安全研究

安全漏洞
Microsoft Windows Server DNS Server远程代码执行漏洞(CVE-2020-1350)

发布日期:2020-07-14
更新日期:2020-07-20

受影响系统:
Microsoft Windows Server version 2004 (Server Core Inst
Microsoft Windows Server version 1909 (Server Core Inst
Microsoft Windows Server version 1903 (Server Core Inst
Microsoft Windows Server 2019 (Server Core Installation
Microsoft Windows Server 2019
Microsoft Windows Server 2016 (Server Core Installation
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2 (Server Core installat
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 (Server Core installation
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Windows Server 2008 for x64-based Systems Ser
Microsoft Windows Server 2008 for 32-bit Systems SP2
Microsoft Windows Server 2008 for 32-bit Systems Servic
描述:
CVE(CAN) ID: CVE-2020-1350

Microsoft Windows Server是美国微软(Microsoft)公司的一套服务器操作系统。Windows DNS Server是其中一个DNS(域名系统)服务器。
Microsoft Windows DNS Server中存在远程代码漏洞,该漏洞源于程序无法正确处理请求。攻击者可通过发送恶意的请求利用该漏洞在本地系统帐户的上下文中运行任意代码。以下产品及版本受到影响:Windows Server 2008 SP2,Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windows Server 2016,Windows Server 2019,Windows Server 1903版本,Windows Server 1909版本,Windows Server 2004版本。

<*来源:Sagi Tzadik and Eyal Itkin (Check Point Research)
  
  链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
*>

建议:
临时解决方法:

如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:

*对注册表进行如下修改:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters
  DWORD = TcpReceivePacketSize
  Value = 0xFF00

修改完毕,重启DNS服务。

厂商补丁:

Microsoft
---------
Microsoft已经为此发布了一个安全公告(CVE-2020-1350)以及相应补丁:
CVE-2020-1350:Windows DNS Server Remote Code Execution Vulnerability
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

浏览次数:1393
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障