"MS.SChannel.SSL.Packets.Handling.Code.Execution"
- 特征库ID:
39577
- 漏洞级别:
critical
- CVE ID:
CVE-2014-6321
- 建议的动作:
drop
- 受影响的系统:
Windows
- 协议:
tcp
攻击漏洞描述
这表示针对 Microsoft 安全通道 (Schannel) 安全包中的代码执行漏洞的攻击尝试。该漏洞是由易受攻击的软件处理特制数据包时的错误引起的。它允许远程攻击者通过精心制作的 SSL 数据包控制易受攻击的系统。
影响范围
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
可能带来的后果
系统被入侵:远程攻击者可以控制易受攻击的系统。
解决办法
应用供应商提供的最新升级或补丁。 http://technet.microsoft.com/security/bulletin/MS14-066