Windows DNS Server远程代码执行漏洞

2020年7月14日,武汉云之巅监测到微软发布补丁修复了一个标注为远程代码执行的DNS Server漏洞(CVE-2020-1350),官方分类为“可蠕虫级”高危漏洞。目前微软官方已提供临时缓解措施以及相应的月度安全补丁修复该漏洞。

漏洞描述

微软官方于7月14日发布安全更新,其中修复了一个标注为远程代码执行的DNS Server漏洞(CVE-2020-1350),官方分类为“可蠕虫级”高危漏洞。未经身份验证的攻击者可以发送特殊构造的数据包到目标DNS Server来利用此漏洞,成功利用此漏洞可能达到远程代码执行的效果。如果域控制器上存在DNS服务,攻击者可利用此漏洞获取到域控制器的系统权限。武汉云之巅提醒 Windows 用户尽快采取安全措施阻止漏洞攻击。

漏洞评级

CVE-2020-1350 高危

影响版本

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core)

Windows Server 2012

Windows Server 2012 (Server Core)

Windows Server 2012

Windows Server 2012 (Server Core)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core)

Windows Server 2016

Windows Server 2016 (Server Core)

Windows Server 2019

Windows Server 2019 (Server Core)

Windows Server, version 1903 (Server Core)

Windows Server, version 1909 (Server Core)

Windows Server, version 2004 (Server Core)

安全建议

1、缓解措施。修改 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters 中TcpReceivePacketSize的值为0xFF00,并重启DNS Service。

2、前往微软官方下载相应补丁进行更新 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

3、阿里云云安全中心Windows系统漏洞模块已支持对该漏洞补丁一键检测和修复,详情登陆云安全中心

Windows Server 2008 (官方已停止免费补丁维护,需购买微软ESU服务,建议放弃使用:https://www.microsoft.com/en-us/windows-server/extended-security-updates)

Windows Server 2012 补丁:KB4565537

Windows Server 2012 R2 补丁:KB4565541

Windows Server 2016 补丁:KB4565511

Windows Server 2019 补丁:KB4558998
Windows DNS Server远程代码执行漏洞

相关链接

SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

相关新闻