class="topic_img" alt=""/>
2017 年 10 月 10 日微软漏洞补丁日修复了多个安全漏洞,其中一个为 Microsoft WindowsSMB Server 远程执行代码漏洞,根据官方描述该漏洞如果被成功利用,远程攻击者可在目标系统上执行任意代码,如果失败还将将导致拒绝服务,对业务存在较大的安全风险。
该漏洞影响范围
- Microsoft Windows 10 Version1607 for 32-bit systems.html" target="_blank">Systems
- Microsoft Windows 10 Version1607 for x64-based Systems
- Microsoft Windows 10 for 32-bitSystems
- Microsoft Windows 10 forx64-based Systems
- Microsoft Windows 10 version1511 for 32-bit Systems
- Microsoft Windows 10 version1511 for x64-based Systems
- Microsoft Windows 10 version1703 for 32-bit Systems
- Microsoft Windows 10 version1703 for x64-based Systems
- Microsoft Windows 7 for 32-bitSystems SP1
- Microsoft Windows 7 for x64-basedSystems SP1
- Microsoft Windows 8.1 for32-bit Systems
- Microsoft Windows 8.1 forx64-based Systems
- Microsoft Windows RT 8.1
- Microsoft Windows Server 2008R2 for Itanium-based Systems SP1
- Microsoft Windows Server 2008R2 for x64-based Systems SP1
- Microsoft Windows Server 2008for 32-bit Systems SP2
- Microsoft Windows Server 2008for Itanium-based Systems SP2
- Microsoft Windows Server 2008for x64-based Systems SP2
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
- Microsoft Windows Server 2016
漏洞修复建议(或缓解措施)
信息参考:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11780
https://www.symantec.com/security_response/vulnerability.jsp?bid=101110&om_rssid=sr-advisories
http://www.securityfocus.com/bid/101110/info