【漏洞通告】Windows 网络文件系统漏洞(CVE-2020-17051、CVE-2020-17056)

百家 作者:绿盟科技 2020-11-11 20:00:24


1

漏洞概述

当地时间11月10日,微软最新的月度补丁更新中修复了两枚存在于Windows 网络文件系统(Network File System,NFS)中的漏洞,分别是 CVE-2020-17051和 CVE-2020-17056。


CVE-2020-17051 是存在于nfssvr.sys驱动中的远程代码执行漏洞,据称复现时可导致蓝屏死机(BSOD)[3]。


CVE-2020-17056是一个存在于nfssvr.sys驱动中的远程越界读取漏洞,可导致ASLR(地址空间布局随机化)被绕过。


当这两个漏洞被组合利用时,攻击者在Windows服务器上绕过漏洞缓解措施并实现远程利用的可能性将大大增加。官方已为受影响系统提供了补丁,建议用户尽快安装更新进行防护。


NFS是个分布式的客户机/服务器文件系统。通过Windows NFS,用户可以在运行 Windows 的计算机上,像访问本地文件一样访问其他非 Windows 操作系统(如 Linux 或 UNIX)上的文件。


参考链接:

[1]https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17051

[2]https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17056

[3]https://www.mcafee.com/blogs/other-blogs/mcafee-labs/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server/



2

受影响产品版本

CVE-2020-17051

  • Windows 10 Version 20H2 for 32-bit Systems

  • Windows 10 Version 20H2 for ARM64-based Systems

  • Windows 10 Version 20H2 for x64-based Systems

  • Windows Server, version 20H2 (Server Core Installation)

  • Windows 10 Version 1809 for 32-bit Systems

  • Windows 10 Version 1809 for x64-based Systems

  • Windows 10 Version 1809 for ARM64-based Systems

  • Windows Server 2019

  • Windows Server 2019 (Server Core installation)

  • Windows 10 Version 1909 for 32-bit Systems

  • Windows 10 Version 1909 for x64-based Systems

  • Windows 10 Version 1909 for ARM64-based Systems

  • Windows Server, version 1909 (Server Core installation)

  • Windows 10 Version 1903 for 32-bit Systems

  • Windows 10 Version 1903 for x64-based Systems

  • Windows 10 Version 1903 for ARM64-based Systems

  • Windows Server, version 1903 (Server Core installation)

  • Windows 10 Version 2004 for 32-bit Systems

  • Windows 10 Version 2004 for ARM64-based Systems

  • Windows 10 Version 2004 for x64-based Systems

  • Windows Server, version 2004 (Server Core installation)

  • Windows 10 Version 1607 for 32-bit Systems

  • Windows 10 Version 1607 for x64-based Systems

  • Windows Server 2016

  • Windows Server 2016 (Server Core installation)

  • Windows 7 for 32-bit Systems Service Pack 1

  • Windows 7 for x64-based Systems Service Pack 1

  • Windows 8.1 for 32-bit systems

  • Windows 8.1 for x64-based systems

  • Windows RT 8.1

  • Windows Server 2008 for 32-bit Systems Service Pack 2

  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

  • Windows Server 2008 for x64-based Systems Service Pack 2

  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

  • Windows Server 2008 R2 for x64-based Systems Service Pack 1

  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

  • Windows Server 2012

  • Windows Server 2012 (Server Core installation)

  • Windows Server 2012 R2

  • Windows Server 2012 R2 (Server Core installation)


CVE-2020-17056

  • Windows 10 Version 1803 for 32-bit Systems

  • Windows 10 Version 1803 for x64-based Systems

  • Windows 10 Version 1803 for ARM64-based Systems

  • Windows 10 Version 1809 for 32-bit Systems

  • Windows 10 Version 1809 for x64-based Systems

  • Windows 10 Version 1809 for ARM64-based Systems

  • Windows Server 2019

  • Windows Server 2019 (Server Core installation)

  • Windows 10 Version 1909 for 32-bit Systems

  • Windows 10 Version 1909 for x64-based Systems

  • Windows 10 Version 1909 for ARM64-based Systems

  • Windows Server, version 1909 (Server Core installation)

  • Windows 10 Version 1903 for 32-bit Systems

  • Windows 10 Version 1903 for x64-based Systems

  • Windows 10 Version 1903 for ARM64-based Systems

  • Windows Server, version 1903 (Server Core installation)

  • Windows 10 Version 2004 for 32-bit Systems

  • Windows 10 Version 2004 for ARM64-based Systems

  • Windows 10 Version 2004 for x64-based Systems

  • Windows Server, version 2004 (Server Core installation)

  • Windows 10 for 32-bit Systems

  • Windows 10 for x64-based Systems

  • Windows 10 Version 1607 for 32-bit Systems

  • Windows 10 Version 1607 for x64-based Systems

  • Windows Server 2016

  • Windows Server 2016 (Server Core installation)

  • Windows 8.1 for 32-bit systems

  • Windows 8.1 for x64-based systems

  • Windows RT 8.1

  • Windows Server 2012

  • Windows Server 2012 (Server Core installation)

  • Windows Server 2012 R2

  • Windows Server 2012 R2 (Server Core installation)

  • Windows 10 Version 20H2 for ARM64-based Systems

  • Windows Server, version 20H2 (Server Core Installation)

  • Windows 10 Version 20H2 for x64-based Systems

  • Windows 10 Version 20H2 for 32-bit Systems


3

解决方案

微软官方已针对受影响系统发布安全补丁,强烈建议相关用户尽快更新。补丁升级,参考链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17051

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17056


    ·    声明    ·    


本安全公告仅用来描述可能存在的安全问题,绿盟科技不为此安全公告提供任何保证或承诺。


由于传播、利用此安全公告所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,绿盟科技以及安全公告作者不为此承担任何责任。


绿盟科技拥有对此安全公告的修改和解释权。


如欲转载或传播此安全公告,必须保证此安全公告的完整性,包括版权声明等全部内容。未经绿盟科技允许,不得任意修改或者增减此安全公告内容,不得以任何方式将其用于商业目的。


  关于绿盟科技  

绿盟科技集团股份有限公司(以下简称绿盟科技),成立于2000年4月,总部位于北京。


公司于2014年1月29日在深圳证券交易所创业板上市,证券代码:300369。


绿盟科技在国内设有40多个分支机构,为政府、金融、运营商、能源、交通、教育、医疗以及企业等行业用户,提供全线网络安全产品、全方位安全解决方案和体系化安全运营服务。公司在美国硅谷、日本东京、英国伦敦、巴西、新加坡设立海外子公司,深入开展全球业务,打造全球网络安全行业的中国品牌。 




关注公众号:拾黑(shiheibook)了解更多

[广告]赞助链接:

四季很好,只要有你,文娱排行榜:https://www.yaopaiming.com/
让资讯触达的更精准有趣:https://www.0xu.cn/

公众号 关注网络尖刀微信公众号
随时掌握互联网精彩
赞助链接