Windows远程桌面远程代码执行漏洞(CVE-2019-0708)

“关于Windows远程桌面远程代码执行漏洞(CVE-2019-0708)”

黑客可利用此漏洞,无需用户验证,在目标系统上执行恶意行为,漏洞影响范围包括Windows 7、WindowsServer 2008、WindowsServer2003、Windows XP,漏洞危害评级很高,与永恒之蓝威胁程度类似。目前微软已公布该漏洞补丁,包括支持WindowsXP、Windows2003的补丁

一、漏洞检测工具

https://free.360totalsecurity.com/CVE-2019-0708/detector_release.zip
https://www.qianxin.com/other/CVE-2019-0708
https://cloud.nsfocus.com/#/secwarning/secwarning_news?menu_id=urgent

二、微软官方补丁下载地址

操作系统版本

补丁下载链接

Windows 7 x86

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu

Windows 7 x64

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu

Windows Embedded Standard 7 for x64

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu

Windows Embedded Standard 7 for x86

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu

Windows Server 2008 x64

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499149-x64_9236b098f7cea864f7638e7d4b77aa8f81f70fd6.msu

Windows Server 2008 Itanium

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499180-ia64_805e448d48ab8b1401377ab9845f39e1cae836d4.msu

Windows Server 2008 x86

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499149-x86_832cf179b302b861c83f2a92acc5e2a152405377.msu

Windows Server 2008 R2 Itanium

http://download.windowsupdate.com/c/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-ia64_fabc8e54caa0d31a5abe8a0b347ab4a77aa98c36.msu

Windows Server 2008 R2 x64

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu

Windows Server 2003 x86

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x86-custom-chs_4892823f525d9d532ed3ae36fc440338d2b46a72.exe

Windows Server 2003 x64

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x64-custom-chs_f2f949a9a764ff93ea13095a0aca1fc507320d3c.exe

Windows XP SP3

http://download.windowsupdate.com/c/csa/csa/secu/2019/04/windowsxp-kb4500331-x86-custom-chs_718543e86e06b08b568826ac13c05f967392238c.exe

Windows XP SP2 for x64

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x64-custom-enu_e2fd240c402134839cfa22227b11a5ec80ddafcf.exe

Windows XP SP3 for XPe

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsxp-kb4500331-x86-embedded-custom-chs_96da48aaa9d9bcfe6cd820f239db2fe96500bfae.exe

WES09 and POSReady 2009

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/04/windowsxp-kb4500331-x86-embedded-chs_e3fceca22313ca5cdda811f49a606a6632b51c1c.exe

CVE-2019-0708 POC,检测工具 C:. │ cve_2019_0708.rb │ Dockerfile │ LICENSE │ list.txt │ README.md │ screenshot.png │ 使用说明.txt │ ├─docker │ entrypoint.sh │ setup.sh │ └─rdesktop-fork-bd6aa6acddf0ba640a49834807872f4cc0d0a773 │ .cvsignore │ asn.c │ bitmap.c │ bootstrap │ cache.c │ channels.c │ cliprdr.c │ config.guess │ config.sub │ configure.ac │ constants.h │ COPYING │ cssp.c │ ctrl.c │ disk.c │ disk.h │ ewmhints.c │ genauthors │ indent-all.sh │ install-sh │ iso.c │ licence.c │ lspci.c │ Makefile.in │ mcs.c │ mppc.c │ mst120.c │ orders.c │ orders.h │ parallel.c │ parse.h │ printer.c │ printercache.c │ proto.h │ proto.head │ proto.tail │ pstcache.c │ rdesktop │ rdesktop.c │ rdesktop.h │ rdesktop.spec │ rdp.c │ rdp5.c │ rdpdr.c │ rdpsnd.c │ rdpsnd.h │ rdpsnd_alsa.c │ rdpsnd_dsp.c │ rdpsnd_dsp.h │ rdpsnd_libao.c │ rdpsnd_oss.c │ rdpsnd_sgi.c │ rdpsnd_sun.c │ README │ scancodes.h │ scard.c │ scard.h │ seamless.c │ seamless.h │ secure.c │ serial.c │ ssl.c │ ssl.h │ tcp.c │ types.h │ utils.c │ xclip.c │ xkeymap.c │ xproto.h │ xwin.c │ ├─doc │ AUTHORS │ ChangeLog │ ctrl.txt │ HACKING │ ipv6.txt │ keymap-names.txt │ keymapping.txt │ keynums.png │ licensing.txt │ lspci-channel.txt │ makerelease.txt │ patches.txt │ rdesktop.1 │ rdpsnd-rec.txt │ rdpsnd.txt │ redirection.txt │ seamlessrdp-channel.txt │ TODO │ ├─keymaps │ ar │ common │ convert-map │ cs │ da │ de │ de-ch │ en-dv │ en-gb │ en-us │ en-us-intl │ es │ et │ fi │ fo │ fr │ fr-be │ fr-bepo │ fr-ca │ fr-ch │ he │ hr │ hu │ is │ it │ ja │ ko │ lt │ lv │ mk │ modifiers │ nl │ nl-be │ no │ pl │ pt │ pt-br │ ru │ sk │ sl │ sv │ th │ tr │ ├─tests │ brushtest.c │ brushtestMakefile │ notepadbehindwordpad.c │ ├─uiports │ makefile_nanox │ makefile_qt │ makefile_qte │ makefile_svga │ makefile_xxx │ nanoxreadme.txt │ nanoxwin.c │ qtereadme.txt │ qtewin.cpp │ qtewin.h │ qtreadme.txt │ qtwin.cpp │ qtwin.h │ readme.txt │ svgareadme.txt │ svgawin.c │ xxxwin.c │ └─vnc vnc.c vnc.h x11stubs.c x11stubs.h
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

皮卡丘踢球

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值