Windows HTTP協議棧遠程代碼執行漏洞的緊急預警
發布時間:2022-01-13
點擊數:
一、安全預警
近期,發現 Windows HTTP 協議棧遠程代碼執行漏洞,攻 擊者可利用該漏洞傳播蠕蟲病毒。HTTP 是一個用于傳輸超媒體 文檔的應用層協議,它是為 Web 瀏覽器與 Web 服務器之間的 通信而設計,Windows 上的 HTTP 協議棧用于 windows 上的 We b 服務器。應用范圍較廣,因此威脅影響范圍較大。 請各重點單位高度重視,加強網絡安全防護,切實保障網絡 系統安全穩定運行。
二、事件信息
(一)事件概要
事件名稱:Windows HTTP 協議棧遠程代碼執行漏洞
CVE 編號 :CVE-2022-21907
威脅類型:遠程代碼執行
威脅等級:高
受影響的應用版本:
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
(二)漏洞描述
由于 HTTP 協議棧(HTTP.sys)中的 HTTP Trailer Support 功 能中存在邊界錯誤導致緩沖區溢出。該漏洞允許未授權的遠程攻 擊者通過向 Web 服務器發送一個特制的 HTTP 請求,觸發緩沖 區溢出,從而在目標系統上執行任意代碼。
(三)影響范圍
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
三、處置建議
(一)解決方案
官方已發布更新補丁,鏈接地址如下:https://msrc.microsoft.com/update-guide/en-US/vulnerability/C VE-2022-21907
四、應急處置建議
一旦發現系統中存在漏洞被利用的情況,請您第一時間通知我司,同時開展以下緊急處置:
一是立即斷開被入侵的主機系統的網絡連接,防止進一步危 害
二是留存相關日志信息;
三是通過“解決方案”加固系統并通過檢查確認無相關漏洞 后再恢復網絡連接