五月婷婷丁香性爱|j久久一级免费片|久久美女福利视频|中文观看在线观看|加勒比四区三区二|亚洲裸女视频网站|超碰97AV在线69网站免费观看|有码在线免费视频|久久青青日本视频|亚洲国产AAAA

服務(wù)公告

全部公告 > 安全公告 > Windows Print Spooler遠(yuǎn)程代碼執(zhí)行0day漏洞預(yù)警 (CVE-2021-34527)

Windows Print Spooler遠(yuǎn)程代碼執(zhí)行0day漏洞預(yù)警 (CVE-2021-34527)

2021-07-02

一、概要

近日,華為云關(guān)注到微軟官方發(fā)布Windows Print Spooler遠(yuǎn)程代碼執(zhí)行0day漏洞(CVE-2021-34527)安全公告,代號PrintNightmare,該漏洞與6月份官方披露的Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞(CVE-2021-1675)類似但不完全相同。攻擊者利用漏洞可繞過RpcAddPrinterDriverEx的安全驗證,并在打印服務(wù)器中安裝惡意的驅(qū)動程序,如果攻擊者所控制的用戶在域中,則攻擊者可以連接到DC中的Spooler服務(wù),并利用該漏洞在DC中安裝惡意的驅(qū)動程序,完全的控制整個域環(huán)境。目前Exp已擴散,風(fēng)險較高。

Windows Print Spooler是Windows的打印機后臺處理程序,廣泛運用于各種內(nèi)網(wǎng)中。華為云提醒使用Windows Print Spooler的用戶及時安排自檢并做好安全加固以降低安全風(fēng)險。

參考鏈接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

二、威脅級別

威脅級別:【嚴(yán)重】

(說明:威脅級別共四級:一般、重要、嚴(yán)重、緊急)

三、漏洞影響范圍

影響版本:

Windows Server, version 20H2 (Server Core Installation)

Windows Server, version 2004 (Server Core installation)

Windows Server, version 1909 (Server Core installation)

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows RT 8.1

Windows 8.1 for x64-based systems

Windows 8.1 for 32-bit systems

Windows 7 for x64-based Systems Service Pack 1

Windows 7 for 32-bit Systems Service Pack 1

Windows 10 Version 21H1 for x64-based Systems

Windows 10 Version 21H1 for ARM64-based Systems

Windows 10 Version 21H1 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 2004 for x64-based Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

四、安全建議

1、微軟官方已發(fā)布修復(fù)補丁,受影響用戶可通過官方發(fā)布的補丁進行修復(fù),補丁下載地址:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

2、若無法及時安裝補丁,可通過以下官方提供的方法進行排查和緩解:

檢查Print Spooler 服務(wù)是否運行(以域管理員身份運行)

Get-Service -Name Spooler

如果Print Spooler服務(wù)正在運行或者未被禁用,可選擇以下方法進行操作(二選一):

方法1、禁用Print Spooler 服務(wù),在powershell中運行如下命令

Stop-Service -Name Spooler -Force

Set-Service -Name Spooler -StartupType Disabled

方法2、通過配置組策略禁用入站遠(yuǎn)程打印。

在組策略編輯器(gpedit.msc)中依次找到管理模板--->打印機,將“允許打印后臺處理程序接受客戶端連接”設(shè)置為禁用。

為確保數(shù)據(jù)安全,建議重要業(yè)務(wù)數(shù)據(jù)進行異地備份。

注:修復(fù)漏洞前請將資料備份,并進行充分測試。