安全研究
安全漏洞
Microsoft Windows URL Parsing远程代码执行漏洞(CVE-2025-59295)
发布日期:2025-10-14
更新日期:2025-10-15
受影响系统:
Microsoft Windows Server 2025 (Server Core installation描述:
Microsoft Windows Server 2025
Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Windows Server 2022 (Server Core installation
Microsoft Windows Server 2022
Microsoft Windows Server 2019 (Server Core Installation
Microsoft Windows Server 2019
Microsoft Windows Server 2016 (Server Core Installation
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2 (Server Core installat
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 (Server Core installation
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Ser
Microsoft Windows Server 2008 for x64-based Systems Ser
Microsoft Windows Server 2008 for 32-bit Systems Servic
Microsoft Windows Server 2008 for 32-bit Systems Servic
Microsoft Windows 10 for x64-based Systems
Microsoft Windows 10 for 32-bit Systems
Microsoft Windows 10 22H2 for x64-based Systems
Microsoft Windows 10 22H2 for ARM64-based Systems
Microsoft Windows 10 22H2 for 32-bit Systems
Microsoft Windows 10 21H2 for x64-based Systems
Microsoft Windows 10 21H2 for ARM64-based Systems
Microsoft Windows 10 21H2 for 32-bit Systems
Microsoft Windows 10 1809 for x64-based Systems
Microsoft Windows 10 1809 for 32-bit Systems
Microsoft Windows 10 1607 for x64-based Systems
Microsoft Windows 10 1607 for 32-bit Systems
Microsoft Windows 11 25H2 for x64-based Systems
Microsoft Windows 11 25H2 for ARM64-based Systems
Microsoft Windows 11 24H2 for x64-based Systems
Microsoft Windows 11 24H2 for ARM64-based Systems
Microsoft Windows 11 23H2 for x64-based Systems
Microsoft Windows 11 23H2 for ARM64-based Systems
Microsoft Windows 11 22H2 for x64-based Systems
Microsoft Windows 11 22H2 for ARM64-based Systems
CVE(CAN) ID: CVE-2025-59295
Microsoft Windows URL Parsing是过解析URL字符串提取组件信息的技术,主要用于服务器端获取客户端请求的协议类型、主机名、路径等关键数据。
Microsoft Windows URL Parsing存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。
<**>
建议:
厂商补丁:
Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59295
浏览次数:74
严重程度:0(网友投票)
绿盟科技给您安全的保障