全部产品

【漏洞公告】微软“周二补丁日”—2018年05月

更新时间:2018-05-10 15:05:19

美国时间2018年5月8日,微软发布其漏洞安全公告。 本月的安全公告涉及67个新漏洞,其中21个评级为重要,其中42个评级为重要,4个评级为严重性低。 这些漏洞影响Outlook,Office,Exchange,Edge,Internet Explorer等。

其中重点关注13个远程代码执行漏洞

  • GitHub CVE-2018-8115 Windows Host Compute Service Shim 远程代码执行漏洞
  • Microsoft Office CVE-2018-8161 Microsoft Office 远程代码执行漏洞
  • Microsoft Office CVE-2018-8162 Microsoft Excel 远程代码执行漏洞
  • Microsoft Office CVE-2018-8173 Microsoft InfoPath 远程代码执行漏洞
  • Microsoft Office CVE-2018-8147 Microsoft Excel 远程代码执行漏洞
  • Microsoft Office CVE-2018-8148 Microsoft Excel 远程代码执行漏洞
  • Microsoft Office CVE-2018-8157 Microsoft Office 远程代码执行漏洞
  • Microsoft Office CVE-2018-8158 Microsoft Office 远程代码执行漏洞
  • Microsoft Windows CVE-2018-8136 Windows 远程代码执行漏洞
  • Microsoft Windows CVE-2018-8174 Windows VBScript Engine 远程代码执行漏洞
  • Windows COM CVE-2018-0824 Microsoft COM for Windows 远程代码执行漏洞
  • Windows Hyper-V CVE-2018-0959 Hyper-V 远程代码执行漏洞
  • Windows Hyper-V CVE-2018-0961 Hyper-V vSMB 远程代码执行漏洞

阿里云提示企业用户关注,并根据自身业务情况安排补丁升级。 具体公告详情如下:

漏洞影响范围:

本次漏洞公告涉及到的微软产品:

  • NET Framework
  • Adobe Flash Player
  • Azure
  • Common Log File System Driver
  • Device Guard、GitHub
  • Internet Explorer
  • Microsoft Browsers
  • Microsoft Edge
  • Microsoft Exchange Server
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Scripting Engine
  • Microsoft Windows
  • Windows COM
  • Windows Hyper-V以及Windows Kernel

严重漏洞:

  • CVE-2018-8174 - Windows VBScript Engine Remote Code Execution Vulnerability
  • CVE-2018-0959 - Hyper-V Remote Code Execution Vulnerability
  • CVE-2018-0961 - Hyper-V vSMB Remote Code Execution Vulnerability
  • CVE-2018-8115 - Windows Host Compute Service Shim Remote Code Execution Vulnerability
  • CVE-2018-8178 - Microsoft Browser Memory Corruption Vulnerability
  • CVE-2018-0946 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0951 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0953 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0954 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0955 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8114 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8122 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8137 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0945 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-1022 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8139 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8128 - Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8133 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-0943 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8130 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8177 - Chakra Scripting Engine Memory Corruption Vulnerability

高危漏洞:

  • CVE-2018-8120 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8123 - Microsoft Edge Memory Corruption Vulnerability
  • CVE-2018-8124 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8147 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8148 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8157 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8158 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8161 - Microsoft Office Remote Code Execution Vulnerability
  • CVE-2018-8162 - Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2018-8164 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8165 - DirectX Graphics Kernel Elevation of Privilege Vulnerability
  • CVE-2018-8166 - Win32k Elevation of Privilege Vulnerability
  • CVE-2018-8167 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
  • CVE-2018-8179 - Microsoft Edge Memory Corruption Vulnerability
  • CVE-2018-0765 - .NET and .NET Core Denial of Service Vulnerability
  • CVE-2018-0824 - Microsoft COM for Windows Remote Code Execution Vulnerability
  • CVE-2018-0854 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-0958 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-1021 - Microsoft Edge Information Disclosure Vulnerability
  • CVE-2018-1025 - Microsoft Browser Information Disclosure Vulnerability
  • CVE-2018-1039 - .NET Framework Device Guard Security Feature Bypass Vulnerability
  • CVE-2018-8112 - Microsoft Edge Security Feature Bypass Vulnerability
  • CVE-2018-8119 - Azure IoT SDK Spoofing Vulnerability
  • CVE-2018-8126 - Internet Explorer Security Feature Bypass Vulnerability
  • CVE-2018-8127 - Windows Kernel Information Disclosure Vulnerability
  • CVE-2018-8129 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-8132 - Windows Security Feature Bypass Vulnerability
  • CVE-2018-8134 - Windows Elevation of Privilege Vulnerability
  • CVE-2018-8141 - Windows Kernel Information Disclosure Vulnerability
  • CVE-2018-8145 - Chakra Scripting Engine Memory Corruption Vulnerability
  • CVE-2018-8149 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8150 - Microsoft Outlook Security Feature Bypass Vulnerability
  • CVE-2018-8151 - Microsoft Exchange Memory Corruption Vulnerability
  • CVE-2018-8152 - Microsoft Exchange Server Elevation of Privilege Vulnerability
  • CVE-2018-8155 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8156 - Microsoft SharePoint Elevation of Privilege Vulnerability
  • CVE-2018-8159 - Microsoft Exchange Elevation of Privilege Vulnerability
  • CVE-2018-8160 - Microsoft Outlook Information Disclosure Vulnerability
  • CVE-2018-8163 - Microsoft Excel Information Disclosure Vulnerability
  • CVE-2018-8170 - Windows Image Elevation of Privilege Vulnerability
  • CVE-2018-8173 - Microsoft InfoPath Remote Code Execution Vulnerability
  • CVE-2018-8897 - Windows Kernel Elevation of Privilege Vulnerability

安全建议:

  • 阿里云安全团队建议用户关注,并根据业务情况择机更新补丁,以提高服务器安全性;
  • 建议不要在企业业务系统上安装与业务无关的软件,例如:Office、其他办公软件。防止被黑客利用;
  • 建议用户打开Windows Update功能,然后点击“检查更新”按钮,根据业务情况下载安装相关安全补丁,安装完毕后重启服务器,检查系统运行情况。

    注意:在更新安装升级前,建议做好测试工作,并务必做好数据备份和快照,防止出现意外。

    情报来源:

  • https://blog.talosintelligence.com/2018/05/microsoft-patch-tuesday-may-2018.html