/tmp/phpjDxAOd

我們都知道這些年來很多單位一直在推廣 IPv6

希望借此可以解決未來可見的 IPv4 不夠使用的問題

但這麼多年來,我們還是無法認真的去使用 IPv6

甚至於 ~ 為了省下諸多麻煩事,我們只有在萬不得以的情況下才會轉向使用 IPv6

說起麻煩事 ~~~就一定要提這個微軟致今還沒公告的資安通報

通報編號為 CVE-2024-38063

 

適用的對象為 所有現行運作中的 Windows 系統

 

內容為

Windows 的 TCP/IP 網路堆棧中,存在一個嚴重的遠程代碼執行漏洞

惡意者可透過 IPv6 傳送封包針對對應 Windows 系統進行攻擊,進而在無任何認證狀態下啟動該系統的遠端程式碼

目前微軟還沒有推出相關補救的更新封包來解決此問題

 

因此應對的方式應該就只剩下禁用 IPv6 服務,全面轉回 IPv4

各別系統如何禁用,我這邊就不教學了

有能力開啟的人必定有能力關上

這部分是更新

微軟為其各版本作業系統提供解決此問題的更新包了

理論上系統更新功能中安裝後便可解決

如果系統更新檢查沒看到的,可在底下列表找到對應的檔案下載連結

ug 13, 2024

Windows 11 Version 24H2 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.26100.1457
Aug 13, 2024
Windows Server 2012 R2 (Server Core installation)
-
Remote Code Execution
Critical
  • 6.3.9600.22134
Aug 13, 2024
Windows Server 2012 R2
-
Remote Code Execution
Critical
  • 6.3.9600.22134
Aug 13, 2024
Windows Server 2012 (Server Core installation)
-
Remote Code Execution
Critical
  • 6.2.9200.25031
Aug 13, 2024
Windows Server 2012
-
Remote Code Execution
Critical
  • 6.2.9200.25031
Aug 13, 2024
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
-
Remote Code Execution
Critical
  • 6.1.7601.27277
  • 6.1.7601.27277
Aug 13, 2024
Windows Server 2008 R2 for x64-based Systems Service Pack 1
-
Remote Code Execution
Critical
  • 6.1.7601.27277
  • 6.1.7601.27277
Aug 13, 2024
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
-
Remote Code Execution
Critical
  • 6.0.6003.22825
  • 6.0.6003.22825
Aug 13, 2024
Windows Server 2008 for x64-based Systems Service Pack 2
-
Remote Code Execution
Critical
  • 6.0.6003.22825
  • 6.0.6003.22825
Aug 13, 2024
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
-
Remote Code Execution
Critical
  • 6.0.6003.22825
  • 6.0.6003.22825
Aug 13, 2024
Windows Server 2008 for 32-bit Systems Service Pack 2
-
Remote Code Execution
Critical
  • 6.0.6003.22825
  • 6.0.6003.22825
Aug 13, 2024
Windows Server 2016 (Server Core installation)
-
Remote Code Execution
Critical
  • 10.0.14393.7259
Aug 13, 2024
Windows Server 2016
-
Remote Code Execution
Critical
  • 10.0.14393.7259
Aug 13, 2024
Windows 10 Version 1607 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.14393.7259
Aug 13, 2024
Windows 10 Version 1607 for 32-bit Systems
-
Remote Code Execution
Critical
  • 10.0.14393.7259
Aug 13, 2024
Windows 10 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.10240.20751
Aug 13, 2024
Windows 10 for 32-bit Systems
-
Remote Code Execution
Critical
  • 10.0.10240.20751
Aug 13, 2024
Windows Server 2022, 23H2 Edition (Server Core installation)
-
Remote Code Execution
Critical
  • 10.0.25398.1085
Aug 13, 2024
Windows 11 Version 23H2 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.22631.4037
Aug 13, 2024
Windows 11 Version 23H2 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.22631.4037
Aug 13, 2024
Windows 10 Version 22H2 for 32-bit Systems
-
Remote Code Execution
Critical
  • 10.0.19045.4780
Aug 13, 2024
Windows 10 Version 22H2 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.19045.4780
Aug 13, 2024
Windows 10 Version 22H2 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.19045.4780
Aug 13, 2024
Windows 11 Version 22H2 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.22621.4037
Aug 13, 2024
Windows 11 Version 22H2 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.22621.4037
Aug 13, 2024
Windows 10 Version 21H2 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.19044.4780
Aug 13, 2024
Windows 10 Version 21H2 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.19044.4780
Aug 13, 2024
Windows 10 Version 21H2 for 32-bit Systems
-
Remote Code Execution
Critical
  • 10.0.19044.4780
Aug 13, 2024
Windows 11 version 21H2 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.22000.3147
Aug 13, 2024
Windows 11 version 21H2 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.22000.3147
Aug 13, 2024
Windows Server 2022 (Server Core installation)
-
Remote Code Execution
Critical
  • 10.0.20348.2655
Aug 13, 2024
Windows Server 2022
-
Remote Code Execution
Critical
  • 10.0.20348.2655
Aug 13, 2024
Windows Server 2019 (Server Core installation)
-
Remote Code Execution
Critical
  • 10.0.17763.6189
Aug 13, 2024
Windows Server 2019
-
Remote Code Execution
Critical
  • 10.0.17763.6189
Aug 13, 2024
Windows 10 Version 1809 for ARM64-based Systems
-
Remote Code Execution
Critical
  • 10.0.17763.6189
Aug 13, 2024
Windows 10 Version 1809 for x64-based Systems
-
Remote Code Execution
Critical
  • 10.0.17763.6189
Aug 13, 2024
Windows 10 Version 1809 for 32-bit Systems
-
Remote Code Execution
Critical
  • 10.0.17763.6189

就這樣算是結案了

如果因為關上導致內網的 IP 數量問題,建議您趁此機會想個備案

因為沒意外的話,下半年度外部稽核時可能會被問及此問題

以上簡單報告完畢 ~ 各位勞苦功高的 IT 們辛苦了

 

針對 CrowdStrike 更新出包造成全球客戶大當機事件,微軟推出官方修正工具包 

[免費] nomoreransom 多種勒索病毒解除工具軟體下載 (更新至 2024 年版) 

ASUS ExpertBook B5 (B5404CMA) 輕 薄 堅固 新一代 AI 技術加持 更加十項全能 為專業人士設計的 AI 商務筆電 開箱小聊 

SHARP AQUOS wish4 實測篇 

Waymax X7 Pro 電動滑板車 帶著我穿梭都會小巷的超便利代步小車 簡單開箱 

 

如果您想贊助提神良方,鼓勵編輯部更努力 (低銷 50)

可以點我前往 或是掃 QR CODE

想要跟我們聊天,請加入傻瓜狐狸的粉絲團

原文發表於傻瓜狐狸的雜碎物品

01


arrow
arrow
    全站熱搜
    創作者介紹
    創作者 傻瓜狐狸 的頭像
    傻瓜狐狸

    傻瓜狐狸的雜碎物品

    傻瓜狐狸 發表在 痞客邦 留言(0) 人氣()