Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞 || 安全通告

2025-01-08 14:08
146
安全通告

  免责声明

  在网络安全领域,技术文章应谨慎使用,遵守法律法规,严禁非法网络活动。未经授权,不得利用文中信息进行入侵。使用本文信息造成的任何后果,由使用者自行承担,希客安全及作者不负责。提供的工具仅限学习使用,严禁他用。

  CVE-2024-49113

  一、漏洞描述

  该漏洞产生的原因是Windows LDAP客户端在处理Netlogon Remote Protocol (NRPC)和LDAP客户端交互时,未能正确处理特制的LDAP响应。攻击者通过向目标服务器发送恶意RPC请求诱骗目标服务器向攻击者发送LDAP查询,从而导致信息泄露和服务器崩溃等危害。

  二、影响版本

  Windows Server 2012 R2 (Server Core installation)

  Windows Server 2012 R2

  Windows Server 2012 (Server Core installation)

  Windows Server 2012

  Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

  Windows Server 2008 R2 for x64-based Systems Service Pack 1

  Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

  Windows Server 2008 for x64-based Systems Service Pack 2

  Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

  Windows Server 2008 for 32-bit Systems Service Pack 2

  Windows Server 2016 (Server Core installation)

  Windows Server 2016

  Windows 10 Version 1607 for x64-based Systems

  Windows 10 Version 1607 for 32-bit Systems

  Windows 10 for x64-based Systems

  Windows 10 for 32-bit Systems

  Windows Server 2025

  Windows 11 Version 24H2 for x64-based Systems

  Windows 11 Version 24H2 for ARM64-based Systems

  Windows Server 2022, 23H2 Edition (Server Core installation)

  Windows 11 Version 23H2 for x64-based Systems

  Windows 11 Version 23H2 for ARM64-based Systems

  Windows Server 2025 (Server Core installation)

  Windows 10 Version 22H2 for 32-bit Systems

  Windows 10 Version 22H2 for ARM64-based Systems

  Windows 10 Version 22H2 for x64-based Systems

  Windows 11 Version 22H2 for x64-based Systems

  Windows 11 Version 22H2 for ARM64-based Systems

  Windows 10 Version 21H2 for x64-based Systems

  Windows 10 Version 21H2 for ARM64-based Systems

  Windows 10 Version 21H2 for 32-bit Systems

  Windows Server 2022 (Server Core installation)

  Windows Server 2022

  Windows Server 2019 (Server Core installation)

  Windows Server 2019

  Windows 10 Version 1809 for x64-based Systems

  Windows 10 Version 1809 for 32-bit Systems

  三、修复方案

  Windows自动更新

  Windows系统默认启用 Microsoft Update,当检测到可用更新时,将会自动下载更新并在下一次启动时安装。还可通过以下步骤快速安装更新:

  1、点击“开始菜单”或按Windows快捷键,点击进入“设置”;

  2、选择“更新和安全”,进入“Windows更新”(Windows Server 2012以及Windows Server 2012 R2可通过控制面板进入“Windows更新”,步骤为“控制面板”-> “系统和安全”->“Windows更新”);

  3、选择“检查更新”,等待系统将自动检查并下载可用更新;

  4、重启计算机,安装更新。

  手动安装补丁

  另外,对于不能自动更新的系统版本,可参考以下链接下载适用于该系统的补丁并安装:

  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113

  四、参考文献

  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113

稀客原创,如有转载,请声明原文来源!!!