خانه » CVE-2024-43628

CVE-2024-43628

آسیب‌پذیری اجرای کد از راه دور (Remote Code Execution) در خدمات تلفنی ویندوز (Windows Telephony Service)

توسط Vulnerbyte_Alerts

چکیده

این مشکل برخی از عملکردهای نامشخص مؤلفه Telephony Service را تحت تأثیر قرار می‌دهد. ایجاد تغییرات در ورودی این آسیب‌پذیری منجر به سرریز عدد صحیح (Integer Overflow) می‌شود. حمله از طریق این آسیب‌پذیری ممکن است راه دور(به صورت ریموت) انجام شود.

توضیحات

این آسیب پذیری در دسته CWE-190 قرار دارد. عملکرد این آسیب‌پذیری به این صورت است که محصول محاسباتی انجام می‌دهد که می‌تواند منجر به سرریز یا دور زدن عدد صحیح شودو این اتفاق زمانی رخ میدهد که منطق فرض می‌کند که مقدار حاصل همواره از مقدار اولیه بزرگتر خواهد بود. این امر می‌تواند نقاط ضعف دیگری را معرفی کند که این نقاط ضعف زمانی رخ میدهد که محاسبات برای مدیریت منابع یا کنترل اجرا استفاده می‌شوند. این آسیب‌پذیری بر محرمانگی، یکپارچگی، و دسترس‌پذیری تأثیر می‌گذارد.

اکسپلویت این آسیب‌پذیری به نظر ساده می‌رسد. حمله از طریق این آسیب‌پذیری می‌تواند به‌صورت از راه دور انجام شود و برای اکسپلویت موفق هیچ نوع احراز هویتی نیاز نیست. تنها شرط آن این است که قربانی باید نوعی تعامل با کاربر انجام دهد.

اسکنر آسیب‌پذیری Nessus یک پلاگین با شناسه  (KB5046639: 210865 به‌روزرسانی امنیتی Windows Server 2008 (نوامبر 2024)) فراهم می‌کند که کمک می‌کند تا وجود این ضعف در محیط هدف شناسایی شود.

CVSS

Score Severity Version Vector String
8.8 HIGH 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

 لیست محصولات آسیب پذیر

Versions Platforms Product
affected from 10.0.17763.0 before 10.0.17763.6532 32-bit Systems, x64-based Systems

 

Windows 10 Version 1809

 

affected from 10.0.17763.0 before 10.0.17763.6532 x64-based Systems

 

Windows Server 2019

 

affected from 10.0.17763.0 before 10.0.17763.6532 x64-based Systems

 

Windows Server 2019 (Server Core installation)

 

affected from 10.0.20348.0 before 10.0.20348.2849 x64-based Systems

 

Windows Server 2022

 

affected from 10.0.19043.0 before 10.0.19044.5131 32-bit Systems, ARM64-based Systems, x64-based Systems

 

Windows 10 Version 21H2

 

affected from 10.0.22621.0 before 10.0.22621.4460 ARM64-based Systems, x64-based Systems

 

Windows 11 version 22H2

 

affected from 10.0.19045.0 before 10.0.19045.5131 x64-based Systems, ARM64-based Systems, 32-bit Systems

 

Windows 10 Version 22H2

 

affected from 10.0.22631.0 before 10.0.22631.4460 ARM64-based Systems

 

Windows 11 version 22H3

 

affected from 10.0.22631.0 before 10.0.22631.4460 x64-based Systems

 

Windows 11 Version 23H2

 

affected from 10.0.25398.0 before 10.0.25398.1251 x64-based Systems

 

Windows Server 2022, 23H2 Edition (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2314 ARM64-based Systems, x64-based Systems

 

Windows 11 Version 24H2

 

affected from 10.0.10240.0 before 10.0.10240.20826 32-bit Systems, x64-based Systems

 

Windows 10 Version 1507

 

affected from 10.0.14393.0 before 10.0.14393.7515 32-bit Systems, x64-based Systems

 

Windows 10 Version 1607

 

affected from 10.0.14393.0 before 10.0.14393.7515 x64-based Systems

 

Windows Server 2016

 

affected from 10.0.14393.0 before 10.0.14393.7515 x64-based Systems

 

Windows Server 2016 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.22966 32-bit Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.0.6003.0 before 6.0.6003.22966 32-bit Systems, x64-based Systems

 

Windows Server 2008 Service Pack 2 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.22966 x64-based Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.1.7601.0 before 6.1.7601.27415 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1

 

affected from 6.1.7601.0 before 6.1.7601.27415 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1 (Server Core installation)

 

affected from 6.2.9200.0 before 6.2.9200.25165 x64-based Systems

 

Windows Server 2012

 

affected from 6.2.9200.0 before 6.2.9200.25165 x64-based Systems

 

Windows Server 2012 (Server Core installation)

 

affected from 6.3.9600.0 before 6.3.9600.22267 x64-based Systems

 

Windows Server 2012 R2

 

affected from 6.3.9600.0 before 6.3.9600.22267 x64-based Systems

 

Windows Server 2012 R2 (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2314 x64-based Systems

 

Windows Server 2025

 

affected from 10.0.26100.0 before 10.0.26100.2314 x64-based Systems

 

Windows Server 2025 (Server Core installation)

 

 لیست محصولات بروز شده

Product Impact Max Severity Build Number
Windows Server 2025 (Server Core installation) Remote Code Execution Important 10.0.26100.2314
Windows Server 2025 (Server Core installation) Remote Code Execution Important 10.0.26100.2240
Windows Server 2025 Remote Code Execution Important 10.0.26100.2314
Windows Server 2025 Remote Code Execution Important 10.0.26100.2240
Windows Server 2012 R2 (Server Core installation) Remote Code Execution Important 6.3.9600.22267
Windows Server 2012 R2 Remote Code Execution Important 6.3.9600.22267
Windows Server 2012 (Server Core installation) Remote Code Execution Important 6.2.9200.25165
Windows Server 2012 Remote Code Execution Important 6.2.9200.25165
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2016 (Server Core installation) Remote Code Execution Important 10.0.14393.7515
Windows Server 2016 Remote Code Execution Important 10.0.14393.7515
Windows 10 Version 1607 for x64-based Systems Remote Code Execution Important 10.0.14393.7515
Windows 10 Version 1607 for 32-bit Systems Remote Code Execution Important 10.0.14393.7515
Windows 10 for x64-based Systems Remote Code Execution Important 10.0.10240.20826
Windows 10 for 32-bit Systems Remote Code Execution Important 10.0.10240.20826
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2314
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2240
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2314
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2240
Windows Server 2022, 23H2 Edition (Server Core installation) Remote Code Execution Important 10.0.25398.1251
Windows 11 Version 23H2 for x64-based Systems Remote Code Execution Important 10.0.22631.4460
Windows 11 Version 23H2 for ARM64-based Systems Remote Code Execution Important 10.0.22631.4460
Windows 10 Version 22H2 for 32-bit Systems Remote Code Execution Important 10.0.19045.5131
Windows 10 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.19045.5131
Windows 10 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.19045.5131
Windows 11 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.22621.4460
Windows 11 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.22621.4460
Windows 10 Version 21H2 for x64-based Systems Remote Code Execution Important 10.0.19044.5131
Windows 10 Version 21H2 for ARM64-based Systems Remote Code Execution Important 10.0.19044.5131
Windows 10 Version 21H2 for 32-bit Systems Remote Code Execution Important 10.0.19044.5131
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348.2849
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348.2819
Windows Server 2022 Remote Code Execution Important 10.0.20348.2849
Windows Server 2022 Remote Code Execution Important 10.0.20348.2819
Windows Server 2019 (Server Core installation) Remote Code Execution Important 10.0.17763.6532
Windows Server 2019 Remote Code Execution Important 10.0.17763.6532
Windows 10 Version 1809 for x64-based Systems Remote Code Execution Important 10.0.17763.6532
Windows 10 Version 1809 for 32-bit Systems Remote Code Execution Important 10.0.17763.6532

 نتیجه گیری

این آسیب پذیری برای حمله نیاز دارد که یک مشتری (کاربر) به یک سرور مخرب متصل شود و به مهاجم این امکان را بدهد تا کد را روی سیستم مشتری بتواند اجرا کند. یک مهاجم می‌تواند با فریب دادن یک کاربر برای ارسال یک درخواست به یک سرور مخرب، از این آسیب‌پذیری سوءاستفاده کند. این درخواست ممکن است منجر به بازگشت داده‌های مخرب از سرور شود که می‌تواند منجر به اجرای کد دلخواه روی سیستم کاربر شود. برای جلوگیری از هرگونه سو استفاده بهتر است از موارد بروزرسانی شده استفاده کنید.

منابع

  1. https://www.cve.org/CVERecord?id=CVE-2024-43628
  2. https://www.cvedetails.com/cve/CVE-2024-43628/
  3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43628
  4. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-43628
  5. https://vuldb.com/?id.284095
  6. https://nvd.nist.gov/vuln/detail/CVE-2024-43628
  7. https://cwe.mitre.org/data/definitions/190.html

همچنین ممکن است دوست داشته باشید

پیام بگذارید