- CNNVD編號:未知
- 危害等級: 高危
- CVE編號:CVE-2021-1675
- 漏洞類型: 未知
- 威脅類型:未知
- 廠 商:未知
- 漏洞來源:金山毒霸
- 發(fā)布時間:2021-07-01
- 更新時間:2021-07-01
漏洞簡介
2021年6月8日,微軟在6月份補丁日更新中通報并修復了Windows Print Spooler遠程代碼執(zhí)行漏洞(CVE-2021-1675)。日前,該漏洞的POC已在網(wǎng)絡上公開。
Windows Print Spooler是Windows的打印機后臺處理程序,廣泛的應用于各種內網(wǎng)中,攻擊者可以在漏洞環(huán)境中繞過RpcAddPrinterDriver的身份驗證,并在打印服務器中安裝惡意驅動程序。若攻擊者所控制的用戶在域中,則攻擊者可以連接到DC中的Spooler服務,并利用該漏洞在DC中安裝惡意驅動程序,從而可能控制整個域環(huán)境。
該漏洞廣泛存在于各個Windows版本中,利用復雜度為中,但由于成功利用該漏洞的攻擊者可以完整的控制域環(huán)境,攻擊可能造成的后果嚴重,所以該漏洞的利用價值極高。
2021年6月29日,國外安全研究人員在GitHub上公開了Windows Print Spooler遠程代碼執(zhí)行漏洞的POC。毒霸安全專家建議相關用戶盡快升級系統(tǒng)以修復該漏洞,避免受到黑客攻擊。
漏洞公示
受影響實體
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Coreinstallation)
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Coreinstallation)
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows RT 8.1
- Windows Server 2012 R2 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 (Server Core installation)
- Windows Server 2012
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Coreinstallation)
- Windows 10 Version 1909 for ARM64-based Systems
- Windows 10 Version 20H2 for ARM64-based Systems
- Windows 10 Version 20H2 for 32-bit Systems
- Windows 10 Version 21H1 for 32-bit Systems
- Windows 10 Version 20H2 for x64-based Systems
- Windows Server, version 2004 (Server Core installation)
- Windows 10 Version 21H1 for ARM64-based Systems
- Windows 10 Version 21H1 for x64-based Systems
- Windows 8.1 for x64-based systems
- Windows 8.1 for 32-bit systems
- Windows 7 for x64-based Systems Service Pack 1
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 10 Version 2004 for x64-based Systems
- Windows 10 Version 2004 for ARM64-based Systems
- Windows 10 Version 2004 for 32-bit Systems
- Windows Server 2016 (Server Coreinstallation)
- Windows Server 2016
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 for 32-bit Systems
- Windows Server, version 20H2 (Server Core Installation)
- Windows 10 Version 1909 for x64-based Systems
- Windows 10 Version 1909 for 32-bit Systems
- Windows Server 2019 (Server Coreinstallation)
- Windows Server 2019
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
補丁
目前微軟已修復該漏洞并發(fā)布了安全版本,毒霸安全團隊強烈建議用戶立即更新Windows至最新版本。
若用戶暫時無法進行補丁更新,可以通過禁用Print Spooler服務來緩解漏洞風險。
臨時解決方案:
運行service.msc,在服務列表中找到PrintSpooler服務。
右鍵打開服務屬性,將服務類型修改為“禁用”,并停止該服務。