CVE-2024-38063|Windows TCP/IP远程代码执行漏洞

CVE-2024-38063|Windows TCP/IP远程代码执行漏洞

alicy 信安百科 2024-08-25 18:00

0x00 前言

TCP/IP(传输控制协议/互联网协议)是一种核心的网络通信协议,它对于设备之间的网络通信至关重要。如果网络适配器没有启用TCP/IP服务,将无法正常连接到网络。

0x01 漏洞描述

CVE-2024-38063技术原理主要涉及整数下溢和缓冲区溢出。

在处理 IPv6 数据包过程中,存在对某些数据值的计算或处理不当,导致出现整数下溢,计算结果小于预期的最小值,导致错误的内存访问或数据处理。

发送特制IPv6数据包时,数据包特定字段值被设计成能够触发整数下溢。由于下溢错误,导致系统在分配内存或处理数据时出现偏差,引发缓冲区溢出。

缓冲区溢出是指缓冲区写入的数据量超过缓冲区本身的容量,覆盖了相邻的内存区域。攻击者构造的数据可以覆盖关键的内存区域,包括程序的控制流信息(如函数返回地址等)。

通过覆盖关键内存信息,可以让目标系统执行预先植入在数据包中的恶意代码,实现代码执行,获得系统控制权。

0x02 CVE编号

CVE-2024-38063

0x03 影响版本

Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems

0x04 漏洞详情

https://learn.microsoft.com/zh-cn/troubleshoot/windows-server/networking/description-tcp-features

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063

0x05 参考链接

https://learn.microsoft.com/zh-cn/troubleshoot/windows-server/networking/description-tcp-features

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063

推荐阅读:

CVE-2024-40725|Apache HTTP Server 源代码泄露漏洞(POC)

CVE-2024-5217|ServiceNow Glide表达式注入漏洞(POC)

CVE-2024-36401|GeoServer 未授权远程代码执行漏洞(POC)

Ps:国内外安全热点分享,欢迎大家分享、转载,请保证文章的完整性。文章中出现敏感信息和侵权内容,请联系作者删除信息。信息安全任重道远,感谢您的支持

!!!

本公众号的文章及工具仅提供学习参考,由于传播、利用此文档提供的信息而造成任何直接或间接的后果及损害,均由使用者本人负责,本公众号及文章作者不为此承担任何责任。