Microsoft – Patch Tuesday – CVE-2023-21674
Date de publication :
Date de mise à jour :
Une faille dans le Advanced Local Procedure Call (ALPC) de Microsoft Windows permet à un attaquant local de s’échapper d’une sandbox Chromium et d’obtenir les privilèges du compte SYSTEM.
Informations
La faille est activement exploitée : Oui
Un correctif existe : Oui
Une mesure de contournement existe : Non
Élévation de privilèges
Exploitation
La vulnérabilité exploitée est du type
CWE-416: Use After Free
Détails sur l’exploitation
• Vecteur d’attaque : Local.
• Complexité de l’attaque : Faible.
• Privilèges nécessaires pour réaliser l’attaque : Authentification utilisateur simple.
• Interaction d’un utilisateur ayant accès au produit est-elle nécessaire : Non.
• L’exploitation de la faille permet d’obtenir des droits privilégiés : Oui.
Systèmes ou composants affectés
Produits Microsoft affectés
• Windows Server 2012 R2 (Server Core installation)
• Windows Server 2012 R2
• Windows RT 8.1
• Windows 8.1 for x64-based systems
• Windows 8.1 for 32-bit systems
• Windows Server 2016 (Server Core installation)
• Windows Server 2016
• Windows 10 Version 1607 for x64-based Systems
• Windows 10 Version 1607 for 32-bit Systems
• Windows 10 for x64-based Systems
• Windows 10 for 32-bit Systems
• Windows 10 Version 22H2 for 32-bit Systems
• Windows 10 Version 22H2 for ARM64-based Systems
• Windows 10 Version 22H2 for x64-based Systems
• Windows 11 Version 22H2 for x64-based Systems
• Windows 11 Version 22H2 for ARM64-based Systems
• Windows 10 Version 21H2 for x64-based Systems
• Windows 10 Version 21H2 for ARM64-based Systems
• Windows 10 Version 21H2 for 32-bit Systems
• Windows 11 version 21H2 for ARM64-based Systems
• Windows 11 version 21H2 for x64-based Systems
• Windows 10 Version 20H2 for ARM64-based Systems
• Windows 10 Version 20H2 for 32-bit Systems
• Windows 10 Version 20H2 for x64-based Systems
• Windows Server 2022 (Server Core installation)
• Windows Server 2022
• Windows Server 2019 (Server Core installation)
• Windows Server 2019
• Windows 10 Version 1809 for ARM64-based Systems
• Windows 10 Version 1809 for x64-based Systems
• Windows 10 Version 1809 for 32-bit Systems
Solutions ou recommandations
Appliquer les correctifs suivants :
- Windows Server 2012 R2 (Server Core installation) : [KB5022346]
- Windows Server 2012 R2 : [KB5022346]
- Windows RT 8.1 : [KB5022346]
- Windows 8.1 for x64-based systems : [KB5022346]
- Windows 8.1 for 32-bit systems : [KB5022346]
- Windows Server 2016 (Server Core installation) : [KB5022289]
- Windows Server 2016 : [KB5022289]
- Windows 10 Version 1607 for x64-based Systems : [KB5022289]
- Windows 10 Version 1607 for 32-bit Systems : [KB5022289]
- Windows 10 for x64-based Systems : [KB5022297]
- Windows 10 for 32-bit Systems : [KB5022297]
- Windows 10 Version 22H2 for 32-bit Systems : [KB5022282]
- Windows 10 Version 22H2 for ARM64-based Systems : [KB5022282]
- Windows 10 Version 22H2 for x64-based Systems : [KB5022282]
- Windows 10 Version 21H2 for x64-based Systems : : [KB5022282]
- Windows 10 Version 21H2 for ARM64-based Systems : : [KB5022282]
- Windows 10 Version 21H2 for 32-bit Systems : [KB5022282]
- Windows 10 Version 20H2 for ARM64-based Systems : : [KB5022282]
- Windows 10 Version 20H2 for 32-bit Systems : [KB5022282]
- Windows 10 Version 20H2 for x64-based Systems : [KB5022282]
- Windows 11 Version 22H2 for x64-based Systems : [KB5022303]
- Windows 11 Version 22H2 for ARM64-based Systems : [KB5022303]
- Windows 11 for ARM64-based Systems : [KB5022287]
- Windows 11 for x64-based Systems : [KB5022287]
- Windows Server 2022 (Server Core installation) : [KB5022291]
- Windows Server 2022 : [KB5022291]
- Windows Server 2019 (Server Core installation) : [KB5022286]
- Windows Server 2019 : [KB5022286]
- Windows 10 Version 1809 for ARM64-based Systems : [KB5022286]
- Windows 10 Version 1809 for x64-based Systems : [KB5022286]
- Windows 10 Version 1809 for 32-bit Systems : [KB5022286]
Des informations complémentaires sont disponibles ici.