خانه » CVE-2024-43627

CVE-2024-43627

آسیب‌پذیری اجرای کد از راه دور (Remote Code Execution) در خدمات تلفنی ویندوز (Windows Telephony Service)

توسط Vulnerbyte_Alerts

چکیده

این آسیب‌پذیری مربوط به عملکرد نامشخصی در بخش خدمات تلفنی (Telephony Service) است. ایجاد تغییرات در ورودی منجر به سرریز مبتنی بر هیپ (heap-based overflow) می‌شود. در اثر این آسیب پذیری حمله می‌تواند  از راه دور انجام شود.

توضیحات

این آسیب پذیری در دسته CWE-122 طبقه‌بندی می‌شود. شرایط سرریز هیپ یک نوع سرریز بافر است که در آن بافر قابل نوشتن در بخش هیپ حافظه تخصیص می‌یابد، که معمولاً به این معنی است که بافر با استفاده از تابعی مانند malloc() تخصیص داده شده است. این مشکل می‌تواند بر محرمانگی، یکپارچگی و دسترس‌پذیری تأثیر بگذارد.

اکسپلویت این آسیب‌پذیری به نظر ساده می‌رسد.  برای یک اکسپلویت موفق هیچ نوع احراز هویتی لازم نیست. برای موفقیت در اکسپلویت، قربانی باید نوعی تعامل با کاربر انجام دهد.

CVSS

Score Severity Version Vector String
8.8 HIGH 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

لیست محصولات آسیب پذیر

Versions Platforms Product
affected from 10.0.17763.0 before 10.0.17763.6532 32-bit Systems, x64-based Systems

 

Windows 10 Version 1809

 

affected from 10.0.17763.0 before 10.0.17763.6532 x64-based Systems

 

Windows Server 2019

 

affected from 10.0.17763.0 before 10.0.17763.6532 x64-based Systems

 

Windows Server 2019 (Server Core installation)

 

affected from 10.0.20348.0 before 10.0.20348.2849 x64-based Systems

 

Windows Server 2022

 

affected from 10.0.19043.0 before 10.0.19044.5131 32-bit Systems, ARM64-based Systems, x64-based Systems

 

Windows 10 Version 21H2

 

affected from 10.0.22621.0 before 10.0.22621.4460 ARM64-based Systems, x64-based Systems

 

Windows 11 version 22H2

 

affected from 10.0.19045.0 before 10.0.19045.5131 x64-based Systems, ARM64-based Systems, 32-bit Systems

 

Windows 10 Version 22H2

 

affected from 10.0.22631.0 before 10.0.22631.4460 ARM64-based Systems

 

Windows 11 version 22H3

 

affected from 10.0.22631.0 before 10.0.22631.4460 x64-based Systems

 

Windows 11 Version 23H2

 

affected from 10.0.25398.0 before 10.0.25398.1251 x64-based Systems

 

Windows Server 2022, 23H2 Edition (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2314 ARM64-based Systems, x64-based Systems

 

Windows 11 Version 24H2

 

affected from 10.0.10240.0 before 10.0.10240.20826 32-bit Systems, x64-based Systems

 

Windows 10 Version 1507

 

affected from 10.0.14393.0 before 10.0.14393.7515 32-bit Systems, x64-based Systems

 

Windows 10 Version 1607

 

affected from 10.0.14393.0 before 10.0.14393.7515 x64-based Systems

 

Windows Server 2016

 

affected from 10.0.14393.0 before 10.0.14393.7515 x64-based Systems

 

Windows Server 2016 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.22966 32-bit Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.0.6003.0 before 6.0.6003.22966 32-bit Systems, x64-based Systems

 

Windows Server 2008 Service Pack 2 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.22966 x64-based Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.1.7601.0 before 6.1.7601.27415 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1

 

affected from 6.1.7601.0 before 6.1.7601.27415 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1 (Server Core installation)

 

affected from 6.2.9200.0 before 6.2.9200.25165 x64-based Systems

 

Windows Server 2012

 

affected from 6.2.9200.0 before 6.2.9200.25165 x64-based Systems

 

Windows Server 2012 (Server Core installation)

 

affected from 6.3.9600.0 before 6.3.9600.22267 x64-based Systems

 

Windows Server 2012 R2

 

affected from 6.3.9600.0 before 6.3.9600.22267 x64-based Systems

 

Windows Server 2012 R2 (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2314 x64-based Systems

 

Windows Server 2025

 

affected from 10.0.26100.0 before 10.0.26100.2314 x64-based Systems

 

Windows Server 2025 (Server Core installation)

 

لیست محصولات بروز شده

Product Impact Max Severity Build Number
Windows Server 2025 (Server Core installation) Remote Code Execution Important 10.0.26100.2314
Windows Server 2025 (Server Core installation) Remote Code Execution Important 10.0.26100.2240
Windows Server 2025 Remote Code Execution Important 10.0.26100.2314
Windows Server 2025 Remote Code Execution Important 10.0.26100.2240
Windows Server 2012 R2 (Server Core installation) Remote Code Execution Important 6.3.9600.22267
Windows Server 2012 R2 Remote Code Execution Important 6.3.9600.22267
Windows Server 2012 (Server Core installation) Remote Code Execution Important 6.2.9200.25165
Windows Server 2012 Remote Code Execution Important 6.2.9200.25165
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2016 (Server Core installation) Remote Code Execution Important 10.0.14393.7515
Windows Server 2016 Remote Code Execution Important 10.0.14393.7515
Windows 10 Version 1607 for x64-based Systems Remote Code Execution Important 10.0.14393.7515
Windows 10 Version 1607 for 32-bit Systems Remote Code Execution Important 10.0.14393.7515
Windows 10 for x64-based Systems Remote Code Execution Important 10.0.10240.20826
Windows 10 for 32-bit Systems Remote Code Execution Important 10.0.10240.20826
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2314
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2240
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2314
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2240
Windows Server 2022, 23H2 Edition (Server Core installation) Remote Code Execution Important 10.0.25398.1251
Windows 11 Version 23H2 for x64-based Systems Remote Code Execution Important 10.0.22631.4460
Windows 11 Version 23H2 for ARM64-based Systems Remote Code Execution Important 10.0.22631.4460
Windows 10 Version 22H2 for 32-bit Systems Remote Code Execution Important 10.0.19045.5131
Windows 10 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.19045.5131
Windows 10 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.19045.5131
Windows 11 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.22621.4460
Windows 11 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.22621.4460
Windows 10 Version 21H2 for x64-based Systems Remote Code Execution Important 10.0.19044.5131
Windows 10 Version 21H2 for ARM64-based Systems Remote Code Execution Important 10.0.19044.5131
Windows 10 Version 21H2 for 32-bit Systems Remote Code Execution Important 10.0.19044.5131
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348.2849
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348.2819
Windows Server 2022 Remote Code Execution Important 10.0.20348.2849
Windows Server 2022 Remote Code Execution Important 10.0.20348.2819
Windows Server 2019 (Server Core installation) Remote Code Execution Important 10.0.17763.6532
Windows Server 2019 Remote Code Execution Important 10.0.17763.6532
Windows 10 Version 1809 for x64-based Systems Remote Code Execution Important 10.0.17763.6532
Windows 10 Version 1809 for 32-bit Systems Remote Code Execution Important 10.0.17763.6532

 نتیجه گیری

برای این حمله نیاز است که یک (Client) به یک سرور مخرب (Malicious Server) متصل شود که می‌تواند به مهاجم این امکان را بدهد تا اجرای کد را روی سیستم (Client) به دست آورد. یک مهاجم می‌تواند با فریب دادن کاربر برای ارسال درخواست به یک سرور مخرب (Malicious Server)، از این آسیب‌پذیری سوءاستفاده کند. این کار می‌تواند باعث شود که سرور داده‌های مخربی بازگرداند که ممکن است منجر به اجرای کد دلخواه روی سیستم کاربر شود. اسکنر آسیب‌پذیری Nessus یک پلاگین با شناسه  (KB5046639: 210865 به‌روزرسانی امنیتی Windows Server 2008 (نوامبر 2024)) فراهم می‌کند که کمک می‌کند تا وجود این ضعف در محیط هدف شناسایی شود. برای جلوگیری از نفوذ بهتر است از موارد بروزرسانی شده استفاده کنید.

منابع

  1. https://www.cve.org/CVERecord?id=CVE-2024-43627
  2. https://www.cvedetails.com/cve/CVE-2024-43627/
  3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43627
  4. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-43627
  5. https://vuldb.com/?id.284094
  6. https://nvd.nist.gov/vuln/detail/CVE-2024-43627
  7. https://cwe.mitre.org/data/definitions/122.html

همچنین ممکن است دوست داشته باشید

پیام بگذارید