阿里云
发表主题 回复主题
  • 5473阅读
  • 1回复

[安全漏洞公告专区]【漏洞公告】微软“周二补丁日”—2018年05月

级别: 论坛版主
发帖
240
云币
471
美国时间2018年5月8日,微软发布其漏洞安全公告。 本月的安全公告涉及67个新漏洞,其中21个评级为重要,其中42个评级为重要,4个评级为严重性低。 这些漏洞影响Outlook,Office,Exchange,Edge,Internet Explorer等。 A578g  
(IAc*V~  
(r&e|  
其中重点关注13个远程代码执行漏洞 ^8_`IT  
GitHub                    CVE-2018-8115    Windows Host Compute Service Shim 远程代码执行漏洞 SUSam/xeg"  
Microsoft Office    CVE-2018-8161    Microsoft Office 远程代码执行漏洞 qDOJ;> I  
Microsoft Office    CVE-2018-8162    Microsoft Excel 远程代码执行漏洞 l7rGz2:?  
Microsoft Office    CVE-2018-8173    Microsoft InfoPath 远程代码执行漏洞 M<f=xY2$v  
Microsoft Office    CVE-2018-8147    Microsoft Excel 远程代码执行漏洞 1QfOD-lv  
Microsoft Office    CVE-2018-8148    Microsoft Excel 远程代码执行漏洞 1|_8+)i;  
Microsoft Office    CVE-2018-8157    Microsoft Office 远程代码执行漏洞 N8$MAW  
Microsoft Office    CVE-2018-8158    Microsoft Office 远程代码执行漏洞 z8#c!h<@;  
Microsoft Windows    CVE-2018-8136    Windows 远程代码执行漏洞 ?*I _'2  
Microsoft Windows    CVE-2018-8174    Windows VBScript Engine 远程代码执行漏洞 &9Vm3X  
Windows COM    CVE-2018-0824    Microsoft COM for Windows 远程代码执行漏洞 P #_8$#G3  
Windows Hyper-V    CVE-2018-0959    Hyper-V 远程代码执行漏洞 6bL"ZOEu  
Windows Hyper-V    CVE-2018-0961    Hyper-V vSMB 远程代码执行漏洞 }v0IzGKs  
D,aJ`PK~  
5W0'r'{  
阿里提示企业用户关注,并根据身业务情况安排补丁升级。 具体公告详情如下:    nN|zEw]  
n&?]GyQ  
?K<m.+4b*y  
漏洞影响范围: hFC4CqBV  
本次漏洞公告涉及到的微软产品: =y3gnb6  
NET Framework、Adobe Flash Player、Azure、Common Log File System Driver、Device Guard、GitHub、Internet Explorer、Microsoft Browsers、Microsoft Edge、Microsoft Exchange Server、Microsoft Graphics Component、Microsoft Office、Microsoft Scripting Engine、Microsoft Windows、Windows COM、Windows Hyper-V以及Windows Kernel。 l)PEg PSRV  
91oIxW  
{.W$<y (j7  
严重漏洞: mp_(ke  
  • CVE-2018-8174 - Windows VBScript Engine Remote Code Execution Vulnerability
  • CVE-2018-0959 - Hyper-V Remote Code Execution Vulnerability
  • CVE-2018-0961 - Hyper-V vSMB Remote Code Execution Vulnerability
  • CVE-2018-8115 - Windows Host Compute Service Shim Remote Code Execution Vulnerability
  • CVE-2018-8178 - Microsoft Browser Memory Corruption Vulnerability
  • CVE-2018-0946 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0951 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0953 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0954 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0955 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8114 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8122 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8137 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0945 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-1022 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8139 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8128 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8133 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0943 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8130 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8177 - Chakra Scripting Engine Memory Corruption Vulnerability
Sb&sW?M  
Zi+>#kDV  
2<$C6J0HM  
高危漏洞: |?c v5l7E  
RvL-SI%E  
  • CVE-2018-8120 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8123 - Microsoft Edge Memory Corruption Vulnerability
  • CVE-2018-8124 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8147 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8148 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8157 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8158 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8161 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8162 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8164 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8165 - DirectX Graphics Kernel Elevation of Privilege Vulnerability
  • CVE-2018-8166 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8167 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
  • CVE-2018-8179 - Microsoft Edge Memory Corruption Vulnerability
  • CVE-2018-0765 - .NET and .NET Core Denial of Service Vulnerability
  • CVE-2018-0824 - Microsoft COM for Windows Remote Code Execution Vulnerability
  • CVE-2018-0854 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-0958 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-1021 - Microsoft Edge Information Disclosure Vulnerability
  • CVE-2018-1025 - Microsoft Browser Information Disclosure Vulnerability
  • CVE-2018-1039 - .NET Framework Device Guard Security Feature Bypass Vulnerability
  • CVE-2018-8112 - Microsoft Edge Security Feature Bypass Vulnerability
  • CVE-2018-8119 - Azure IoT SDK Spoofing Vulnerability
  • CVE-2018-8126 - Internet Explorer Security Feature Bypass Vulnerability
  • CVE-2018-8127 - Windows Kernel Information Disclosure Vulnerability
  • CVE-2018-8129 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-8132 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-8134 - Windows Elevation of Privilege Vulnerability
  • CVE-2018-8141 - Windows Kernel Information Disclosure Vulnerability
  • CVE-2018-8145 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8149 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8150 - Microsoft Outlook Security Feature Bypass Vulnerability
  • CVE-2018-8151 - Microsoft Exchange Memory Corruption Vulnerability
  • CVE-2018-8152 - Microsoft Exchange Server Elevation of Privilege Vulnerability
  • CVE-2018-8155 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8156 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8159 - Microsoft Exchange Elevation of Privilege Vulnerability
  • CVE-2018-8160 - Microsoft Outlook Information Disclosure Vulnerability
  • CVE-2018-8163 - Microsoft Excel Information Disclosure Vulnerability
  • CVE-2018-8170 - Windows Image Elevation of Privilege Vulnerability
  • CVE-2018-8173 - Microsoft InfoPath Remote Code Execution Vulnerability
  • CVE-2018-8897 - Windows Kernel Elevation of Privilege Vulnerability
G0sg\]  
安全建议
  1. 阿里安全团队建议用户关注,并根据业务情况择机更新补丁,以提高服务安全性;
  2. 建议不要在企业业务系统安装与业务无关的软件,例如:Office、其他办公软件。防止被黑客利用;
  3. 建议用户打开Windows Update功能,然后点击“检查更新”按钮,根据业务情况下载安装相关安全补丁,安装完毕后重启服务器,检查系统运行情况。
注意:在更新安装升级前,建议做好测试工作,并务必做好数据备份和快照,防止出现意外。 情报来源: Qp{rAAC:  
  • https://blog.talosintelligence.com/2018/05/microsoft-patch-tuesday-may-2018.html
U=<E,tM  
[ 此帖被正禾在2018-05-10 15:06重新编辑 ]
级别: 新人
发帖
1
云币
1
只看该作者 沙发  发表于: 06-14
Re【漏洞公告】微软“周二补丁日”—2018年05月
楼主,你好!   @].Ko[P~  
)W&H{2No  
请问一下, YQ>M&lnQ<  
微软“周二补丁日”—2018年06月的 安全公告一般什么时间发出来?  
发表主题 回复主题
« 返回列表上一主题下一主题

限100 字节
如果您提交过一次失败了,可以用”恢复数据”来恢复帖子内容
 
验证问题: 阿里云官网域名是什么? 正确答案:www.aliyun.com
上一个 下一个