您当前的位置:首页 > 新闻中心 > 业界动态

关于应对微软远程桌面代码执行漏洞的安全公告

   2019813日,MSRC发布了安全通告修复了关于远程桌面服务的漏洞,其中包含两个严重的远程代码执行漏洞(CVE-2019-1181CVE-2019-1182)。目前,微软官方已发布补丁以修复这些漏洞,请及时进行修复。

漏洞影响:

攻击者利用此漏洞可以在目标系统上执行任意代码。可在未经身份验证和用户交互的情况下被利用,极易被攻击者利用于传播蠕虫病毒。

影响范围:

受影响的版本:

Windows10 for 32-bit Systems

Windows10 for x64-based Systems

Windows10 Version 1607 for 32-bit Systems

Windows10 Version 1607 for x64-based Systems

Windows10 Version 1703 for 32-bit Systems

Windows10 Version 1703 for x64-based Systems

Windows10 Version 1709 for 32-bit Systems

Windows10 Version 1709 for 64-based Systems

Windows10 Version 1709 for ARM64-based Systems

Windows10 Version 1803 for 32-bit Systems

Windows10 Version 1803 for ARM64-based Systems

Windows10 Version 1803 for x64-based Systems

Windows10 Version 1809 for 32-bit Systems

Windows10 Version 1809 for ARM64-based Systems

Windows10 Version 1809 for x64-based Systems

Windows10 Version 1903 for 32-bit Systems

Windows10 Version 1903 for ARM64-based Systems

Windows10 Version 1903 for x64-based Systems

Windows7 for 32-bit Systems Service Pack 1

Windows7 for x64-based Systems Service Pack 1

Windows8.1 for 32-bit systems

Windows8.1 for x64-based systems

WindowsRT 8.1

WindowsServer 2008 R2 for Itanium-Based Systems Service Pack 1

WindowsServer 2008 R2 for x64-based Systems Service Pack 1

WindowsServer 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

WindowsServer 2012

WindowsServer 2012 (Server Core installation)

WindowsServer 2012 R2

WindowsServer 2012 R2 (Server Core installation)

WindowsServer 2016

WindowsServer 2016 (Server Core installation)

WindowsServer 2019

WindowsServer 2019 (Server Core installation)

WindowsServer, version 1803 (Server Core Installation)

WindowsServer, version 1903 (Server Core installation)

不受影响的版本:

Windows XPWindows Server 2003Windows Server 2008

防范方法:

目前微软已经发布了升级补丁以修复此安全问题,补丁获取链接:

1https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182

2https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181

缓解措施:

1. 如不需要使用远程桌面服务,请禁用该服务。

2. 在运行Windows 7Windows Server 2008Windows Server 2008 R2的受支持版本的系统上启用网络级别身份验证(NLA)。

3. 在企业外围防火墙上关闭3389端口。

永乐高030net会员登录

  • 地址:常州市新北区三井街道太湖东路9-2号3楼
  • 邮编:213000
  • 电话:400-0170078 / 0519-81236533
  • 传真:0519-85157327
  • Copyright @ 2008-2020 永乐高030net会员登录. All Rights Reserved .
  • 苏ICP备09036926号

南京分公司

  • 地址:南京市秦淮区中山东路532-2号H1栋110室
  • 邮编:210000
  • 电话:025-85330327
  • 苏公网安备 32041102000092号

徐州分公司

  • 地址:江苏省徐州市云龙区绿地商务城翡翠公馆loft-C-601
  • 邮编:221000
  • 电话:0516-83203808

淮安分公司

  • 地址:淮安市生态文化旅游区青创空间2F-C8
  • 邮编:223001