安全公告编号:cnta-2021-0026
2021年9月8日,国家信息安全漏洞共享平台(cnvd)收录了microsoft mshtml远程代码执行漏洞(cnvd-2021-69088,对应cve-2021-40444)。攻击者利用该漏洞,可在未授权的情况下远程执行代码。目前,漏洞利用细节已在小范围公开,微软公司暂未发布补丁修复该漏洞。cnvd建议受影响用户按照临时防范措施缓解漏洞攻击威胁。
一、漏洞情况分析
mshtml(又称trident)是微软windows操作系统internet explorer(ie)浏览器的排版组件。软件开发人员使用该组件,可以在应用中快速实现网页浏览功能。mshtml除应用于ie浏览器、ie内核浏览器外,还在office的word、excel和powerpoint文档中用来呈现web托管内容。
9月7日,微软公司发布了针对microsoft mshtml远程代码执行漏洞的紧急安全公告。攻击者利用该漏洞,通过精心构造包含可被加载的恶意 activex控件的microsoft office文件,并诱导受害者打开文档,从而触发此漏洞。未经身份验证的攻击者利用该漏洞,可获得受害者的当前用户权限,以该用户权限执行任意代码。
cnvd对该漏洞的综合评级为“高危”。
二、漏洞影响范围
漏洞影响的产品版本包括:
windows 7 for x64-based systems service pack 1
windows 7 for 32-bit systems service pack 1
windows server 2012 r2 (server core installation)
windows server 2012 r2
windows server 2012 (server core installation)
windows server 2012
windows server 2008 r2 for x64-based systems service pack 1 (server core installation)
windows server 2008 r2 for x64-based systems service pack 1
windows server 2008 for x64-based systems service pack 2 (server core installation)
windows server 2008 for x64-based systems service pack 2
windows server 2008 for 32-bit systems service pack 2 (server core installation)
windows server 2008 for 32-bit systems service pack 2
windows rt 8.1
windows 8.1 for x64-based systems
windows 8.1 for 32-bit systems
windows server 2016 (server core installation)
windows server 2016
windows 10 version 1607 for x64-based systems
windows 10 version 1607 for 32-bit systems
windows 10 for x64-based systems
windows 10 for 32-bit systems
windows server, version 20h2 (server core installation)
windows 10 version 20h2 for arm64-based systems
windows 10 version 20h2 for 32-bit systems
windows 10 version 20h2 for x64-based systems
windows server, version 2004 (server core installation)
windows 10 version 2004 for x64-based systems
windows 10 version 2004 for arm64-based systems
windows 10 version 2004 for 32-bit systems
windows server 2022 (server core installation)
windows server 2022
windows 10 version 21h1 for 32-bit systems
windows 10 version 21h1 for arm64-based systems
windows 10 version 21h1 for x64-based systems
windows 10 version 1909 for arm64-based systems
windows 10 version 1909 for x64-based systems
windows 10 version 1909 for 32-bit systems
windows server 2019 (server core installation)
windows server 2019
windows 10 version 1809 for arm64-based systems
windows 10 version 1809 for x64-based systems
windows 10 version 1809 for 32-bit systems
三、漏洞处置建议
目前,微软公司暂未发布补丁程序修复该漏洞。cnvd建议受影响用户谨慎访问来源不明的office文件或网页链接,具备一定专业知识的用户可通过更改注册表配置禁用activex控件(建议操作前先做备份),并及时关注厂商的更新公告。
附:参考链接:
感谢cnvd技术组支撑单位——奇安信科技集团股份有限公司、北京天融信网络安全技术有限公司为本报告提供的尊龙凯时平台入口的技术支持。