发布日期:2024-01-09
更新日期:2024-01-10
受影响系统:
Microsoft Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Microsoft Windows Server 2022(Server Core installation)
Microsoft Microsoft Windows Server 2022
Microsoft Microsoft Windows Server 2019(Server Core installation)
Microsoft Microsoft Windows Server 2019
Microsoft Microsoft Windows Server 2016(Server Core installation)
Microsoft Microsoft Windows Server 2016
Microsoft Microsoft Windows Server 2012(Server Core installation)
Microsoft Microsoft Windows Server 2012 R2(Server Core installati
Microsoft Microsoft Windows Server 2012 R2
Microsoft Microsoft Windows Server 2012
Microsoft Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Microsoft Windows Server 2008 for 32-bit Systems SP2(Se
Microsoft Microsoft Windows Server 2008 for 32-bit Systems SP2
描述:
CVE(CAN) ID: CVE-2024-20655
Microsoft Windows Online Certificate Status Protocol (OCSP)是用于获取X.509数字证书撤销状态的网际协议,作为证书吊销列表(CRL)的替代品解决了在公开密钥基础建设中使用证书吊销列表而带来的多个问题。
Microsoft Windows Online Certificate Status Protocol (OCSP)存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。
< **>
建议:
厂商补丁:
Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-20655
浏览次数:48
严重程度:0(网友投票)