- شناسه CVE-2024-43628 :CVE
- CWE-190 :CWE
- yes :Advisory
- منتشر شده: 11/11/2024
- به روز شده: 01/01/2025
- امتیاز: 8.8
- نوع حمله: Unknown
- اثر گذاری: Remote Code Execution
- برند: Microsoft
- محصول: Windows
- وضعیتPublished :CVE
- No :POC
- وضعیت آسیب پذیری: patch شده
چکیده
این مشکل برخی از عملکردهای نامشخص مؤلفه Telephony Service را تحت تأثیر قرار میدهد. ایجاد تغییرات در ورودی این آسیبپذیری منجر به سرریز عدد صحیح (Integer Overflow) میشود. حمله از طریق این آسیبپذیری ممکن است راه دور(به صورت ریموت) انجام شود.
توضیحات
این آسیب پذیری در دسته CWE-190 قرار دارد. عملکرد این آسیبپذیری به این صورت است که محصول محاسباتی انجام میدهد که میتواند منجر به سرریز یا دور زدن عدد صحیح شودو این اتفاق زمانی رخ میدهد که منطق فرض میکند که مقدار حاصل همواره از مقدار اولیه بزرگتر خواهد بود. این امر میتواند نقاط ضعف دیگری را معرفی کند که این نقاط ضعف زمانی رخ میدهد که محاسبات برای مدیریت منابع یا کنترل اجرا استفاده میشوند. این آسیبپذیری بر محرمانگی، یکپارچگی، و دسترسپذیری تأثیر میگذارد.
اکسپلویت این آسیبپذیری به نظر ساده میرسد. حمله از طریق این آسیبپذیری میتواند بهصورت از راه دور انجام شود و برای اکسپلویت موفق هیچ نوع احراز هویتی نیاز نیست. تنها شرط آن این است که قربانی باید نوعی تعامل با کاربر انجام دهد.
اسکنر آسیبپذیری Nessus یک پلاگین با شناسه (KB5046639: 210865 بهروزرسانی امنیتی Windows Server 2008 (نوامبر 2024)) فراهم میکند که کمک میکند تا وجود این ضعف در محیط هدف شناسایی شود.
CVSS
Score | Severity | Version | Vector String |
8.8 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
لیست محصولات آسیب پذیر
Versions | Platforms | Product |
affected from 10.0.17763.0 before 10.0.17763.6532 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1809
|
affected from 10.0.17763.0 before 10.0.17763.6532 | x64-based Systems
|
Windows Server 2019
|
affected from 10.0.17763.0 before 10.0.17763.6532 | x64-based Systems
|
Windows Server 2019 (Server Core installation)
|
affected from 10.0.20348.0 before 10.0.20348.2849 | x64-based Systems
|
Windows Server 2022
|
affected from 10.0.19043.0 before 10.0.19044.5131 | 32-bit Systems, ARM64-based Systems, x64-based Systems
|
Windows 10 Version 21H2
|
affected from 10.0.22621.0 before 10.0.22621.4460 | ARM64-based Systems, x64-based Systems
|
Windows 11 version 22H2
|
affected from 10.0.19045.0 before 10.0.19045.5131 | x64-based Systems, ARM64-based Systems, 32-bit Systems
|
Windows 10 Version 22H2
|
affected from 10.0.22631.0 before 10.0.22631.4460 | ARM64-based Systems
|
Windows 11 version 22H3
|
affected from 10.0.22631.0 before 10.0.22631.4460 | x64-based Systems
|
Windows 11 Version 23H2
|
affected from 10.0.25398.0 before 10.0.25398.1251 | x64-based Systems
|
Windows Server 2022, 23H2 Edition (Server Core installation)
|
affected from 10.0.26100.0 before 10.0.26100.2314 | ARM64-based Systems, x64-based Systems
|
Windows 11 Version 24H2
|
affected from 10.0.10240.0 before 10.0.10240.20826 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1507
|
affected from 10.0.14393.0 before 10.0.14393.7515 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1607
|
affected from 10.0.14393.0 before 10.0.14393.7515 | x64-based Systems
|
Windows Server 2016
|
affected from 10.0.14393.0 before 10.0.14393.7515 | x64-based Systems
|
Windows Server 2016 (Server Core installation)
|
affected from 6.0.6003.0 before 6.0.6003.22966 | 32-bit Systems
|
Windows Server 2008 Service Pack 2
|
affected from 6.0.6003.0 before 6.0.6003.22966 | 32-bit Systems, x64-based Systems
|
Windows Server 2008 Service Pack 2 (Server Core installation)
|
affected from 6.0.6003.0 before 6.0.6003.22966 | x64-based Systems
|
Windows Server 2008 Service Pack 2
|
affected from 6.1.7601.0 before 6.1.7601.27415 | x64-based Systems
|
Windows Server 2008 R2 Service Pack 1
|
affected from 6.1.7601.0 before 6.1.7601.27415 | x64-based Systems
|
Windows Server 2008 R2 Service Pack 1 (Server Core installation)
|
affected from 6.2.9200.0 before 6.2.9200.25165 | x64-based Systems
|
Windows Server 2012
|
affected from 6.2.9200.0 before 6.2.9200.25165 | x64-based Systems
|
Windows Server 2012 (Server Core installation)
|
affected from 6.3.9600.0 before 6.3.9600.22267 | x64-based Systems
|
Windows Server 2012 R2
|
affected from 6.3.9600.0 before 6.3.9600.22267 | x64-based Systems
|
Windows Server 2012 R2 (Server Core installation)
|
affected from 10.0.26100.0 before 10.0.26100.2314 | x64-based Systems
|
Windows Server 2025
|
affected from 10.0.26100.0 before 10.0.26100.2314 | x64-based Systems
|
Windows Server 2025 (Server Core installation)
|
لیست محصولات بروز شده
Product | Impact | Max Severity | Build Number |
Windows Server 2025 (Server Core installation) | Remote Code Execution | Important | 10.0.26100.2314 |
Windows Server 2025 (Server Core installation) | Remote Code Execution | Important | 10.0.26100.2240 |
Windows Server 2025 | Remote Code Execution | Important | 10.0.26100.2314 |
Windows Server 2025 | Remote Code Execution | Important | 10.0.26100.2240 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 6.3.9600.22267 |
Windows Server 2012 R2 | Remote Code Execution | Important | 6.3.9600.22267 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Important | 6.2.9200.25165 |
Windows Server 2012 | Remote Code Execution | Important | 6.2.9200.25165 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 6.1.7601.27415 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 6.1.7601.27415 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 6.1.7601.27415 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 6.1.7601.27415 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 6.0.6003.22966 |
Windows Server 2016 (Server Core installation) | Remote Code Execution | Important | 10.0.14393.7515 |
Windows Server 2016 | Remote Code Execution | Important | 10.0.14393.7515 |
Windows 10 Version 1607 for x64-based Systems | Remote Code Execution | Important | 10.0.14393.7515 |
Windows 10 Version 1607 for 32-bit Systems | Remote Code Execution | Important | 10.0.14393.7515 |
Windows 10 for x64-based Systems | Remote Code Execution | Important | 10.0.10240.20826 |
Windows 10 for 32-bit Systems | Remote Code Execution | Important | 10.0.10240.20826 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Important | 10.0.26100.2314 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Important | 10.0.26100.2240 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Important | 10.0.26100.2314 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Important | 10.0.26100.2240 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Important | 10.0.25398.1251 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Important | 10.0.22631.4460 |
Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Important | 10.0.22631.4460 |
Windows 10 Version 22H2 for 32-bit Systems | Remote Code Execution | Important | 10.0.19045.5131 |
Windows 10 Version 22H2 for ARM64-based Systems | Remote Code Execution | Important | 10.0.19045.5131 |
Windows 10 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 10.0.19045.5131 |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 10.0.22621.4460 |
Windows 11 Version 22H2 for ARM64-based Systems | Remote Code Execution | Important | 10.0.22621.4460 |
Windows 10 Version 21H2 for x64-based Systems | Remote Code Execution | Important | 10.0.19044.5131 |
Windows 10 Version 21H2 for ARM64-based Systems | Remote Code Execution | Important | 10.0.19044.5131 |
Windows 10 Version 21H2 for 32-bit Systems | Remote Code Execution | Important | 10.0.19044.5131 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 10.0.20348.2849 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 10.0.20348.2819 |
Windows Server 2022 | Remote Code Execution | Important | 10.0.20348.2849 |
Windows Server 2022 | Remote Code Execution | Important | 10.0.20348.2819 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Important | 10.0.17763.6532 |
Windows Server 2019 | Remote Code Execution | Important | 10.0.17763.6532 |
Windows 10 Version 1809 for x64-based Systems | Remote Code Execution | Important | 10.0.17763.6532 |
Windows 10 Version 1809 for 32-bit Systems | Remote Code Execution | Important | 10.0.17763.6532 |
نتیجه گیری
این آسیب پذیری برای حمله نیاز دارد که یک مشتری (کاربر) به یک سرور مخرب متصل شود و به مهاجم این امکان را بدهد تا کد را روی سیستم مشتری بتواند اجرا کند. یک مهاجم میتواند با فریب دادن یک کاربر برای ارسال یک درخواست به یک سرور مخرب، از این آسیبپذیری سوءاستفاده کند. این درخواست ممکن است منجر به بازگشت دادههای مخرب از سرور شود که میتواند منجر به اجرای کد دلخواه روی سیستم کاربر شود. برای جلوگیری از هرگونه سو استفاده بهتر است از موارد بروزرسانی شده استفاده کنید.
منابع
- https://www.cve.org/CVERecord?id=CVE-2024-43628
- https://www.cvedetails.com/cve/CVE-2024-43628/
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43628
- https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-43628
- https://vuldb.com/?id.284095
- https://nvd.nist.gov/vuln/detail/CVE-2024-43628
- https://cwe.mitre.org/data/definitions/190.html