¡¾Îó²îͨ¸æ¡¿Win32kÌØÈ¨ÌáÉýÎó²î£¨CVE-2023-29336£©
Ðû²¼Ê±¼ä 2023-06-09Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-29336 | ·¢Ã÷ʱ¼ä | 2023-05-10 |
Àà ÐÍ | ȨÏÞÌáÉý | µÈ ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍâµØ | ËùÐèȨÏÞ | µÍ |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÒѹûÕæ | ÔÚҰʹÓà | ÒÑ·¢Ã÷ |
6ÔÂ9ÈÕ£¬£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨VSRC¼à²âµ½Win32k ÌØÈ¨ÌáÉýÎó²î£¨CVE-2023-29336£¬£¬£¬£¬CVSSÆÀ·Ö7.8£©µÄÎó²îϸ½Ú¼°POC£¨ÊÊÓÃÓÚWindows Server 2016£©ÔÚ»¥ÁªÍøÉϹûÕæ¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑÔÚ5ÔÂ9ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬ÏÖÔÚÒѾ¼ì²âµ½Îó²îʹÓᣡ£¡£¡£¡£¡£
Win32k×Óϵͳ£¨Win32k.sysÄÚºËÇý¶¯³ÌÐò£©ÖÎÀí²Ù×÷ϵͳµÄ´°¿ÚÖÎÀíÆ÷¡¢ÆÁÄ»Êä³ö¡¢ÊäÈëºÍͼÐΣ¬£¬£¬£¬²¢×÷ΪÖÖÖÖÊäÈëÓ²¼þÖ®¼äµÄ½Ó¿Ú¡£¡£¡£¡£¡£¡£
Win32kÄÚºËÇý¶¯³ÌÐòÖб£´æÈ¨ÏÞÌáÉýÎó²î£¬£¬£¬£¬ÓÉÓÚWin32kÖÐֻרעÓÚËø¶¨´°¿Ú¹¤¾ß£¬£¬£¬£¬ÎÞÒâÖкöÂÔÁËËø¶¨Ç¶Ì×ÔÚ´°¿Ú¹¤¾ßÖеIJ˵¥¹¤¾ß£¬£¬£¬£¬¿ÉÒÔͨ¹ý¸ü¸ÄϵͳÄÚ´æÖеÄÌØ¶¨µØµãÀ´¿ØÖƲ˵¥¹¤¾ß£¬£¬£¬£¬ÒÔ»ñµÃÓëÆô¶¯ËüµÄ³ÌÐòÏàͬ¼¶±ðµÄ»á¼ûȨÏÞ£¬£¬£¬£¬²¢Í¨¹ýÆäËü²Ù×÷ʵÏÖ½«È¨ÏÞÌáÉýΪSYSTEM¡£¡£¡£¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
¸ÃÎó²îÒÑÔÚ΢Èí5ÔÂÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉʵʱװÖò¹¶¡¡£¡£¡£¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336
3.2 ÔÝʱ²½·¥
ÔÝÎÞ¡£¡£¡£¡£¡£¡£
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.numencyber.com/cve-2023-29336-win32k-analysis/
https://www.bleepingcomputer.com/news/security/poc-released-for-windows-win32k-bug-exploited-in-attacks/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-06-09 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 c7c7ÓéÀÖÆ½Ì¨¼ò½é
c7c7ÓéÀÖÆ½Ì¨½¨ÉèÓÚ1996Ä꣬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°c7c7ÓéÀÖÆ½Ì¨´óÏ㬣¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£¡£
5.2 ¹ØÓÚc7c7ÓéÀÖÆ½Ì¨
c7c7ÓéÀÖÆ½Ì¨Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ