【漏洞预警】蠕虫级RDP远程桌面服务漏洞(CVE-2019-1181、CVE-2019-1182)附补丁下载地址

漏洞介绍

CVE-2019-0708还没走远,微软在梳理0708的原理的时候发现的两个新漏洞(CVE-2019-1181/CVE-2019-1182)并推送修复。

与之前修复的“BlueKeep”漏洞(CVE-2019-0708)几乎一样,这两个漏洞影响了几乎所有目前受支持的Windows系统。此漏洞是预身份验证且无需用户交互,这就意味着这个漏洞可以通过网络蠕虫的方式被利用,任何利用这些漏洞的恶意软件都有可能从易受攻击的计算机传播到易受攻击的计算机而无需用户交互。

影响范围

•Windows 10 for 32-bit Systems

•Windows 10 for x64-based Systems

•Windows 10 Version 1607 for 32-bit Systems

•Windows 10 Version 1607 for x64-based Systems

•Windows 10 Version 1703 for 32-bit Systems

•Windows 10 Version 1703 for x64-based Systems

•Windows 10 Version 1709 for 32-bit Systems

•Windows 10 Version 1709 for 64-based Systems

•Windows 10 Version 1709 for ARM64-based Systems

•Windows 10 Version 1803 for 32-bit Systems

•Windows 10 Version 1803 for ARM64-based Systems

•Windows 10 Version 1803 for x64-based Systems

•Windows 10 Version 1809 for 32-bit Systems

•Windows 10 Version 1809 for ARM64-based Systems

•Windows 10 Version 1809 for x64-based Systems

•Windows 10 Version 1903 for 32-bit Systems

•Windows 10 Version 1903 for ARM64-based Systems

•Windows 10 Version 1903 for x64-based Systems

•Windows 7 for 32-bit Systems Service Pack 1

•Windows 7 for x64-based Systems Service Pack 1

•Windows 8.1 for 32-bit systems

•Windows 8.1 for x64-based systems

•Windows RT 8.1

•Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1

•Windows Server 2008 R2 for x64-based Systems Service Pack 1

•Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

•Windows Server 2012

•Windows Server 2012 (Server Core installation)

•Windows Server 2012 R2

•Windows Server 2012 R2 (Server Core installation)

•Windows Server 2016

•Windows Server 2016 (Server Core installation)

•Windows Server 2019

•Windows Server 2019 (Server Core installation)

•Windows Server, version 1803 (Server Core Installation)

•Windows Server, version 1903 (Server Core installation)

注意:对于使用Windows 7 Service Pack 1或者Windows Server 2008 R2 Service Pack 1的用户,只有安装了RDP 8.0或RDP 8.1,这些操作系统才会受到此漏洞的影响。

查看RDP版本:

1、打开运行,输入mstsc

2、右键点击顶上方区域,查询RDP版本信息

3、显示RDP版本信息

修复建议

•如非必须建议关闭企业外围防火墙的TCP端口3389

•如系统上无需此服务,建议禁用

•使用Windows Update打上补丁修复漏洞

•在受支持的Windows 7、Windows Server 2008和Windows Server 2008 R2版本的系统上启用网络身份验证(NLA)可部分缓解

补丁下载地址

•Windows 7 SP1 x86:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/08/windows6.1-kb4512486-x86_4c88f71af8e9d07e5fb141d7aed0bcc7f532781e.msu

•Windows 7 SP1 x64:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/08/windows6.1-kb4512486-x64_547fe7e4099c11d494c95d1f72e62a693cd70441.msu

•Windows Server 2008 R2 SP1:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/08/windows6.1-kb4512486-x64_547fe7e4099c11d494c95d1f72e62a693cd70441.msu

•Windows Server 2012:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2019/08/windows8-rt-kb4512482-x64_d70a5c16078078eabc121282b160536e6f61d242.msu

•Windows Server 2012 R2:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/08/windows8.1-kb4512489-x64_be2ed8f4ee800d8c39e5025c5d95808858077c05.msu

•其他:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181

百度网盘

链接:https://pan.baidu.com/s/1qibRIj3MNfnzjsL1Afix6A
提取码:n035

windows 2008 r2 kb4512486补丁安装失败解决办法:

http://www.db-sec.com/2019/08/windows-2008-r2-cve-2019-1181、cve-2019-1182补丁kb4512486-安装失败解决方法/

 

发表评论

电子邮件地址不会被公开。 必填项已用*标注