>
代码注入
代码注入
CNNVD-ID编号 | CNNVD-202104-810 | CVE编号 | CVE-2021-28349 |
发布时间 | 2021-04-13 | 更新时间 | 2021-04-15 |
漏洞类型 | 代码注入 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 本地 |
厂商 | N/A |
漏洞介绍
Microsoft Windows GDI+是美国微软(Microsoft)公司的一个Windows操作操作系统的图形设备接口。该软件是.NET框架的组成部分,负责在屏幕和打印机上绘制图形图像和显示信息。 Microsoft Windows GDI+ 远程代码执行漏洞。以下产品和版本受到影响:Windows Server, version 20H2 (Server Core Installation),Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Co漏洞补丁
目前厂商已发布升级了代码注入的补丁,代码注入的补丁获取链接: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28349参考网址
暂无
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202104-810

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论