작성일 : 20-02-13 14:27
2020년 02월 MS정기 보안업데이트 권고
 글쓴이 : 마이호스팅
조회 : 30,313  

수신 : 마이호스팅 KT-IDC 이용고객님

발신 : 마이호스팅 IDC운영팀

 

안녕하세요? 마이호스팅 IDC 운영팀 입니다.

아래와 같이 MS보안 권고안을 보내드리오니

해당항목은 패치 부탁드립니다.

 

2월 보안업데이트 개요( 11)

o 등급 : 긴급(Critical) 5, 중요(Important) 6

o 발표일 : 2020.02.12.()

o 업데이트 내용

 

제품군

중요도

영향

KB번호

Windows 10 v1909, v1903, v1809, v1803, v1709, v1607

긴급

원격 코드 실행

4502496  8

Windows Server 2019, Windows Server 2016, Server Core 설치(2019, 2016, v1909, v1903, v1803)

긴급

원격 코드 실행

4524244  5

Windows 8.1 , Windows Server 2012 R2, Windows Server 2012

긴급

원격 코드 실행

4502496  5

Internet Explorer

긴급

원격 코드 실행

4532691  11

Microsoft Office 관련 소프트웨어

중요

원격 코드 실행

4484156  15

Microsoft SharePoint 관련 소프트웨어

중요

스푸핑

4484255  6

Microsoft Exchange Server

중요

원격 코드 실행

4536987  3

Microsoft SQL Server

중요

원격 코드 실행

4532095  5

ChakraCore

긴급

원격 코드 실행

-

Adobe Flash Player

중요

권한 상승

4537759

Windows 악성 소프트웨어 제거 도구

중요

권한 상승

891716

 

o 참고사이트

- 한글 : https://portal.msrc.microsoft.com/ko-kr/security-guidance

- 영문 : https://portal.msrc.microsoft.com/en-us/security-guidance

1. Windows 10 v1909, v1903, v1809, v1803, v1709, v1607 보안 업데이트
 
□ 설명
 o 공격자가 특수하게 제작된 악성 응용 프로그램을 실행할 경우, 원격코드실행을 허용하는 취약점
 
 o 관련취약점 :
  - 원격코드실행 취약점(VE-2020-0655, CVE-2020-0662, CVE-2020-0681, CVE-2020-0708, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0729, CVE-2020-0734, CVE-2020-0738, CVE-2020-0767)
  - 권한상승 취약점(CVE-2020-0657, CVE-2020-0659, CVE-2020-0663, CVE-2020-0665, CVE-2020-066, CVE-2020-0667, CVE-2020-0668, CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672, CVE-2020-0678, CVE-2020-0679, CVE-2020-0680, CVE-2020-0682, CVE-2020-0683, CVE-2020-065, CVE-2020-0686, CVE-2020-0691, CVE-2020-0701, CVE-2020-0703, CVE-2020-0704, CVE-2020-0707, CVE-2020-0709, CVE-2020-0715, CVE-2020-0719, CVE-2020-0720, CVE-2020-0721, CVE-2020-072, CVE-2020-0723, CVE-2020-0724, CVE-2020-0725, CVE-2020-0726, CVE-2020-0727, CVE-2020-0730, CVE-2020-0731, CVE-2020-0732, CVE-2020-0735, CVE-2020-0737, CVE-2020-0739, CVE-2020-0740 CVE-2020-0741, CVE-2020-0742, CVE-2020-0743, CVE-2020-0745, CVE-2020-0747, CVE-2020-0749, CVE-2020-0750, CVE-2020-0752, CVE-2020-0753, CVE-2020-0754, CVE-2020-0757, CVE-2020-0792)
  - 서비스거부 취약점(CVE-2020-0660, CVE-2020-0661, CVE-2020-0751)
  - 보안기능 우회 취약점(CVE-2020-0689)
  -정보노출 취약점(CVE-2020-0658, CVE-2020-0675, CVE-2020-0676, CVE-2020-0677, CVE-2020-0698, CVE-2020-0705, CVE-2020-0706, CVE-2020-0714, CVE-2020-0716, CVE-2020-0717, CVE-20200728, CVE-2020-0744, CVE-2020-0746, CVE-2020-0748, CVE-2020-0755, CVE-2020-0756)
 
 o 영향 : 원격코드실행
 
 o 중요도 : 긴급
 
 o 관련 KB번호
  - 4502496, 4524244, 4532691, 4532693, 4537762, 4537764, 4537776, 4537789
 
□ 해결책
 o 영향 받는 소프트웨어를 이용하는 경우 마이크로소프트사의 보안 패치 적용
 
 
 
2. Windows Server 2019, Windows Server 2016, Server Core 설치(2019, 2016, v1909, v1903, v1803) 보안 업데이트
 
□ 설명
 o 공격자가 특수하게 제작된 악성 응용 프로그램을 실행할 경우, 원격코드실행을 허용하는 취약점
 
 o 관련취약점 :
  - 원격코드실행 취약점(CVE-2020-0655, CVE-2020-0662, CVE-2020-0681, CVE-2020-0708, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0729, CVE-2020-0734, CVE-2020-0738, CVE-2020-0767)
  - 권한상승 취약점(CVE-2020-0657, CVE-2020-0659, CVE-2020-0663, CVE-2020-0665, CVE-2020-0666, CVE-2020-0667, CVE-2020-0668, CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672, CVE-2020-0678, CVE-2020-0679, CVE-2020-0680, CVE-2020-0682, CVE-2020-0683, CVE-2020-065, CVE-2020-0686, CVE-2020-0691, CVE-2020-0701, CVE-2020-0703, CVE-2020-0704, CVE-2020-0707, CVE-2020-0709, CVE-2020-0715, CVE-2020-0719, CVE-2020-0720, CVE-2020-0721, CVE-2020-072, CVE-2020-0723, CVE-2020-0724, CVE-2020-0725, CVE-2020-0726, CVE-2020-0727, CVE-2020-0730, CVE-2020-0731, CVE-2020-0732, CVE-2020-0735, CVE-2020-0737, CVE-2020-0739, CVE-2020-0740 CVE-2020-0741, CVE-2020-0742, CVE-2020-0743, CVE-2020-0745, CVE-2020-0747, CVE-2020-0749, CVE-2020-0750, CVE-2020-0752, CVE-2020-0753, CVE-2020-0754, CVE-2020-0757, CVE-2020-0792)
  - 서비스거부 취약점(CVE-2020-0660, CVE-2020-0661, CVE-2020-0751)
  - 보안기능 우회 취약점(CVE-2020-0689)
  - 정보노출 취약점(CVE-2020-0658, CVE-2020-0675, CVE-2020-0676, CVE-2020-0677,CVE-2020-0698, CVE-2020-0705, CVE-2020-0706, CVE-2020-0714, CVE-2020-0716, CVE-2020-0717, CVE-2020-0728, CVE-2020-0744, CVE-2020-0746, CVE-2020-0748, CVE-2020-0755, CVE-2020-0756)
 
 o 영향 : 원격코드실행
 
 o 중요도 : 긴급
 
 o 관련 KB번호
  - 4524244, 4532691, 4532693, 4537762, 4537764
 
□ 해결책
 o 영향 받는 소프트웨어를 이용하는 경우 마이크로소프트사의 보안 패치 적용
 
 
 
3. Windows 8.1, Windows Server 2012 R2, Windows Server 2012 보안 업데이트
 
□ 설명
 o 공격자가 특수하게 제작된 악성 응용 프로그램을 실행할 경우, 원격코드실행을 허용하는 취약점
 
 o 관련취약점 :
  - 원격코드실행 취약점(CVE-2020-0655, CVE-2020-0662, CVE-2020-0681, CVE-2020-0708, CVE-2020-0729, CVE-2020-0734, CVE-2020-0738)
  - 권한상승 취약점(CVE-2020-0657, CVE-2020-0665, CVE-2020-0666, CVE-2020-0667, CVE-2020-0668, CVE-2020-0678, CVE-2020-0679 CVE-2020-0680, CVE-2020-0682, CVE-2020-0683, CVE-2020-0686, CVE-2020-0691, CVE-2020-0703, CVE-2020-0707, CVE-2020-0715, CVE-2020-0719, CVE-2020-0720, CVE-2020-0721, CVE-2020-0722 CVE-2020-0723, CVE-2020-0724, CVE-2020-0725, CVE-2020-0726, CVE-2020-0730, CVE-2020-0731, CVE-2020-0735, CVE-2020-0737, CVE-2020-0745, CVE-2020-0752, CVE-2020-0753, CVE-2020-0754)
  -정보노출 취약점(CVE-2020-0658, CVE-2020-0675, CVE-2020-0676, CVE-2020-0677, CVE-2020-0698, CVE-2020-0705, CVE-2020-0716, CVE-2020-0744, CVE-2020-0748, CVE-2020-0755, CVE-20200756)
  - 서비스거부 취약점(CVE-2020-0660)
  - 보안기능 우회 취약점(CVE-2020-0689)
 
 o 영향 : 원격코드실행
 
 o 중요도 : 긴급
 
 o 관련 KB번호
  - 4502496, 4537794, 4537803, 4537814, 4537821