阿里云
发表主题 回复主题
  • 5438阅读
  • 1回复

[安全漏洞公告专区]【漏洞公告】微软“周二补丁日”—2018年05月

级别: 论坛版主
发帖
240
云币
471
美国时间2018年5月8日,微软发布其漏洞安全公告。 本月的安全公告涉及67个新漏洞,其中21个评级为重要,其中42个评级为重要,4个评级为严重性低。 这些漏洞影响Outlook,Office,Exchange,Edge,Internet Explorer等。 CQH^VTQ  
^tI4FQ>Y  
S0?e/VWy  
其中重点关注13个远程代码执行漏洞 -=)+)9~G  
GitHub                    CVE-2018-8115    Windows Host Compute Service Shim 远程代码执行漏洞 9b)'vr*Hy7  
Microsoft Office    CVE-2018-8161    Microsoft Office 远程代码执行漏洞 p/KG{-f,  
Microsoft Office    CVE-2018-8162    Microsoft Excel 远程代码执行漏洞 X 1}U  
Microsoft Office    CVE-2018-8173    Microsoft InfoPath 远程代码执行漏洞 SbH} cu8  
Microsoft Office    CVE-2018-8147    Microsoft Excel 远程代码执行漏洞 QG5)mIJ  
Microsoft Office    CVE-2018-8148    Microsoft Excel 远程代码执行漏洞 w$ jq2?l  
Microsoft Office    CVE-2018-8157    Microsoft Office 远程代码执行漏洞 :a_MT  
Microsoft Office    CVE-2018-8158    Microsoft Office 远程代码执行漏洞 )Tw A?kj  
Microsoft Windows    CVE-2018-8136    Windows 远程代码执行漏洞 RSIhZYA  
Microsoft Windows    CVE-2018-8174    Windows VBScript Engine 远程代码执行漏洞 U|v@v@IBA  
Windows COM    CVE-2018-0824    Microsoft COM for Windows 远程代码执行漏洞 UDV6 ##$  
Windows Hyper-V    CVE-2018-0959    Hyper-V 远程代码执行漏洞 (VBO1f  
Windows Hyper-V    CVE-2018-0961    Hyper-V vSMB 远程代码执行漏洞 OhTd>~R`<  
Y.E]U!i*  
>z k6{kC  
阿里提示企业用户关注,并根据身业务情况安排补丁升级。 具体公告详情如下:    rvPmd%nk-  
O[z-K K<  
Gg6<4T1  
漏洞影响范围: 4\m#:fj %  
本次漏洞公告涉及到的微软产品: IQ5'4zQg=  
NET Framework、Adobe Flash Player、Azure、Common Log File System Driver、Device Guard、GitHub、Internet Explorer、Microsoft Browsers、Microsoft Edge、Microsoft Exchange Server、Microsoft Graphics Component、Microsoft Office、Microsoft Scripting Engine、Microsoft Windows、Windows COM、Windows Hyper-V以及Windows Kernel。 ;2'/rEq4o  
lLN5***47J  
~> S? m;  
严重漏洞: 5wb R}`8  
  • CVE-2018-8174 - Windows VBScript Engine Remote Code Execution Vulnerability
  • CVE-2018-0959 - Hyper-V Remote Code Execution Vulnerability
  • CVE-2018-0961 - Hyper-V vSMB Remote Code Execution Vulnerability
  • CVE-2018-8115 - Windows Host Compute Service Shim Remote Code Execution Vulnerability
  • CVE-2018-8178 - Microsoft Browser Memory Corruption Vulnerability
  • CVE-2018-0946 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0951 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0953 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0954 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0955 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8114 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8122 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8137 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0945 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-1022 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8139 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8128 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8133 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0943 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8130 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8177 - Chakra Scripting Engine Memory Corruption Vulnerability
QQQN}!xPj  
'@WS7`@-y  
,AyQCUz{*?  
高危漏洞: /,JL \b  
!~te&ccPE  
  • CVE-2018-8120 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8123 - Microsoft Edge Memory Corruption Vulnerability
  • CVE-2018-8124 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8147 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8148 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8157 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8158 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8161 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8162 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8164 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8165 - DirectX Graphics Kernel Elevation of Privilege Vulnerability
  • CVE-2018-8166 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8167 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
  • CVE-2018-8179 - Microsoft Edge Memory Corruption Vulnerability
  • CVE-2018-0765 - .NET and .NET Core Denial of Service Vulnerability
  • CVE-2018-0824 - Microsoft COM for Windows Remote Code Execution Vulnerability
  • CVE-2018-0854 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-0958 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-1021 - Microsoft Edge Information Disclosure Vulnerability
  • CVE-2018-1025 - Microsoft Browser Information Disclosure Vulnerability
  • CVE-2018-1039 - .NET Framework Device Guard Security Feature Bypass Vulnerability
  • CVE-2018-8112 - Microsoft Edge Security Feature Bypass Vulnerability
  • CVE-2018-8119 - Azure IoT SDK Spoofing Vulnerability
  • CVE-2018-8126 - Internet Explorer Security Feature Bypass Vulnerability
  • CVE-2018-8127 - Windows Kernel Information Disclosure Vulnerability
  • CVE-2018-8129 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-8132 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-8134 - Windows Elevation of Privilege Vulnerability
  • CVE-2018-8141 - Windows Kernel Information Disclosure Vulnerability
  • CVE-2018-8145 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8149 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8150 - Microsoft Outlook Security Feature Bypass Vulnerability
  • CVE-2018-8151 - Microsoft Exchange Memory Corruption Vulnerability
  • CVE-2018-8152 - Microsoft Exchange Server Elevation of Privilege Vulnerability
  • CVE-2018-8155 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8156 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8159 - Microsoft Exchange Elevation of Privilege Vulnerability
  • CVE-2018-8160 - Microsoft Outlook Information Disclosure Vulnerability
  • CVE-2018-8163 - Microsoft Excel Information Disclosure Vulnerability
  • CVE-2018-8170 - Windows Image Elevation of Privilege Vulnerability
  • CVE-2018-8173 - Microsoft InfoPath Remote Code Execution Vulnerability
  • CVE-2018-8897 - Windows Kernel Elevation of Privilege Vulnerability
6&6t=  
安全建议
  1. 阿里安全团队建议用户关注,并根据业务情况择机更新补丁,以提高服务安全性;
  2. 建议不要在企业业务系统安装与业务无关的软件,例如:Office、其他办公软件。防止被黑客利用;
  3. 建议用户打开Windows Update功能,然后点击“检查更新”按钮,根据业务情况下载安装相关安全补丁,安装完毕后重启服务器,检查系统运行情况。
注意:在更新安装升级前,建议做好测试工作,并务必做好数据备份和快照,防止出现意外。 情报来源: %h& F  
  • https://blog.talosintelligence.com/2018/05/microsoft-patch-tuesday-may-2018.html
5N$O  
[ 此帖被正禾在2018-05-10 15:06重新编辑 ]
级别: 新人
发帖
1
云币
1
只看该作者 沙发  发表于: 06-14
Re【漏洞公告】微软“周二补丁日”—2018年05月
楼主,你好!   %D E_kwL  
@^,9O92l  
请问一下, LteZ7e  
微软“周二补丁日”—2018年06月的 安全公告一般什么时间发出来?  
发表主题 回复主题
« 返回列表上一主题下一主题

限100 字节
批量上传需要先选择文件,再选择上传
 
验证问题: 阿里云官网域名是什么? 正确答案:www.aliyun.com
上一个 下一个