• 產品與解決方案
  • 行業解決方案
  • 服務
  • 支持
  • 合作夥伴
  • 關於我們

微軟一月補丁日安全通告

【發布時間:2023-02-20】

BOB登陆 攻防實驗室

2023/01/11

1. 漏洞綜述

1.1 漏洞背景

2023年1月11日,BOB登陆 攻防實驗室威脅預警團隊監測發現Microsoft官方發布了1月安全更新,此次安全更新共發布了99個漏洞的補丁,主要修複了Microsoft Exchange Server、Microsoft SharePoint、Windows LDAP、Microsoft Office等產品中的漏洞。在此次更新的補丁中,有11 個漏洞被微軟標記為嚴重漏洞,且部分漏洞已被發現在野利用。由於影響較大,BOB登陆 攻防實驗室建議廣大用戶及時做好資產自查以及預防工作,以免遭受黑客攻擊。

1.2 重點漏洞

CVE-2023-21674 Windows 高級本地過程調用(ALPC)權限提升漏洞

Windows 高級本地過程調用(ALPC)存在權限提升漏洞,經過身份驗證的惡意攻擊者成功利用此漏洞提升至SYSTEM權限,且此漏洞可用於瀏覽器沙箱逃逸。

Windows 第二層隧道協議(L2TP)遠程代碼執行漏洞

Windows 第二層隧道協議(L2TP)中存在著五個代碼執行漏洞(CVE-2023-21679、CVE-2023-21556、CVE-2023-21555、CVE-2023-21543、CVE-2023-21546)未經身份驗證的惡意攻擊者通過向 RAS 服務器發送特製連接請求,從而實現在RAS 服務器上實現遠程代碼執行。

Windows 安全套接字隧道協議(SSTP)遠程代碼執行漏洞

Windows 安全套接字隧道協議(SSTP)中存在遠程代碼執行漏洞(CVE-2023-21548、CVE-2023-21535),惡意攻擊者通過構造特製的惡意數據包發送給SSTP服務器,成功利用此漏洞可在目標係統上執行任意代碼,從而獲取係統控製權限。

CVE-2023-21473 Microsoft SharePoint服務器安全功能繞過漏洞

Microsoft SharePoint 服務器存在安全特性繞過漏洞,具有遠程訪問權限的惡意攻擊者成功利用此漏洞可以繞過身份驗證並建立匿名連接。

2. 影響範圍

CVE編號

受影響產品

CVE-2023-21674

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows RT 8.1

Windows 8.1 for x64-based systems

Windows 8.1 for 32-bit systems

Windows 11 version 21H2 for x64-based Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

CVE-2023-21473

Microsoft SharePoint Server Subscription Edition

Microsoft SharePoint Server 2019

Microsoft SharePoint Enterprise Server 2016

CVE-2023-21763

CVE-2023-21764

Microsoft Exchange Server 2019 Cumulative Update 12

Microsoft Exchange Server 2019 Cumulative Update 11

Microsoft Exchange Server 2016 Cumulative Update 23

CVE-2023-21535

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows RT 8.1

Windows 8.1 for x64-based systems

Windows 8.1 for 32-bit systems

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 version 21H2 for x64-based Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

CVE-2023-21679

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows RT 8.1

Windows 8.1 for x64-based systems

Windows 8.1 for 32-bit systems

Windows 7 for x64-based Systems Service Pack 1

Windows 7 for 32-bit Systems Service Pack 1

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 version 21H2 for x64-based Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

3. 處置方法

3.1官方補丁

目前,微軟官方已經發布針對此漏洞的補丁程序,建議用戶通過以下鏈接盡快安裝補丁程序:

https://msrc.microsoft.com/update-guide/releaseNote/2023-Jan

4. 參考鏈接

https://msrc.microsoft.com/update-guide/releaseNote/2023-Jan

https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2023-patch-tuesday-fixes-98-flaws-1-zero-day

BOB登陆
官網
聯係我們