微軟于周二發(fā)布了12月安全更新補(bǔ)丁,修復(fù)了39個(gè)從簡(jiǎn)單的欺騙攻擊到遠(yuǎn)程執(zhí)行代碼的安全問(wèn)題,產(chǎn)品涉及.NET Framework、Adobe Flash Player、Internet Explorer、Microsoft Dynamics、Mi2crosoft Exchange Server、Microsoft Graphics Component、Microsoft Office、Microsoft Office SharePoint、Microsoft Scripting Engine、Microsoft Windows、Microsoft Windows DNS、Visual Studio、Windows Authentication Methods、Windows Azure Pack、Windows Kernel以及Windows Kernel-Mode Drivers。
漏洞概述
相關(guān)信息如下(紅色部分威脅相對(duì)比較高):
產(chǎn)品 | CVE?編號(hào) | CVE?標(biāo)題 |
.NET Framework | CVE-2018-8517 | .NET Framework Denial Of Service Vulnerability |
.NET Framework | CVE-2018-8540 | .NET Framework Remote Code Injection Vulnerability |
Adobe Flash Player | ADV180031 | December 2018 Adobe Flash 安全更新 |
Internet Explorer | CVE-2018-8619 | Internet Explorer 遠(yuǎn)程代碼執(zhí)行漏洞 |
Internet Explorer | CVE-2018-8631 | Internet Explorer 內(nèi)存破壞漏洞 |
Microsoft Dynamics | CVE-2018-8651 | Microsoft Dynamics NAV Cross Site Scripting Vulnerability |
Microsoft Exchange Server | CVE-2018-8604 | Microsoft Exchange Server Tampering Vulnerability |
Microsoft Graphics Component | CVE-2018-8595 | Windows GDI 信息泄露漏洞 |
Microsoft Graphics Component | CVE-2018-8596 | Windows GDI 信息泄露漏洞 |
Microsoft Graphics Component | CVE-2018-8638 | DirectX 信息泄露漏洞 |
Microsoft Graphics Component | CVE-2018-8639 | Win32k 特權(quán)提升漏洞 |
Microsoft Office | CVE-2018-8587 | Microsoft Outlook 遠(yuǎn)程代碼執(zhí)行漏洞 |
Microsoft Office | CVE-2018-8597 | Microsoft Excel 遠(yuǎn)程代碼執(zhí)行漏洞 |
Microsoft Office | CVE-2018-8598 | Microsoft Excel 信息泄露漏洞 |
Microsoft Office | CVE-2018-8627 | Microsoft Excel 信息泄露漏洞 |
Microsoft Office | CVE-2018-8628 | Microsoft PowerPoint 遠(yuǎn)程代碼執(zhí)行漏洞 |
Microsoft Office | CVE-2018-8636 | Microsoft Excel 遠(yuǎn)程代碼執(zhí)行漏洞 |
Microsoft Office SharePoint | CVE-2018-8580 | Microsoft SharePoint 信息泄露漏洞 |
Microsoft Office SharePoint | CVE-2018-8635 | Microsoft SharePoint Server 特權(quán)提升漏洞 |
Microsoft Scripting Engine | CVE-2018-8583 | Chakra Scripting Engine 內(nèi)存破壞漏洞 |
Microsoft Scripting Engine | CVE-2018-8617 | Chakra Scripting Engine 內(nèi)存破壞漏洞 |
Microsoft Scripting Engine | CVE-2018-8618 | Chakra Scripting Engine 內(nèi)存破壞漏洞 |
Microsoft Scripting Engine | CVE-2018-8624 | Chakra Scripting Engine 內(nèi)存破壞漏洞 |
Microsoft Scripting Engine | CVE-2018-8625 | Windows VBScript Engine 遠(yuǎn)程代碼執(zhí)行漏洞 |
Microsoft Scripting Engine | CVE-2018-8629 | Chakra Scripting Engine 內(nèi)存破壞漏洞 |
Microsoft Scripting Engine | CVE-2018-8643 | Scripting Engine 內(nèi)存破壞漏洞 |
Microsoft Windows | CVE-2018-8649 | Windows 拒絕服務(wù)漏洞 |
Microsoft Windows DNS | CVE-2018-8514 | Remote Procedure Call runtime 信息泄露漏洞 |
Microsoft Windows DNS | CVE-2018-8626 | Windows DNS Server Heap Overflow Vulnerability |
Visual Studio | CVE-2018-8599 | Diagnostics Hub Standard Collector Service 特權(quán)提升漏洞 |
Windows Authentication Methods | CVE-2018-8634 | Microsoft Text-To-Speech 遠(yuǎn)程代碼執(zhí)行漏洞 |
Windows Azure Pack | CVE-2018-8652 | Windows Azure Pack Cross Site Scripting Vulnerability |
Windows Kernel | CVE-2018-8477 | Windows Kernel 信息泄露漏洞 |
Windows Kernel | CVE-2018-8611 | Windows Kernel 特權(quán)提升漏洞 |
Windows Kernel | CVE-2018-8612 | Connected User Experiences and Telemetry Service 拒絕服務(wù)漏洞 |
Windows Kernel | CVE-2018-8621 | Windows Kernel 信息泄露漏洞 |
Windows Kernel | CVE-2018-8622 | Windows Kernel 信息泄露漏洞 |
Windows Kernel | CVE-2018-8637 | Win32k 信息泄露漏洞 |
Windows Kernel-Mode Drivers | CVE-2018-8641 | Win32k 特權(quán)提升漏洞 |
修復(fù)建議
微軟官方已經(jīng)發(fā)布更新補(bǔ)丁,請(qǐng)及時(shí)進(jìn)行補(bǔ)丁更新。