Windows Print Spooler 遠(yuǎn)程代碼執(zhí)行漏洞——POC已公開(kāi)
  • CNNVD編號(hào):未知
  • 危害等級(jí): 高危 
  • CVE編號(hào):CVE-2021-1675
  • 漏洞類型: 未知
  • 威脅類型:未知
  • 廠       商:未知
  • 漏洞來(lái)源:金山毒霸
  • 發(fā)布時(shí)間:2021-07-01
  • 更新時(shí)間:2021-07-01

漏洞簡(jiǎn)介

2021年6月8日,微軟在6月份補(bǔ)丁日更新中通報(bào)并修復(fù)了Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞(CVE-2021-1675)。日前,該漏洞的POC已在網(wǎng)絡(luò)上公開(kāi)。

Windows Print Spooler是Windows的打印機(jī)后臺(tái)處理程序,廣泛的應(yīng)用于各種內(nèi)網(wǎng)中,攻擊者可以在漏洞環(huán)境中繞過(guò)RpcAddPrinterDriver的身份驗(yàn)證,并在打印服務(wù)器中安裝惡意驅(qū)動(dòng)程序。若攻擊者所控制的用戶在域中,則攻擊者可以連接到DC中的Spooler服務(wù),并利用該漏洞在DC中安裝惡意驅(qū)動(dòng)程序,從而可能控制整個(gè)域環(huán)境。

 

該漏洞廣泛存在于各個(gè)Windows版本中,利用復(fù)雜度為中,但由于成功利用該漏洞的攻擊者可以完整的控制域環(huán)境,攻擊可能造成的后果嚴(yán)重,所以該漏洞的利用價(jià)值極高。

 

2021年6月29日,國(guó)外安全研究人員在GitHub上公開(kāi)了Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞的POC。毒霸安全專家建議相關(guān)用戶盡快升級(jí)系統(tǒng)以修復(fù)該漏洞,避免受到黑客攻擊。

漏洞公示

暫無(wú)

受影響實(shí)體

- Windows Server 2008 R2 for x64-based Systems Service Pack 1

- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Coreinstallation)

- Windows Server 2008 for x64-based Systems Service Pack 2

- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Coreinstallation)

- Windows Server 2008 for 32-bit Systems Service Pack 2

- Windows RT 8.1

- Windows Server 2012 R2 (Server Core installation)

- Windows Server 2012 R2

- Windows Server 2012 (Server Core installation)

- Windows Server 2012

- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Coreinstallation)

- Windows 10 Version 1909 for ARM64-based Systems

- Windows 10 Version 20H2 for ARM64-based Systems

- Windows 10 Version 20H2 for 32-bit Systems

- Windows 10 Version 21H1 for 32-bit Systems

- Windows 10 Version 20H2 for x64-based Systems

- Windows Server, version 2004 (Server Core installation)

- Windows 10 Version 21H1 for ARM64-based Systems

- Windows 10 Version 21H1 for x64-based Systems

- Windows 8.1 for x64-based systems

- Windows 8.1 for 32-bit systems

- Windows 7 for x64-based Systems Service Pack 1

- Windows 7 for 32-bit Systems Service Pack 1

- Windows 10 Version 2004 for x64-based Systems

- Windows 10 Version 2004 for ARM64-based Systems

- Windows 10 Version 2004 for 32-bit Systems

- Windows Server 2016  (Server Coreinstallation)

- Windows Server 2016

- Windows 10 Version 1607 for x64-based Systems

- Windows 10 Version 1607 for 32-bit Systems

- Windows 10 for x64-based Systems

- Windows 10 for 32-bit Systems

- Windows Server, version 20H2 (Server Core Installation)

- Windows 10 Version 1909 for x64-based Systems

- Windows 10 Version 1909 for 32-bit Systems

- Windows Server 2019  (Server Coreinstallation)

- Windows Server 2019

- Windows 10 Version 1809 for ARM64-based Systems

- Windows 10 Version 1809 for x64-based Systems

- Windows 10 Version 1809 for 32-bit Systems

補(bǔ)丁

目前微軟已修復(fù)該漏洞并發(fā)布了安全版本,毒霸安全團(tuán)隊(duì)強(qiáng)烈建議用戶立即更新Windows至最新版本。

若用戶暫時(shí)無(wú)法進(jìn)行補(bǔ)丁更新,可以通過(guò)禁用Print Spooler服務(wù)來(lái)緩解漏洞風(fēng)險(xiǎn)。

臨時(shí)解決方案:

運(yùn)行service.msc,在服務(wù)列表中找到PrintSpooler服務(wù)。


右鍵打開(kāi)服務(wù)屬性,將服務(wù)類型修改為“禁用”,并停止該服務(wù)。