2022年6月29日星期三

Mozilla 產品多個漏洞

發佈日期: 2022年06月29日

風險: 中度風險

類型: 用戶端 - 瀏覽器

類型: 瀏覽器

於 Mozilla 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼、洩露敏感資料、資料篡改及繞過保安限制。


影響

  • 遠端執行程式碼
  • 繞過保安限制
  • 資料洩露
  • 仿冒
  • 阻斷服務
  • 篡改

受影響之系統或技術

以下版本之前的版本﹕

 

  • Firefox 102
  • Firefox ESR 91.11
  • Thunderbird 102
  • Thunderbird 91.11

解決方案

在安裝軟體之前,請先瀏覽供應商之官方網站,以獲得更多詳細資料。

更新至版本:

 

  • Firefox 102
  • Firefox ESR 91.11
  • Thunderbird 102
  • Thunderbird 91.11

漏洞識別碼


資料來源


相關連結

Mozilla Products Multiple Vulnerabilities

Release Date: 29 Jun 2022

RISK: Medium Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, spoofing, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.


Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing
  • Denial of Service
  • Data Manipulation

System / Technologies affected

Versions prior to:

 

  • Firefox 102
  • Firefox ESR 91.11
  • Thunderbird 102
  • Thunderbird 91.11

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • Firefox 102
  • Firefox ESR 91.11
  • Thunderbird 102
  • Thunderbird 91.11

Vulnerability Identifier


Source


Related Link

Red Hat 內核多個漏洞

發佈日期: 2022年06月29日

風險: 中度風險

類型: 操作系統 - LINUX

類型: LINUX

於 Red Hat 內核發現多個漏洞,遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行程式碼、洩露敏感資料及權限提升。


影響

  • 遠端執行程式碼
  • 資料洩露
  • 權限提升

受影響之系統或技術

  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Virtualization Host 4 for RHEL 7 x86_64

    解決方案

    在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

    漏洞識別碼


    資料來源


    相關連結

    Red Hat Kernel Multiple Vulnerabilities

    Release Date: 29 Jun 2022

    RISK: Medium Risk

    TYPE: Operating Systems - Linux

    TYPE: Linux

    Multiple vulnerabilities have been identified in Red Hat Kernel. A remote attacker can exploit these vulnerabilities to trigger remote code execution, sensitive information disclosure and elevation of privilege on the targeted system.


    Impact

    • Remote Code Execution
    • Information Disclosure
    • Elevation of Privilege

    System / Technologies affected

    • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64
    • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
    • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
    • Red Hat Enterprise Linux Desktop 7 x86_64
    • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    • Red Hat Enterprise Linux for IBM z Systems 7 s390x
    • Red Hat Enterprise Linux for Power, big endian 7 ppc64
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
    • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
    • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    • Red Hat Enterprise Linux Server 7 x86_64
    • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
    • Red Hat Enterprise Linux Workstation 7 x86_64
    • Red Hat Virtualization Host 4 for RHEL 7 x86_64

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.


      Vulnerability Identifier


      Source


      Related Link

      2022年6月28日星期二

      SUSE Linux 內核多個漏洞

      發佈日期: 2022年06月28日

      風險: 中度風險

      類型: 操作系統 - LINUX

      類型: LINUX

      於 SUSE Linux 內核發現多個漏洞。攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、洩露敏感資料及繞過保安限制。


      影響

      • 權限提升
      • 繞過保安限制
      • 資料洩露
      • 阻斷服務

      受影響之系統或技術

      • openSUSE Leap 15.3
      • openSUSE Leap 15.4
      • SUSE Linux Enterprise Desktop 15-SP3
      • SUSE Linux Enterprise High Availability 15-SP3
      • SUSE Linux Enterprise High Performance Computing
      • SUSE Linux Enterprise High Performance Computing 15-SP3
      • SUSE Linux Enterprise Micro 5.1
      • SUSE Linux Enterprise Micro 5.2
      • SUSE Linux Enterprise Module for Basesystem 15-SP3
      • SUSE Linux Enterprise Module for Development Tools 15-SP3
      • SUSE Linux Enterprise Module for Legacy Software 15-SP3
      • SUSE Linux Enterprise Module for Live Patching 15-SP3
      • SUSE Linux Enterprise Module for Public Cloud 15-SP3
      • SUSE Linux Enterprise Module for Realtime 15-SP3
      • SUSE Linux Enterprise Real Time 15-SP3
      • SUSE Linux Enterprise Server
      • SUSE Linux Enterprise Server 15-SP3
      • SUSE Linux Enterprise Server for SAP Applications
      • SUSE Linux Enterprise Server for SAP Applications 15-SP3
      • SUSE Linux Enterprise Workstation Extension 15-SP3
      • SUSE Manager Proxy 4.2
      • SUSE Manager Retail Branch Server 4.2
      • SUSE Manager Server 4.2

      解決方案

      在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

       

      安裝供應商提供的修補程式:


      漏洞識別碼


      資料來源


      相關連結

      SUSE Linux Kernel Multiple Vulnerabilities

      Release Date: 28 Jun 2022

      RISK: Medium Risk

      TYPE: Operating Systems - Linux

      TYPE: Linux

      Multiple vulnerabilities were identified in SUSE Linux Kernel. A attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, sensitive information disclosure and security restriction bypass on the targeted system.


      Impact

      • Elevation of Privilege
      • Security Restriction Bypass
      • Information Disclosure
      • Denial of Service

      System / Technologies affected

      • openSUSE Leap 15.3
      • openSUSE Leap 15.4
      • SUSE Linux Enterprise Desktop 15-SP3
      • SUSE Linux Enterprise High Availability 15-SP3
      • SUSE Linux Enterprise High Performance Computing
      • SUSE Linux Enterprise High Performance Computing 15-SP3
      • SUSE Linux Enterprise Micro 5.1
      • SUSE Linux Enterprise Micro 5.2
      • SUSE Linux Enterprise Module for Basesystem 15-SP3
      • SUSE Linux Enterprise Module for Development Tools 15-SP3
      • SUSE Linux Enterprise Module for Legacy Software 15-SP3
      • SUSE Linux Enterprise Module for Live Patching 15-SP3
      • SUSE Linux Enterprise Module for Public Cloud 15-SP3
      • SUSE Linux Enterprise Module for Realtime 15-SP3
      • SUSE Linux Enterprise Real Time 15-SP3
      • SUSE Linux Enterprise Server
      • SUSE Linux Enterprise Server 15-SP3
      • SUSE Linux Enterprise Server for SAP Applications
      • SUSE Linux Enterprise Server for SAP Applications 15-SP3
      • SUSE Linux Enterprise Workstation Extension 15-SP3
      • SUSE Manager Proxy 4.2
      • SUSE Manager Retail Branch Server 4.2
      • SUSE Manager Server 4.2

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.

       

      Apply fixes issued by the vendor:


      Vulnerability Identifier


      Source


      Related Link

      2022年6月27日星期一

      Citrix Hypervisor 多個漏洞

      發佈日期: 2022年06月27日

      風險: 中度風險

      類型: 伺服器 - 其他伺服器

      類型: 其他伺服器

      於 Citrix Hypervisor 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼。


      影響

      • 遠端執行程式碼

      受影響之系統或技術

      • Citrix Hypervisor 7.1 LTSR CU2

      解決方案

      在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

       

      安裝供應商提供的修補程式:


      漏洞識別碼


      資料來源


      相關連結

      Citrix Hypervisor Multiple Vulnerabilities

      Release Date: 27 Jun 2022

      RISK: Medium Risk

      TYPE: Servers - Other Servers

      TYPE: Other Servers

      Multiple vulnerabilities were identified in Citrix Hypervisor. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution on the targeted system.


      Impact

      • Remote Code Execution

      System / Technologies affected

      • Citrix Hypervisor 7.1 LTSR CU2

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.

       

      Apply fixes issued by the vendor:


      Vulnerability Identifier


      Source


      Related Link

      2022年6月22日星期三

      Google Chrome 多個漏洞

      發佈日期: 2022年06月22日

      風險: 中度風險

      類型: 用戶端 - 瀏覽器

      類型: 瀏覽器

      於 Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼,繞過保安限制及敏感資料洩露。


      影響

      • 遠端執行程式碼
      • 資料洩露
      • 繞過保安限制

      受影響之系統或技術

      • Google Chrome 103.0.5060.53 之前的版本

      解決方案

      在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

      安裝軟件供應商提供的修補程式:

      • 更新至 103.0.5060.53 版本

      漏洞識別碼


      資料來源


      相關連結

      Google Chrome Multiple Vulnerabilities

      Release Date: 22 Jun 2022

      RISK: Medium Risk

      TYPE: Clients - Browsers

      TYPE: Browsers

      Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.


      Impact

      • Remote Code Execution
      • Information Disclosure
      • Security Restriction Bypass

      System / Technologies affected

      • Google Chrome prior to 103.0.5060.53

      Solutions

      Before installation of the software, please visit the software vendor web-site for more details.

      Apply fixes issued by the vendor:

      • Update to version 103.0.5060.53

      Vulnerability Identifier


      Source


      Related Link

      2022年6月17日星期五

      思科小型企業路由器阻斷服務漏洞

      發佈日期: 2022年06月17日

      風險: 高度風險

      類型: 操作系統 - Network

      類型: Network

      於 思科小型企業路由器 發現一個漏洞。攻擊者可利用這漏洞,於目標系統觸發阻斷服務狀況。

       

      注意
      由於受影響產品已經進入產品生命周期終止過程,供應商確認這些產品不會提供解決方案或軟件更新。

      要確定產品是否受漏洞影響,請打開網路管理界面,然後選擇“基本設置”>“遠程管理”。 如果已剔選“啟用”,則代表設備受漏洞影響。


      影響

      • 阻斷服務

      受影響之系統或技術

      • Cisco RV110W Wireless-N VPN 防火牆
      • Cisco RV130 VPN 路由器
      • Cisco RV130W Wireless-N Multifunction VPN 路由器
      • Cisco RV215W Wireless-N VPN 路由器

      解決方案

      在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

       


      漏洞識別碼


      資料來源


      相關連結

      Cisco Small Business Routers Denial Of Service Vulnerability

      Release Date: 17 Jun 2022

      RISK: High Risk

      TYPE: Operating Systems - Networks OS

      TYPE: Networks OS

      A vulnerability was identified in Cisco Cisco Small Business Routers. An attacker could exploit this vulnerability to trigger denial of service condition on the targeted system.

       

      Note:

      The vendor confirms there are no workarounds or fix as affected products have already entered end of life process. 

      To determine whether the products is vulnerable, open the web-based management interface and choose Basic Settings > Remote Management. If the Enable check box is checked, the device is vulnerable.


      Impact

      • Denial of Service

      System / Technologies affected

      • Cisco RV110W Wireless-N VPN Firewall
      • Cisco RV130 VPN Router
      • Cisco RV130W Wireless-N Multifunction VPN Router
      • Cisco RV215W Wireless-N VPN Router

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.

       


      Vulnerability Identifier


      Source


      Related Link

      SUSE Linux 內核多個漏洞

      發佈日期: 2022年06月17日

      風險: 中度風險

      類型: 操作系統 - LINUX

      類型: LINUX

      於 SUSE 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、資料洩露、遠端執行程式碼、篡改及繞過保安限制。


      影響

      • 權限提升
      • 繞過保安限制
      • 篡改
      • 資料洩露
      • 阻斷服務
      • 遠端執行程式碼

      受影響之系統或技術

      • HPE Helion Openstack 8
      • SUSE Linux Enterprise Desktop 15-SP3
      • SUSE Linux Enterprise High Availability 12-SP3
      • SUSE Linux Enterprise High Availability 12-SP4
      • SUSE Linux Enterprise High Availability 15-SP3
      • SUSE Linux Enterprise High Performance Computing
      • SUSE Linux Enterprise High Performance Computing 12-SP3
      • SUSE Linux Enterprise High Performance Computing 12-SP4
      • SUSE Linux Enterprise High Performance Computing 15-SP3
      • SUSE Linux Enterprise Live Patching 12-SP4
      • SUSE Linux Enterprise Micro 5.1
      • SUSE Linux Enterprise Micro 5.2
      • SUSE Linux Enterprise Module for Basesystem 15-SP3
      • SUSE Linux Enterprise Module for Development Tools 15-SP3
      • SUSE Linux Enterprise Module for Legacy Software 15-SP3
      • SUSE Linux Enterprise Module for Live Patching 15-SP3
      • SUSE Linux Enterprise Module for Public Cloud 15-SP3
      • SUSE Linux Enterprise Server
      • SUSE Linux Enterprise Server 12-SP2-BCL
      • SUSE Linux Enterprise Server 12-SP3
      • SUSE Linux Enterprise Server 12-SP3-BCL
      • SUSE Linux Enterprise Server 12-SP3-LTSS
      • SUSE Linux Enterprise Server 12-SP4
      • SUSE Linux Enterprise Server 12-SP4-LTSS
      • SUSE Linux Enterprise Server 12-SP5
      • SUSE Linux Enterprise Server 15-SP3
      • SUSE Linux Enterprise Server for SAP 12-SP3
      • SUSE Linux Enterprise Server for SAP 12-SP4
      • SUSE Linux Enterprise Server for SAP Applications
      • SUSE Linux Enterprise Server for SAP Applications 15-SP3
      • SUSE Linux Enterprise Workstation Extension 15-SP3
      • SUSE Manager Proxy 4.2
      • SUSE Manager Retail Branch Server 4.2
      • SUSE Manager Server 4.2
      • SUSE OpenStack Cloud 8
      • SUSE OpenStack Cloud 9
      • SUSE OpenStack Cloud Crowbar 8
      • SUSE OpenStack Cloud Crowbar 9
      • openSUSE Leap 15.3
      • openSUSE Leap 15.4

      解決方案

      在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

       

      安裝供應商提供的修補程式:


      漏洞識別碼


      資料來源


      相關連結

      SUSE Linux Kernel Multiple Vulnerabilities

      Release Date: 17 Jun 2022

      RISK: Medium Risk

      TYPE: Operating Systems - Linux

      TYPE: Linux

      Multiple vulnerabilities were identified in SUSE Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, denial of service condition, information disclosure, remote code execution, data manipulation and security restriction bypass on the targeted system.


      Impact

      • Elevation of Privilege
      • Security Restriction Bypass
      • Data Manipulation
      • Information Disclosure
      • Denial of Service
      • Remote Code Execution

      System / Technologies affected

      • HPE Helion Openstack 8
      • SUSE Linux Enterprise Desktop 15-SP3
      • SUSE Linux Enterprise High Availability 12-SP3
      • SUSE Linux Enterprise High Availability 12-SP4
      • SUSE Linux Enterprise High Availability 15-SP3
      • SUSE Linux Enterprise High Performance Computing
      • SUSE Linux Enterprise High Performance Computing 12-SP3
      • SUSE Linux Enterprise High Performance Computing 12-SP4
      • SUSE Linux Enterprise High Performance Computing 15-SP3
      • SUSE Linux Enterprise Live Patching 12-SP4
      • SUSE Linux Enterprise Micro 5.1
      • SUSE Linux Enterprise Micro 5.2
      • SUSE Linux Enterprise Module for Basesystem 15-SP3
      • SUSE Linux Enterprise Module for Development Tools 15-SP3
      • SUSE Linux Enterprise Module for Legacy Software 15-SP3
      • SUSE Linux Enterprise Module for Live Patching 15-SP3
      • SUSE Linux Enterprise Module for Public Cloud 15-SP3
      • SUSE Linux Enterprise Server
      • SUSE Linux Enterprise Server 12-SP2-BCL
      • SUSE Linux Enterprise Server 12-SP3
      • SUSE Linux Enterprise Server 12-SP3-BCL
      • SUSE Linux Enterprise Server 12-SP3-LTSS
      • SUSE Linux Enterprise Server 12-SP4
      • SUSE Linux Enterprise Server 12-SP4-LTSS
      • SUSE Linux Enterprise Server 12-SP5
      • SUSE Linux Enterprise Server 15-SP3
      • SUSE Linux Enterprise Server for SAP 12-SP3
      • SUSE Linux Enterprise Server for SAP 12-SP4
      • SUSE Linux Enterprise Server for SAP Applications
      • SUSE Linux Enterprise Server for SAP Applications 15-SP3
      • SUSE Linux Enterprise Workstation Extension 15-SP3
      • SUSE Manager Proxy 4.2
      • SUSE Manager Retail Branch Server 4.2
      • SUSE Manager Server 4.2
      • SUSE OpenStack Cloud 8
      • SUSE OpenStack Cloud 9
      • SUSE OpenStack Cloud Crowbar 8
      • SUSE OpenStack Cloud Crowbar 9
      • openSUSE Leap 15.3
      • openSUSE Leap 15.4

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.

       

      Apply fixes issued by the vendor:


      Vulnerability Identifier


      Source


      Related Link

      2022年6月15日星期三

      Adobe 每月保安更新 (2022年6月)

      發佈日期: 2022年06月15日

      風險: 中度風險

      類型: 用戶端 - 辦公室應用

      類型: 辦公室應用

      Adobe已為產品提供本月保安更新:

       

      受影響產品風險程度影響備註詳情(包括 CVE)
      Adobe Animate中度風險 中度風險遠端執行程式碼 APSB22-24
      Adobe Bridge中度風險 中度風險遠端執行程式碼
      篡改
      資料洩露
       APSB22-25
      Adobe Illustrator中度風險 中度風險遠端執行程式碼
      資料洩露
       APSB22-26
      Adobe InCopy中度風險 中度風險遠端執行程式碼 APSB22-29
      Adobe InDesign中度風險 中度風險遠端執行程式碼 APSB22-30
      RoboHelp Server 中度風險 中度風險權限提升 APSB22-31

       

      「極高度風險」產品數目:0

      「高度風險」產品數目:0

      「中度風險」產品數目:6

      「低度風險」產品數目:0

      整體「風險程度」評估:中度風險


      影響

      • 篡改
      • 權限提升
      • 遠端執行程式碼
      • 資料洩露

      受影響之系統或技術

      • Adobe Animate 22.0.5 及以前版本
      • Adobe Bridge  12.0.1 及以前版本
      • Illustrator 2022 26.0.2 及以前版本
      • Illustrator 2021 25.4.5 及以前版本
      • Adobe InCopy  17.2 及以前版本
      • Adobe InCopy  16.4.1 及以前版本
      • Adobe InDesign 17.2.1 及以前版本
      • Adobe InDesign 16.4.1 及以前版本
      • RoboHelp Server RHS 11 Update 3 及以前版本

      解決方案

      在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

      • 安裝供應商提供的修補程式。個別產品詳情可參考上表「詳情」一欄或執行軟件更新。

      漏洞識別碼


      資料來源


      相關連結

      Adobe Monthly Security Update (June 2022)

      Release Date: 15 Jun 2022

      RISK: Medium Risk

      TYPE: Clients - Productivity Products

      TYPE: Productivity Products

      Adobe has released monthly security update for their products:

       

      Vulnerable ProductRisk LevelImpactsNotesDetails (including CVE)
      Adobe AnimateMedium Risk Medium RiskRemote Code Execution APSB22-24
      Adobe BridgeMedium Risk Medium RiskRemote Code Execution
      Data Manipulation
      Information Disclosure
       APSB22-25
      Adobe IllustratorMedium Risk Medium RiskRemote Code Execution
      Information Disclosure
       APSB22-26
      Adobe InCopyMedium Risk Medium RiskRemote Code Execution APSB22-29
      Adobe InDesignMedium Risk Medium RiskRemote Code Execution APSB22-30
      RoboHelp Server Medium Risk Medium RiskElevation of Privilege APSB22-31

       

      Number of 'Extremely High Risk' product(s): 0

      Number of 'High Risk' product(s): 0

      Number of 'Medium Risk' product(s): 6

      Number of 'Low Risk' product(s): 0

      Evaluation of overall 'Risk Level': Medium Risk


      Impact

      • Data Manipulation
      • Elevation of Privilege
      • Remote Code Execution
      • Information Disclosure

      System / Technologies affected

      • Adobe Animate 22.0.5 and earlier versions
      • Adobe Bridge  12.0.1 and earlier versions
      • Illustrator 2022 26.0.2 and earlier versions
      • Illustrator 2021 25.4.5 and earlier versions
      • Adobe InCopy  17.2 and earlier versions
      • Adobe InCopy  16.4.1 and earlier versions
      • Adobe InDesign 17.2.1 and earlier versions
      • Adobe InDesign 16.4.1 and earlier versions
      • RoboHelp Server RHS 11 Update 3 and earlier versions

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.

      • Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update

      Vulnerability Identifier


      Source


      Related Link

      微軟每月保安更新 (2022年6月)

      發佈日期: 2022年06月15日

      風險: 極高度風險

      類型: 操作系統 - 視窗操作系統

      類型: 視窗操作系統

      微軟已為產品提供本月保安更新:

       

      受影響產品風險程度影響備註
      視窗中度風險 極高度風險資料洩露
      遠端執行程式碼
      權限提升
      阻斷服務
      繞過保安限制
      仿冒
      延伸安全性更新 (ESU)中度風險 中度風險資料洩露
      權限提升
      遠端執行程式碼
      阻斷服務
       
      Azure中度風險 中度風險權限提升
      遠端執行程式碼
      資料洩露
       
      System Center中度風險 中度風險權限提升 
      瀏覽器中度風險 中度風險遠端執行程式碼 
      微軟 Office中度風險 中度風險遠端執行程式碼
      資料洩露
       
      開發者工具中度風險 中度風險資料洩露 
      SQL Server中度風險 中度風險遠端執行程式碼 
      Apps中度風險 中度風險遠端執行程式碼 

       

      「極高度風險」產品數目:1

      「高度風險」產品數目:0

      「中度風險」產品數目:8

      「低度風險」產品數目:0

      整體「風險程度」評估:極高度風險


      影響

      • 阻斷服務
      • 權限提升
      • 遠端執行程式碼
      • 繞過保安限制
      • 資料洩露
      • 仿冒

      受影響之系統或技術

      • 視窗
      • 延伸安全性更新 (ESU)
      • Azure
      • System Center
      • 瀏覽器
      • 微軟 Office
      • 開發者工具
      • SQL Server
      • Apps

      解決方案

      在安裝軟體之前,請先瀏覽軟體供應商之網站,以獲得更多詳細資料。

      • 安裝軟件供應商提供的修補程式。

      漏洞識別碼


      資料來源


      相關連結

      Microsoft Monthly Security Update (June 2022)

      Release Date: 15 Jun 2022

      RISK: Extremely High Risk

      TYPE: Operating Systems - Windows OS

      TYPE: Windows OS

      Microsoft has released monthly security update for their products:

       

      Vulnerable ProductRisk LevelImpactsNotes
      WindowsMedium Risk Extremely High RiskInformation Disclosure
      Remote Code Execution
      Elevation of Privilege
      Denial of Service
      Security Restriction Bypass
      Spoofing
      Extended Security Updates (ESU)Medium Risk Medium RiskInformation Disclosure
      Elevation of Privilege
      Remote Code Execution
      Denial of Service
       
      AzureMedium Risk Medium RiskElevation of Privilege
      Remote Code Execution
      Information Disclosure
       
      System CenterMedium Risk Medium RiskElevation of Privilege 
      BrowserMedium Risk Medium RiskRemote Code Execution 
      Microsoft OfficeMedium Risk Medium RiskRemote Code Execution
      Information Disclosure
       
      Developer ToolsMedium Risk Medium RiskInformation Disclosure 
      SQL ServerMedium Risk Medium RiskRemote Code Execution 
      AppsMedium Risk Medium RiskRemote Code Execution 

       

      Number of 'Extremely High Risk' product(s): 1

      Number of 'High Risk' product(s): 0

      Number of 'Medium Risk' product(s): 8

      Number of 'Low Risk' product(s): 0

      Evaluation of overall 'Risk Level': Extremely High Risk


      Impact

      • Denial of Service
      • Elevation of Privilege
      • Remote Code Execution
      • Security Restriction Bypass
      • Information Disclosure
      • Spoofing

      System / Technologies affected

      • Windows
      • Extended Security Updates (ESU)
      • Azure
      • System Center
      • Browser
      • Microsoft Office
      • Developer Tools
      • SQL Server
      • Apps

      Solutions

      Before installation of the software, please visit the vendor web-site for more details.

      •  Apply fixes issued by the vendor.

      Vulnerability Identifier


      Source


      Related Link

      惡意軟件警報 - 零售商成為 Scattered Spider 黑客組織勒索軟件攻擊的目標

      惡意軟件警報 - 零售商成為 Scattered Spider 黑客組織勒索軟件攻擊的目標 發佈日期: 2025年05月02日 類別: ...