一、漏洞概述
7月14日,绿盟科技CERT监测到微软发布7月安全更新补丁,修复了117个安全漏洞,涉及Windows、Microsoft Office、Microsoft Edge、Visual Studio 、SharePoint Server等广泛使用的产品,其中包括远程代码执行和权限提升等高危漏洞类型。
本月微软月度更新修复的漏洞中,严重程度为关键(Critical)的漏洞有13个,重要(Important)漏洞有103个。其中有9个为0day漏洞,有5个信息已被公开披露:
Windows 证书欺骗漏洞(CVE-2021-34492)
Microsoft Exchange Server 远程代码执行漏洞(CVE-2021-34473)
Microsoft Exchange Server 权限提升漏洞(CVE-2021-34523)
Windows ADFS 安全功能绕过漏洞(CVE-2021-33779)
Active Directory 安全功能绕过漏洞(CVE-2021-33781)
有4个已被在野利用:
Windows Print Spooler远程代码执行漏洞(CVE-2021-34527)
Windows Script Engine 内存损坏漏洞(CVE-2021-34448)
Windows Kernel 权限提升漏洞(CVE-2021-31979)
Windows Kernel 权限提升漏洞(CVE-2021-33771)
请相关用户尽快更新补丁进行防护,完整漏洞列表请参考附录。
绿盟远程安全评估系统(RSAS)已具备微软此次补丁更新中大多数漏洞的检测能力(包括CVE-2021-34448、CVE-2021-34473、CVE-2021-34494、CVE-2021-34458、CVE-2021-34527等高危漏洞),请相关用户关注绿盟远程安全评估系统系统插件升级包的更新,及时升级至V6.0R02F01.2401,官网链接:http://update.nsfocus.com/update/listRsasDetail/v/vulsys
参考链接:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-Jul
二、重点漏洞简述
根据产品流行度和漏洞重要性筛选出此次更新中包含影响较大的漏洞,请相关用户重点进行关注:
Windows Print Spooler远程代码执行漏洞(CVE-2021-34527):
Print Spooler是Windows系统中管理打印相关事务的服务,域用户可远程利用该漏洞以SYSTEM权限在域控制器上执行任意代码,从而获得整个域的控制权。此漏洞EXP已公开且被在野利用,绿盟科技CERT全程追踪了此漏洞,详情及防护措施请参考:https://mp.weixin.qq.com/s/fq0QhojmcrnucJ7kDZPK1A
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527
Windows Script Engine 内存损坏漏洞(CVE-2021-34448):
脚本引擎中存在内存损坏漏洞,未授权的远程攻击者可通过诱导用户打开特制文件或访问恶意网站进行利用,从而控制用户计算机系统,目前此漏洞已发现在野利用。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34448
Windows Kernel 远程代码执行漏洞(CVE-2021-34458):
Windows内核中存在远程代码执行漏洞,此漏洞影响SR-IOV虚拟机系统,CVSS为9.9分
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34458
Exchange Server 远程代码执行漏洞(CVE-2021-34473):
Microsoft Exchange Server存在远程执行代码漏洞,未经身份验证的远程攻击者向服务器发送精心构造的请求,可在目标服务器上执行任意代码。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473
Exchange Server 远程代码执行漏洞(CVE-2021-31206):
此漏洞为2021 Pwn2Own 竞赛上发现的Exchange Server漏洞之一,攻击者成功利用该漏洞可获取一定的服务器控制权限。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206
Windows DNS Server 远程代码执行漏洞(CVE-2021-34494):
Windows DNS 服务器存在远程执行代码漏洞,经过身份验证的攻击者通过向配置为DNS服务器发送特制的请求,可在目标主机上以system权限执行任意代码。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34494
Windows Kernel 权限提升漏洞(CVE-2021-31979/CVE-2021-33771):
Windows存在两个内核权限提升漏洞,经过身份验证的本地攻击者可以运行特制的二进制文件,从而在目标主机上提升当前账户权限,目前已发现在野利用。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31979
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33771
三、影响范围
以下为重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。
漏洞编号 | 受影响产品版本 |
CVE-2021-34527 | 所有微软支持的Windows版本 |
CVE-2021-34448 | Windows Server 2012 R2 Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 2004 for x64-based Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows Server 2019 Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows RT 8.1 Windows 8.1 for x64-based systems Windows 8.1 for 32-bit systems Windows 7 for x64-based Systems Service Pack 1 Windows 7 for 32-bit Systems Service Pack 1 Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
CVE-2021-34458 | Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server, version 20H2 (Server Core Installation) Windows Server, version 2004 (Server Core installation) Windows Server 2019 (Server Core installation) Windows Server 2019 |
CVE-2021-34473 | Microsoft Exchange Server 2019 Cumulative Update 9 Microsoft Exchange Server 2013 Cumulative Update 23 Microsoft Exchange Server 2019 Cumulative Update 8 Microsoft Exchange Server 2016 Cumulative Update 19 Microsoft Exchange Server 2016 Cumulative Update 20 |
CVE-2021-31206 | Microsoft Exchange Server 2019 Cumulative Update 9 Microsoft Exchange Server 2019 Cumulative Update 10 Microsoft Exchange Server 2016 Cumulative Update 21 Microsoft Exchange Server 2016 Cumulative Update 20 Microsoft Exchange Server 2013 Cumulative Update 23 |
CVE-2021-34494 | Windows Server, version 20H2 (Server Core Installation) Windows Server, version 2004 (Server Core installation) Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 |
CVE-2021-31979 | 所有微软支持的Windows版本 |
CVE-2021-33771 | Windows Server, version 20H2 (Server Core Installation) Windows Server, version 2004 (Server Core installation) Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows RT 8.1 Windows 8.1 for x64-based systems Windows 8.1 for 32-bit systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 2004 for x64-based Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems |
四、漏洞防护
- 补丁更新
目前微软官方已针对受支持的产品版本发布了修复以上漏洞的安全补丁,强烈建议受影响用户尽快安装补丁进行防护,官方下载链接:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-Jul
注:由于网络问题、计算机环境问题等原因,Windows Update的补丁更新可能出现失败。用户在安装补丁后,应及时检查补丁是否成功更新。
右键点击Windows图标,选择“设置(N)”,选择“更新和安全”-“Windows更新”,查看该页面上的提示信息,也可点击“查看更新历史记录”查看历史更新情况。
针对未成功安装的更新,可点击更新名称跳转到微软官方下载页面,建议用户点击该页面上的链接,转到“Microsoft更新目录”网站下载独立程序包并安装。
附录:漏洞列表
影响产品 | CVE 编号 | 漏洞标题 | 严重程度 |
Windows | CVE-2021-33740 | Windows Media 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34494 | Windows DNS Server 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34497 | Windows MSHTML Platform 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34448 | Scripting Engine 内存泄露漏洞 | Critical |
Windows | CVE-2021-34450 | Windows Hyper-V 远程代码执行漏洞 | Critical |
Exchange Server | CVE-2021-34473 | Microsoft Exchange Server 远程代码执行漏洞 | Critical |
Microsoft Dynamics | CVE-2021-34474 | Dynamics Business Central 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34439 | Microsoft Windows Media Foundation 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34503 | Microsoft Windows Media Foundation 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34458 | Windows Kernel 远程代码执行漏洞 | Critical |
System Center | CVE-2021-34464 | Microsoft Defender 远程代码执行漏洞 | Critical |
System Center | CVE-2021-34522 | Microsoft Defender 远程代码执行漏洞 | Critical |
Windows | CVE-2021-34527 | Windows Print Spooler 远程代码执行漏洞 | Critical |
Windows | CVE-2021-31183 | Windows TCP/IP Driver 拒绝服务漏洞 | Important |
Exchange Server | CVE-2021-31196 | Microsoft Exchange Server 远程代码执行漏洞 | Important |
Exchange Server | CVE-2021-31206 | Microsoft Exchange Server 远程代码执行漏洞 | Important |
Windows | CVE-2021-31947 | HEVC Video Extensions 远程代码执行漏洞 | Important |
Windows | CVE-2021-31961 | Windows InstallService 权限提升漏洞 | Important |
Power BI Report Server | CVE-2021-31984 | Power BI 远程代码执行漏洞 | Important |
Windows | CVE-2021-33743 | Windows Projected File System 权限提升漏洞 | Important |
Windows | CVE-2021-33744 | Windows Secure Kernel Mode 安全功能绕过漏洞 | Important |
Apps | CVE-2021-33753 | Microsoft Bing Search 欺骗漏洞 | Important |
Windows | CVE-2021-33755 | Windows Hyper-V 拒绝服务漏洞 | Important |
Windows | CVE-2021-33757 | Windows Security Account Manager Remote Protocol 安全功能绕过漏洞 | Important |
Windows | CVE-2021-33758 | Windows Hyper-V 拒绝服务漏洞 | Important |
Windows | CVE-2021-33759 | Windows Desktop Bridge 权限提升漏洞 | Important |
Windows | CVE-2021-33760 | Media Foundation 信息披露漏洞 | Important |
Windows | CVE-2021-33761 | Windows Remote Access Connection Manager 权限提升漏洞 | Important |
Windows | CVE-2021-33763 | Windows Remote Access Connection Manager 信息披露漏洞 | Important |
Windows | CVE-2021-33765 | Windows Installer 欺骗漏洞 | Important |
Open Enclave SDK | CVE-2021-33767 | Open Enclave SDK 权限提升漏洞 | Important |
Windows | CVE-2021-33771 | Windows Kernel 权限提升漏洞 | Important |
Windows | CVE-2021-33773 | Windows Remote Access Connection Manager 权限提升漏洞 | Important |
Windows | CVE-2021-33774 | Windows Event Tracing 权限提升漏洞 | Important |
Windows | CVE-2021-33780 | Windows DNS Server 远程代码执行漏洞 | Important |
Windows | CVE-2021-34441 | Microsoft Windows Media Foundation 远程代码执行漏洞 | Important |
Windows | CVE-2021-34442 | Windows DNS Server 拒绝服务漏洞 | Important |
Windows | CVE-2021-34491 | Win32k 信息披露漏洞 | Important |
Windows | CVE-2021-34492 | Windows Certificate 欺骗漏洞 | Important |
Windows | CVE-2021-34493 | Windows Partition Management Driver 权限提升漏洞 | Important |
Windows | CVE-2021-34444 | Windows DNS Server 拒绝服务漏洞 | Important |
Windows | CVE-2021-34445 | Windows Remote Access Connection Manager 权限提升漏洞 | Important |
Windows | CVE-2021-34446 | Windows HTML Platforms 安全功能绕过漏洞 | Important |
Windows | CVE-2021-34496 | Windows GDI 信息披露漏洞 | Important |
Windows | CVE-2021-34447 | Windows MSHTML Platform 远程代码执行漏洞 | Important |
Windows | CVE-2021-34498 | Windows GDI 权限提升漏洞 | Important |
Windows | CVE-2021-34449 | Win32k 权限提升漏洞 | Important |
Windows | CVE-2021-34499 | Windows DNS Server 拒绝服务漏洞 | Important |
Windows | CVE-2021-34500 | Windows Kernel Memory 信息披露漏洞 | Important |
Microsoft Office | CVE-2021-34501 | Microsoft Excel 远程代码执行漏洞 | Important |
Microsoft Office | CVE-2021-34452 | Microsoft Word 远程代码执行漏洞 | Important |
Microsoft Office | CVE-2021-34467 | Microsoft SharePoint Server 远程代码执行漏洞 | Important |
Microsoft Office | CVE-2021-34518 | Microsoft Excel 远程代码执行漏洞 | Important |
Microsoft Office | CVE-2021-34468 | Microsoft SharePoint Server 远程代码执行漏洞 | Important |
Microsoft Office | CVE-2021-34469 | Microsoft Office 安全功能绕过漏洞 | Important |
Microsoft Office | CVE-2021-34520 | Microsoft SharePoint Server 远程代码执行漏洞 | Important |
Windows | CVE-2021-34521 | Raw Image Extension 远程代码执行漏洞 | Important |
Exchange Server | CVE-2021-34523 | Microsoft Exchange Server 权限提升漏洞 | Important |
Windows | CVE-2021-34476 | Bowser.sys 拒绝服务漏洞 | Important |
Visual Studio Code | CVE-2021-34528 | Visual Studio Code 远程代码执行漏洞 | Important |
Visual Studio Code | CVE-2021-34479 | Microsoft Visual Studio 欺骗漏洞 | Important |
Windows | CVE-2021-31979 | Windows Kernel 权限提升漏洞 | Important |
Windows | CVE-2021-33745 | Windows DNS Server 拒绝服务漏洞 | Important |
Windows | CVE-2021-33746 | Windows DNS Server 远程代码执行漏洞 | Important |
Windows | CVE-2021-33749 | Windows DNS Snap-in 远程代码执行漏洞 | Important |
Windows | CVE-2021-33750 | Windows DNS Snap-in 远程代码执行漏洞 | Important |
Windows | CVE-2021-33751 | Storage Spaces Controller 权限提升漏洞 | Important |
Windows | CVE-2021-33752 | Windows DNS Snap-in 远程代码执行漏洞 | Important |
Windows | CVE-2021-33754 | Windows DNS Server 远程代码执行漏洞 | Important |
Windows | CVE-2021-33756 | Windows DNS Snap-in 远程代码执行漏洞 | Important |
Windows | CVE-2021-33764 | Windows Key Distribution Center 信息披露漏洞 | Important |
Exchange Server | CVE-2021-33766 | Microsoft Exchange 信息披露漏洞 | Important |
Exchange Server | CVE-2021-33768 | Microsoft Exchange Server 权限提升漏洞 | Important |
Windows | CVE-2021-33772 | Windows TCP/IP Driver 拒绝服务漏洞 | Important |
Windows | CVE-2021-33775 | HEVC Video Extensions 远程代码执行漏洞 | Important |
Windows | CVE-2021-33776 | HEVC Video Extensions 远程代码执行漏洞 | Important |
Windows | CVE-2021-33777 | HEVC Video Extensions 远程代码执行漏洞 | Important |
Windows | CVE-2021-33778 | HEVC Video Extensions 远程代码执行漏洞 | Important |
Windows | CVE-2021-33779 | Windows ADFS 安全功能绕过漏洞 | Important |
Windows | CVE-2021-33781 | Active Directory 安全功能绕过漏洞 | Important |
Windows | CVE-2021-33782 | Windows Authenticode 欺骗漏洞 | Important |
Windows | CVE-2021-33783 | Windows SMB 信息披露漏洞 | Important |
Windows | CVE-2021-33784 | Windows Cloud Files Mini Filter Driver 权限提升漏洞 | Important |
Windows | CVE-2021-33785 | Windows AF_UNIX Socket Provider 拒绝服务漏洞 | Important |
Windows | CVE-2021-33786 | Windows LSA 安全功能绕过漏洞 | Important |
Windows | CVE-2021-33788 | Windows LSA 拒绝服务漏洞 | Important |
Windows | CVE-2021-34438 | Windows Font Driver Host 远程代码执行漏洞 | Important |
Windows | CVE-2021-34488 | Windows Console Driver 权限提升漏洞 | Important |
Windows | CVE-2021-34489 | DirectWrite 远程代码执行漏洞 | Important |
Windows | CVE-2021-34440 | GDI+ 信息披露漏洞 | Important |
Windows | CVE-2021-34490 | Windows TCP/IP Driver 拒绝服务漏洞 | Important |
Microsoft Office | CVE-2021-34451 | Microsoft Office Online Server 欺骗漏洞 | Important |
Windows | CVE-2021-34454 | Windows Remote Access Connection Manager 信息披露漏洞 | Important |
Windows | CVE-2021-34504 | Windows Address Book 远程代码执行漏洞 | Important |
Windows | CVE-2021-34455 | Windows File History Service 权限提升漏洞 | Important |
Windows | CVE-2021-34456 | Windows Remote Access Connection Manager 权限提升漏洞 | Important |
Windows | CVE-2021-34457 | Windows Remote Access Connection Manager 信息披露漏洞 | Important |
Windows | CVE-2021-34507 | Windows Remote Assistance 信息披露漏洞 | Important |
Windows | CVE-2021-34508 | Windows Kernel 远程代码执行漏洞 | Important |
Windows | CVE-2021-34459 | Windows AppContainer Elevation Of Privilege Vulnerability | Important |
Windows | CVE-2021-34509 | Storage Spaces Controller 信息披露漏洞 | Important |
Windows | CVE-2021-34460 | Storage Spaces Controller 权限提升漏洞 | Important |
Windows | CVE-2021-34510 | Storage Spaces Controller 权限提升漏洞 | Important |
Windows | CVE-2021-34511 | Windows Installer 权限提升漏洞 | Important |
Windows | CVE-2021-34461 | Windows Container Isolation FS Filter Driver 权限提升漏洞 | Important |
Windows | CVE-2021-34512 | Storage Spaces Controller 权限提升漏洞 | Important |
Windows | CVE-2021-34462 | Windows AppX Deployment Extensions 权限提升漏洞 | Important |
Windows | CVE-2021-34513 | Storage Spaces Controller 权限提升漏洞 | Important |
Windows | CVE-2021-34514 | Windows Kernel 权限提升漏洞 | Important |
Windows | CVE-2021-34516 | Win32k 权限提升漏洞 | Important |
Windows | CVE-2021-34466 | Windows Hello 安全功能绕过漏洞 | Important |
Microsoft Office | CVE-2021-34517 | Microsoft SharePoint Server 欺骗漏洞 | Important |
Exchange Server | CVE-2021-34470 | Microsoft Exchange Server 权限提升漏洞 | Important |
Windows | CVE-2021-34525 | Windows DNS Server 远程代码执行漏洞 | Important |
.NET Education Bundle SDK Install Tool,.NET Install Tool for Extension Authors | CVE-2021-34477 | Visual Studio Code .NET Runtime 权限提升漏洞 | Important |
Visual Studio Code | CVE-2021-34529 | Visual Studio Code 远程代码执行漏洞 | Important |
Microsoft Office | CVE-2021-34519 | Microsoft SharePoint Server 信息披露漏洞 | Moderate |
声明
本安全公告仅用来描述可能存在的安全问题,绿盟科技不为此安全公告提供任何保证或承诺。由于传播、利用此安全公告所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,绿盟科技以及安全公告作者不为此承担任何责任。
绿盟科技拥有对此安全公告的修改和解释权。如欲转载或传播此安全公告,必须保证此安全公告的完整性,包括版权声明等全部内容。未经绿盟科技允许,不得任意修改或者增减此安全公告内容,不得以任何方式将其用于商业目的。
版权声明
本站“技术博客”所有内容的版权持有者为绿盟科技集团股份有限公司(“绿盟科技”)。作为分享技术资讯的平台,绿盟科技期待与广大用户互动交流,并欢迎在标明出处(绿盟科技-技术博客)及网址的情形下,全文转发。
上述情形之外的任何使用形式,均需提前向绿盟科技(010-68438880-5462)申请版权授权。如擅自使用,绿盟科技保留追责权利。同时,如因擅自使用博客内容引发法律纠纷,由使用者自行承担全部法律责任,与绿盟科技无关。