時(shí)間:2022-01-17???瀏覽:983???作者:王德靈
安全公告編號(hào):CNTA-2022-0001
1月11日,微軟發(fā)布了2022年1月份的月度例行安全公告,修復(fù)了多款產(chǎn)品存在的127個(gè)安全漏洞。受影響的產(chǎn)品包括:Windows 11(66個(gè))、Windows Server 2022(81個(gè))、Windows 10 21H1 & 21H2(79個(gè))、Windows 10 20H2 & Windows Server v20H2(81個(gè))、Windows 10 1909(77個(gè))、Windows 8.1 & Server 2012 R2(52個(gè))、Windows Server 2012(49個(gè))、Windows RT 8.1(48個(gè))和Microsoft Office-related software(4個(gè))。
利用上述漏洞,攻擊者可進(jìn)行欺騙,繞過(guò)安全功能限制,獲取敏感信息,提升權(quán)限,執(zhí)行遠(yuǎn)程代碼,或發(fā)起拒絕服務(wù)攻擊等。CNVD提醒廣大Microsoft用戶盡快下載補(bǔ)丁更新,避免引發(fā)漏洞相關(guān)的網(wǎng)絡(luò)安全事件。
CVE編號(hào) | 公告標(biāo)題 | 最高嚴(yán)重等級(jí)和漏洞影響 | 受影響的軟件 |
CVE-2022-21907 | HTTP Protocol棧遠(yuǎn)程代碼執(zhí)行漏洞 | 嚴(yán)重 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 |
CVE-2022-21893 | Remote Desktop Protocol遠(yuǎn)程代碼執(zhí)行漏洞 | 重要 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 |
CVE-2022-21849 | Windows IKE Extension遠(yuǎn)程代碼執(zhí)行漏洞 | 重要 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 |
Remote Procedure Call Runtime遠(yuǎn)程代碼執(zhí)行漏洞 | 重要 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 | |
CVE-2022-21901 | Windows Hyper-V權(quán)限提升漏洞 | 重要 特權(quán)提升 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Windows 8.1 |
CVE-2022-21850 | Remote Desktop Client遠(yuǎn)程代碼執(zhí)行漏洞 | 重要 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 Remote Desktop client Windows Desktop |
CVE-2022-21920 | Windows Kerberos權(quán)限提升漏洞 | 重要 特權(quán)提升 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 |
CVE-2022-21874 | Windows Installer權(quán)限提升漏洞 | 重要 特權(quán)提升 | Windows 11 Server 2022 Server, version 20H2 Server, version 2004 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 |
CVE-2022-21874 | Windows Security Center API遠(yuǎn)程代碼執(zhí)行漏洞 | 重要 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 |
CVE-2022-21857 | Active Directory Domain Services權(quán)限提升漏洞 | 嚴(yán)重 遠(yuǎn)程代碼執(zhí)行 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 |
CVE-2022-21836 | Windows Certificate欺騙漏洞 | 重要 欺騙 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 |
CVE-2022-21919 | Windows User Profile Service權(quán)限提升漏洞 | 重要 特權(quán)提升 | Windows 11 Server 2022 Server, version 20H2 Server 2019 Windows 10 Server 2016 Server 2012 R2 Server 2012 Windows 8.1 |
CVE-2022-21840 | Microsoft Office遠(yuǎn)程代碼執(zhí)行漏洞 | 嚴(yán)重 遠(yuǎn)程代碼執(zhí)行 | Excel 2013/2016 Office 2013/2016/2019 Office LTSC 2021 SharePoint Server — Subscription Edition SharePoint Server — Sub Edition Language Pack Office Web Apps Server 201 SharePoint Foundation 2013 SharePoint Server 2019 SharePoint Ent. Server 2016 SharePoint Ent. Server 2013 365 Apps Enterprise Office LTSC for Mac 2021 Office 2019 for Mac Office Online Server |
CVE-2022-21837 | Microsoft SharePoint Server遠(yuǎn)程代碼執(zhí)行漏洞 | 重要 遠(yuǎn)程代碼執(zhí)行 | SharePoint Server Subscription Edition SharePoint Foundation 2013 SharePoint Enterprise Server 2016 SharePoint Server 2019 |
文章來(lái)源:國(guó)家信息安全漏洞共享平臺(tái)