点击上方蓝字关注我们
漏洞预警
01
漏洞基本概述
Vulnerability Overview
Windows 是微软公司开发的操作系统,Office 是微软公司的办公套件,包括常用的办公应用程序如 Word、Excel、PowerPoint 等。
该漏洞允许远程攻击者危害受影响的系统。该漏洞的存在是由于在处理跨协议文件导航时对用户提供的输入验证不足。远程攻击者可以诱骗受害者打开特制文件并在系统上执行任意代码。
【风险等级】高 危
【CVE编号】CVE-2023-36884
禾盾科技应急团队建议广大用户及时将Office升级到最新版本。与此同时,请做好资产自查以及预防工作,以免遭受黑客攻击。
02
漏洞影响范围
Vulnerability Impact
主要影响范围如下:
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2016 (64-bit edition)
Microsoft Word 2016 (32-bit edition)
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
03
漏洞修复方案
Vulnerability Fixes
目前官方已正式发布修复版本,建议受影响用户尽快升级至安全版本。
注:临时防护措施:
使用Microsoft Defender for Office 或 Microsoft 365 Apps
微软建议使用 Microsoft Defender for Office ,Microsoft Defender for Office 可以防御恶意文件以防止此漏洞造成的危害,使用Microsoft 365 Apps (Versions 2302 and later)也可免受此漏洞危害。
使用阻止创建新进程策略
此漏洞的当前利用链会在Office中创建新进程,建议使用阻止创建新进程策略,以减少此漏洞成功利用的可能性,相关操作方法请参考微软官方说明
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-all-office-applications-from-creating-child-processes
通过修改注册表值以减少漏洞被利用的可能性
此漏虽然这些注册表设置可减轻对该问题的利用,但可能会影响与这些应用程序相关的某些用例的常规功能。因此,我们建议修改注册表时进行测试。具体操作为将以下值设置为”1“,并在漏洞修复后将此值重新设置为”0“。
设置的字段为:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION
下载链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
04
漏洞参考链接
Vulnerability Fixes Link
https://www.microsoft.com/en-us/security/blog/2023/07/11/storm-0978-attacks-reveal-financial-and-espionage-motives/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
05
漏洞时间滚轴
Vulnerability Time
#发现时间#2023年07月11日
#验证时间#2023年07月17日
#通告时间#2023年07月18日
HD
禾盾科技响应中心
HD
获取更多最新情报
建议您订阅「禾盾科技-漏洞情报」服务,及时获取更多漏洞情报详情以及处置建议,让您的单位真正远离漏洞威胁。
电话:177-128-77993
邮箱:support@hedun.com.cn
END