摘要
2011年02月21日至3月20日,国家计算机网络入侵防范中心发布漏洞总条目为342条,漏洞总数比2月[1]减少了24.84。其中威胁级别为"紧急"的有68条,"高"的有110条,"中"的有146条,"低"的有18条。威胁级别为紧急和高的漏洞占到总量的52.05,从漏洞利用方式来看,远程攻击的有305条,本地攻击的有31条,局域网攻击的有6条。可见,能够从远程进行攻击的漏洞占绝大多数,这使得攻击者利用相应漏洞发动攻击更为容易。在此期间微软共发布3个安全公告,其中1个为严重等级,2个为重要等级,共修复微软媒体组件、Windows远程桌面客户端中的4个"远程代码执行"漏洞。在3月举行的全球黑客大赛Pwn2Own中,发现了InternetExplorer8浏览器中的两个零日漏洞以及苹果Safari浏览器中的一个代码执行漏洞。此外,Adobe也发布通告公布了FlashPlayer中存在的一个零日远程内存破坏漏洞。部分零日漏洞已经被利用进行攻击。建议广大用户及时安装补丁,增强系统安全性,做好安全防范工作,保证信息系统安全。
From February 21,2011 to March 20,2011,the National Computer Networks Intrusion Protection Center(aka NCNIPC) published 342 vulnerabilities,which decreased by 24.84%.Among all these vulnerabilities,68 ones were "Critical",110 were "Important",146 were "Middle",and 18 were "Low".The vulnerabilities at Level "Critical" and "Important" accounted for 52.05% of the total.From the access vectors' perspective,305 were network exploitable,31 were locally exploitable and 6 was Local network exploitable.The vast majority could be exploited remotely,which made exploitation easy.Microsoft published three security bulletins,of which one were considered critical and two were important.Four "Remote Code Execution" vulnerabilities in Windows Media and Remote Desktop Client were patched.During a Pwn2Own competition at CanSecWest 2011 held this month,two 0day vulnerabilities of Internet Explorer were disclosed and so was a "Code Execution" vulnerability of Apple Safari Explorer.Besides,Adobe published an 0day "Memory Corruption" vulnerability in Flash Player.Some of these 0day vulnerabilities have been exploited.NCNIPC would recommend that affected users install patches as soon as possible,enhance the security of systems,and take pre-measures to make sure the security of information.
出处
《信息网络安全》
2011年第4期95-95,97,共2页
Netinfo Security