让您全面了解并上手亿速云产品
常见入门级使用教程
对外 API 开发文档中心
您历史提交的工单
您的每一条意见,我们都严谨处理
您的每一条建议,我们都认真对待
CNNVD-ID编号 | CNNVD-201911-694 | CVE编号 | CVE-2018-12207 |
发布时间 | 2019-11-12 | 更新时间 | 2020-09-25 |
漏洞类型 | 输入验证错误 | 漏洞来源 | Ubuntu,Debian,Red Hat,Benjamin M. Romer,Gentoo |
危险等级 | 中危 | 威胁类型 | 本地 |
厂商 | N/A |
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。
Microsoft Windows和Windows Server中存在拒绝服务漏洞,该漏洞源于程序没有正确处理内存中的对象。攻击者可通过登录到受影响的系统并运行经特殊设计的应用程序利用该漏洞造成目标系统停止响应。以下产品及版本受到影响:Microsoft Windows 10,Windows 10版本1607,Windows 10版本1709,Windows 10版本1803,Windows 10版本1809,Windows 10版本1903,Windows 7 SP1,Windows 8.1,Windows RT 8.1,Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windows Server 2016,Windows Server 2019,Windows Server版本1803,Windows Server版本1903。
目前厂商已发布升级了Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞的补丁,Microsoft Windows和Microsoft Windows Server 输入验证错误漏洞的补丁获取链接:
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-12207
来源:UBUNTU
来源:REDHAT
来源:BUGTRAQ
来源:GENTOO
来源:CONFIRM
链接:https://support.f5.com/csp/article/K17269881?utm_source=f5support&utm_medium=RSS
来源:REDHAT
来源:REDHAT
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html
来源:FEDORA
来源:REDHAT
来源:REDHAT
来源:DEBIAN
来源:REDHAT
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html
来源:access.redhat.com
来源:access.redhat.com
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193348-1.html
来源:access.redhat.com
来源:www.debian.org
来源:support.f5.com
来源:access.redhat.com
来源:access.redhat.com
来源:access.redhat.com
来源:access.redhat.com
来源:www.vmware.com
链接:https://www.vmware.com/security/advisories/VMSA-2019-0020.html
来源:access.redhat.com
来源:access.redhat.com
来源:access.redhat.com
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193293-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193307-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193308-1.html
来源:access.redhat.com
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192962-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192960-1.html
来源:security.freebsd.org
链接:https://security.freebsd.org/advisories/FreeBSD-SA-19:25.mcepsc.asc
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html
来源:support.citrix.com
来源:www.oracle.com
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/xsa-304-and-xsa-305-security-vulnerabilities/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156920/Gentoo-Linux-Security-Advisory-202003-56.html
来源:www.auscert.org.au
来源:vigilance.fr
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155697/Red-Hat-Security-Advisory-2019-4245-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155405/Red-Hat-Security-Advisory-2019-3916-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155847/Red-Hat-Security-Advisory-2020-0028-01.html
来源:portal.msrc.microsoft.com
链接:https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-12207
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155294/Red-Hat-Security-Advisory-2019-3839-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155424/Red-Hat-Security-Advisory-2019-3941-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155318/Kernel-Live-Patch-Security-Notice-LSN-0059-1.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156058/Red-Hat-Security-Advisory-2020-0204-01.html
来源:access.redhat.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155956/Debian-Security-Advisory-4602-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155335/Ubuntu-Security-Notice-USN-4186-3.html
来源:nvd.nist.gov
暂无