程代码执行多个安全漏洞

当软件无法检查应用程序包的源标记时,Microsoft SharePoint中将存在一个远程代码执行漏洞。

攻击者需要上传一个恶意的SharePoint应用程序包到受影响的SharePoint版本来利用此漏洞,成功利用此漏洞的攻击者可以在SharePoint应用程序池和SharePoint服务器帐户中运行任意代码。

本次Microsoft修复了Sharepoint 2010年至2019年版本中的7个其他严重漏洞。分别为:CVE-2020-1200、CVE-2020-1210、CVE-2020-1452、CVE-2020-1453、CVE-2020-1576、CVE-2020-1460和CVE-2020-1595。

1.CVE-2020-1200

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200

2.CVE-2020-1210

CVE-2020-1210是受支持版本的Microsoft Sharepoint文档管理软件中的远程代码执行漏洞。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1210

3.CVE-2020-1452

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1452

4.CVE-2020-1453

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1453

5.CVE-2020-1460

当Microsoft SharePoint Server无法正确识别和过滤不安全的ASP.Net Web控件时,它会存在一个远程代码执行漏洞。

攻击者通过在受影响的Microsoft SharePoint Server版本上创建并调用特制页面来利用此漏洞,成功利用此漏洞并经过身份验证的攻击者可以使用特制页面在SharePoint应用程序池进程安全方面执行操作。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460

6.CVE-2020-1576

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1576

7.CVE-2020-1595

Microsoft SharePoint中存在一个远程代码执行漏洞,由于没有防护策略来使API免受不安全数据输入的攻击。攻击者通过在受影响的SharePoint版本上使用特殊格式的输入访问易受感染的API来利用此漏洞。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595

3.Microsoft Windows Codecs 库远程代码执行漏洞(CVE-2020-1319)

Microsoft Windows Codecs 库处理内存中的对象时,存在一处远程代码执行漏洞。

成功利用此漏洞的攻击者可以控制受影响的系统,如安装程序、查看、更改或删除数据,或创建具有完全用户权限的新帐户。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1319

4.Dynamics 365(on-premises)远程代码执行漏洞

1. Microsoft Dynamics 365 for Finance and Operations(on-premises)远程代码执行漏洞(CVE-2020-16857)

Microsoft Dynamics 365 for Finance and Operations(on-premises)版本10.0.11中存在一个远程代码执行漏洞。经过身份验证的、具有导入和导出数据特权的攻击者可以通过将恶意文件发送到易受攻击的Dynamics服务器来利用此漏洞,成功利用此漏洞的攻击者可以通过在受害者服务器上执行服务器端脚本来实现远程代码执行。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16857

2. Microsoft Dynamics 365(on-premises)远程代码执行漏洞(CVE-2020-16862)

当服务器无法正确对待受影响的Dynamics服务器的Web请求时,Microsoft Dynamics 365(on-premises)中将存在一个远程代码执行漏洞。经过身份验证的攻击者可以通过将恶意请求发送到易受攻击的Dynamics服务器来利用此漏洞,成功利用此漏洞的攻击者可以在SQL服务帐户中运行任意代码。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16862

5.Microsoft Exchange Server远程代码执行漏洞(CVE-2020-16875 )

由于对cmdlet参数的验证不正确,Microsoft Exchange服务器中存在一个远程代码执行漏洞。成功利用此漏洞的攻击者可以在受影响的系统上执行任意代码。

详细信息及补丁下载地址:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875

0x0处置建议

微软官方已于2020年09月08日发布了相关软件的安全更新,建议用户及时更新相关补丁。

下载地址:

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep

0x03 相关新闻

https://krebsonsecurity.com/2020/09/microsoft-patch-tuesday-sept-2020-edition/

https://blog.qualys.com/vulnerabilities-research/2020/09/08/september-2020-patch-tuesday-129-vulnerabilities-23-critical-sharepoint-exchange-windows-codecs-adobe-vulns
发表评论

评论已关闭。

相关文章