Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞

admin 2024-01-13 22:44:18 YS 来源:ZONE.CI 全球网 0 阅读模式
> Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞

Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞

CNNVD-ID编号 CNNVD-201911-694 CVE编号 CVE-2018-12207
发布时间 2019-11-12 更新时间 2020-09-25
漏洞类型 输入验证错误 漏洞来源 Ubuntu,Debian,Red Hat,Benjamin M. Romer,Gentoo
危险等级 中危 威胁类型 本地
厂商 N/A

漏洞介绍

Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。

Microsoft Windows和Windows Server中存在拒绝服务漏洞,该漏洞源于程序没有正确处理内存中的对象。攻击者可通过登录到受影响的系统并运行经特殊设计的应用程序利用该漏洞造成目标系统停止响应。以下产品及版本受到影响:Microsoft Windows 10,Windows 10版本1607,Windows 10版本1709,Windows 10版本1803,Windows 10版本1809,Windows 10版本1903,Windows 7 SP1,Windows 8.1,Windows RT 8.1,Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windows Server 2016,Windows Server 2019,Windows Server版本1803,Windows Server版本1903。

漏洞补丁

目前厂商已发布升级了Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞的补丁,Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞的补丁获取链接:

参考网址

来源:UBUNTU

链接:https://usn.ubuntu.com/4186-2/

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:3916

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2020/Jan/21

来源:GENTOO

链接:https://security.gentoo.org/glsa/202003-56

来源:CONFIRM

链接:https://support.f5.com/csp/article/K17269881?utm_source=f5support&utm_medium=RSS

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:3936

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2019:3941

来源:www.intel.com

链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2020:0028

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2020:0204

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4602

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2020:0026

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2020:0028

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2020:0026

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193348-1.html

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:4245

来源:www.debian.org

链接:https://www.debian.org/security/2020/dsa-4602

来源:support.f5.com

链接:https://support.f5.com/csp/article/K15840535

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3835

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3844

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3833

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3936

来源:www.vmware.com

链接:https://www.vmware.com/security/advisories/VMSA-2019-0020.html

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3942

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3941

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3940

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193293-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193307-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193308-1.html

来源:access.redhat.com

链接:https://access.redhat.com/errata/RHSA-2019:3916

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192962-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192960-1.html

来源:security.freebsd.org

链接:https://security.freebsd.org/advisories/FreeBSD-SA-19:25.mcepsc.asc

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html

来源:www.intel.com

链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html

来源:support.citrix.com

链接:https://support.citrix.com/article/CTX263684

来源:www.oracle.com

链接:https://www.oracle.com/security-alerts/cpujul2020.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/xsa-304-and-xsa-305-security-vulnerabilities/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156920/Gentoo-Linux-Security-Advisory-202003-56.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4417/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Intel-Processors-denial-of-service-via-Machine-Check-Error-On-Page-Size-Change-30843

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4700/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155697/Red-Hat-Security-Advisory-2019-4245-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0437/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4730/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4386/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4561/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4247/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155405/Red-Hat-Security-Advisory-2019-3916-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4561.2/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155847/Red-Hat-Security-Advisory-2020-0028-01.html

来源:portal.msrc.microsoft.com

链接:https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-12207

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155294/Red-Hat-Security-Advisory-2019-3839-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4406/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4339/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4675.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4359/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4676/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4301/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0127/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155424/Red-Hat-Security-Advisory-2019-3941-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2696/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.4254/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155318/Kernel-Live-Patch-Security-Notice-LSN-0059-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0049/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0153/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0561/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156058/Red-Hat-Security-Advisory-2020-0204-01.html

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-12207

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155956/Debian-Security-Advisory-4602-1.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155335/Ubuntu-Security-Notice-USN-4186-3.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2018-12207

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201911-694

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  1