CNNVD-ID编号 | CNNVD-202008-548 |
CVE编号 | CVE-2020-1472 |
发布时间 | 2020-08-11 |
更新时间 | 2021-01-07 |
漏洞类型 | 其他 |
漏洞来源 | Tom Tervoort of Secura |
危险等级 | 超危 |
威胁类型 | 远程 |
厂 商 | N/A |
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Netlogon是一个用于为域控制器注册所有SRV资源记录的服务。
Microsoft Windows NetLogon中存在提权漏洞。攻击者可借助特制应用程序利用该漏洞获取管理员访问权限。以下产品及版本受到影响:Microsoft Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windows Server 2016,Windows Server 2019,Windows Server 1903版本,Windows Server 1909版本,Windows Server 2004版本。
目前厂商已发布升级了Microsoft Windows和Microsoft Windows Server 安全漏洞的补丁,Microsoft Windows和Microsoft Windows Server 安全漏洞的补丁获取链接:
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1472
来源:MLIST
来源:FEDORA
来源:FEDORA
来源:FEDORA
来源:CONFIRM
链接:https://www.synology.com/security/advisory/Synology_SA_20_21
来源:MISC
链接:https://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
来源:UBUNTU
来源:MISC
链接:https://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
来源:CERT-VN
来源:UBUNTU
来源:GENTOO
来源:UBUNTU
来源:N/A
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
来源:media.cert.europa.eu
链接:https://media.cert.europa.eu/static/SecurityAdvisories/2020/CERT-EU-SA2020-046.pdf
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
来源:www.ibm.com
来源:portal.msrc.microsoft.com
链接:https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1472
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Microsoft-Windows-vulnerabilities-of-August-2020-33057
来源:cxsecurity.com
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160823/Understanding-And-Exploiting-Zerologon.html
来源:www.huawei.com
链接:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20200925-01-netlogon-cn
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160507/Red-Hat-Security-Advisory-2020-5439-01.html
来源:www.nsfocus.net
来源:www.nsfocus.net
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160717/Gentoo-Linux-Security-Advisory-202012-24.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:vigilance.fr
来源:www.auscert.org.au
来源:www.exploit-db.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
来源:nvd.nist.gov
来源:www.kb.cert.org
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159207/Ubuntu-Security-Notice-USN-4510-2.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159414/Ubuntu-Security-Notice-USN-4559-1.html
暂无