خانه » CVE-2024-49118

CVE-2024-49118

آسیب پذیری اجرای کد به صورت ریموت در صف پیام مایکروسافت (MSMQ)

توسط Vulnerbyte_Alerts

چکیده

این آسیب پذیری، برخی از عملکردهای ناشناخته کامپوننت Message Queuing را تحت تأثیر قرار می دهد. ایجاد تغییرات در ورودی منجر به استفاده از حافظه پس از آزادسازی آن می شود. این آسیب پذیری در دسته  CWE-416 طبقه بندی می شود.

توضیحات

ارجاع به حافظه پس از آزاد شدن می تواند باعث از کار افتادن برنامه، استفاده از مقادیر غیرمنتظره یا اجرای کد خاصی شود. ای آسیب پذیری به عنوان یک عامل قابل تأثیر شناخته شده است که بر محرمانگی، یکپارچگی و در دسترس بودن در سیستم تأثیر می گذارد.

به نظر می رسد اکسپلویت دشوار است. حمله را می توان از راه دور راه اندازی کرد همچنین اکسپلویت به هیچ شکلی از احراز هویت نیاز ندارد. اکسپلویت موفقیت آمیز از این آسیب پذیری مستلزم آن است که مهاجم در طول اجرای یک عملیات خاص که احتمال اکسپلویت آن کم است و روی سیستم هدف تکرار می شود، وارد شرایط race condition شود. این ممکن است مستلزم آن باشد که مهاجم زمان قابل توجهی را برای اکسپلویت این آسیب‌پذیری در صورت عدم پیروزی در شرایط race condition ، صرف کند.

برای سوء استفاده از این آسیب پذیری، یک مهاجم باید یک بسته مخرب MSMQ ساخته شده ویژه را به سرور MSMQ ارسال کند. این می تواند منجر به اجرای کد به صورت ریموت در سمت سرور شود.

CVSS

Score Severity Version Vector String
8.1 HIGH 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

لیست محصولات آسیب پذیر 

version platform product
affected from 10.0.17763.0 before 10.0.17763.6659 32-bit Systems, x64-based Systems Windows 10 Version 1809
affected from 10.0.17763.0 before 10.0.17763.6659 x64-based Systems Windows Server 2019
affected from 10.0.17763.0 before 10.0.17763.6659 x64-based Systems Windows Server 2019 (Server Core installation)
affected from 10.0.20348.0 before 10.0.20348.2966 x64-based Systems Windows Server 2022
affected from 10.0.19043.0 before 10.0.19044.5247 32-bit Systems, ARM64-based Systems, x64-based Systems Windows 10 Version 21H2
affected from 10.0.22621.0 before 10.0.22621.4602 ARM64-based Systems, x64-based Systems Windows 11 version 22H2
affected from 10.0.19045.0 before 10.0.19045.5247 x64-based Systems, ARM64-based Systems, 32-bit Systems Windows 10 Version 22H2
affected from 10.0.26100.0 before 10.0.26100.2605 x64-based Systems Windows Server 2025 (Server Core installation)
affected from 10.0.22631.0 before 10.0.22631.4602 ARM64-based Systems Windows 11 version 22H3
affected from 10.0.22631.0 before 10.0.22631.4602 x64-based Systems Windows 11 Version 23H2
affected from 10.0.25398.0 before 10.0.25398.1308 x64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation)
affected from 10.0.26100.0 before 10.0.26100.2605 ARM64-based Systems, x64-based Systems Windows 11 Version 24H2
affected from 10.0.26100.0 before 10.0.26100.2605 x64-based Systems Windows Server 2025
affected from 10.0.10240.0 before 10.0.10240.20857 32-bit Systems, x64-based Systems Windows 10 Version 1507
affected from 10.0.14393.0 before 10.0.14393.7606 32-bit Systems, x64-based Systems Windows 10 Version 1607
affected from 10.0.14393.0 before 10.0.14393.7606 x64-based Systems Windows Server 2016
affected from 10.0.14393.0 before 10.0.14393.7606 x64-based Systems Windows Server 2016 (Server Core installation)
affected from 6.0.6003.0 before 6.0.6003.23016 32-bit Systems Windows Server 2008 Service Pack 2
affected from 6.0.6003.0 before 6.0.6003.23016 32-bit Systems, x64-based Systems Windows Server 2008 Service Pack 2 (Server Core installation)
affected from 6.0.6003.0 before 6.0.6003.23016 x64-based Systems Windows Server 2008 Service Pack 2
affected from 6.1.7601.0 before 6.1.7601.27467 x64-based Systems Windows Server 2008 R2 Service Pack 1
affected from 6.1.7601.0 before 6.1.7601.27467 x64-based Systems Windows Server 2008 R2 Service Pack 1 (Server Core installation)
affected from 6.2.9200.0 before 6.2.9200.25222 x64-based Systems Windows Server 2012
affected from 6.2.9200.0 before 6.2.9200.25222 x64-based Systems Windows Server 2012 (Server Core installation)
affected from 6.3.9600.0 before 6.3.9600.22318 x64-based Systems Windows Server 2012 R2
affected from 6.3.9600.0 before 6.3.9600.22318 x64-based Systems Windows Server 2012 R2 (Server Core installation)

لیست محصولات بروز شده:

Product Impact Max Severity Build Number
Windows Server 2012 R2 (Server Core installation) Remote Code Execution Critical 6.3.9600.22318
Windows Server 2012 R2 Remote Code Execution Critical 6.3.9600.22318
Windows Server 2012 (Server Core installation) Remote Code Execution Critical 6.2.9200.25222
Windows Server 2012 Remote Code Execution Critical 6.2.9200.25222
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Critical 6.1.7601.27467
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Critical 6.1.7601.27467
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Critical 6.1.7601.27467
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Critical 6.1.7601.27467
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23016
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23016
Windows Server 2016 (Server Core installation) Remote Code Execution Critical 10.0.14393.7606
Windows Server 2016 Remote Code Execution Critical 10.0.14393.7606
Windows 10 Version 1607 for x64-based Systems Remote Code Execution Critical 10.0.14393.7606
Windows 10 Version 1607 for 32-bit Systems Remote Code Execution Critical 10.0.14393.7606
Windows 10 for x64-based Systems Remote Code Execution Critical 10.0.10240.20857
Windows 10 for 32-bit Systems Remote Code Execution Critical 10.0.10240.20857
Windows Server 2025 Remote Code Execution Critical 10.0.26100.2605
Windows Server 2025 Remote Code Execution Critical 10.0.26100.2528
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Critical 10.0.26100.2605
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Critical 10.0.26100.2528
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Critical 10.0.26100.2605
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Critical 10.0.26100.2528
Windows Server 2022, 23H2 Edition (Server Core installation) Remote Code Execution Critical 10.0.25398.1308
Windows 11 Version 23H2 for x64-based Systems Remote Code Execution Critical 10.0.22631.4602
Windows 11 Version 23H2 for ARM64-based Systems Remote Code Execution Critical 10.0.22631.4602
Windows Server 2025 (Server Core installation) Remote Code Execution Critical 10.0.26100.2605
Windows Server 2025 (Server Core installation) Remote Code Execution Critical 10.0.26100.2528
Windows 10 Version 22H2 for 32-bit Systems Remote Code Execution Critical 10.0.19045.5247
Windows 10 Version 22H2 for ARM64-based Systems Remote Code Execution Critical 10.0.19045.5247
Windows 10 Version 22H2 for x64-based Systems Remote Code Execution Critical 10.0.19045.5247
Windows 11 Version 22H2 for x64-based Systems Remote Code Execution Critical 10.0.22621.4602
Windows 11 Version 22H2 for ARM64-based Systems Remote Code Execution Critical 10.0.22621.4602
Windows 10 Version 21H2 for x64-based Systems Remote Code Execution Critical 10.0.19044.5247
Windows 10 Version 21H2 for ARM64-based Systems Remote Code Execution Critical 10.0.19044.5247
Windows 10 Version 21H2 for 32-bit Systems Remote Code Execution Critical 10.0.19044.5247
Windows Server 2022 (Server Core installation) Remote Code Execution Critical 10.0.20348.2966
Windows Server 2022 (Server Core installation) Remote Code Execution Critical 10.0.20348.2908
Windows Server 2022 Remote Code Execution Critical 10.0.20348.2966
Windows Server 2022 Remote Code Execution Critical 10.0.20348.2908
Windows Server 2019 (Server Core installation) Remote Code Execution Critical 10.0.17763.6659
Windows Server 2019 Remote Code Execution Critical 10.0.17763.6659
Windows 10 Version 1809 for x64-based Systems Remote Code Execution Critical 10.0.17763.6659
Windows 10 Version 1809 for 32-bit Systems Remote Code Execution Critical 10.0.17763.6659

نتیجه گیری

برای جلوگیری از هرگونه نفوذ بهتر است از نسخه های بروزرسانی شده استفاده کنید.

منابع

  1. https://www.cve.org/CVERecord?id=CVE-2024-49118
  2. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49118
  3. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-49118
  4. https://vuldb.com/?id.287623

همچنین ممکن است دوست داشته باشید

پیام بگذارید