关于微软RDL服务高危远程代码执行漏洞(CVE-2024-38077)的预警提示 |
发布时间:2024-08-12 浏览次数:1900 |
一、漏洞详情 Windows远程桌面许可服务远程代码执行漏洞CVE-2024-38077,漏洞威胁等级:高危。未经认证的攻击者可利用该漏洞远程执行代码,获取服务器控制权限。 建议受影响用户做好资产自查以及预防工作,以免遭受黑客攻击。 二、影响范围 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2025 Preview 三、修复建议 微软公司已发布补丁修复该漏洞:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077 对于暂无法安装更新补丁的情况,微软公司建议在确认RDL服务非必要的前提下,采取关闭RDL服务等临时防范措施。 |