安全研究
安全漏洞
Microsoft Speech Application Programming Interface远程代码执行漏洞(CVE-2024-43574)
发布日期:2024-10-08
更新日期:2024-10-09
受影响系统:Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Windows Server 2022 (Server Core installation
Microsoft Windows Server 2022
Microsoft Windows 10 22H2 for x64-based Systems
Microsoft Windows 10 22H2 for ARM64-based Systems
Microsoft Windows 10 22H2 for 32-bit Systems
Microsoft Windows 10 21H2 for x64-based Systems
Microsoft Windows 10 21H2 for ARM64-based Systems
Microsoft Windows 10 21H2 for 32-bit Systems
Microsoft Windows 11 24H2 for x64-based Systems
Microsoft Windows 11 24H2 for ARM64-based Systems
Microsoft Windows 11 23H2 for x64-based Systems
Microsoft Windows 11 23H2 for ARM64-based Systems
Microsoft Windows 11 22H2 for x64-based Systems
Microsoft Windows 11 22H2 for ARM64-based Systems
Microsoft Windows 11 21H2 for x64-based Systems
Microsoft Windows 11 21H2 for ARM64-based Systems
描述:
CVE(CAN) ID:
CVE-2024-43574
Microsoft Speech Application Programming Interface (SAPI)是Microsoft集团设计的一套语音功能软件,主要用途是让其他软件能使用电脑语音合成的功能。
Microsoft Speech Application Programming Interface (SAPI)存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。
<**>
建议:
厂商补丁:
Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-43574浏览次数:292
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载 绿盟科技给您安全的保障 |