¡¾Îó²îͨ¸æ¡¿Win32kÌØÈ¨ÌáÉýÎó²î£¨CVE-2023-29336£©

Ðû²¼Ê±¼ä 2023-06-09

Ò»¡¢Îó²î¸ÅÊö

CVE   ID

CVE-2023-29336

·¢Ã÷ʱ¼ä

2023-05-10

Àà    ÐÍ

ȨÏÞÌáÉý

µÈ    ¼¶

¸ßΣ

¹¥»÷ÏòÁ¿

ÍâµØ

ËùÐèȨÏÞ

µÍ

¹¥»÷ÖØÆ¯ºó

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

ÒѹûÕæ

ÔÚҰʹÓÃ

ÒÑ·¢Ã÷

 

6ÔÂ9ÈÕ £¬£¬ £¬£¬£¬£¬¿­Ê±K66VSRC¼à²âµ½Win32k ÌØÈ¨ÌáÉýÎó²î£¨CVE-2023-29336 £¬£¬ £¬£¬£¬£¬CVSSÆÀ·Ö7.8£©µÄÎó²îϸ½Ú¼°POC£¨ÊÊÓÃÓÚWindows Server 2016£©ÔÚ»¥ÁªÍøÉϹûÕæ¡£ ¡£¡£¡£¡£Î¢ÈíÒÑÔÚ5ÔÂ9ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î £¬£¬ £¬£¬£¬£¬ÏÖÔÚÒѾ­¼ì²âµ½Îó²îʹÓᣠ¡£¡£¡£¡£

Win32k×Óϵͳ£¨Win32k.sysÄÚºËÇý¶¯³ÌÐò£©ÖÎÀí²Ù×÷ϵͳµÄ´°¿ÚÖÎÀíÆ÷¡¢ÆÁÄ»Êä³ö¡¢ÊäÈëºÍͼÐÎ £¬£¬ £¬£¬£¬£¬²¢×÷ΪÖÖÖÖÊäÈëÓ²¼þÖ®¼äµÄ½Ó¿Ú¡£ ¡£¡£¡£¡£

Win32kÄÚºËÇý¶¯³ÌÐòÖб£´æÈ¨ÏÞÌáÉýÎó²î £¬£¬ £¬£¬£¬£¬ÓÉÓÚWin32kÖÐֻרעÓÚËø¶¨´°¿Ú¹¤¾ß £¬£¬ £¬£¬£¬£¬ÎÞÒâÖкöÂÔÁËËø¶¨Ç¶Ì×ÔÚ´°¿Ú¹¤¾ßÖеIJ˵¥¹¤¾ß £¬£¬ £¬£¬£¬£¬¿ÉÒÔͨ¹ý¸ü¸ÄϵͳÄÚ´æÖеÄÌØ¶¨µØµãÀ´¿ØÖƲ˵¥¹¤¾ß £¬£¬ £¬£¬£¬£¬ÒÔ»ñµÃÓëÆô¶¯ËüµÄ³ÌÐòÏàͬ¼¶±ðµÄ»á¼ûȨÏÞ £¬£¬ £¬£¬£¬£¬²¢Í¨¹ýÆäËü²Ù×÷ʵÏÖ½«È¨ÏÞÌáÉýΪSYSTEM¡£ ¡£¡£¡£¡£

 

¶þ¡¢Ó°Ïì¹æÄ£

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

 

Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

¸ÃÎó²îÒÑÔÚ΢Èí5ÔÂÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´ £¬£¬ £¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉʵʱװÖò¹¶¡¡£ ¡£¡£¡£¡£

ÏÂÔØÁ´½Ó£º

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336

3.2 ÔÝʱ²½·¥

ÔÝÎÞ¡£ ¡£¡£¡£¡£

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡ £¬£¬ £¬£¬£¬£¬ïÔ̭ϵͳÎó²î £¬£¬ £¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£ ¡£¡£¡£¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ £¬£¬ £¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ £¬£¬ £¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ £¬£¬ £¬£¬£¬£¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø £¬£¬ £¬£¬£¬£¬ïÔÌ­¹¥»÷Ãæ¡£ ¡£¡£¡£¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ· £¬£¬ £¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£ ¡£¡£¡£¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí £¬£¬ £¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò £¬£¬ £¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£ ¡£¡£¡£¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£ ¡£¡£¡£¡£

3.4 ²Î¿¼Á´½Ó

https://www.numencyber.com/cve-2023-29336-win32k-analysis/

https://www.bleepingcomputer.com/news/security/poc-released-for-windows-win32k-bug-exploited-in-attacks/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-06-09

Ê×´ÎÐû²¼

  

Îå¡¢¸½Â¼

5.1 ¿­Ê±K66¼ò½é

¿­Ê±K66½¨ÉèÓÚ1996Äê £¬£¬ £¬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£ ¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£ ¡£¡£¡£¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¿­Ê±K66´óÏà £¬£¬ £¬£¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË £¬£¬ £¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£ ¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö £¬£¬ £¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£ ¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£ ¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´ £¬£¬ £¬£¬£¬£¬¿­Ê±K66ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ £¬£¬ £¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ £¬£¬ £¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£ ¡£¡£¡£¡£

5.2 ¹ØÓÚ¿­Ê±K66

¿­Ê±K66Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯ £¬£¬ £¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î £¬£¬ £¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£ ¡£¡£¡£¡£

¹Ø×¢ÎÒÃÇ£º

image.png