自检代码中trustmanager漏洞_微软多个产品严重漏洞安全通告

b778be975f41fe613d795b8331a6243a.png

漏洞背景

5月12日,Microsoft补丁日发布了111个漏洞的补丁更新,这些补丁涵盖了Microsoft Windows,Edge(基于EdgeHTML和Chromium),ChakraCore,Internet Explorer(IE),Office and Office Services和其他软件。在这111个漏洞补丁中,严重漏洞有16个,高危漏洞有95。

漏洞描述

16个严重漏洞如下:

CVE编号标题公开状态导致结果
CVE-2020-1037Chakra 脚本引擎内存破坏未公开远程代码执行
CVE-2020-1062Internet Explorer 内存破坏未公开远程代码执行
CVE-2020-1028Media Foundation 内存破坏未公开远程代码执行
CVE-2020-1126Media Foundation 内存破坏未公开远程代码执行
CVE-2020-1136Media Foundation 内存破坏未公开远程代码执行
CVE-2020-1117Microsoft Color Management  远程代码执行未公开远程代码执行
CVE-2020-1056Microsoft Edge 特权提升未公开权限提升
CVE-2020-1153Microsoft Graphics Components  远程代码执行未公开远程代码执行
CVE-2020-1023Microsoft SharePoint 远程代码执行未公开远程代码执行
CVE-2020-1024Microsoft SharePoint 远程代码执行未公开远程代码执行
CVE-2020-1102Microsoft SharePoint 远程代码执行未公开远程代码执行
CVE-2020-1069Microsoft SharePoint Server  远程代码执行未公开远程代码执行
CVE-2020-1064MSHTML Engine 远程代码执行未公开远程代码执行
CVE-2020-1065Scripting Engine 内存破坏未公开远程代码执行
CVE-2020-1093VBScript 远程代码执行未公开远程代码执行
CVE-2020-1192Visual Studio Code Python  插件远程代码执行未公开远程代码执行

CVE-2020-1037 | Chakra 脚本引擎内存破坏

Chakra脚本引擎处理Microsoft Edge(基于HTML)的内存中对象的方式中存在一个远程执行代码漏洞。该漏洞可能以一种攻击者可以在当前用户的上下文中执行任意代码的方式来破坏内存。成功利用此漏洞的攻击者可以获得与当前用户相同的用户权限。如果当前用户使用管理用户权限登录,则成功利用此漏洞的攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据或创建具有完全用户权限的新帐户。

在基于Web的攻击情形中,攻击者可能拥有一个旨在通过Microsoft Edge(基于HTML)利用此漏洞的特制网站,然后诱使用户查看该网站。攻击者还可能利用受感染的网站以及接受或托管用户提供的内容或广告的网站。这些网站可能包含可以利用此漏洞的特制内容。

CVE编号受影响版本
CVE-2020-1037Windows 10 Version 1803  for 32-bit Systems
Windows 10 Version 1803 for x64-based  Systems
Windows 10 Version 1803 for ARM64-based  Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based  Systems
Windows 10 Version 1809 for ARM64-based  Systems
Windows Server 2019
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based  Systems
Windows 10 Version 1909 for ARM64-based  Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for x64-based  Systems
Windows 10 Version 1709 for ARM64-based  Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based  Systems
Windows 10 Version 1903 for ARM64-based  Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based  Systems
Windows Server 2016

CVE-2020-1062 | Internet Explorer 内存破坏

当Internet Explorer不正确地访问内存中的对象时,存在一个远程执行代码漏洞。该漏洞可能以一种攻击者可以在当前用户的上下文中执行任意代码的方式来破坏内存。成功利用此漏洞的攻击者可以获得与当前用户相同的用户权限。如果当前用户使用管理用户权限登录,则攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据;或创建具有完全用户权限的新帐户。

攻击者可能拥有一个旨在通过Internet Explorer利用此漏洞的特制网站,然后诱使用户查看该网站。攻击者还可以通过添加可以利用此漏洞的经特殊设计的内容,来利用受感染的网站或接受或托管用户提供的内容或广告的网站。但是,在所有情况下,攻击者都无法强迫用户查看攻击者控制的内容。取而代之的是,攻击者必须说服用户采取措施,通常是通过诱使电子邮件或即时消息,或者诱使用户打开通过电子邮件发送的附件。

CVE编号受影响版本
CVE-2020-1062Windows  10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based  Systems
Windows 10 Version 1803 for ARM64-based  Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based  Systems
Windows 10 Version 1809 for ARM64-based  Systems
Windows Server 2019
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based  Systems
Windows 10 Version 1909 for ARM64-based  Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for x64-based  Systems
Windows 10 Version 1709 for ARM64-based  Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based  Systems
Windows 10 Version 1903 for ARM64-based  Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based  Systems
Windows Server 2016
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack  1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for x64-based Systems  Service Pack 1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2008 for 32-bit Systems  Service Pack 2
Windows Server 2008 for x64-based Systems  Service Pack 2

CVE-2020-1028、CVE-2020-1126、CVE-2020-1136 | Media Foundation 内存破坏

Windows Media Foundation不正确地处理内存中的对象时,存在内存损坏漏洞。成功利用此漏洞的攻击者可以安装程序。查看,更改或删除数据;或创建具有完全用户权限的新帐户。

攻击者可以多种方式利用此漏洞,例如,诱使用户打开特制文档,或诱使用户访问恶意网页。

CVE编号受影响版本
CVE-2020-1028Windows  10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803 (Server Core  Installation)
Windows Server, version 1903 (Server Core  installation)
Windows Server, version 1909 (Server Core  installation)
CVE-2020-1126Windows  10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803 (Server Core  Installation)
Windows Server, version 1903 (Server Core  installation)
Windows Server, version 1909 (Server Core  installation)
CVE-2020-1136Windows  10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core  installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803 (Server Core  Installation)
Windows Server, version 1903 (Server Core  installation)
Windows Server, version 1909 (Server Core  installation)

CVE-2020-1117 | Microsoft Color Management 远程代码执行

颜色管理模块(ICM32.dll)处理内存中的对象的方式中存在一个远程执行代码漏洞。成功利用此漏洞的攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据或创建具有完全用户权限的新帐户。与使用管理用户权限进行操作的用户相比,其帐户被配置为在系统上具有较少用户权限的用户受到的影响较小。

在基于Web的攻击情形中,攻击者可能拥有一个旨在利用此漏洞的特制网站,然后诱使用户查看该网站。攻击者无法强迫用户查看攻击者控制的内容。相反,攻击者必须说服用户采取措施,通常是让用户单击电子邮件或Instant Messenger消息中的链接(将用户带到攻击者的网站),或者打开通过电子邮件发送的附件。

CVE编号受影响版本
CVE-2020-1117Windows  10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803 (Server Core  Installation)
Windows Server, version 1903 (Server Core  installation)
Windows Server, version 1909 (Server Core  installation)

CVE-2020-1056  | Microsoft Edge 特权提升

当Microsoft Edge未正确执行跨域策略时,就会存在一个特权提升漏洞,攻击者可能会利用该策略从一个域访问信息并将其注入到另一个域。

在基于Web的攻击情形中,攻击者可能拥有一个用来试图利用此漏洞的网站。此外,受感染的网站和接受或托管用户提供的内容的网站可能包含可以利用此漏洞的特制内容。但是,在所有情况下,攻击者都无法强迫用户查看攻击者控制的内容。相反,攻击者必须说服用户采取措施。例如,攻击者可能诱使用户单击链接,将他们带到攻击者的站点。成功利用此漏洞的攻击者可以提升受影响的Microsoft Edge版本的特权。

CVE编号受影响版本
CVE-2020-1056Windows  10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based  Systems
Windows 10 Version 1803 for ARM64-based  Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based  Systems
Windows 10 Version 1809 for ARM64-based  Systems
Windows Server 2019
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based  Systems
Windows 10 Version 1909 for ARM64-based  Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for x64-based  Systems
Windows 10 Version 1709 for ARM64-based  Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based  Systems
Windows 10 Version 1903 for ARM64-based  Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based  Systems
Windows Server 2016

CVE-2020-1153 | Microsoft Graphics Components 远程代码执行

Microsoft图形组件处理内存中对象的方式中存在一个远程执行代码漏洞。成功利用此漏洞的攻击者可以在目标系统上执行任意代码。

要利用此漏洞,用户必须打开特制文件。

CVE编号受影响版本
CVE-2020-1153Windows 10 for  32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 for 32-bit Systems Service  Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server  Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server  Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1  (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803 (Server Core  Installation)
Windows Server, version 1903 (Server Core  installation)
Windows Server, version 1909 (Server Core  installation)

CVE-2020-1023、CVE-2020-1024、CVE-2020-1102 | Microsoft SharePoint 远程代码执行

当软件无法检查应用程序包的源标记时,Microsoft SharePoint中将存在一个远程执行代码漏洞。成功利用此漏洞的攻击者可以在SharePoint应用程序池和SharePoint服务器场帐户的上下文中运行任意代码。

要利用此漏洞,需要用户将特制的SharePoint应用程序包上载到受影响的SharePoint版本。

CVE编号受影响版本
CVE-2020-1023Microsoft  SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service  Pack 1
Microsoft SharePoint Server 2019
CVE-2020-1024Microsoft  SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service  Pack 1
Microsoft SharePoint Server 2019
CVE-2020-1102Microsoft  SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019

CVE-2020-1069 | Microsoft SharePoint Server 远程代码执行

当Microsoft SharePoint Server无法正确识别和过滤不安全的ASP.Net Web控件时,将存在一个远程执行代码漏洞。成功利用此漏洞的经过身份验证的攻击者可以使用特制页面在SharePoint应用程序池过程的安全上下文中执行操作。

要利用此漏洞,经过身份验证的用户必须在受影响的Microsoft SharePoint Server版本上创建并调用特制页面。

CVE编号受影响版本
CVE-2020-1069Microsoft  SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service  Pack 1
Microsoft SharePoint Server 2019

CVE-2020-1064 | MSHTML Engine 远程代码执行

MSHTML引擎不正确地验证输入的方式中存在一个远程执行代码漏洞。

攻击者可以在当前用户的上下文中执行任意代码。如果当前用户使用管理用户权限登录,则成功利用此漏洞的攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据;或创建具有完全用户权限的新帐户。

在HTML编辑攻击情形中,攻击者可能诱使用户编辑旨在利用此漏洞的特制文件。

CVE编号受影响版本
CVE-2020-1064Internet  Explorer 11Windows  10 Version 1803 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1803 for x64-based Systems
Internet Explorer 11Windows  10 Version 1803 for ARM64-based Systems
Internet Explorer 11Windows  10 Version 1809 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1809 for x64-based Systems
Internet Explorer 11Windows  10 Version 1809 for ARM64-based Systems
Internet Explorer 11Windows  Server 2019
Internet Explorer 11Windows  10 Version 1909 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1909 for x64-based Systems
Internet Explorer 11Windows  10 Version 1909 for ARM64-based Systems
Internet Explorer 11Windows  10 Version 1709 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1709 for x64-based Systems
Internet Explorer 11Windows  10 Version 1709 for ARM64-based Systems
Internet Explorer 11Windows  10 Version 1903 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1903 for x64-based Systems
Internet Explorer 11Windows  10 Version 1903 for ARM64-based Systems
Internet Explorer 11Windows  10 for 32-bit Systems
Internet Explorer 11Windows  10 for x64-based Systems
Internet Explorer 11Windows  10 Version 1607 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1607 for x64-based Systems
Internet Explorer 11Windows  Server 2016
Internet Explorer 11Windows  7 for 32-bit Systems Service Pack 1
Internet Explorer 11Windows  7 for x64-based Systems Service Pack 1
Internet Explorer 11Windows  8.1 for 32-bit systems
Internet Explorer 11Windows  8.1 for x64-based systems
Internet Explorer 11Windows  RT 8.1
Internet Explorer 11Windows  Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 11Windows  Server 2012
Internet Explorer 11Windows  Server 2012 R2
Internet Explorer 9Windows  Server 2008 for 32-bit Systems Service Pack 2
Internet Explorer 9Windows  Server 2008 for x64-based Systems Service Pack 2

CVE-2020-1065 | Scripting Engine 内存破坏

ChakraCore脚本引擎处理内存中的对象的方式中存在一个远程执行代码漏洞。该漏洞可能以一种攻击者可以在当前用户的上下文中执行任意代码的方式来破坏内存。成功利用此漏洞的攻击者可以获得与当前用户相同的用户权限。

如果当前用户使用管理用户权限登录,则成功利用此漏洞的攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据;或创建具有完全用户权限的新帐户。

CVE编号受影响版本
CVE-2020-1065Windows 10 Version 1803  for 32-bit Systems
Windows 10 Version 1803 for x64-based  Systems
Windows 10 Version 1803 for ARM64-based  Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based  Systems
Windows 10 Version 1809 for ARM64-based  Systems
Windows Server 2019
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based  Systems
Windows 10 Version 1909 for ARM64-based  Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based  Systems
Windows 10 Version 1903 for ARM64-based  Systems

CVE-2020-1093 | VBScript 远程代码执行

VBScript引擎处理内存中对象的方式中存在一个远程执行代码漏洞。该漏洞可能以一种攻击者可以在当前用户的上下文中执行任意代码的方式来破坏内存。成功利用此漏洞的攻击者可以获得与当前用户相同的用户权限。如果当前用户使用管理用户权限登录,则成功利用此漏洞的攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据;或创建具有完全用户权限的新帐户。

在基于Web的攻击情形中,攻击者可能拥有一个旨在通过Internet Explorer利用该漏洞的特制网站,然后诱使用户查看该网站。攻击者还可能在承载IE呈现引擎的应用程序或Microsoft Office文档中嵌入标记为“初始化安全”的ActiveX控件。攻击者还可能利用受感染的网站以及接受或托管用户提供的内容或广告的网站。这些网站可能包含可以利用此漏洞的特制内容。

CVE编号受影响版本
CVE-2020-1093Internet  Explorer 11Windows  10 Version 1803 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1803 for x64-based Systems
Internet Explorer 11Windows  10 Version 1803 for ARM64-based Systems
Internet Explorer 11Windows  10 Version 1809 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1809 for x64-based Systems
Internet Explorer 11Windows  10 Version 1809 for ARM64-based Systems
Internet Explorer 11Windows  Server 2019
Internet Explorer 11Windows  10 Version 1909 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1909 for x64-based Systems
Internet Explorer 11Windows  10 Version 1909 for ARM64-based Systems
Internet Explorer 11Windows  10 Version 1709 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1709 for x64-based Systems
Internet Explorer 11Windows  10 Version 1709 for ARM64-based Systems
Internet Explorer 11Windows  10 Version 1903 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1903 for x64-based Systems
Internet Explorer 11Windows  10 Version 1903 for ARM64-based Systems
Internet Explorer 11Windows  10 for 32-bit Systems
Internet Explorer 11Windows  10 for x64-based Systems
Internet Explorer 11Windows  10 Version 1607 for 32-bit Systems
Internet Explorer 11Windows  10 Version 1607 for x64-based Systems
Internet Explorer 11Windows  Server 2016
Internet Explorer 11Windows  7 for 32-bit Systems Service Pack 1
Internet Explorer 11Windows  7 for x64-based Systems Service Pack 1
Internet Explorer 11Windows  8.1 for 32-bit systems
Internet Explorer 11Windows  8.1 for x64-based systems
Internet Explorer 11Windows  RT 8.1
Internet Explorer 11Windows  Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 11Windows  Server 2012
Internet Explorer 11Windows  Server 2012 R2
Internet Explorer 9Windows  Server 2008 for 32-bit Systems Service Pack 2
Internet Explorer 9Windows  Server 2008 for x64-based Systems Service Pack 2

CVE-2020-1192 | Visual Studio Code Python 插件远程代码执行

当Python扩展从笔记本文件加载工作区设置时,Visual Studio Code中存在一个远程执行代码漏洞。成功利用此漏洞的攻击者可以在当前用户的上下文中运行任意代码。如果当前用户使用管理用户权限登录,则攻击者可以控制受影响的系统。然后,攻击者可能会安装程序。查看,更改或删除数据;或创建具有完全用户权限的新帐户。

要利用此漏洞,攻击者需要说服目标,才能在安装了Python扩展名的Visual Studio Code中打开特制文件。

CVE编号受影响版本
CVE-2020-1192Visual Studio Code

完整漏洞列表如下:

CVE编号标题严重程度类型
CVE-2020-1037Chakra脚本引擎内存损坏漏洞严重远程代码执行
CVE-2020-1062Internet Explorer内存损坏漏洞严重远程代码执行
CVE-2020-1028Media Foundation内存损坏漏洞严重远程代码执行
CVE-2020-1126Media Foundation内存损坏漏洞严重远程代码执行
CVE-2020-1136Media Foundation内存损坏漏洞严重远程代码执行
CVE-2020-1117Microsoft颜色管理远程执行代码漏洞严重远程代码执行
CVE-2020-1056Microsoft Edge特权提升漏洞严重权限提升
CVE-2020-1153Microsoft图形组件远程执行代码漏洞严重远程代码执行
CVE-2020-1023Microsoft SharePoint远程执行代码漏洞严重远程代码执行
CVE-2020-1024Microsoft SharePoint远程执行代码漏洞严重远程代码执行
CVE-2020-1102Microsoft SharePoint远程执行代码漏洞严重远程代码执行
CVE-2020-1069Microsoft SharePoint  Server远程执行代码漏洞严重远程代码执行
CVE-2020-1064MSHTML引擎远程执行代码漏洞严重远程代码执行
CVE-2020-1065脚本引擎内存损坏漏洞严重远程代码执行
CVE-2020-1093VBScript远程执行代码漏洞严重远程代码执行
CVE-2020-1192Visual Studio Code  Python扩展远程代码执行漏洞严重远程代码执行
CVE-2020-1108.NET核心拒绝服务漏洞高危拒绝服务
CVE-2020-1066.NET Framework特权提升漏洞高危权限提升
CVE-2020-1161ASP.NET核心拒绝服务漏洞高危拒绝服务
CVE-2020-1084连接的用户体验和遥测服务拒绝服务漏洞高危拒绝服务
CVE-2020-1123连接的用户体验和遥测服务拒绝服务漏洞高危拒绝服务
CVE-2020-1140DirectX特权提升漏洞高危权限提升
CVE-2020-1092Internet Explorer内存损坏漏洞高危远程代码执行
CVE-2020-1051Jet数据库引擎远程执行代码漏洞高危远程代码执行
CVE-2020-1174Jet数据库引擎远程执行代码漏洞高危远程代码执行
CVE-2020-1175Jet数据库引擎远程执行代码漏洞高危远程代码执行
CVE-2020-1176Jet数据库引擎远程执行代码漏洞高危远程代码执行
CVE-2020-1150Media Foundation内存损坏漏洞高危远程代码执行
CVE-2020-1055Microsoft Active  Directory联合身份验证服务跨站点脚本漏洞高危XSS
CVE-2020-1063Microsoft Dynamics  365(本地)跨站点脚本漏洞高危XSS
CVE-2020-1096Microsoft Edge PDF远程执行代码漏洞高危远程代码执行
CVE-2020-1059Microsoft Edge欺骗漏洞高危欺骗
CVE-2020-0901Microsoft Excel远程执行代码漏洞高危远程代码执行
CVE-2020-1099Microsoft Office SharePoint  XSS漏洞高危XSS
CVE-2020-1100Microsoft Office SharePoint  XSS漏洞高危XSS
CVE-2020-1101Microsoft Office SharePoint  XSS漏洞高危XSS
CVE-2020-1106Microsoft Office SharePoint  XSS漏洞高危XSS
CVE-2020-1173Microsoft Power BI报表服务器欺骗漏洞高危欺骗
CVE-2020-1061Microsoft脚本运行时远程执行代码漏洞高危远程代码执行
CVE-2020-1103Microsoft SharePoint信息泄露漏洞高危信息泄露
CVE-2020-1104Microsoft SharePoint欺骗漏洞高危欺骗
CVE-2020-1105Microsoft SharePoint欺骗漏洞高危欺骗
CVE-2020-1107Microsoft SharePoint欺骗漏洞高危欺骗
CVE-2020-1010Microsoft Windows特权提升漏洞高危权限提升
CVE-2020-1068Microsoft Windows特权提升漏洞高危权限提升
CVE-2020-1079Microsoft Windows特权提升漏洞高危权限提升
CVE-2020-1118Microsoft Windows传输层安全拒绝服务漏洞高危拒绝服务
CVE-2020-1035VBScript远程执行代码漏洞高危远程代码执行
CVE-2020-1058VBScript远程执行代码漏洞高危远程代码执行
CVE-2020-1060VBScript远程执行代码漏洞高危远程代码执行
CVE-2020-1171Visual Studio Code  Python扩展远程代码执行漏洞高危远程代码执行
CVE-2020-1054Win32k特权提升漏洞高危权限提升
CVE-2020-1143Win32k特权提升漏洞高危权限提升
CVE-2020-1112Windows后台智能传输服务特权提升漏洞高危权限提升
CVE-2020-1111Windows剪贴板服务特权提升漏洞高危权限提升
CVE-2020-1121Windows剪贴板服务特权提升漏洞高危权限提升
CVE-2020-1165Windows剪贴板服务特权提升漏洞高危权限提升
CVE-2020-1166Windows剪贴板服务特权提升漏洞高危权限提升
CVE-2020-1154Windows通用日志文件系统驱动程序特权提升漏洞高危权限提升
CVE-2020-1116Windows CSRSS信息泄露漏洞高危信息泄露
CVE-2020-1076Windows拒绝服务漏洞高危拒绝服务
CVE-2020-1021Windows错误报告特权提升漏洞高危权限提升
CVE-2020-1082Windows错误报告特权提升漏洞高危权限提升
CVE-2020-1088Windows错误报告特权提升漏洞高危权限提升
CVE-2020-1132Windows错误报告管理器特权提升漏洞高危权限提升
CVE-2020-1142Windows GDI特权提升漏洞高危权限提升
CVE-2020-0963Windows GDI信息泄露漏洞高危信息泄露
CVE-2020-1141Windows GDI信息泄露漏洞高危信息泄露
CVE-2020-1145Windows GDI信息泄露漏洞高危信息泄露
CVE-2020-1179Windows GDI信息泄露漏洞高危信息泄露
CVE-2020-1135Windows图形组件特权提升漏洞高危权限提升
CVE-2020-0909Windows Hyper-V拒绝服务漏洞高危拒绝服务
CVE-2020-1078Windows Installer特权提升漏洞高危权限提升
CVE-2020-1087Windows内核特权提升漏洞高危权限提升
CVE-2020-1114Windows内核特权提升漏洞高危权限提升
CVE-2020-1072Windows内核信息泄露漏洞高危信息泄露
CVE-2020-1048Windows Print Spooler特权提升漏洞高危权限提升
CVE-2020-1070Windows Print Spooler特权提升漏洞高危权限提升
CVE-2020-1081Windows打印机服务特权提升漏洞高危权限提升
CVE-2020-1137Windows Push Notification  Service特权提升漏洞高危权限提升
CVE-2020-1071Windows远程访问通用对话框特权提升漏洞高危权限提升
CVE-2020-1067Windows远程执行代码漏洞高危权限提升
CVE-2020-1077Windows运行时特权提升漏洞高危权限提升
CVE-2020-1086Windows运行时特权提升漏洞高危权限提升
CVE-2020-1090Windows运行时特权提升漏洞高危权限提升
CVE-2020-1125Windows运行时特权提升漏洞高危权限提升
CVE-2020-1139Windows运行时特权提升漏洞高危权限提升
CVE-2020-1149Windows运行时特权提升漏洞高危权限提升
CVE-2020-1151Windows运行时特权提升漏洞高危权限提升
CVE-2020-1155Windows运行时特权提升漏洞高危权限提升
CVE-2020-1156Windows运行时特权提升漏洞高危权限提升
CVE-2020-1157Windows运行时特权提升漏洞高危权限提升
CVE-2020-1158Windows运行时特权提升漏洞高危权限提升
CVE-2020-1164Windows运行时特权提升漏洞高危权限提升
CVE-2020-1124Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1131Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1134Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1144Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1184Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1185Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1186Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1187Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1188Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1189Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1190Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1191Windows状态存储库服务特权提升漏洞高危权限提升
CVE-2020-1138Windows Storage Service特权提升漏洞高危权限提升
CVE-2020-1075Windows子系统的Linux信息泄露漏洞高危信息泄露
CVE-2020-1113Windows Task Scheduler安全功能绕过漏洞高危安全功能绕过
CVE-2020-1109Windows Update堆栈特权提升漏洞高危权限提升
CVE-2020-1110Windows Update堆栈特权提升漏洞高危权限提升

漏洞危害

严重&高危

影响版本

……

安全建议

  1. 微软官方已更新受影响软件的安全补丁,可根据不同版本系统下载安装对应的安全补丁。

参考信息

  1. https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments

  2. https://marketplace.visualstudio.com/items/ms-python.python/changelog

山石网科安全技术研究院简称“山石安研院”正式成立于2020年4月,是山石网科的信息安全智库部门,其前身是原安全服务部下的安全研究团队。山石安研院整体架构包括干将、莫邪两大安全实验室,以及安全预警分析、高端攻防培训两支独立的技术团队。安研院主要负责反APT跟踪和研究、出战全球攻防赛事及承办、高端攻防技术培训、全球中英文安全预警分析发布、各类软硬件漏洞挖掘和利用研究、承接国家网络安全相关课题、不定期发布年度或半年度的各类技术报告及公司整体攻防能力展现。技术方向包括移动安全、虚拟化安全、工控安全、物联安全、区块链安全、协议安全、源码安全、反APT及反窃密。

自2015年以来为多省公安厅提供技术支撑工作,为上合峰会、财富论坛、金砖五国等多次重大活动提供网络安保支撑工作。在多次攻防赛事中连获佳绩,网安中国行第一名,连续两届红帽杯冠军、网鼎杯线上第一名,在补天杯、极棒杯、全国多地的护网演习等也都获得优秀的成绩,每年获得大量的CNVD、CNNVD、CVE证书或编号。

如需帮助请咨询 hslab@hillstonenet.com

ae5c79aef5c3be2fa5b44a5281209214.png

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值