Microsoft Windows和Microsoft Windows Server 安全漏洞
CNNVD-ID编号 | CNNVD-202008-548 | CVE编号 | CVE-2020-1472 |
发布时间 | 2020-08-11 | 更新时间 | 2021-01-07 |
漏洞类型 | 其他 | 漏洞来源 | Tom Tervoort of Secura |
危险等级 | 超危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Netlogon是一个用于为域控制器注册所有SRV资源记录的服务。
Microsoft Windows NetLogon中存在提权漏洞。攻击者可借助特制应用程序利用该漏洞获取管理员访问权限。以下产品及版本受到影响:Microsoft Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windows Server 2016,Windows Server 2019,Windows Server 1903版本,Windows Server 1909版本,Windows Server 2004版本。
漏洞补丁
目前厂商已发布升级了Microsoft Windows和Microsoft Windows Server 安全漏洞的补丁,Microsoft Windows和Microsoft Windows Server 安全漏洞的补丁获取链接:
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1472
参考网址
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/09/17/2
来源:FEDORA
来源:FEDORA
来源:FEDORA
来源:CONFIRM
链接:https://www.synology.com/security/advisory/Synology_SA_20_21
来源:MISC
链接:https://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4559-1/
来源:MISC
链接:https://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
来源:CERT-VN
链接:https://www.kb.cert.org/vuls/id/490028
来源:UBUNTU
链接:https://usn.ubuntu.com/4510-1/
来源:GENTOO
链接:https://security.gentoo.org/glsa/202012-24
来源:UBUNTU
链接:https://usn.ubuntu.com/4510-2/
来源:N/A
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
来源:media.cert.europa.eu
链接:https://media.cert.europa.eu/static/SecurityAdvisories/2020/CERT-EU-SA2020-046.pdf
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
来源:www.ibm.com
来源:portal.msrc.microsoft.com
链接:https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1472
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Microsoft-Windows-vulnerabilities-of-August-2020-33057
来源:cxsecurity.com
链接:https://cxsecurity.com/issue/WLB-2020110151
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4143/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160823/Understanding-And-Exploiting-Zerologon.html
来源:www.huawei.com
链接:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20200925-01-netlogon-cn
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4436/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160507/Red-Hat-Security-Advisory-2020-5439-01.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48189
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48563
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160717/Gentoo-Linux-Security-Advisory-202012-24.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3417/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3219/
来源:vigilance.fr
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3239/
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/49071
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-1472
来源:www.kb.cert.org
链接:https://www.kb.cert.org/vuls/id/490028
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159207/Ubuntu-Security-Notice-USN-4510-2.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159414/Ubuntu-Security-Notice-USN-4559-1.html
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202008-548

评论