微软发布2月补丁修复79个安全问题

微软于周二发布了2月安全更新补丁,修复了79个从简单的欺骗攻击到远程执行代码的安全问题,产品涉及.NET Framework、Adobe Flash Player、Azure、Internet Explorer、Microsoft Browsers、Microsoft Edge、Microsoft Exchange Server、Microsoft Graphics Component、Microsoft JET Database Engine、Microsoft Office、Microsoft Office SharePoint、Microsoft Scripting Engine、Microsoft Windows、Servicing Stack Updates、Team Foundation Server、Visual Studio、Windows DHCP Server、Windows Hyper-V、Windows Kernel以及Windows SMB Server。

漏洞列表

相关信息如下:

产品CVE 编号CVE 标题严重程度
.NET FrameworkCVE-2019-0657.NET Framework and Visual Studio 欺骗漏洞Important
.NET FrameworkCVE-2019-0613.NET Framework and Visual Studio 远程代码执行漏洞Important
Adobe Flash PlayerADV190003February 2019 Adobe Flash 安全更新Critical
AzureCVE-2019-0729Azure IoT Java SDK 特权提升漏洞Important
AzureCVE-2019-0741Azure IoT Java SDK 信息泄露漏洞Important
Internet ExplorerCVE-2019-0606Internet Explorer 内存破坏漏洞Critical
Internet ExplorerCVE-2019-0676Internet Explorer 信息泄露漏洞Important
Microsoft BrowsersCVE-2019-0654Microsoft Browser 欺骗漏洞Important
Microsoft EdgeCVE-2019-0641Microsoft Edge 安全功能绕过漏洞Moderate
Microsoft EdgeCVE-2019-0643Microsoft Edge 信息泄露漏洞Moderate
Microsoft EdgeCVE-2019-0645Microsoft Edge 内存破坏漏洞Critical
Microsoft EdgeCVE-2019-0650Microsoft Edge 内存破坏漏洞Critical
Microsoft EdgeCVE-2019-0634Microsoft Edge 内存破坏漏洞Moderate
Microsoft Exchange ServerADV190004February 2019 Oracle Outside In Library 安全更新Unknown
Microsoft Exchange ServerCVE-2019-0686Microsoft Exchange Server 特权提升漏洞Important
Microsoft Exchange ServerCVE-2019-0724Microsoft Exchange Server 特权提升漏洞Important
Microsoft Exchange ServerADV190007Guidance for “PrivExchange” 特权提升漏洞Unknown
Microsoft Graphics ComponentCVE-2019-0660Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2019-0662GDI+ 远程代码执行漏洞Critical
Microsoft Graphics ComponentCVE-2019-0664Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2019-0602Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2019-0615Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2019-0616Windows GDI 信息泄露漏洞Important
Microsoft Graphics ComponentCVE-2019-0618GDI+ 远程代码执行漏洞Critical
Microsoft Graphics ComponentCVE-2019-0619Windows GDI 信息泄露漏洞Important
Microsoft JET Database EngineCVE-2019-0625Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2019-0595Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2019-0596Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2019-0597Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2019-0598Jet Database Engine 远程代码执行漏洞Important
Microsoft JET Database EngineCVE-2019-0599Jet Database Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2019-0540Microsoft Office 安全功能绕过漏洞Important
Microsoft OfficeCVE-2019-0671Microsoft Office Access Connectivity Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2019-0672Microsoft Office Access Connectivity Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2019-0673Microsoft Office Access Connectivity Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2019-0674Microsoft Office Access Connectivity Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2019-0675Microsoft Office Access Connectivity Engine 远程代码执行漏洞Important
Microsoft OfficeCVE-2019-0669Microsoft Excel 信息泄露漏洞Important
Microsoft Office SharePointCVE-2019-0668Microsoft SharePoint 特权提升漏洞Important
Microsoft Office SharePointCVE-2019-0670Microsoft SharePoint 欺骗漏洞Moderate
Microsoft Office SharePointCVE-2019-0594Microsoft SharePoint 远程代码执行漏洞Critical
Microsoft Office SharePointCVE-2019-0604Microsoft SharePoint 远程代码执行漏洞Critical
Microsoft Scripting EngineCVE-2019-0607Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0610Scripting Engine 内存破坏漏洞Important
Microsoft Scripting EngineCVE-2019-0640Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0642Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0644Scripting Engine 内存破坏漏洞Moderate
Microsoft Scripting EngineCVE-2019-0648Scripting Engine 信息泄露漏洞Important
Microsoft Scripting EngineCVE-2019-0649Scripting Engine Elevation of Privileged VulnerabilityImportant
Microsoft Scripting EngineCVE-2019-0651Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0652Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0655Scripting Engine 内存破坏漏洞Moderate
Microsoft Scripting EngineCVE-2019-0658Scripting Engine 信息泄露漏洞Important
Microsoft Scripting EngineCVE-2019-0590Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0591Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0593Scripting Engine 内存破坏漏洞Critical
Microsoft Scripting EngineCVE-2019-0605Scripting Engine 内存破坏漏洞Moderate
Microsoft WindowsCVE-2019-0659Windows Storage Service 特权提升漏洞Important
Microsoft WindowsCVE-2019-0600HID 信息泄露漏洞Important
Microsoft WindowsCVE-2019-0601HID 信息泄露漏洞Important
Microsoft WindowsCVE-2019-0627Windows 安全功能绕过漏洞Important
Microsoft WindowsCVE-2019-0631Windows 安全功能绕过漏洞Important
Microsoft WindowsCVE-2019-0632Windows 安全功能绕过漏洞Important
Microsoft WindowsCVE-2019-0636Windows 信息泄露漏洞Important
Microsoft WindowsCVE-2019-0637Windows Defender Firewall 安全功能绕过漏洞Important
Microsoft WindowsADV190006Guidance to mitigate unconstrained delegation vulnerabilitiesUnknown
Servicing Stack UpdatesADV990001Latest Servicing Stack UpdatesCritical
Team Foundation ServerCVE-2019-0743Team Foundation Server Cross-site Scripting VulnerabilityImportant
Team Foundation ServerCVE-2019-0742Team Foundation Server Cross-site Scripting VulnerabilityImportant
Visual StudioCVE-2019-0728Visual Studio Code 远程代码执行漏洞Important
Windows DHCP ServerCVE-2019-0626Windows DHCP Server 远程代码执行漏洞Critical
Windows Hyper-VCVE-2019-0635Windows Hyper-V 信息泄露漏洞Important
Windows KernelCVE-2019-0623Win32k 特权提升漏洞Important
Windows KernelCVE-2019-0628Win32k 信息泄露漏洞Important
Windows KernelCVE-2019-0656Windows Kernel 特权提升漏洞Important
Windows KernelCVE-2019-0661Windows Kernel 信息泄露漏洞Important
Windows KernelCVE-2019-0621Windows Kernel 信息泄露漏洞Important
Windows SMB ServerCVE-2019-0630Windows SMB 远程代码执行漏洞Important
Windows SMB ServerCVE-2019-0633Windows SMB 远程代码执行漏洞Important

修复建议

微软官方已经发布更新补丁,请及时进行补丁更新。

附件下载

微软发布2月补丁修复79个安全问题

 

Spread the word. Share this post!

Meet The Author

Leave Comment