阿国运维网技术分享平台:桌面运维、网络运维、系统运维、服务器运维(及云服务器),精品软件分享、阿国网络、尽在北京运维网
微软官方发布8月例行安全更新公告,共涉及90个漏洞的安全更新发布,其中披露了一个影响广泛、风险较高的TCP/IP 远程代码执行漏洞,漏洞编号CVE-2024-38063。
为避免您的业务受影响,北京IT运维网安全建议您及时开展安全自查,如在受影响范围,请您及时进行更新修复,避免被外部攻击者入侵。
漏洞详情
Windows TCP/IP 是指在 Windows 操作系统中实现的传输控制协议/互联网协议。
据官方描述,该漏洞的存在是由于 Windows TCP/IP 中存在整数下溢漏洞导致,远程攻击者可以向受影响的应用程序发送特制请求,触发缓冲区溢出导致远程代码执行,该漏洞被官方标记为很有可能被利用。
风险等级
严重
漏洞风险
攻击者利用该漏洞可导致远程代码执行
影响版本
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
安全版本
Windows 11 Version 24H2 for x64-based Systems [kb5041571];
Windows 11 Version 24H2 for ARM64-based Systems [kb5041571];
Windows Server 2012 R2 (Server Core installation) [kb5041828];
Windows Server 2012 R2 [kb5041828];
Windows Server 2012 (Server Core installation) [kb5041851];
Windows Server 2012 [kb5041851];
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) [kb5041838];
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) [kb5041823];
Windows Server 2008 R2 for x64-based Systems Service Pack 1 [kb5041838];
Windows Server 2008 R2 for x64-based Systems Service Pack 1 [kb5041823];
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) [kb5041850];
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) [kb5041847];
Windows Server 2008 for x64-based Systems Service Pack 2 [kb5041850];
Windows Server 2008 for x64-based Systems Service Pack 2 [kb5041847];
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) [kb5041850];
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) [kb5041847];
Windows Server 2008 for 32-bit Systems Service Pack 2 [kb5041850];
Windows Server 2008 for 32-bit Systems Service Pack 2 [kb5041847];
Windows Server 2016 (Server Core installation) [kb5041773];
Windows Server 2016 [kb5041773];
Windows 10 Version 1607 for x64-based Systems [kb5041773];
Windows 10 Version 1607 for 32-bit Systems [kb5041773];
Windows 10 for x64-based Systems [kb5041782];
Windows 10 for 32-bit Systems [kb5041782];
Windows Server 2022, 23H2 Edition (Server Core installation) [kb5041573];
Windows 11 Version 23H2 for x64-based Systems [kb5041585];
Windows 11 Version 23H2 for ARM64-based Systems [kb5041585];
Windows 10 Version 22H2 for 32-bit Systems [kb5041580];
Windows 10 Version 22H2 for ARM64-based Systems [kb5041580];
Windows 10 Version 22H2 for x64-based Systems [kb5041580];
Windows 11 Version 22H2 for x64-based Systems [kb5041585];
Windows 11 Version 22H2 for ARM64-based Systems [kb5041585];
Windows 10 Version 21H2 for x64-based Systems [kb5041580];
Windows 10 Version 21H2 for ARM64-based Systems [kb5041580];
Windows 10 Version 21H2 for 32-bit Systems [kb5041580];
Windows 11 version 21H2 for ARM64-based Systems [kb5041592];
Windows 11 version 21H2 for x64-based Systems [kb5041592];
Windows Server 2022 (Server Core installation) [kb5041160];
Windows Server 2022 [kb5041160];
Windows Server 2019 (Server Core installation) [kb5041578];
Windows Server 2019 [kb5041578];
Windows 10 Version 1809 for ARM64-based Systems [kb5041578];
Windows 10 Version 1809 for x64-based Systems [kb5041578];
Windows 10 Version 1809 for 32-bit Systems [kb5041578];
修复建议
一、官方已发布漏洞补丁及修复版本,请评估业务是否受影响后,升级至安全版本,补丁下载地址参考:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
二、临时缓解措施:
检查目标Windows服务器是否使用到 IPv6 协议;
a)按 Windows 键+R。然后键入 ncpa.cpl,然后按 Enter 键;
b)右键单击网络适配器,然后选择“属性”;
c)搜索 Internet协议版本6(TCP/IPv6)。如果该选项已选中,要禁用IPV6,请取消选中该选项,然后单击“确定”保存更改。
【备注】:建议您在升级前做好数据备份工作,避免出现意外
漏洞参考
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063)