• 我的位置:
  • 首頁
  • -
  • 漏洞預警
  • -
  • 操作系統(tǒng)
  • -
  • Windows Print Spooler 遠程代碼執(zhí)行漏洞
    • CNNVD編號:未知
    • 危害等級: 高危 
    • CVE編號:CVE-2021-34527
    • 漏洞類型: 未知
    • 威脅類型:未知
    • 廠       商:未知
    • 漏洞來源:金山毒霸
    • 發(fā)布時間:2021-07-05
    • 更新時間:2021-07-05

    漏洞簡介

    2021年7月1日,微軟發(fā)布了Windows Print Spooler遠程代碼執(zhí)行漏洞(CVE-2021-34527)。日前,該漏洞的exp已在網(wǎng)絡上公開。微軟官方暫無相關補丁。該exp可以繞過微軟6月針對CVE-2021-1675的補丁。建議相關用戶盡早做好緩解措施,暫時關閉相關的Print Spooler服務。

     Windows Print Spooler是Windows的打印機后臺處理程序,廣泛的應用于各種內(nèi)網(wǎng)中,攻擊者可以利用該0day漏洞使用一個低權限用戶(包括匿名共享guest賬戶),對本地網(wǎng)絡中的電腦發(fā)起攻擊,控制存在漏洞的電腦。尤其在企業(yè)內(nèi)部,在域環(huán)境中,普通域用戶,可以通過該服務,攻擊域控服務器,從而控制整個網(wǎng)絡。

     

    此次泄漏的exp利用難度低,同時該漏洞廣泛存在于各個Windows版本中。且成功利用該漏洞的攻擊者可以完整的控制域環(huán)境,攻擊可能造成的后果嚴重,所以該漏洞的利用價值極高。

     

    毒霸安全專家建議相關用戶盡快升級系統(tǒng)以修復該漏洞,避免受到黑客攻擊。

    漏洞公示

    暫無

    參考網(wǎng)站

    暫無

    受影響實體

    - Windows Server 2012 R2 (Server Core installation)

    - Windows Server 2012 R2

    - Windows Server 2012 (Server Core installation)

    - Windows Server 2012

    - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Coreinstallation)

    - Windows Server 2008 R2 for x64-based Systems Service Pack 1

    - Windows Server 2008 for x64-based Systems Service Pack 2 (Server Coreinstallation)

    - Windows Server 2008 for x64-based Systems Service Pack 2

    - Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Coreinstallation)

    - Windows Server 2008 for 32-bit Systems Service Pack 2

    - Windows RT 8.1

    - Windows 8.1 for x64-based systems

    - Windows 8.1 for 32-bit systems

    - Windows 7 for x64-based Systems Service Pack 1

    - Windows 7 for 32-bit Systems Service Pack 1

    - Windows Server 2016  (Server Coreinstallation)

    - Windows Server 2016

    - Windows 10 Version 1607 for x64-based Systems

    - Windows 10 Version 1607 for 32-bit Systems

    - Windows 10 for x64-based Systems

    - Windows 10 for 32-bit Systems

    - Windows Server, version 20H2 (Server Core Installation)

    - Windows 10 Version 20H2 for ARM64-based Systems

    - Windows 10 Version 20H2 for 32-bit Systems

    - Windows 10 Version 20H2 for x64-based Systems

    - Windows Server, version 2004 (Server Core installation)

    - Windows 10 Version 2004 for x64-based Systems

    - Windows 10 Version 2004 for ARM64-based Systems

    - Windows 10 Version 2004 for 32-bit Systems

    - Windows 10 Version 21H1 for 32-bit Systems

    - Windows 10 Version 21H1 for ARM64-based Systems

    - Windows 10 Version 21H1 for x64-based Systems

    - Windows Server, version 1909 (Server Core installation)

    - Windows 10 Version 1909 for ARM64-based Systems

    - Windows 10 Version 1909 for x64-based Systems

    - Windows 10 Version 1909 for 32-bit Systems

    - Windows Server 2019  (Server Coreinstallation)

    - Windows Server 2019

    - Windows 10 Version 1809 for ARM64-based Systems

    - Windows 10 Version 1809 for x64-based Systems

    - Windows 10 Version 1809 for 32-bit Systems

    補丁

    目前正式補丁尚未發(fā)布,相關用戶可以通過禁用Print Spooler服務來緩解漏洞風險。

    臨時解決方案:

    運行service.msc,在服務列表中找到PrintSpooler服務。 



    右鍵打開服務屬性,將服務類型修改為“禁用”,并停止該服務。

    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527