MS.Windows.HTTP.Protocol.Stack.CVE-2022-21907.Code.Execution
- 特征库ID:
51127
- 漏洞级别:
critical
- CVE ID:
CVE-2022-21907
- 建议的动作:
drop
- 受影响的系统:
Windows
- 协议:
攻击漏洞描述
这表明攻击企图利用 Microsoft HTTP 协议栈中的远程代码执行漏洞。该漏洞是由于处理精心设计的 HTTP 请求时协议中的边界检查条件不正确造成的。远程攻击者可能能够利用此漏洞通过精心设计的 HTTP 请求在应用程序上下文中执行任意代码。
影响范围
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 11 for x64-based Systems
Windows 11 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
可能带来的后果
系统被入侵:远程攻击者可以控制易受攻击的系统。
解决办法
应用供应商提供的最新升级或补丁。 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21907