iSNS 服务器内存损坏漏洞会导致远程执行代码

admin 2023-12-05 04:52:18 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 iSNS 服务器内存损坏漏洞会导致远程执行代码

CVE编号

CVE-2021-43215

利用情况

暂无

补丁情况

官方补丁

披露时间

2021-12-14
漏洞描述
iSNS(Internet 存储名称服务)是一种允许自动发现、管理和配置iSCSI设备的协议。 Microsoft iSNS Server存在远程代码执行漏洞。攻击者可利用该漏洞在目标主机上执行代码。 受影响系统: Microsoft Microsoft Windows RT 8.1 Microsoft Microsoft Windows 8.1 for x64-based systems Microsoft Microsoft Windows 8.1 for 32-bit systems Microsoft Microsoft Windows 7 for x64-based Systems SP1 Microsoft Microsoft Windows 7 for 32-bit Systems SP1 Microsoft Microsoft Windows 10 for x64-based Systems Microsoft Microsoft Windows 10 for 32-bit Systems Microsoft Microsoft Windows 10 21H2 for x64-based Systems Microsoft Microsoft Windows 10 21H2 for ARM64-based Systems Microsoft Microsoft Windows 10 21H2 for 32-bit Systems Microsoft Microsoft Windows 10 21H1 for x64-based Systems Microsoft Microsoft Windows 10 21H1 for ARM64-based Systems Microsoft Microsoft Windows 10 21H1 for 32-bit Systems Microsoft Microsoft Windows 10 20H2 for x64-based Systems Microsoft Microsoft Windows 10 20H2 for ARM64-based Systems Microsoft Microsoft Windows 10 20H2 for 32-bit Systems Microsoft Microsoft Windows 10 2004 for x64-based Systems Microsoft Microsoft Windows 10 2004 for ARM64-based Systems Microsoft Microsoft Windows 10 2004 for 32-bit Systems Microsoft Microsoft Windows 10 1909 for x64-based Systems Microsoft Microsoft Windows 10 1909 for ARM64-based Systems Microsoft Microsoft Windows 10 1909 for 32-bit Systems Microsoft Microsoft Windows 10 1809 for x64-based Systems Microsoft Microsoft Windows 10 1809 for ARM64-based Systems Microsoft Microsoft Windows 10 1809 for 32-bit Systems Microsoft Microsoft Windows 10 1607 for x64-based Systems Microsoft Microsoft Windows 10 1607 for 32-bit Systems Microsoft Microsoft Windows Server 20H2(Server Core Installation) Microsoft Microsoft Windows Server 2022(Server Core installation) Microsoft Microsoft Windows Server 2022 Microsoft Microsoft Windows Server 2019(Server Core installation) Microsoft Microsoft Windows Server 2019 Microsoft Microsoft Windows Server 2016(Server Core installation) Microsoft Microsoft Windows Server 2016 Microsoft Microsoft Windows Server 2012(Server Core installation) Microsoft Microsoft Windows Server 2012 R2(Server Core installati Microsoft Microsoft Windows Server 2012 R2 Microsoft Microsoft Windows Server 2012 Microsoft Microsoft Windows Server 2008 R2 for x64-based Systems Microsoft Microsoft Windows Server 2008 R2 for x64-based Systems Microsoft Microsoft Windows Server 2008 for x64-based Systems SP2 Microsoft Microsoft Windows Server 2008 for x64-based Systems SP2 Microsoft Microsoft Windows Server 2008 for 32-bit Systems SP2(Se Microsoft Microsoft Windows Server 2008 for 32-bit Systems SP2 Microsoft Microsoft Windows Server 2004(Server Core installation)
解决建议
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43215
参考链接
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43215
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43215
阿里云评分 6.3
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-787 跨界内存写
CWE-94 对生成代码的控制不恰当(代码注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0