漏洞信息详情
Microsoft Windows 代码注入漏洞
漏洞简介
Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。
Microsoft Role: DNS Server存在代码注入漏洞。以下产品和版本受到影响:Windows Server 2016,Windows Server 2016 (Server Core installation),Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server, version 20H2 (Server Core Installation),Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server, version 2004 (Server Core installation)
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40469
参考网址
来源:MISC
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40469
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Windows-vulnerabilities-of-October-2021-36648
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-40469
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101223
来源:msrc.microsoft.com
链接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40469
受影响实体
暂无
补丁
- Microsoft Windows 代码注入漏洞的修复措施<!--2021-10-12-->
还没有评论,来说两句吧...