CVE-2020-1301 | Windows SMB v1远程代码执行误差通告

宣布时间 2020-06-10

0x00 误差概述


CVE   ID

CVE-2020-1301

   

2020-06-10

   

RCE

   

中危

远程使用

影响规模


0x01 误差详情


尊龙凯时 - 人生就是搏!



微软于周二宣布了6月清静更新补丁,修复了129个误差。其中包括一个Windows SMB远程代码执行误差(CVE-2020-1301),只管本月更新的误差数目许多,但在Microsoft今天宣布补丁之前,还没有发明被使用的误差。建议管理员尽快安排更新。

Server Message Block(SMB)是为盘算机提供身份验证以会见服务器上打印机和文件系统的组件。该误差源于Microsoft SMB 1.0 (SMBv1) 服务器在处置惩罚某些请求的要领中保存过失,导致乐成使用此误差的攻击者可以在目的系统上执行恣意代码。

另外的永恒之蓝就是使用SMB v1误差,建议关闭SMB v1,想要触发此误差需要先通过身份认证,危害品级属于中危。


0x02 影响规模


以下是CVE-2020-1301误差受影响的系统版本:

Windows 10 Version 1803 for 32-bit Systems

Windows 10 Version 1803 for x64-based Systems

Windows Server, version 1803 (Server Core Installation)

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows Server, version 1909 (Server Core installation)

Windows 10 Version 1709 for 32-bit Systems

Windows 10 Version 1709 for x64-based Systems

Windows 10 Version 1709 for ARM64-based Systems

Windows 10 Version 1903 for 32-bit Systems

Windows 10 Version 1903 for x64-based Systems

Windows 10 Version 1903 for ARM64-based Systems

Windows Server, version 1903 (Server Core installation)

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for Itanium-Based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows 10 Version 2004 for x64-based Systems

Windows Server, version 2004 (Server Core installation)

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 2004 for ARM64-based Systems


0x03 处置惩罚建议


建议禁用SMB v1

关于运行Windows Vista和更高版本的用户,请参考Microsoft知识库文章2696547。

运行Windows 8.1或Windows Server 2012 R2及更高版本的客户端操作系统:

1. 翻开控制面板,单击“程序”,然后单击“翻开或关闭Windows功效”。

2. 在“Windows功效”窗口中,扫除“SMB 1.0 / CIFS文件共享支持”复选框,然后单击“确定”关闭该窗口。

3. 重新启动系统。

关于服务器操作系统:

1. 翻开服务器管理器,然后单击“管理”菜单,然后选择“删除角色和功效”。

2. 在“功效”窗口中,扫除“SMB 1.0 / CIFS文件共享支持”复选框,然后单击“确定”关闭该窗口。

3. 重新启动系统。

此解决要领将导致SMB v1协议将在目的系统上被禁用。


0x04 相关新闻


https://www.zdnet.com/article/microsoft-june-2020-patch-tuesday-fixes-129-vulnerabilities/#ftag=RSSbaffb68


0x05 参考链接


https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1301

https://docs.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3

https://portal.msrc.microsoft.com/zh-cn/security-guidance


0x06 时间线


2020-06-09 微软更新误差补丁

2020-06-10 VSRC宣布误差通告


尊龙凯时 - 人生就是搏!