【漏洞通告】2021年10月关于微软多个产品高危漏洞通告

2021.10.18

摘要

近日,微软官方发布了多个安全漏洞的公告,包括Microsoft Exchange Server 权限许可和访问控制问题漏洞(CNNVD-202110-795、CVE-2021-26427)、Microsoft Office 代码注入漏洞(CNNVD-202110-856、CVE-2021-40479)等多个漏洞。成功利用上述漏洞的攻击者可以在目标系统上执行任意代码、获取用户数据,提升权限等。微软多个产品和系统受漏洞影响。目前,微软官方已经发布了漏洞修复补丁,建议用户及时确认是否受到漏洞影响,尽快采取修补措施。

一、漏洞介绍

2021年10月13日,微软发布了2021年10月份安全更新,共69个漏洞的补丁程序,CNNVD对这些漏洞进行了收录。本次更新主要涵盖了Microsoft Windows 和 Windows 组件、Microsoft Edge、Exchange Server、.NET Core 和 Visual Studio、Microsoft Office、SharePoint Server、Microsoft Dynamics、InTune、System Center Operations Manager等。本月微软月度更新修复的漏洞中,严重程度为关键(Critical)的漏洞有3个,重要(Important)漏洞有70个,其中包括4个0day漏洞:

  • Win32k 权限提升漏洞(CVE-2021-40449)

  • Windows DNS Server 远程代码执行漏洞(CVE-2021-40469)

  • Windows Kernel 权限提升漏洞(CVE-2021-41335)

  • Windows AppContainer 防火墙规则安全功能绕过漏洞(CVE-2021-41338)

请相关用户尽快更新补丁进行防护,完整漏洞列表请参考附录。,具体影响范围可访问https://portal.msrc.microsoft.com/zh-cn/security-guidance查询。

二、重点漏洞概述

根据产品流行度和漏洞重要性筛选出此次更新中包含影响较大的漏洞,请相关用户重点进行关注:

Windows Hyper-V 远程代码执行漏洞(CVE-2021-38672/ CVE-2021-40461):

Windows Hyper-V是Microsoft的本地虚拟机管理程序,guest VM可读取主机中的内核内存与在自身VM上发生的内存分配错误,低权限的攻击者可发送特制的请求在目标系统上执行任意代码。官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-38672
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-40461

Win32k 权限提升漏洞(CVE-2021-40449):

Win32k中存在一个NtGdiResetDC 函数,攻击者在该函数释放之后可以设置用户模式回调;拥有低权限的攻击者通过执行意外的 API 函数可实现权限提升,目前已检测到该漏洞被在野利用。官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40449

Windows Print Spooler 欺骗漏洞(CVE-2021-36970):

Windows打印后台服务中存在漏洞,在用户交互的情况下,未经身份验证攻击者可以利用该漏洞在目标主机上远程执行代码。官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36970

Microsoft Exchange Server 远程代码执行漏洞(CVE-2021-26427):

经过身份验证的攻击者可通过相邻网络对受影响的Exchange服务器进行攻击,可在目标服务器端实现远程代码执行。官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26427

Microsoft Word 远程代码执行漏洞(CVE-2021-40486):

攻击者可通过制作恶意的Word文档,当成功诱导用户在受影响的系统上打开恶意文档后,可在目标系统上以该用户权限执行任意代码,预览窗格也被列为攻击媒介。官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-40486

WindowsDNS server远程代码执行漏洞(CVE-2021-40469):

在服务器配置为DNS服务器的情况下,攻击者可利用此漏洞实现在目标系统上以 SYSTEM 权限远程代码执行,且不需要用户交互,目前漏洞细节已公开。官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40469

以下为重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。

漏洞编号

受影响产品版本

CVE-2021-38672

Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 11 for x64-based Systems

CVE-2021-40461

Windows Server, version 20H2 (Server Core   Installation)
Windows Server, version 2004 (Server Core   installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019  (Server Core installation)
Windows Server 2019
Windows 11 for x64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1809 for x64-based Systems

CVE-2021-40449
CVE-2021-36970

Windows Server, version 20H2 (Server Core   Installation)
Windows Server, version 2004 (Server Core   installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 for x64-based Systems Service   Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service   Pack 2
Windows Server 2008 for 32-bit Systems Service Pack   2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack   2
Windows Server 2008 R2 for x64-based Systems Service   Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service   Pack 1
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows 11 for x64-based Systems
Windows 11 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H1 for   ARM64-based   Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for   ARM64-based   Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for   ARM64-based   Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for   ARM64-based   Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems

CVE-2021-26427

Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2013 Cumulative Update 23

CVE-2021-40486

Microsoft Word 2016 (64-bit   edition)
Microsoft Word 2016 (32-bit   edition)
    Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 Service   Pack 1 (32-bit   editions)
Microsoft Word 2013 RT   Service Pack 1
    Microsoft SharePoint Server 2019
Microsoft SharePoint   Enterprise Server 2016
Microsoft SharePoint   Enterprise Server 2013   Service Pack 1
Microsoft Office Web Apps   Server 2013 Service   Pack 1
Microsoft Office Online   Server
Microsoft Office 2019 for   64-bit editions
Microsoft Office 2019 for   32-bit editions

CVE-2021-40469

Windows Server, version 2004 (Server Core   installation)
Windows Server 2022 (Server   Core   installation)
Windows Server 2022
Windows Server, version 20H2 (Server Core   Installation)
Windows Server 2019 (Server   Core   installation)
    Windows Server 2019
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service   Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service   Pack 1
Windows Server 2008 for x64-based Systems Service   Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service   Pack 2
Windows Server 2008 for 32-bit Systems Service Pack   2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack   2
Windows Server 2016 (Server   Core   installation)
Windows Server 2016

三、漏洞详情

此次更新共包括69个漏洞的补丁程序,其中超危漏洞1个,高危漏洞41个,中危漏洞26个,低危漏洞1个。

序号漏洞名称CNNVD编号CVE编号危害等级官方链接
1Microsoft  Exchange Server 权限许可和访问控制问题漏洞CNNVD-202110-795CVE-2021-26427超危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26427
2Microsoft Windows AppX  Deployment Extensions权限许可和访问控制问题漏洞CNNVD-202110-788CVE-2021-41347高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41347
3Microsoft Win32k 权限许可和访问控制问题漏洞CNNVD-202110-789CVE-2021-41357高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41357
4Microsoft Windows Storage  Spaces Controller 权限许可和访问控制问题漏洞CNNVD-202110-793CVE-2021-41345高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41345
5Microsoft Exchange Server  权限许可和访问控制问题漏洞CNNVD-202110-794CVE-2021-41348高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41348
6Microsoft Exchange Server  输入验证错误漏洞CNNVD-202110-797CVE-2021-34453高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34453
7Microsoft Graphics  Components 代码注入漏洞CNNVD-202110-801CVE-2021-41340高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41340
8Microsoft Windows Desktop  Bridge 权限许可和访问控制问题漏洞CNNVD-202110-804CVE-2021-41334高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41334
9Microsoft Windows Kernel 权限许可和访问控制问题漏洞CNNVD-202110-806CVE-2021-41335高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41335
10Microsoft Windows Codecs 代码注入漏洞CNNVD-202110-808CVE-2021-41331高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41331
11Microsoft Windows Codecs 代码注入漏洞CNNVD-202110-809CVE-2021-41330高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41330
12Microsoft Windows Storage  Spaces Controller 权限许可和访问控制问题漏洞CNNVD-202110-811CVE-2021-40489高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489
13Microsoft Windows Event  Tracing权限许可和访问控制问题漏洞CNNVD-202110-812CVE-2021-40477高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40477
14Microsoft Windows Storage  Spaces Controller 权限许可和访问控制问题漏洞CNNVD-202110-813CVE-2021-40478高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478
15Microsoft Windows 代码注入漏洞CNNVD-202110-814CVE-2021-40469高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40469
16Microsoft Windows Common  Log File System Driver 权限许可和访问控制问题漏洞CNNVD-202110-815CVE-2021-40467高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40467
17Microsoft Windows Common  Log File System Driver 权限许可和访问控制问题漏洞CNNVD-202110-817CVE-2021-40466高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466
18Microsoft Windows 权限许可和访问控制问题漏洞CNNVD-202110-819CVE-2021-40464高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40464
19Microsoft Windows 输入验证错误漏洞CNNVD-202110-820CVE-2021-40463高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40463
20Microsoft Windows  AppContainer 权限许可和访问控制问题漏洞CNNVD-202110-821CVE-2021-40476高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40476
21Microsoft Windows Codecs  Library 代码注入漏洞CNNVD-202110-822CVE-2021-40462高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40462
22Microsoft Windows 代码注入漏洞CNNVD-202110-823CVE-2021-40465高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40465
23Microsoft Hyper-V 代码注入漏洞CNNVD-202110-824CVE-2021-40461高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40461
24Microsoft Win32k 缓冲区错误漏洞CNNVD-202110-828CVE-2021-40449高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449
25Microsoft Hyper-V 代码注入漏洞CNNVD-202110-830CVE-2021-38672高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38672
26Microsoft Windows Print  Spooler Components 安全漏洞CNNVD-202110-833CVE-2021-36970高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36970
27Microsoft Windows 输入验证错误漏洞CNNVD-202110-836CVE-2021-36953高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953
28Microsoft Windows Storage  Spaces Controller 权限许可和访问控制问题漏洞CNNVD-202110-840CVE-2021-26441高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26441
29Microsoft Office和Microsoft  SharePoint 代码注入漏洞CNNVD-202110-842CVE-2021-41344高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41344
30Microsoft Office和Microsoft  SharePoint 代码注入漏洞CNNVD-202110-846CVE-2021-40487高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40487
31Microsoft Office和Microsoft  SharePoint 安全漏洞CNNVD-202110-849CVE-2021-40484高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40484
32Microsoft Office 安全漏洞CNNVD-202110-851CVE-2021-40483高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40483
33Microsoft Office 代码注入漏洞CNNVD-202110-856CVE-2021-40479高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40479
34Microsoft Office 代码注入漏洞CNNVD-202110-858CVE-2021-40474高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40474
35Microsoft Office 代码注入漏洞CNNVD-202110-859CVE-2021-40473高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40473
36Microsoft Office 代码注入漏洞CNNVD-202110-860CVE-2021-40471高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40471
37Microsoft Office 代码注入漏洞CNNVD-202110-863CVE-2021-40485高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40485
38Microsoft Office 代码注入漏洞CNNVD-202110-865CVE-2021-40486高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40486
39Microsoft Office 代码注入漏洞CNNVD-202110-866CVE-2021-40480高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40480
40Microsoft Windows 权限许可和访问控制问题漏洞CNNVD-202110-869CVE-2021-40470高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470
41Microsoft Office 代码注入漏洞CNNVD-202110-870CVE-2021-40481高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40481
42Microsoft System Center  Operations Manager 信息泄露漏洞CNNVD-202110-874CVE-2021-41352高危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41352
43Microsoft Active  Directory Federation Services 安全漏洞CNNVD-202110-787CVE-2021-41361中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41361
44Microsoft Windows 安全特征问题特征问题漏洞CNNVD-202110-791CVE-2021-41346中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41346
45Microsoft Exchange Server  跨站脚本漏洞CNNVD-202110-792CVE-2021-41350中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41350
46Microsoft Windows 信息泄露漏洞CNNVD-202110-796CVE-2021-41343中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41343
47Microsoft Windows MSHTML  Platform 代码注入漏洞CNNVD-202110-798CVE-2021-41342中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41342
48Microsoft DWM Core  Library权限许可和访问控制问题漏洞CNNVD-202110-800CVE-2021-41339中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41339
49Microsoft Windows  AppContainer 安全特征问题特征问题漏洞CNNVD-202110-802CVE-2021-41338中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41338
50Microsoft Windows Kernel 信息泄露漏洞CNNVD-202110-803CVE-2021-41336中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41336
51Microsoft Windows 安全特征问题特征问题漏洞CNNVD-202110-805CVE-2021-41337中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41337
52Microsoft Windows Print  Spooler Components 信息泄露漏洞CNNVD-202110-807CVE-2021-41332中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41332
53Microsoft Windows Storage  Spaces Controller 权限许可和访问控制问题漏洞CNNVD-202110-810CVE-2021-40488中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488
54Microsoft Windows 信息泄露漏洞CNNVD-202110-816CVE-2021-40468中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40468
55Microsoft Windows Cloud Files  Mini Filter Driver 信息泄露漏洞CNNVD-202110-818CVE-2021-40475中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40475
56Microsoft Windows Remote  Procedure Call Runtime安全特征问题特征问题漏洞CNNVD-202110-825CVE-2021-40460中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40460
57Microsoft Windows Server 安全特征问题特征问题漏洞CNNVD-202110-826CVE-2021-40456中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40456
58Microsoft Windows  Installer 安全漏洞CNNVD-202110-827CVE-2021-40455中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40455
59Microsoft Win32k 权限许可和访问控制问题漏洞CNNVD-202110-829CVE-2021-40450中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40450
60Microsoft Windows exFAT  File System 信息泄露漏洞CNNVD-202110-831CVE-2021-38663中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38663
61Microsoft Windows信息泄露漏洞CNNVD-202110-832CVE-2021-38662中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38662
62Microsoft Windows Common  Log File System Driver 权限许可和访问控制问题漏洞CNNVD-202110-834CVE-2021-40443中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40443
63Microsoft HTTP.sys 权限许可和访问控制问题漏洞CNNVD-202110-835CVE-2021-26442中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26442
64Microsoft Office 信息泄露漏洞CNNVD-202110-853CVE-2021-40482中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40482
65Microsoft Dynamics 365和Microsoft  Dynamics 跨站脚本漏洞CNNVD-202110-857CVE-2021-40457中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40457
66Microsoft Office 信息泄露漏洞CNNVD-202110-861CVE-2021-40472中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40472
67Microsoft Dynamics 365和Microsoft  Dynamics 跨站脚本漏洞CNNVD-202110-871CVE-2021-41354中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41354
68Microsoft Dynamics 365和Microsoft  Dynamics 安全漏洞CNNVD-202110-873CVE-2021-41353中危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41353
69Microsoft Intune 安全特征问题特征问题漏洞CNNVD-202110-896CVE-2021-41363低危https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41363

四、修复建议

目前微软官方已针对受支持的产品版本发布了修复以上漏洞的安全补丁,强烈建议受影响用户尽快安装补丁进行防护,官方下载链接:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-Oct

注:由于网络问题、计算机环境问题等原因,Windows Update的补丁更新可能出现失败。用户在安装补丁后,应及时检查补丁是否成功更新。右键点击Windows图标,选择“设置(N)”,选择“更新和安全”-“Windows更新”,查看该页面上的提示信息,也可点击“查看更新历史记录”查看历史更新情况。针对未成功安装的更新,可点击更新名称跳转到微软官方下载页面,建议用户点击该页面上的链接,转到“Microsoft更新目录”网站下载独立程序包并安装。