按Enter到主內容區
:::

法務部行政執行署臺南分署:回首頁

:::

微軟Windows DNS伺服器存在安全漏洞(CVE-2021-24078),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新

  • 發布日期:
  • 最後更新日期:110-02-19
  • 資料點閱次數:138

研究人員發現微軟Windows DNS伺服器因輸入驗證不足,導致存在安全漏洞(CVE-2021-24078),遠端攻擊者可藉由發送特製封包,利用此漏洞進而執行任意程式碼。

 

使用下列Windows作業系統之伺服器如啟用DNS服務,將受此漏洞影響:

 

Windows Server 2008 for 32-bit Systems Service Pack 2

 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

 Windows Server 2008 for x64-based Systems Service Pack 2

 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

 Windows Server 2008 R2 for x64-based Systems Service Pack 1

 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

 Windows Server 2012

 Windows Server 2012 (Server Core installation)

 Windows Server 2012 R2

 Windows Server 2012 R2 (Server Core installation)

 Windows Server 2016

 Windows Server 2016 (Server Core installation)

Windows Server 2019

 Windows Server 2019 (Server Core installation)

 Windows Server, version 1909 (Server Core installation)

 Windows Server, version 2004 (Server Core installation)

 Windows Server, version 20H2 (Server Core Installation)

 

影響等級               

建議措施        目前微軟官方已針對此漏洞釋出更新程式

回頁首