خانه » CVE-2024-43635

CVE-2024-43635

آسیب‌پذیری اجرای کد از راه دور(Remote) در سرویس تلفنی ویندوز (Windows Telephony Service)

توسط Vulnerbyte_Alerts

چکیده

این آسیب پذیری بخشی ناشناخته از عملکرد سرویس تلفنی (Telephony Service) را تحت تأثیر قرار می‌دهد. ایجاد تغییرات در ورودی این بخش منجر به سرریز عددی (Integer Overflow) می‌شود. در اثر این آسیب پذیری امکان حمله از راه دور وجود دارد.

توضیحات

این آسیب‌پذیری در دسته  CWE-190 قرار دارد. در این آسیب‌پذیری، محصول یک محاسبه را انجام می‌دهد که می‌تواند باعث سرریز عددی یا گردش و رسیدن به نقطه اول (Wraparound) شود،  این اتفاق زمانی رخ می دهد که منطق فرض‌کند که نتیجه همیشه بزرگتر از مقدار اولیه خواهد بود. این مشکل می‌تواند نقاط ضعف دیگری را ایجاد کند، به‌ویژه زمانی که محاسبه برای مدیریت منابع یا کنترل اجرا استفاده شود. تاثیر این آسیب‌پذیری بر محرمانگی (Confidentiality)، یکپارچگی (Integrity) و دسترس‌پذیری (Availability) شناخته شده است.
اکسپلویت این آسیب‌پذیری به‌نظر آسان است. برای حمله از طریق این آسیب پذیری نیاز به هیچ‌گونه احراز هویتی نیست. تنها پیش‌نیاز این است که قربانی نوعی تعامل با فرد مهاجم انجام دهد.
اسکنر آسیب‌پذیری Nessus یک پلاگین با شناسه  (KB5046639: 210865 به‌روزرسانی امنیتی Windows Server 2008 (نوامبر ۲۰۲۴)) ارائه می‌دهد که به تعیین وجود این نقص در محیط هدف کمک می‌کند.

CVSS

Score Severity Version Vector String
8.8 HIGH 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

 لیست محصولات آسیب پذیر

Versions Platforms Product
affected from 10.0.17763.0 before 10.0.17763.6532 32-bit Systems, x64-based Systems

 

Windows 10 Version 1809

 

affected from 10.0.17763.0 before 10.0.17763.6532 x64-based Systems

 

Windows Server 2019

 

affected from 10.0.17763.0 before 10.0.17763.6532 x64-based Systems

 

Windows Server 2019 (Server Core installation)

 

affected from 10.0.20348.0 before 10.0.20348.2849 x64-based Systems

 

Windows Server 2022

 

affected from 10.0.19043.0 before 10.0.19044.5131 32-bit Systems, ARM64-based Systems, x64-based Systems

 

Windows 10 Version 21H2

 

affected from 10.0.22621.0 before 10.0.22621.4460 ARM64-based Systems, x64-based Systems

 

Windows 11 version 22H2

 

affected from 10.0.19045.0 before 10.0.19045.5131 x64-based Systems, ARM64-based Systems, 32-bit Systems

 

Windows 10 Version 22H2

 

affected from 10.0.22631.0 before 10.0.22631.4460 ARM64-based Systems

 

Windows 11 version 22H3

 

affected from 10.0.22631.0 before 10.0.22631.4460 x64-based Systems

 

Windows 11 Version 23H2

 

affected from 10.0.25398.0 before 10.0.25398.1251 x64-based Systems

 

Windows Server 2022, 23H2 Edition (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2314 ARM64-based Systems, x64-based Systems

 

Windows 11 Version 24H2

 

affected from 10.0.10240.0 before 10.0.10240.20826 32-bit Systems, x64-based Systems

 

Windows 10 Version 1507

 

affected from 10.0.14393.0 before 10.0.14393.7515 32-bit Systems, x64-based Systems

 

Windows 10 Version 1607

 

affected from 10.0.14393.0 before 10.0.14393.7515 x64-based Systems

 

Windows Server 2016

 

affected from 10.0.14393.0 before 10.0.14393.7515 x64-based Systems

 

Windows Server 2016 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.22966 32-bit Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.0.6003.0 before 6.0.6003.22966 32-bit Systems, x64-based Systems

 

Windows Server 2008 Service Pack 2 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.22966 x64-based Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.1.7601.0 before 6.1.7601.27415 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1

 

affected from 6.1.7601.0 before 6.1.7601.27415 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1 (Server Core installation)

 

affected from 6.2.9200.0 before 6.2.9200.25165 x64-based Systems

 

Windows Server 2012

 

affected from 6.2.9200.0 before 6.2.9200.25165 x64-based Systems

 

Windows Server 2012 (Server Core installation)

 

affected from 6.3.9600.0 before 6.3.9600.22267 x64-based Systems

 

Windows Server 2012 R2

 

affected from 6.3.9600.0 before 6.3.9600.22267 x64-based Systems

 

Windows Server 2012 R2 (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2314 x64-based Systems

 

Windows Server 2025

 

affected from 10.0.26100.0 before 10.0.26100.2314 x64-based Systems

 

Windows Server 2025 (Server Core installation)

 

 لیست محصولات بروز شده

Product Impact Max Severity Build Number
Windows Server 2025 (Server Core installation) Remote Code Execution Important 10.0.26100.2314
Windows Server 2025 (Server Core installation) Remote Code Execution Important 10.0.26100.2240
Windows Server 2025 Remote Code Execution Important 10.0.26100.2314
Windows Server 2025 Remote Code Execution Important 10.0.26100.2240
Windows Server 2012 R2 (Server Core installation) Remote Code Execution Important 6.3.9600.22267
Windows Server 2012 R2 Remote Code Execution Important 6.3.9600.22267
Windows Server 2012 (Server Core installation) Remote Code Execution Important 6.2.9200.25165
Windows Server 2012 Remote Code Execution Important 6.2.9200.25165
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27415
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22966
Windows Server 2016 (Server Core installation) Remote Code Execution Important 10.0.14393.7515
Windows Server 2016 Remote Code Execution Important 10.0.14393.7515
Windows 10 Version 1607 for x64-based Systems Remote Code Execution Important 10.0.14393.7515
Windows 10 Version 1607 for 32-bit Systems Remote Code Execution Important 10.0.14393.7515
Windows 10 for x64-based Systems Remote Code Execution Important 10.0.10240.20826
Windows 10 for 32-bit Systems Remote Code Execution Important 10.0.10240.20826
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2314
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2240
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2314
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2240
Windows Server 2022, 23H2 Edition (Server Core installation) Remote Code Execution Important 10.0.25398.1251
Windows 11 Version 23H2 for x64-based Systems Remote Code Execution Important 10.0.22631.4460
Windows 11 Version 23H2 for ARM64-based Systems Remote Code Execution Important 10.0.22631.4460
Windows 10 Version 22H2 for 32-bit Systems Remote Code Execution Important 10.0.19045.5131
Windows 10 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.19045.5131
Windows 10 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.19045.5131
Windows 11 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.22621.4460
Windows 11 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.22621.4460
Windows 10 Version 21H2 for x64-based Systems Remote Code Execution Important 10.0.19044.5131
Windows 10 Version 21H2 for ARM64-based Systems Remote Code Execution Important 10.0.19044.5131
Windows 10 Version 21H2 for 32-bit Systems Remote Code Execution Important 10.0.19044.5131
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348.2849
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348.2819
Windows Server 2022 Remote Code Execution Important 10.0.20348.2849
Windows Server 2022 Remote Code Execution Important 10.0.20348.2819
Windows Server 2019 (Server Core installation) Remote Code Execution Important 10.0.17763.6532
Windows Server 2019 Remote Code Execution Important 10.0.17763.6532
Windows 10 Version 1809 for x64-based Systems Remote Code Execution Important 10.0.17763.6532
Windows 10 Version 1809 for 32-bit Systems Remote Code Execution Important 10.0.17763.6532

 نتیجه گیری

این حمله نیاز دارد که یک کاربر به یک سرور مخرب متصل شود، که این امکان را به مهاجم می‌دهد تا کد دلخواه خود را بر روی سیستم کاربر اجرا کند. یک مهاجم می‌تواند با فریب دادن کاربر برای ارسال یک درخواست به سرور مخرب، از این آسیب‌پذیری سوءاستفاده کند. این می‌تواند منجر به بازگشت داده‌های مخرب از سرور شود که ممکن است باعث اجرای کد دلخواه بر روی سیستم کاربر گردد. برای جلوگیری از هرگونه نفوذ بهتر است از نسخه های بروزرسانی شده استفاده کنید.

 منابع

  1. https://www.cve.org/CVERecord?id=CVE-2024-43635
  2. https://www.cvedetails.com/cve/CVE-2024-43635/
  3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635
  4. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-43635
  5. https://vuldb.com/?id.284131
  6. https://nvd.nist.gov/vuln/detail/CVE-2024-43635
  7. https://cwe.mitre.org/data/definitions/190.html

همچنین ممکن است دوست داشته باشید

پیام بگذارید