LDAP 是一种开放的、跨平台的、行业标准的应用层协议,用于访问和维护分布式目录信息服务。它定义了客户端如何与目录服务器进行通信,以查询、修改和管理目录数据。
综合处置优先级:高
基本信息 | 微步编号 | XVE-2024-35677 |
漏洞类型 | 拒绝服务漏洞 | |
利用条件评估 | 利用漏洞的网络条件 | 远程 |
是否需要绕过安全机制 | 不需要 | |
对被攻击系统的要求 | ||
利用漏洞的权限要求 | 无需任何权限 | |
是否需要受害者配合 | 不需要 | |
利用情报 | PoC是否公开 | 是 |
已知利用行为 | 否 |
产品名称 | Microsoft - Windows |
受影响版本 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
有无修复补丁 | 有 |
微软官方已发布漏洞公告,请尽快前往下载更新补丁:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113
使用流量设备监控可疑的DNS SRV查询,对可疑查询进行防护。
使用终端设备监控可疑的DsrGetDcNameEx2 RPC调用,对可疑RPC调用进行防护。
根据微软官方漏洞通告,尽快安装对应的补丁。
微步威胁感知平台TDP 已支持检测,检测ID:S3100158089,模型/规则高于20250106000000可检出。
//
微步漏洞情报订阅服务
微步提供漏洞情报订阅服务,精准、高效助力企业漏洞运营:
提供高价值漏洞情报,具备及时、准确、全面和可操作性,帮助企业高效应对漏洞应急与日常运营难题;
可实现对高威胁漏洞提前掌握,以最快的效率解决信息差问题,缩短漏洞运营MTTR;
提供漏洞完整的技术细节,更贴近用户漏洞处置的落地;
X漏洞奖励计划
活动详情:https://x.threatbook.com/v5/vulReward