Windows TCP/IP 远程执行漏洞CVE-2024-38063
Microsoft 近期宣布了存在于Windows的 TCP/IP 栈中的 Windows TCP/IP 远程代码执行漏洞(CVE-2024-38063)。
根据微软官方接受,该漏洞风险评级为严重,CVSS评分为9.8,主要影响使用IPv6协议的多个 Windows 系统版本。
漏洞原因在于Windows操作系统的 TCP/IP 组件中存在整数下溢漏洞,使得Windows处理TCP连接请求的方式不当。
简单来说,就是受影响Windows系统tcpip.sys中Ipv6pProcessOptions函数在处理ipv6协议options时存在整数溢出。
攻击者可以向目标系统发送特制的 TCP/IPv6 数据包,在无需用户进行任何操作的前提下利用该漏洞执行任意代码。
未经身份验证的攻击者甚至可以重复向目标 Windows 计算机发送特制数据包,然后利用该漏洞实现远程代码执行。
这种攻击方式既无需用户执行任意操作,无需点击链接、加载图像或执行文件,最重要的是其不受系统防火墙限制。
图片来源:pixabay
一旦被成功利用,攻击者可以获得目标系统的 SYSTEM 级别访问权限,这也意味着攻击者可以完全控制目标系统。
其后果自然可想而知了,攻击者可以执行包括但不限于数据窃取、安装恶意软件等一系列恶意操作,建议进行修复。
对于该漏洞最简单且有效的解决方案是更新操作系统到最新版本,当然也可以安装火绒等第三方安全软件进行防护。
临时性解决方案:在Windows防火墙中阻止445 端口的入站流量; 使用第三方防火墙或安全软件来增强网络安全性。
windows_server 官方安全补丁:https://catalog.update.microsoft.com/Search.aspx?q=KB5041573,
windows11 官方安全补丁:https://catalog.update.microsoft.com/Search.aspx?q=KB5041571,
windows10 官方安全补丁:https://catalog.update.microsoft.com/Search.aspx?q=KB5041580。
翻译工具:搜狗翻译
参考资料:
https://www.cve.org/CVERecord?id=CVE-2024-38063
https://met.ntu.edu.cn/2024/0815/c9375a246468/pagem.htm
https://catalog.update.microsoft.com/Search.aspx?q=KB5041571
CVE-2024-38063 影响操作系统列表:
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)