首页 -> 安全研究

安全研究

安全漏洞
Microsoft Windows Shell远程代码执行漏洞(CVE-2020-1286)

发布日期:2020-06-09
更新日期:2020-06-12

受影响系统:
Microsoft Windows Windows Server, version 2004 (
Microsoft Windows Windows Server, version 1909 (
Microsoft Windows Windows Server, version 1903 (
Microsoft Windows Windows Server, version 1803 (
Microsoft Windows Windows Server 2019 (Server Co
Microsoft Windows Windows Server 2019
Microsoft Windows Windows 10 Version 2004 for x6
Microsoft Windows Windows 10 Version 2004 for AR
Microsoft Windows Windows 10 Version 2004 for 32
Microsoft Windows Windows 10 Version 1909 for x6
Microsoft Windows Windows 10 Version 1909 for AR
Microsoft Windows Windows 10 Version 1909 for 32
Microsoft Windows Windows 10 Version 1903 for x6
Microsoft Windows Windows 10 Version 1903 for AR
Microsoft Windows Windows 10 Version 1903 for 32
Microsoft Windows Windows 10 Version 1809 for x6
Microsoft Windows Windows 10 Version 1809 for AR
Microsoft Windows Windows 10 Version 1809 for 32
Microsoft Windows Windows 10 Version 1803 for x6
Microsoft Windows Windows 10 Version 1803 for AR
Microsoft Windows Windows 10 Version 1803 for 32
Microsoft Windows Windows 10 Version 1709 for x6
Microsoft Windows Windows 10 Version 1709 for AR
Microsoft Windows Windows 10 Version 1709 for 32
描述:
CVE(CAN) ID: CVE-2020-1286

Microsoft Windows是微软公司发布的一系列操作系统。

Microsoft Windows Shell在验证文件路径时存在远程代码执行漏洞,通过构造的文件,攻击者利用此漏洞在当前用户上下文中执行任意代码。

<*来源:Hidetake Jo
  
  链接:https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jun
*>

建议:
厂商补丁:

Microsoft
---------
Microsoft已经为此发布了一个安全公告(June 2020 Security Updates)以及相应补丁:
June 2020 Security Updates:June 2020 Security Updates
链接:https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jun

浏览次数:931
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障