- CNNVD編號(hào):未知
- 危害等級(jí): 高危
- CVE編號(hào):CVE-2021-34527
- 漏洞類型: 未知
- 威脅類型:未知
- 廠 商:未知
- 漏洞來源:金山毒霸
- 發(fā)布時(shí)間:2021-07-05
- 更新時(shí)間:2021-07-05
漏洞簡(jiǎn)介
2021年7月1日,微軟發(fā)布了Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞(CVE-2021-34527)。日前,該漏洞的exp已在網(wǎng)絡(luò)上公開。微軟官方暫無相關(guān)補(bǔ)丁。該exp可以繞過微軟6月針對(duì)CVE-2021-1675的補(bǔ)丁。建議相關(guān)用戶盡早做好緩解措施,暫時(shí)關(guān)閉相關(guān)的Print Spooler服務(wù)。
Windows Print Spooler是Windows的打印機(jī)后臺(tái)處理程序,廣泛的應(yīng)用于各種內(nèi)網(wǎng)中,攻擊者可以利用該0day漏洞使用一個(gè)低權(quán)限用戶(包括匿名共享guest賬戶),對(duì)本地網(wǎng)絡(luò)中的電腦發(fā)起攻擊,控制存在漏洞的電腦。尤其在企業(yè)內(nèi)部,在域環(huán)境中,普通域用戶,可以通過該服務(wù),攻擊域控服務(wù)器,從而控制整個(gè)網(wǎng)絡(luò)。
此次泄漏的exp利用難度低,同時(shí)該漏洞廣泛存在于各個(gè)Windows版本中。且成功利用該漏洞的攻擊者可以完整的控制域環(huán)境,攻擊可能造成的后果嚴(yán)重,所以該漏洞的利用價(jià)值極高。
毒霸安全專家建議相關(guān)用戶盡快升級(jí)系統(tǒng)以修復(fù)該漏洞,避免受到黑客攻擊。
漏洞公示
參考網(wǎng)站
受影響實(shí)體
- Windows Server 2012 R2 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 (Server Core installation)
- Windows Server 2012
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Coreinstallation)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Coreinstallation)
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Coreinstallation)
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows RT 8.1
- Windows 8.1 for x64-based systems
- Windows 8.1 for 32-bit systems
- Windows 7 for x64-based Systems Service Pack 1
- Windows 7 for 32-bit Systems Service Pack 1
- Windows Server 2016 (Server Coreinstallation)
- Windows Server 2016
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 for 32-bit Systems
- Windows Server, version 20H2 (Server Core Installation)
- Windows 10 Version 20H2 for ARM64-based Systems
- Windows 10 Version 20H2 for 32-bit Systems
- Windows 10 Version 20H2 for x64-based Systems
- Windows Server, version 2004 (Server Core installation)
- Windows 10 Version 2004 for x64-based Systems
- Windows 10 Version 2004 for ARM64-based Systems
- Windows 10 Version 2004 for 32-bit Systems
- Windows 10 Version 21H1 for 32-bit Systems
- Windows 10 Version 21H1 for ARM64-based Systems
- Windows 10 Version 21H1 for x64-based Systems
- Windows Server, version 1909 (Server Core installation)
- Windows 10 Version 1909 for ARM64-based Systems
- Windows 10 Version 1909 for x64-based Systems
- Windows 10 Version 1909 for 32-bit Systems
- Windows Server 2019 (Server Coreinstallation)
- Windows Server 2019
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
補(bǔ)丁
目前正式補(bǔ)丁尚未發(fā)布,相關(guān)用戶可以通過禁用Print Spooler服務(wù)來緩解漏洞風(fēng)險(xiǎn)。
臨時(shí)解決方案:
運(yùn)行service.msc,在服務(wù)列表中找到PrintSpooler服務(wù)。
右鍵打開服務(wù)屬性,將服務(wù)類型修改為“禁用”,并停止該服務(wù)。
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527