关于应对Microsoft Windows SMB Server存在远程代码执行漏洞的通知

发布者:曹萍发布时间:2017-10-16浏览次数:2876

各校园网用户:

    近日,Microsoft Windows SMB Server被发现存在远程代码执行漏洞(CNVD-2017-29681,对应CVE-2017-11780),该漏洞如果被成功利用,远程攻击者可在目标系统上执行任意代码,或导致拒绝服务。该漏洞影响范围广,危害级别高,须高度重视。

一、影响范围:

1、桌面版:

Microsoft Windows 10 Version1607 for 32-bit Systems

Microsoft Windows 10 Version1607 for x64-based Systems

Microsoft Windows 10 for 32-bitSystems

Microsoft Windows 10 forx64-based Systems

Microsoft Windows 10 version1511 for 32-bit Systems

Microsoft Windows 10 version1511 for x64-based Systems

Microsoft Windows 10 version1703 for 32-bit Systems

Microsoft Windows 10 version1703 for x64-based Systems

Microsoft Windows 7 for 32-bitSystems SP1

Microsoft Windows 7 for x64-basedSystems SP1

Microsoft Windows 8.1 for32-bit Systems

Microsoft Windows 8.1 forx64-based Systems

Microsoft Windows RT 8.1

2、服务器版:

Microsoft Windows Server 2008R2 for Itanium-based Systems SP1

Microsoft Windows Server 2008R2 for x64-based Systems SP1

Microsoft Windows Server 2008for 32-bit Systems SP2

Microsoft Windows Server 2008for Itanium-based Systems SP2

Microsoft Windows Server 2008for x64-based Systems SP2

Microsoft Windows Server 2012

Microsoft Windows Server 2012R2

Microsoft Windows Server 2016

二、修复方案:

1、打开Windows Update功能,点击“检查更新”按钮,根据业务情况下载安装相关安全补丁,安装完毕重启电脑(服务器),检查系统运行情况。补丁链接:

https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/CVE-2017-0143

2、建议关停SMB服务或禁用445、139端口的入站访问。