- CNNVD編號(hào):未知
- 危害等級(jí): 高危
- CVE編號(hào):CVE-2021-1675
- 漏洞類型: 未知
- 威脅類型:未知
- 廠 商:未知
- 漏洞來(lái)源:金山毒霸
- 發(fā)布時(shí)間:2021-07-01
- 更新時(shí)間:2021-07-01
漏洞簡(jiǎn)介
2021年6月8日,微軟在6月份補(bǔ)丁日更新中通報(bào)并修復(fù)了Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞(CVE-2021-1675)。日前,該漏洞的POC已在網(wǎng)絡(luò)上公開(kāi)。
Windows Print Spooler是Windows的打印機(jī)后臺(tái)處理程序,廣泛的應(yīng)用于各種內(nèi)網(wǎng)中,攻擊者可以在漏洞環(huán)境中繞過(guò)RpcAddPrinterDriver的身份驗(yàn)證,并在打印服務(wù)器中安裝惡意驅(qū)動(dòng)程序。若攻擊者所控制的用戶在域中,則攻擊者可以連接到DC中的Spooler服務(wù),并利用該漏洞在DC中安裝惡意驅(qū)動(dòng)程序,從而可能控制整個(gè)域環(huán)境。
該漏洞廣泛存在于各個(gè)Windows版本中,利用復(fù)雜度為中,但由于成功利用該漏洞的攻擊者可以完整的控制域環(huán)境,攻擊可能造成的后果嚴(yán)重,所以該漏洞的利用價(jià)值極高。
2021年6月29日,國(guó)外安全研究人員在GitHub上公開(kāi)了Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞的POC。毒霸安全專家建議相關(guān)用戶盡快升級(jí)系統(tǒng)以修復(fù)該漏洞,避免受到黑客攻擊。
漏洞公示
受影響實(shí)體
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Coreinstallation)
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Coreinstallation)
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows RT 8.1
- Windows Server 2012 R2 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 (Server Core installation)
- Windows Server 2012
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Coreinstallation)
- Windows 10 Version 1909 for ARM64-based Systems
- Windows 10 Version 20H2 for ARM64-based Systems
- Windows 10 Version 20H2 for 32-bit Systems
- Windows 10 Version 21H1 for 32-bit Systems
- Windows 10 Version 20H2 for x64-based Systems
- Windows Server, version 2004 (Server Core installation)
- Windows 10 Version 21H1 for ARM64-based Systems
- Windows 10 Version 21H1 for x64-based Systems
- Windows 8.1 for x64-based systems
- Windows 8.1 for 32-bit systems
- Windows 7 for x64-based Systems Service Pack 1
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 10 Version 2004 for x64-based Systems
- Windows 10 Version 2004 for ARM64-based Systems
- Windows 10 Version 2004 for 32-bit Systems
- Windows Server 2016 (Server Coreinstallation)
- Windows Server 2016
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 for 32-bit Systems
- Windows Server, version 20H2 (Server Core Installation)
- Windows 10 Version 1909 for x64-based Systems
- Windows 10 Version 1909 for 32-bit Systems
- Windows Server 2019 (Server Coreinstallation)
- Windows Server 2019
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
補(bǔ)丁
目前微軟已修復(fù)該漏洞并發(fā)布了安全版本,毒霸安全團(tuán)隊(duì)強(qiáng)烈建議用戶立即更新Windows至最新版本。
若用戶暫時(shí)無(wú)法進(jìn)行補(bǔ)丁更新,可以通過(guò)禁用Print Spooler服務(wù)來(lái)緩解漏洞風(fēng)險(xiǎn)。
臨時(shí)解決方案:
運(yùn)行service.msc,在服務(wù)列表中找到PrintSpooler服務(wù)。
右鍵打開(kāi)服務(wù)屬性,將服務(wù)類型修改為“禁用”,并停止該服務(wù)。