有人不知道如何获得MS对应的补丁KB编号,可以看这篇文章了~

漏洞编号为ms17-010,如何查看对应MS号的补丁已经安装:

下载微软官方的补丁信息列表(Microsoft Security Bulletin Data)

https://www.microsoft.com/en-gb/download/confirmation.aspx?id=36982

http://download.microsoft.com/download/6/7/3/673E4349-1CA5-40B9-8879-095C72D5B49D/BulletinSearch.xlsx

查看系统对应补丁号码:

执行systeminfo,查看是否有对应的补丁,比如server 2012R2对应的是KB4012598注意补丁最后备注信息,注意需要重启。

Date Posted    Bulletin Id    Bulletin KB    Severity    Impact    Title    Affected Product    Component KB    Affected Component    Impact    Severity    Supersedes    Reboot    CVEs
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 R2 for x64-based Systems Service Pack 1 4012212 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2016 for x64-based Systems 4013429 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 10 for 32-bit Systems 4012606 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 10 for x64-based Systems 4012606 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 10 Version 1511 for 32-bit Systems 4013198 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 10 Version 1511 for x64-based Systems 4013198 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 10 Version 1607 for 32-bit Systems 4013429 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 10 Version 1607 for x64-based Systems 4013429 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 4012212 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 8.1 for 32-bit Systems 4012213 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 8.1 for x64-based Systems 4012213 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2012 4012214 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2012 R2 4012213 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows RT 8.1 4012216 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4012212 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2012 (Server Core installation) 4012214 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2012 R2 (Server Core installation) 4012213 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2016 for x64-based Systems (Server Core installation) 4013429 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Vista Service Pack 2 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Vista x64 Edition Service Pack 2 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 for 32-bit Systems Service Pack 2 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 for x64-based Systems Service Pack 2 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows Server 2008 for Itanium-based Systems Service Pack 2 4012598 Remote Code Execution Critical MS16-114[3177186] Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 7 for 32-bit Systems Service Pack 1 4012212 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148
3/14/2017 ms17-010 4013389 Critical Remote Code Execution Security Update for Microsoft Windows SMB Server Windows 7 for x64-based Systems Service Pack 1 4012212 Remote Code Execution Critical Yes CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CVE-2017-0148

ShadowBroker公开的SMB远程命令执行漏洞修复的更多相关文章

  1. Linux系统服务器 GNU Bash 环境变量远程命令执行漏洞修复命令

    具体方法就是在ssh上执行 yum update bash 完成后重启VPS.

  2. 【漏洞公告】高危:Windows系统 SMB/RDP远程命令执行漏洞

    2017年4月14日,国外黑客组织Shadow Brokers发出了NSA方程式组织的机密文档,包含了多个Windows 远程漏洞利用工具,该工具包可以可以覆盖全球70%的Windows服务器,为了确 ...

  3. FlexPaper 2.3.6 远程命令执行漏洞 附Exp

    影响版本:小于FlexPaper 2.3.6的所有版本 FlexPaper (https://www.flowpaper.com) 是一个开源项目,遵循GPL协议,在互联网上非常流行.它为web客户端 ...

  4. D-Link service.cgi远程命令执行漏洞复现

    1.1 概述 友讯集团(D-Link),成立于1986年,1994年10月于台湾证券交易所挂牌上市,为台湾第一家上市的网络公司,以自创D-Link品牌行销全球,产品遍及100多个国家. 1月17日,C ...

  5. struts2远程命令执行漏洞S2-045

    Apache Struts2最新漏洞(CVE-2017-5638,S02-45) struts2远程命令执行漏洞S2-045 Apache Struts 2被曝存在远程命令执行漏洞,漏洞编号S2-04 ...

  6. Apache Tomcat远程命令执行漏洞(CVE-2017-12615) 漏洞利用到入侵检测

    本文作者:i春秋作家——Anythin9 1.漏洞简介 当 Tomcat运行在Windows操作系统时,且启用了HTTP PUT请求方法(例如,将 readonly 初始化参数由默认值设置为 fals ...

  7. Drupal 远程命令执行漏洞(CVE-2018-7600)

    名称: Drupal 远程命令执行漏洞 CVE-ID: CVE-2018-7600 Poc: https://paper.seebug.org/578/ EXPLOIT-DB: https://www ...

  8. Apache SSI 远程命令执行漏洞复现

    Apache SSI 远程命令执行漏洞复现 一.漏洞描述 当目标服务器开启了SSI与CGI支持,我们就可以上传shtml,利用<!--#exec cmd=”id” -->语法执行命令. 使 ...

  9. ThinkPHP 5.x远程命令执行漏洞复现

    ThinkPHP 5.x远程命令执行漏洞复现 一.漏洞描述 2018年12月10日,ThinkPHP官方发布了安全更新,其中修复了ThinkPHP5框架的一个高危漏洞: https://blog.th ...

随机推荐

  1. jmeter使用BeanShell断言

    1. 首先存储一个接口的响应结果,如在http请求的BeanShell PostProcessor: import java.io.UnsupportedEncodingException; Syst ...

  2. 【个人训练】(POJ1837)Balance

    这几天抓住国庆的黄金时间(因为没有女朋友,天天刷题emmmm 其实还在肝少前还要捞秋刀鱼) ,重点攻克掉几个基本的地方:搜索.dp.图论.这几天的题目应该就是这些范围. 题意 原题的意思大概是这样的, ...

  3. Spring框架中ModelAndView、Model、ModelMap的区别

    转自:http://blog.csdn.net/liujiakunit/article/details/51733211 1. Model Model 是一个接口, 其实现类为ExtendedMode ...

  4. PowerDesigner 使用记录

    使用PowerDesigner 16.5 设计数据库表结构的操作过程: 第一步:打开PowerDesigner工具 第二步:创建一个新的数据模型,选择 File -> New Model -&g ...

  5. JAVA虚拟机(一):内存区域

    根据<java虚拟机规范第二版>规定,现阶段的java内存区域总体如下图 其中,方法区和堆是所有线程共享区域. 虚拟机栈,本地方法栈,程序计数器是各线程独占. 概述一下各个区域 先说说线程 ...

  6. python--基础篇二

    一. 格式化输出 :name=input("name:") age=input("age:") hobby=input("hobbie:") ...

  7. CentOS环境安装JDK(二)

    安装JDK-7u79-linux-x64 打开虚拟机,进入终端: 1.假设用户名是tianjiale(则需要进入管理员角色,既root) (1).将用户名tianjiale添加到sudoer列表中 提 ...

  8. 机器学习sklearn的快速使用--周振洋

    ML神器:sklearn的快速使用 传统的机器学习任务从开始到建模的一般流程是:获取数据 -> 数据预处理 -> 训练建模 -> 模型评估 -> 预测,分类.本文我们将依据传统 ...

  9. Week 1 Team Homework #3 from Z.XML-软件工程在北航

    任务名称:软件工程在北航 任务要求:要求我们采访往届师兄师姐,收集他们对于软件工程这门课程的反馈.具体作业链接http://www.cnblogs.com/jiel/p/3311403.html 任务 ...

  10. JavaSE复习(七)Stream流和方法引用

    Stream流 全新的Stream概念,用于解决已有集合类库既有的弊端. 传统集合的多步遍历代码 几乎所有的集合(如 Collection 接口或 Map 接口等)都支持直接或间接的遍历操作.而当我们 ...