2023年6月13日,微软发布了6月安全更新
2023年的更新情况
此版本包含以下 73 个 Microsoft CVE
序号 |
标签 |
CVE |
基本 分数 |
变通 方法 |
缓解 措施 |
001 |
Azure DevOps |
CVE-2023-21565 |
7.1 |
否 |
否 |
002 |
Azure DevOps |
CVE-2023-21569 |
5.5 |
否 |
否 |
003 |
.NET 和 Visual Studio |
CVE-2023-24895 |
7.8 |
否 |
否 |
004 |
Microsoft Dynamics |
CVE-2023-24896 |
5.4 |
否 |
否 |
005 |
.NET 和 Visual Studio |
CVE-2023-24897 |
7.8 |
否 |
否 |
006 |
.NET 和 Visual Studio |
CVE-2023-24936 |
8.1 |
否 |
否 |
007 |
Windows CryptoAPI |
CVE-2023-24937 |
6.5 |
否 |
否 |
008 |
Windows CryptoAPI |
CVE-2023-24938 |
6.5 |
否 |
否 |
009 |
Microsoft Exchange Server |
CVE-2023-28310 |
8 |
否 |
否 |
010 |
.NET Framework |
CVE-2023-29326 |
7.8 |
否 |
否 |
011 |
.NET Core |
CVE-2023-29331 |
7.5 |
否 |
否 |
012 |
NuGet 客户端 |
CVE-2023-29337 |
7.1 |
否 |
否 |
013 |
Microsoft Edge(基于 Chromium) |
CVE-2023-29345 |
6.1 |
否 |
否 |
014 |
Windows NTFS |
CVE-2023-29346 |
7.8 |
否 |
否 |
015 |
Windows 组策略 |
CVE-2023-29351 |
8.1 |
否 |
否 |
016 |
远程桌面客户端 |
CVE-2023-29352 |
6.5 |
否 |
否 |
017 |
SysInternals |
CVE-2023-29353 |
5.5 |
否 |
否 |
018 |
Windows DHCP 服务器 |
CVE-2023-29355 |
5.3 |
否 |
是 |
019 |
Microsoft Office SharePoint |
CVE-2023-29357 |
9.8 |
否 |
是 |
020 |
Windows GDI |
CVE-2023-29358 |
7.8 |
否 |
否 |
021 |
Windows Win32K |
CVE-2023-29359 |
7.8 |
否 |
否 |
022 |
Windows TPM 设备驱动程序 |
CVE-2023-29360 |
7.8 |
否 |
否 |
023 |
Windows Cloud Files Mini Filter Driver |
CVE-2023-29361 |
7 |
否 |
否 |
024 |
远程桌面客户端 |
CVE-2023-29362 |
8.8 |
否 |
否 |
025 |
Windows PGM |
CVE-2023-29363 |
9.8 |
否 |
是 |
026 |
Windows 身份验证方法 |
CVE-2023-29364 |
7 |
否 |
否 |
027 |
Microsoft Windows 编解码器库 |
CVE-2023-29365 |
7.8 |
否 |
否 |
028 |
Windows 地理位置服务 |
CVE-2023-29366 |
7.8 |
否 |
否 |
029 |
Windows OLE |
CVE-2023-29367 |
7.8 |
否 |
否 |
030 |
Windows 筛选 |
CVE-2023-29368 |
7 |
否 |
否 |
031 |
Windows 远程过程调用运行时 |
CVE-2023-29369 |
6.5 |
否 |
否 |
032 |
Microsoft Windows 编解码器库 |
CVE-2023-29370 |
7.8 |
否 |
否 |
033 |
Windows Win32K |
CVE-2023-29371 |
7.8 |
否 |
否 |
034 |
Microsoft WDAC OLE DB provider for SQL |
CVE-2023-29372 |
8.8 |
否 |
否 |
035 |
Windows ODBC 驱动程序 |
CVE-2023-29373 |
8.8 |
否 |
否 |
036 |
Windows 复原文件系统 (ReFS) |
CVE-2023-32008 |
7.8 |
否 |
否 |
037 |
Windows 协作翻译框架 |
CVE-2023-32009 |
8.8 |
否 |
否 |
038 |
Windows 总线筛选器驱动程序 |
CVE-2023-32010 |
7 |
否 |
否 |
039 |
Windows iSCSI |
CVE-2023-32011 |
7.5 |
否 |
否 |
040 |
Windows 容器管理服务 |
CVE-2023-32012 |
6.3 |
否 |
否 |
041 |
Windows Hyper-V |
CVE-2023-32013 |
6.5 |
否 |
否 |
042 |
Windows PGM |
CVE-2023-32014 |
9.8 |
否 |
是 |
043 |
Windows PGM |
CVE-2023-32015 |
9.8 |
否 |
是 |
044 |
Windows 安装程序 |
CVE-2023-32016 |
5.5 |
否 |
否 |
045 |
Microsoft 打印机驱动程序 |
CVE-2023-32017 |
7.8 |
否 |
否 |
046 |
Windows Hello |
CVE-2023-32018 |
7.8 |
否 |
否 |
047 |
Windows Kernel |
CVE-2023-32019 |
4.7 |
否 |
否 |
048 |
角色:DNS 服务器 |
CVE-2023-32020 |
3.7 |
否 |
否 |
049 |
Windows SMB |
CVE-2023-32021 |
7.1 |
否 |
是 |
050 |
Windows Server 服务 |
CVE-2023-32022 |
7.6 |
否 |
是 |
051 |
Microsoft Power Apps |
CVE-2023-32024 |
3 |
否 |
否 |
052 |
Microsoft Office Excel |
CVE-2023-32029 |
7.8 |
否 |
否 |
053 |
.NET 和 Visual Studio |
CVE-2023-32030 |
7.5 |
否 |
否 |
054 |
Microsoft Exchange Server |
CVE-2023-32031 |
8.8 |
否 |
否 |
055 |
.NET 和 Visual Studio |
CVE-2023-32032 |
6.5 |
否 |
否 |
056 |
.NET 和 Visual Studio |
CVE-2023-33126 |
7.3 |
否 |
否 |
057 |
.NET 和 Visual Studio |
CVE-2023-33127 |
8.1 |
否 |
否 |
058 |
.NET 和 Visual Studio |
CVE-2023-33128 |
7.3 |
否 |
否 |
059 |
Microsoft Office SharePoint |
CVE-2023-33129 |
6.5 |
否 |
否 |
060 |
Microsoft Office SharePoint |
CVE-2023-33130 |
7.3 |
否 |
否 |
061 |
Microsoft Office Outlook |
CVE-2023-33131 |
8.8 |
否 |
否 |
062 |
Microsoft Office SharePoint |
CVE-2023-33132 |
6.3 |
否 |
否 |
063 |
Microsoft Office Excel |
CVE-2023-33133 |
7.8 |
否 |
否 |
064 |
.NET 和 Visual Studio |
CVE-2023-33135 |
7.3 |
否 |
否 |
065 |
Microsoft Office Excel |
CVE-2023-33137 |
7.8 |
否 |
否 |
066 |
Visual Studio |
CVE-2023-33139 |
5.5 |
否 |
否 |
067 |
Microsoft Office OneNote |
CVE-2023-33140 |
6.5 |
否 |
否 |
068 |
ASP .NET |
CVE-2023-33141 |
7.5 |
否 |
否 |
069 |
Microsoft Office SharePoint |
CVE-2023-33142 |
6.5 |
否 |
否 |
070 |
Microsoft Edge(基于 Chromium) |
CVE-2023-33143 |
7.5 |
否 |
否 |
071 |
Visual Studio Code |
CVE-2023-33144 |
5 |
否 |
否 |
072 |
Microsoft Edge(基于 Chromium) |
CVE-2023-33145 |
6.5 |
否 |
否 |
073 |
Microsoft Office |
CVE-2023-33146 |
7.8 |
否 |
否 |
上表阅读不方便的话,还有cve与产品对应关系
漏洞编号 |
受影响产品版本 |
CVE-2023-29357 |
Microsoft SharePoint Server 2019 |
CVE-2023-32031 |
Microsoft Exchange Server 2019 Cumulative Update 13 |
Microsoft Exchange Server 2019 Cumulative Update 12 |
|
Microsoft Exchange Server 2016 Cumulative Update 23 |
|
CVE-2023-33133 |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) |
CVE-2023-32029 |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) |
Microsoft Excel 2013 RT Service Pack 1 |
|
Microsoft Excel 2016 (64-bit edition) |
|
Microsoft Excel 2016 (32-bit edition) |
|
Microsoft Office LTSC 2021 for 32-bit editions |
|
Microsoft Office LTSC 2021 for 64-bit editions |
|
Microsoft Office LTSC for Mac 2021 |
|
Microsoft 365 Apps for Enterprise for 64-bit Systems |
|
Microsoft 365 Apps for Enterprise for 32-bit Systems |
|
Microsoft Office Online Server |
|
Microsoft Office 2019 for Mac |
|
Microsoft Office 2019 for 64-bit editions |
|
Microsoft Office 2019 for 32-bit editions |
|
CVE-2023-33137 |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) |
|
Microsoft Excel 2013 RT Service Pack 1 |
|
Microsoft Excel 2016 (64-bit edition) |
|
Microsoft Excel 2016 (32-bit edition) |
|
Microsoft Office Online Server |
|
Microsoft Office 2019 for 64-bit editions |
|
Microsoft Office 2019 for 32-bit editions |
|
CVE-2023-24897 |
Microsoft .NET Framework 3.5 AND 4.8 |
Microsoft .NET Framework 4.8 |
|
Microsoft .NET Framework 3.5 and 4.6.2 |
|
Microsoft .NET Framework 4.6.2 |
|
Microsoft .NET Framework 3.5 AND 4.8.1 |
|
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 |
|
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 |
|
Microsoft .NET Framework 3.5 AND 4.7.2 |
|
Microsoft Visual Studio 2022 version 17.6 |
|
.NET 6.0 |
|
.NET 7.0 |
|
Microsoft Visual Studio 2015 Update 3 |
|
Microsoft Visual Studio 2013 Update 5 |
|
Microsoft Visual Studio 2022 version 17.4 |
|
Microsoft Visual Studio 2022 version 17.0 |
|
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) |
|
Microsoft Visual Studio 2022 version 17.2 |
|
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) |
|
CVE-2023-29362 |
Windows Server 2012 R2 (Server Core installation) |
Windows Server 2012 R2 |
|
Windows Server 2012 (Server Core installation) |
|
Windows Server 2012 |
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) |
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 |
|
Windows Server 2016 (Server Core installation) |
|
Windows Server 2016 |
|
Windows 10 Version 1607 for x64-based Systems |
|
Windows 10 for x64-based Systems |
|
Windows 10 Version 22H2 for x64-based Systems |
|
Windows 11 Version 22H2 for x64-based Systems |
|
Windows 11 Version 22H2 for ARM64-based Systems |
|
Windows 10 Version 21H2 for x64-based Systems |
|
Windows 11 version 21H2 for ARM64-based Systems |
|
Windows 11 version 21H2 for x64-based Systems |
|
Windows Server 2022 (Server Core installation) |
|
Windows Server 2022 |
|
Remote Desktop client for Windows Desktop |
|
Windows Server 2019 (Server Core installation) |
|
Windows Server 2019 |
|
Windows 10 Version 1809 for x64-based Systems |
|
CVE-2023-29363 |
Windows Server 2012 R2 (Server Core installation) |
CVE-2023-32014 |
Windows Server 2012 R2 |
CVE-2023-32015 |
Windows Server 2012 (Server Core installation) |
Windows Server 2012 |
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) |
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 |
|
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) |
|
Windows Server 2008 for x64-based Systems Service Pack 2 |
|
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) |
|
Windows Server 2008 for 32-bit Systems Service Pack 2 |
|
Windows Server 2016 (Server Core installation) |
|
Windows Server 2016 |
|
Windows 10 Version 1607 for x64-based Systems |
|
Windows 10 Version 1607 for 32-bit Systems |
|
Windows 10 for x64-based Systems |
|
Windows 10 for 32-bit Systems |
|
Windows 10 Version 22H2 for 32-bit Systems |
|
Windows 10 Version 22H2 for ARM64-based Systems |
|
Windows 10 Version 22H2 for x64-based Systems |
|
Windows 11 Version 22H2 for x64-based Systems |
|
Windows 11 Version 22H2 for ARM64-based Systems |
|
Windows 10 Version 21H2 for x64-based Systems |
|
Windows 10 Version 21H2 for ARM64-based Systems |
|
Windows 10 Version 21H2 for 32-bit Systems |
|
Windows 11 version 21H2 for ARM64-based Systems |
|
Windows 11 version 21H2 for x64-based Systems |
|
Windows Server 2022 (Server Core installation) |
|
Windows Server 2022 |
|
Windows Server 2019 (Server Core installation) |
|
Windows Server 2019 |
|
Windows 10 Version 1809 for ARM64-based Systems |
|
Windows 10 Version 1809 for x64-based Systems |
|
Windows 10 Version 1809 for 32-bit Systems |
|
CVE-2023-32013 |
Windows 10 Version 22H2 for x64-based Systems |
Windows 11 Version 22H2 for x64-based Systems |
|
Windows 11 Version 22H2 for ARM64-based Systems |
|
Windows 10 Version 21H2 for x64-based Systems |
|
Windows 11 version 21H2 for ARM64-based Systems |
|
Windows 11 version 21H2 for x64-based Systems |
|
Windows Server 2022 (Server Core installation) |
|
Windows Server 2022 |
|
Windows Server 2019 (Server Core installation) |
|
Windows Server 2019 |
|
Windows 10 Version 1809 for x64-based Systems |
|
CVE-2023-33140 |
Microsoft OneNote for Universal |
我们当前windows仍然以2008r2和2012r2为主,均为64位,2012R2为带图形化的服务器
那么我们找了了这么一个对应关系
CVE-2023-24897 |
CVE-2023-29362 |
CVE-2023-29363 |
CVE-2023-32014 |
CVE-2023-32015 |
|
2008R2 |
KB5027540 KB5027531 |
KB5027275 KB5027256 |
KB5027275 KB5027256 |
KB5027275 KB5027256 |
KB5027275 KB5027256 |
2012R2 |
KB5027542 KB5027333 |
KB5027271 KB5027282 |
KB5027271 KB5027282 |
KB5027271 KB5027282 |
KB5027271 KB5027282 |
1.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897,找到系统所需的补丁,其中2008R2的补丁是KB5027540和KB5027531,2012R2对应补丁是KB5027542和KB5027333
2.https://msrc.microsoft.com/update-guide/zh-cn/vulnerability/CVE-2023-29362,找到系统所需的补丁,其中2008R2的补丁是KB5027275和KB5027256,2012R2对应补丁是KB5027271和KB5027282
3.https://msrc.microsoft.com/update-guide/zhcn/vulnerability/CVE-2023-29363
4.https://msrc.microsoft.com/update-guide/zh-cn/vulnerability/CVE-2023-32014
5.https://msrc.microsoft.com/update-guide/zh-cn/vulnerability/CVE-2023-32015
找到了上面的补丁,针对独立的服务器适合独立安装,批量的话还是WSUS方便。