cnvd-2023-44304
Vulnerability from cnvd
Title: Microsoft Windows DNS远程代码执行漏洞(CNVD-2023-44304)
Description:
Microsoft Windows DNS是美国微软(Microsoft)公司的一个域名解析服务。域名系统(DNS)是包含TCP / IP的行业标准协议套件之一,并且DNS客户端和DNS服务器共同为计算机和用户提供计算机名称到IP地址的映射名称解析服务。
Microsoft Windows DNS存在远程代码执行漏洞,攻击者可利用该漏洞导致远程代码执行。
Severity: 高
Patch Name: Microsoft Windows DNS远程代码执行漏洞(CNVD-2023-44304)的补丁
Patch Description:
Microsoft Windows DNS是美国微软(Microsoft)公司的一个域名解析服务。域名系统(DNS)是包含TCP / IP的行业标准协议套件之一,并且DNS客户端和DNS服务器共同为计算机和用户提供计算机名称到IP地址的映射名称解析服务。
Microsoft Windows DNS存在远程代码执行漏洞,攻击者可利用该漏洞导致远程代码执行。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255
Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255
Impacted products
Name | ['Microsoft Windows Server 2008 R2 SP1', 'Microsoft Windows Server 2008 SP2', 'Microsoft Windows Server 2016', 'Microsoft Windows Server 2019', 'Microsoft Windows Server 2012', 'Microsoft Windows Server 2022', 'Microsoft Windows Server 2012 R2'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2023-28255", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-28255" } }, "description": "Microsoft Windows DNS\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u57df\u540d\u89e3\u6790\u670d\u52a1\u3002\u57df\u540d\u7cfb\u7edf\uff08DNS\uff09\u662f\u5305\u542bTCP / IP\u7684\u884c\u4e1a\u6807\u51c6\u534f\u8bae\u5957\u4ef6\u4e4b\u4e00\uff0c\u5e76\u4e14DNS\u5ba2\u6237\u7aef\u548cDNS\u670d\u52a1\u5668\u5171\u540c\u4e3a\u8ba1\u7b97\u673a\u548c\u7528\u6237\u63d0\u4f9b\u8ba1\u7b97\u673a\u540d\u79f0\u5230IP\u5730\u5740\u7684\u6620\u5c04\u540d\u79f0\u89e3\u6790\u670d\u52a1\u3002\n\nMicrosoft Windows DNS\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2023-44304", "openTime": "2023-06-08", "patchDescription": "Microsoft Windows DNS\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u57df\u540d\u89e3\u6790\u670d\u52a1\u3002\u57df\u540d\u7cfb\u7edf\uff08DNS\uff09\u662f\u5305\u542bTCP / IP\u7684\u884c\u4e1a\u6807\u51c6\u534f\u8bae\u5957\u4ef6\u4e4b\u4e00\uff0c\u5e76\u4e14DNS\u5ba2\u6237\u7aef\u548cDNS\u670d\u52a1\u5668\u5171\u540c\u4e3a\u8ba1\u7b97\u673a\u548c\u7528\u6237\u63d0\u4f9b\u8ba1\u7b97\u673a\u540d\u79f0\u5230IP\u5730\u5740\u7684\u6620\u5c04\u540d\u79f0\u89e3\u6790\u670d\u52a1\u3002\r\n\r\nMicrosoft Windows DNS\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Microsoft Windows DNS\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2023-44304\uff09\u7684\u8865\u4e01", "products": { "product": [ "Microsoft Windows Server 2008 R2 SP1", "Microsoft Windows Server 2008 SP2", "Microsoft Windows Server 2016", "Microsoft Windows Server 2019", "Microsoft Windows Server 2012", "Microsoft Windows Server 2022", "Microsoft Windows Server 2012 R2" ] }, "referenceLink": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255", "serverity": "\u9ad8", "submitTime": "2023-04-13", "title": "Microsoft Windows DNS\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2023-44304\uff09" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…