安全研究

安全漏洞
Microsoft Windows Online Certificate Status Protocol信息泄露漏洞(CVE-2024-20662)

发布日期:2024-01-09
更新日期:2024-01-10

受影响系统:
Microsoft Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Microsoft Windows Server 2022(Server Core installation)
Microsoft Microsoft Windows Server 2022
Microsoft Microsoft Windows Server 2019(Server Core installation)
Microsoft Microsoft Windows Server 2019
Microsoft Microsoft Windows Server 2016(Server Core installation)
Microsoft Microsoft Windows Server 2016
Microsoft Microsoft Windows Server 2012(Server Core installation)
Microsoft Microsoft Windows Server 2012 R2(Server Core installati
Microsoft Microsoft Windows Server 2012 R2
Microsoft Microsoft Windows Server 2012
Microsoft Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Microsoft Windows Server 2008 for 32-bit Systems SP2(Se
Microsoft Microsoft Windows Server 2008 for 32-bit Systems SP2
描述:
CVE(CAN) ID: CVE-2024-20662

Microsoft Windows Online Certificate Status Protocol (OCSP)是用于获取X.509数字证书撤销状态的网际协议,作为证书吊销列表(CRL)的替代品解决了在公开密钥基础建设中使用证书吊销列表而带来的多个问题。
Microsoft Windows Online Certificate Status Protocol (OCSP)存在信息泄露漏洞,攻击者可通过与其他漏洞结合的方式利用该漏洞执行任意代码。

<**>

建议:
厂商补丁:

Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-20662

浏览次数:421
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障