windows print spooler 远程代码执行漏洞——poc已公开
  • cnnvd编号:未知
  • 危害等级: 高危 
  • cve编号:cve-2021-1675
  • 漏洞类型: 未知
  • 威胁类型:未知
  • 厂       商:未知
  • 漏洞来源:金山毒霸
  • 发布时间:2021-07-01
  • 更新时间:2021-07-01

漏洞简介

2021年6月8日,微软在6月份补丁日更新中通报并修复了windows print spooler远程代码执行漏洞(cve-2021-1675)。日前,该漏洞的poc已在网络上公开。

windows print spooler是windows的打印机后台处理程序,广泛的应用于各种内网中,攻击者可以在漏洞环境中绕过rpcaddprinterdriver的身份验证,并在打印服务器中安装恶意驱动程序。若攻击者所控制的用户在域中,则攻击者可以连接到dc中的spooler服务,并利用该漏洞在dc中安装恶意驱动程序,从而可能控制整个域环境。

 

该漏洞广泛存在于各个windows版本中,利用复杂度为中,但由于成功利用该漏洞的攻击者可以完整的控制域环境,攻击可能造成的后果严重,所以该漏洞的利用价值极高。

 

2021年6月29日,国外安全研究人员在github上公开了windows print spooler远程代码执行漏洞的poc。毒霸安全专家建议相关用户尽快升级系统以修复该漏洞,避免受到黑客攻击。

漏洞公示

暂无

参考网站


受影响实体

- windows server 2008 r2 for x64-based systems service pack 1

- windows server 2008 for x64-based systems service pack 2 (server coreinstallation)

- windows server 2008 for x64-based systems service pack 2

- windows server 2008 for 32-bit systems service pack 2 (server coreinstallation)

- windows server 2008 for 32-bit systems service pack 2

- windows rt 8.1

- windows server 2012 r2 (server core installation)

- windows server 2012 r2

- windows server 2012 (server core installation)

- windows server 2012

- windows server 2008 r2 for x64-based systems service pack 1 (server coreinstallation)

- windows 10 version 1909 for arm64-based systems

- windows 10 version 20h2 for arm64-based systems

- windows 10 version 20h2 for 32-bit systems

- windows 10 version 21h1 for 32-bit systems

- windows 10 version 20h2 for x64-based systems

- windows server, version 2004 (server core installation)

- windows 10 version 21h1 for arm64-based systems

- windows 10 version 21h1 for x64-based systems

- windows 8.1 for x64-based systems

- windows 8.1 for 32-bit systems

- windows 7 for x64-based systems service pack 1

- windows 7 for 32-bit systems service pack 1

- windows 10 version 2004 for x64-based systems

- windows 10 version 2004 for arm64-based systems

- windows 10 version 2004 for 32-bit systems

- windows server 2016  (server coreinstallation)

- windows server 2016

- windows 10 version 1607 for x64-based systems

- windows 10 version 1607 for 32-bit systems

- windows 10 for x64-based systems

- windows 10 for 32-bit systems

- windows server, version 20h2 (server core installation)

- windows 10 version 1909 for x64-based systems

- windows 10 version 1909 for 32-bit systems

- windows server 2019  (server coreinstallation)

- windows server 2019

- windows 10 version 1809 for arm64-based systems

- windows 10 version 1809 for x64-based systems

- windows 10 version 1809 for 32-bit systems

补丁

目前微软已修复该漏洞并发布了安全版本,毒霸安全团队强烈建议用户立即更新windows至最新版本。

若用户暂时无法进行补丁更新,可以通过禁用print spooler服务来缓解漏洞风险。

临时正规网赌十大娱乐棋牌的解决方案:

运行service.msc,在服务列表中找到printspooler服务。


右键打开服务属性,将服务类型修改为“禁用”,并停止该服务。