Χθες η Microsoft κυκλοφόρησε το Patch Tuesday Νοεμβρίου 2021, το οποίο φέρνει διορθώσεις για 55 ευπάθειες ασφαλείας, μεταξύ των οποίων βρίσκονται και 6 zero-day bugs.
Δείτε επίσης: Η Microsoft μόλις επέκτεινε την malware προστασία της για servers Linux
Σύμφωνα με την εταιρεία, οι 6 από τις 55 ευπάθειες έχουν χαρακτηριστεί ως Κρίσιμες και οι υπόλοιπες 49 ως Σημαντικές. Παρακάτω μπορείτε να δείτε τις κατηγορίες των ευπαθειών που διορθώνονται με το Microsoft Patch Tuesday Νοεμβρίου 2021:
- 20 Elevation of Privilege ευπάθειες
- 2 Security Feature Bypass ευπάθειες
- 15 Remote Code Execution ευπάθειες
- 10 Information Disclosure ευπάθειες
- 3 Denial of Service ευπάθειες
- 4 Spoofing ευπάθειες
Microsoft Patch Tuesday: Διορθώνει έξι zero-day ευπάθειες
Όπως είπαμε και παραπάνω, οι έξι από τις 55 ευπάθειες που διορθώνει το Patch Tuesday Νοεμβρίου είναι zero-day. Μάλιστα, οι δύο από αυτές χρησιμοποιούνται ήδη και επηρεάζουν τα Microsoft Exchange και Microsoft Excel.
Δείτε επίσης: Microsoft Defender for Business: Νέα λύση ασφαλείας για επιχειρήσεις
Οι δύο ευπάθειες που χρησιμοποιούνται ήδη είναι:
- CVE-2021-42292: Security Feature Bypass ευπάθεια στο Microsoft Excel
- CVE-2021-42321: Remote Code Execution ευπάθεια στο Microsoft Exchange Server
Η ευπάθεια του Microsoft Exchange, CVE-2021-42321, είναι ένα σφάλμα εκτέλεσης κώδικα, που χρησιμοποιήθηκε ως μέρος του Tianfu Cup hacking διαγωνισμού τον περασμένο μήνα.
Ωστόσο, το Microsoft Excel CVE-2021-42292 ανακαλύφθηκε από το Microsoft Threat Intelligence Center και έχει χρησιμοποιηθεί σε επιθέσεις.
Οι υπόλοιπες zero-day ευπάθειες που διορθώνονται με το Microsoft Patch Tuesday Νοεμβρίου, είναι:
- CVE-2021-38631: Information Disclosure ευπάθεια στο Windows Remote Desktop Protocol (RDP)
- CVE-2021-41371: Information Disclosure ευπάθεια στο Windows Remote Desktop Protocol (RDP)
- CVE-2021-43208: Remote Code Execution ευπάθεια στο 3D Viewer
- CVE-2021-43209: Remote Code Execution ευπάθεια στο 3D Viewer
Δείτε επίσης: Οι ερευνητές της Microsoft ανακάλυψαν ένα ελάττωμα στο macOS!
Microsoft Patch Tuesday Νοεμβρίου 2021
Στον παρακάτω πίνακα μπορείτε να δείτε όλες τις ευπάθειες που διορθώνει η Microsoft με το Patch αυτού του μήνα.
Tag | CVE ID | CVE Title | Severity |
---|---|---|---|
3D Viewer | CVE-2021-43209 | 3D Viewer Remote Code Execution Vulnerability | Important |
3D Viewer | CVE-2021-43208 | 3D Viewer Remote Code Execution Vulnerability | Important |
Azure | CVE-2021-41373 | FSLogix Information Disclosure Vulnerability | Important |
Azure RTOS | CVE-2021-42303 | Azure RTOS Elevation of Privilege Vulnerability | Important |
Azure RTOS | CVE-2021-42302 | Azure RTOS Elevation of Privilege Vulnerability | Important |
Azure RTOS | CVE-2021-42301 | Azure RTOS Information Disclosure Vulnerability | Important |
Azure RTOS | CVE-2021-42323 | Azure RTOS Information Disclosure Vulnerability | Important |
Azure RTOS | CVE-2021-26444 | Azure RTOS Information Disclosure Vulnerability | Important |
Azure RTOS | CVE-2021-42304 | Azure RTOS Elevation of Privilege Vulnerability | Important |
Azure Sphere | CVE-2021-41374 | Azure Sphere Information Disclosure Vulnerability | Important |
Azure Sphere | CVE-2021-41376 | Azure Sphere Information Disclosure Vulnerability | Important |
Azure Sphere | CVE-2021-42300 | Azure Sphere Tampering Vulnerability | Important |
Azure Sphere | CVE-2021-41375 | Azure Sphere Information Disclosure Vulnerability | Important |
Micrοsoft Dynamics | CVE-2021-42316 | Micrοsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability | Critical |
Micrοsoft Edge (Chromium-based) in IE Mode | CVE-2021-41351 | Micrοsoft Edge (Chrome based) Spoofing on IE Mode | Important |
Micrοsoft Exchange Server | CVE-2021-42305 | Microsoft Exchange Server Spoofing Vulnerability | Important |
Microsoft Exchange Server | CVE-2021-41349 | Microsoft Exchange Server Spoofing Vulnerability | Important |
Micrοsoft Exchange Server | CVE-2021-42321 | Microsoft Exchange Server Remote Code Execution Vulnerability | Important |
Micrοsoft Office Access | CVE-2021-41368 | Microsoft Access Remote Code Execution Vulnerability | Important |
Microsoft Office Excel | CVE-2021-40442 | Microsoft Excel Remote Code Execution Vulnerability | Important |
Micrοsoft Office Excel | CVE-2021-42292 | Microsoft Excel Security Feature Bypass Vulnerability | Important |
Microsoft Office Word | CVE-2021-42296 | Microsoft Word Remote Code Execution Vulnerability | Important |
Micrοsoft Windows | CVE-2021-41356 | Windows Denial of Service Vulnerability | Important |
Microsoft Windows Codecs Library | CVE-2021-42276 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | Important |
Power BI | CVE-2021-41372 | Power BI Report Server Spoofing Vulnerability | Important |
Role: Windows Hyper-V | CVE-2021-42284 | Windows Hyper-V Denial of Service Vulnerability | Important |
Role: Windows Hyper-V | CVE-2021-42274 | Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability | Important |
Visual Studio | CVE-2021-3711 | OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow | Critical |
Visual Studio | CVE-2021-42319 | Visual Studio Elevation of Privilege Vulnerability | Important |
Visual Studio Code | CVE-2021-42322 | Visual Studio Code Elevation of Privilege Vulnerability | Important |
Windows Active Directory | CVE-2021-42278 | Active Directory Domain Services Elevation of Privilege Vulnerability | Important |
Windows Active Directory | CVE-2021-42291 | Active Directory Domain Services Elevation of Privilege Vulnerability | Important |
Windows Active Directory | CVE-2021-42287 | Active Directory Domain Services Elevation of Privilege Vulnerability | Important |
Windows Active Directory | CVE-2021-42282 | Active Directory Domain Services Elevation of Privilege Vulnerability | Important |
Windows COM | CVE-2021-42275 | Microsoft COM for Windows Remote Code Execution Vulnerability | Important |
Windows Core Shell | CVE-2021-42286 | Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability | Important |
Windows Cred SSProvider Protocol | CVE-2021-41366 | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability | Important |
Windows Defender | CVE-2021-42298 | Microsoft Defender Remote Code Execution Vulnerability | Critical |
Windows Desktop Bridge | CVE-2021-36957 | Windows Desktop Bridge Elevation of Privilege Vulnerability | Important |
Windows Diagnostic Hub | CVE-2021-42277 | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | Important |
Windows Fastfat Driver | CVE-2021-41377 | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability | Important |
Windows Feedback Hub | CVE-2021-42280 | Windows Feedback Hub Elevation of Privilege Vulnerability | Important |
Windows Hello | CVE-2021-42288 | Windows Hello Security Feature Bypass Vulnerability | Important |
Windows Installer | CVE-2021-41379 | Windows Installer Elevation of Privilege Vulnerability | Important |
Windows Kernel | CVE-2021-42285 | Windows Kernel Elevation of Privilege Vulnerability | Important |
Windows NTFS | CVE-2021-42283 | NTFS Elevation of Privilege Vulnerability | Important |
Windows NTFS | CVE-2021-41370 | NTFS Elevation of Privilege Vulnerability | Important |
Windows NTFS | CVE-2021-41378 | Windows NTFS Remote Code Execution Vulnerability | Important |
Windows NTFS | CVE-2021-41367 | NTFS Elevation of Privilege Vulnerability | Important |
Windows RDP | CVE-2021-38665 | Remote Desktop Protocol Client Information Disclosure Vulnerability | Important |
Windows RDP | CVE-2021-38631 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | Important |
Windows RDP | CVE-2021-38666 | Remote Desktop Client Remote Code Execution Vulnerability | Critical |
Windows RDP | CVE-2021-41371 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | Important |
Windows Scripting | CVE-2021-42279 | Chakra Scripting Engine Memory Corruption Vulnerability | Critical |
Windows Virtual Machine Bus | CVE-2021-26443 | Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability | Critical |
Πηγή: Bleeping Computer