{"id":327897,"date":"2022-01-12T15:01:40","date_gmt":"2022-01-12T15:01:40","guid":{"rendered":"http:\/\/savepearlharbor.com\/?p=327897"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T21:00:00","slug":"","status":"publish","type":"post","link":"https:\/\/savepearlharbor.com\/?p=327897","title":{"rendered":"<span>Patch Tuesday: Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/span>"},"content":{"rendered":"<div><\/div>\n<div id=\"post-content-body\">\n<div>\n<div class=\"article-formatted-body article-formatted-body_version-2\">\n<div xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<p>Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 2022 \u0433\u043e\u0434\u0443 \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u044b\u0442\u0438\u044f 97 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (\u043e\u0442\u0434\u0435\u043b\u044c\u043d\u043e 26 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Microsoft Edge), 9 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435, \u0430 6 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u044b \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e (0-day). \u041e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0447\u0435\u0440\u0432\u044f \u0441 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u043f\u043e \u0441\u0435\u0442\u0438! \u041d\u0438 \u043e\u0434\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435 \u0431\u044b\u043b\u0430 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u041c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0439 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS \u0441\u0440\u0435\u0434\u0438 \u0432\u0441\u0435\u0445 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u043e\u0441\u0442\u0430\u0432\u0438\u043b 9.8 \u0438\u0437 10.<\/p>\n<p>\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0433\u043e \u043d\u0430\u0431\u043e\u0440\u0430 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u2013 Windows, Office, SharePoint, Visual Studio \u2013 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 Active Directory, Hyper-V, Exchange Server , Dynamics 365 On-premise, .NET Framework, libarchive, curl. \u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u044f \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043e \u0441\u0430\u043c\u044b\u0445 \u0432\u0430\u0436\u043d\u044b\u0445 \u043c\u043e\u043c\u0435\u043d\u0442\u0430\u0445 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439.<\/p>\n<blockquote>\n<p><em>\u041f\u043e\u043c\u043d\u0438\u0442\u0435, \u043f\u043e\u0447\u0442\u0438 90% \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0443\u0436\u0435 \u0438\u043c\u0435\u043b\u0438 \u043f\u0430\u0442\u0447\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u043d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u0432\u043e\u0435\u0433\u043e \u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0430\u043a \u0432\u0430\u0436\u043d\u043e \u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0432\u0430\u0448\u0435 \u041f\u041e, \u043d\u043e \u0438 \u0434\u0435\u043b\u0430\u0442\u044c \u044d\u0442\u043e \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e! (\u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043e\u0442\u0447\u0435\u0442\u0430 Vulnerability Review Report \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Flexera).<\/em><\/p>\n<\/blockquote>\n<p>\u0421\u0432\u043e\u0434\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u0438 \u0442\u0438\u043f\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435, \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u0430 \u043d\u0430 \u0433\u0440\u0430\u0444\u0438\u043a\u0435.<\/p>\n<figure class=\"full-width\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/habrastorage.org\/r\/w780q1\/getpro\/habr\/upload_files\/e66\/f2c\/f4c\/e66f2cf4cd7d6c9af7ffac04fda221d2.jpg\" alt=\"Microsoft Patch Tuesday January 2022 summary\" title=\"Microsoft Patch Tuesday January 2022 summary\" width=\"4359\" height=\"2429\" data-src=\"https:\/\/habrastorage.org\/getpro\/habr\/upload_files\/e66\/f2c\/f4c\/e66f2cf4cd7d6c9af7ffac04fda221d2.jpg\" data-blurred=\"true\"\/><figcaption>Microsoft Patch Tuesday January 2022 summary<\/figcaption><\/figure>\n<h2>\u041d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u043e\u0441\u043e\u0431\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435<\/h2>\n<p>\u0417\u0430\u043a\u0440\u044b\u0442\u044b\u0435 <strong>\u0432\u0430\u0436\u043d\u044b\u0435<\/strong> \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21849\">CVE-2022-21849<\/a> &#8212; <strong>Windows IKE Extension<\/strong> Remote Code Execution Vulnerability (CVSS 9.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21901\">CVE-2022-21901<\/a> &#8212; <strong>Windows Hyper-V <\/strong>Elevation of Privilege Vulnerability<strong> <\/strong>(CVSS 9.0)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21922\">CVE-2022-21922<\/a> &#8212; <strong>Remote Procedure Call Runtime <\/strong>Remote Code Execution Vulnerability<strong> <\/strong>(CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21893\">CVE-2022-21893<\/a> &#8212; <strong>Remote Desktop Protocol <\/strong>Remote Code Execution Vulnerability (CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21850\">CVE-2022-21850<\/a> &#8212; <strong>Remote Desktop Client <\/strong>Remote Code Execution Vulnerability (CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21920\">CVE-2022-21920<\/a> &#8212; <strong>Windows Kerberos <\/strong>Elevation of Privilege Vulnerability<strong> <\/strong>(CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21837\">CVE-2022-21837<\/a> &#8212; <strong>Microsoft SharePoint Server <\/strong>Remote Code Execution Vulnerability (CVSS 8.3)<\/p>\n<p>\u0417\u0430\u043a\u0440\u044b\u0442\u044b\u0435 <strong>\u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435<\/strong> \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:<br \/><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21907\">CVE-2022-21907<\/a> &#8212; <strong>HTTP Protocol Stack <\/strong>Remote Code Execution Vulnerability (CVSS 9.8) <em><u>Wormable, Exploitation More Likely!<\/u><br \/><\/em>\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e\u0435 \u041f\u041e: Windows 11, Windows 10 v21H2, v21H1, v20H2, Windows Server 2022, Windows Server v20H2, Windows Server 2019<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21857\">CVE-2022-21857<\/a> &#8212; <strong>Active Directory Domain Services Elevation of Privilege Vulnerability <\/strong>(CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21846\">CVE-2022-21846<\/a> &#8212; <strong>Microsoft Exchange Server Remote Code Execution Vulnerability <\/strong>(CVSS 9.0)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21840\">CVE-2022-21840<\/a> &#8212; <strong>Microsoft Office Remote Code Execution Vulnerability <\/strong>(CVSS 8.8)<\/p>\n<p>\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0431\u044b\u043b\u0430 <strong>\u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e<\/strong>:<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36976\">CVE-2021-36976<\/a>\u00a0\u2013 <strong>Libarchive <\/strong>Remote Code Execution Vulnerability<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36976\">CVE-2021-36976<\/a> &#8212; <strong>Open Source Curl <\/strong>Remote Code Execution Vulnerability<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21839\">CVE-2022-21839<\/a> &#8212; <strong>Windows Event Tracing<\/strong> Discretionary Access Control List Denial of Service Vulnerability (CVSS 6.1)<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21874\">CVE-2022-21874<\/a>\u00a0\u2013 <strong>Windows Security Center API <\/strong>Remote Code Execution Vulnerability<strong> <\/strong>(CVSS 7.8)<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21836\">CVE-2022-21836<\/a>\u00a0\u2013 <strong>Windows Certificate<\/strong> Spoofing Vulnerability (CVSS 7.8)<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21919\">CVE-2022-21919<\/a> &#8212; <strong>Windows User Profile Service <\/strong>Elevation of Privilege Vulnerability<strong> <\/strong>(CVSS Score 7.0) <em><u>Exploitation More Likely!<\/u><\/em><\/p>\n<p>\u041a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0441\u0430\u043c\u0443\u044e \u043f\u043e\u043b\u043d\u0443\u044e \u0438 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u043d\u0430\u0439\u0442\u0438 \u043d\u0430 \u043d\u0430\u0448\u0435\u043c \u043f\u043e\u0440\u0442\u0430\u043b\u0435 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/summary\">Security Update Guide<\/a>. \u041f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u0441 \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u0440\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d \u0432 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Jan\">\u0437\u0430\u043c\u0435\u0442\u043a\u0430\u0445 \u043a \u0432\u044b\u043f\u0443\u0441\u043a\u0443<\/a>.<\/p>\n<blockquote>\n<p><em>\u041f\u0435\u0440\u0435\u0434 \u0442\u0435\u043c, \u043a\u0430\u043a \u043e\u0442\u043b\u043e\u0436\u0438\u0442\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0432\u0430\u0448\u0435\u0433\u043e \u041f\u041e, \u043f\u043e\u043c\u043d\u0438\u0442\u0435: \u0435\u0441\u0442\u044c \u0434\u0432\u0430 \u0442\u0438\u043f\u0430 \u0430\u0434\u043c\u0438\u043d\u043e\u0432 &#8212; \u0442\u0435, \u043a\u0442\u043e \u0432\u043e\u0432\u0440\u0435\u043c\u044f \u0441\u0442\u0430\u0432\u044f\u0442 \u043f\u0430\u0442\u0447\u0438, \u0438 \u0442\u0435, \u043a\u0442\u043e \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d \u043f\u043e\u043a\u0443\u043f\u0430\u0442\u044c \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u044b \ud83d\ude42<\/em><\/p>\n<\/blockquote>\n<div class=\"persona\" persona=\"true\"><img decoding=\"async\" persona=\"true\" class=\"image persona__image\" src=\"https:\/\/habrastorage.org\/r\/w780q1\/getpro\/habr\/upload_files\/a01\/873\/202\/a01873202e17e71790b2b06172da7181.jpg\" data-src=\"https:\/\/habrastorage.org\/getpro\/habr\/upload_files\/a01\/873\/202\/a01873202e17e71790b2b06172da7181.jpg\" data-blurred=\"true\"\/><\/p>\n<h5 class=\"persona__heading\" persona=\"true\">\u0410\u0440\u0442\u0451\u043c \u0421\u0438\u043d\u0438\u0446\u044b\u043d<\/h5>\n<p><em>CISSP, CCSP, MCSE, Certified Azure Security Engineer\u0441\u0442\u0430\u0440\u0448\u0438\u0439 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0418\u0411 \u0432 \u0441\u0442\u0440\u0430\u043d\u0430\u0445 \u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0439 \u0438 \u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0415\u0432\u0440\u043e\u043f\u044b<br \/>Microsoft<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"v-portal\" style=\"display:none;\"><\/div>\n<\/div>\n<p> <!----> <!----><br \/> \u0441\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b \u0441\u0442\u0430\u0442\u044c\u0438 <a href=\"https:\/\/habr.com\/ru\/company\/microsoft\/blog\/645163\/\"> https:\/\/habr.com\/ru\/company\/microsoft\/blog\/645163\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div><\/div>\n<div id=\"post-content-body\">\n<div>\n<div class=\"article-formatted-body article-formatted-body_version-2\">\n<div xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<p>Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 2022 \u0433\u043e\u0434\u0443 \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u044b\u0442\u0438\u044f 97 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (\u043e\u0442\u0434\u0435\u043b\u044c\u043d\u043e 26 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Microsoft Edge), 9 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435, \u0430 6 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u044b \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e (0-day). \u041e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0447\u0435\u0440\u0432\u044f \u0441 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u043f\u043e \u0441\u0435\u0442\u0438! \u041d\u0438 \u043e\u0434\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435 \u0431\u044b\u043b\u0430 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u041c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0439 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS \u0441\u0440\u0435\u0434\u0438 \u0432\u0441\u0435\u0445 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u043e\u0441\u0442\u0430\u0432\u0438\u043b 9.8 \u0438\u0437 10.<\/p>\n<p>\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0433\u043e \u043d\u0430\u0431\u043e\u0440\u0430 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u2013 Windows, Office, SharePoint, Visual Studio \u2013 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 Active Directory, Hyper-V, Exchange Server , Dynamics 365 On-premise, .NET Framework, libarchive, curl. \u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u044f \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043e \u0441\u0430\u043c\u044b\u0445 \u0432\u0430\u0436\u043d\u044b\u0445 \u043c\u043e\u043c\u0435\u043d\u0442\u0430\u0445 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439.<\/p>\n<blockquote>\n<p><em>\u041f\u043e\u043c\u043d\u0438\u0442\u0435, \u043f\u043e\u0447\u0442\u0438 90% \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0443\u0436\u0435 \u0438\u043c\u0435\u043b\u0438 \u043f\u0430\u0442\u0447\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u043d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u0432\u043e\u0435\u0433\u043e \u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0430\u043a \u0432\u0430\u0436\u043d\u043e \u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0432\u0430\u0448\u0435 \u041f\u041e, \u043d\u043e \u0438 \u0434\u0435\u043b\u0430\u0442\u044c \u044d\u0442\u043e \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e! (\u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043e\u0442\u0447\u0435\u0442\u0430 Vulnerability Review Report \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Flexera).<\/em><\/p>\n<\/blockquote>\n<p>\u0421\u0432\u043e\u0434\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u0438 \u0442\u0438\u043f\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435, \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u0430 \u043d\u0430 \u0433\u0440\u0430\u0444\u0438\u043a\u0435.<\/p>\n<figure class=\"full-width\"><figcaption>Microsoft Patch Tuesday January 2022 summary<\/figcaption><\/figure>\n<h2>\u041d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u043e\u0441\u043e\u0431\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435<\/h2>\n<p>\u0417\u0430\u043a\u0440\u044b\u0442\u044b\u0435 <strong>\u0432\u0430\u0436\u043d\u044b\u0435<\/strong> \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21849\">CVE-2022-21849<\/a> &#8212; <strong>Windows IKE Extension<\/strong> Remote Code Execution Vulnerability (CVSS 9.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21901\">CVE-2022-21901<\/a> &#8212; <strong>Windows Hyper-V <\/strong>Elevation of Privilege Vulnerability<strong> <\/strong>(CVSS 9.0)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21922\">CVE-2022-21922<\/a> &#8212; <strong>Remote Procedure Call Runtime <\/strong>Remote Code Execution Vulnerability<strong> <\/strong>(CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21893\">CVE-2022-21893<\/a> &#8212; <strong>Remote Desktop Protocol <\/strong>Remote Code Execution Vulnerability (CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21850\">CVE-2022-21850<\/a> &#8212; <strong>Remote Desktop Client <\/strong>Remote Code Execution Vulnerability (CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21920\">CVE-2022-21920<\/a> &#8212; <strong>Windows Kerberos <\/strong>Elevation of Privilege Vulnerability<strong> <\/strong>(CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21837\">CVE-2022-21837<\/a> &#8212; <strong>Microsoft SharePoint Server <\/strong>Remote Code Execution Vulnerability (CVSS 8.3)<\/p>\n<p>\u0417\u0430\u043a\u0440\u044b\u0442\u044b\u0435 <strong>\u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435<\/strong> \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:<br \/><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21907\">CVE-2022-21907<\/a> &#8212; <strong>HTTP Protocol Stack <\/strong>Remote Code Execution Vulnerability (CVSS 9.8) <em><u>Wormable, Exploitation More Likely!<\/u><br \/><\/em>\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e\u0435 \u041f\u041e: Windows 11, Windows 10 v21H2, v21H1, v20H2, Windows Server 2022, Windows Server v20H2, Windows Server 2019<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21857\">CVE-2022-21857<\/a> &#8212; <strong>Active Directory Domain Services Elevation of Privilege Vulnerability <\/strong>(CVSS 8.8)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21846\">CVE-2022-21846<\/a> &#8212; <strong>Microsoft Exchange Server Remote Code Execution Vulnerability <\/strong>(CVSS 9.0)<br \/><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21840\">CVE-2022-21840<\/a> &#8212; <strong>Microsoft Office Remote Code Execution Vulnerability <\/strong>(CVSS 8.8)<\/p>\n<p>\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0431\u044b\u043b\u0430 <strong>\u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e<\/strong>:<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36976\">CVE-2021-36976<\/a>\u00a0\u2013 <strong>Libarchive <\/strong>Remote Code Execution Vulnerability<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36976\">CVE-2021-36976<\/a> &#8212; <strong>Open Source Curl <\/strong>Remote Code Execution Vulnerability<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21839\">CVE-2022-21839<\/a> &#8212; <strong>Windows Event Tracing<\/strong> Discretionary Access Control List Denial of Service Vulnerability (CVSS 6.1)<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21874\">CVE-2022-21874<\/a>\u00a0\u2013 <strong>Windows Security Center API <\/strong>Remote Code Execution Vulnerability<strong> <\/strong>(CVSS 7.8)<\/p>\n<p><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21836\">CVE-2022-21836<\/a>\u00a0\u2013 <strong>Windows Certificate<\/strong> Spoofing Vulnerability (CVSS 7.8)<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21919\">CVE-2022-21919<\/a> &#8212; <strong>Windows User Profile Service <\/strong>Elevation of Privilege Vulnerability<strong> <\/strong>(CVSS Score 7.0) <em><u>Exploitation More Likely!<\/u><\/em><\/p>\n<p>\u041a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0441\u0430\u043c\u0443\u044e \u043f\u043e\u043b\u043d\u0443\u044e \u0438 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u043d\u0430\u0439\u0442\u0438 \u043d\u0430 \u043d\u0430\u0448\u0435\u043c \u043f\u043e\u0440\u0442\u0430\u043b\u0435 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/summary\">Security Update Guide<\/a>. \u041f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u0441 \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u0440\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d \u0432 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Jan\">\u0437\u0430\u043c\u0435\u0442\u043a\u0430\u0445 \u043a \u0432\u044b\u043f\u0443\u0441\u043a\u0443<\/a>.<\/p>\n<blockquote>\n<p><em>\u041f\u0435\u0440\u0435\u0434 \u0442\u0435\u043c, \u043a\u0430\u043a \u043e\u0442\u043b\u043e\u0436\u0438\u0442\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0432\u0430\u0448\u0435\u0433\u043e \u041f\u041e, \u043f\u043e\u043c\u043d\u0438\u0442\u0435: \u0435\u0441\u0442\u044c \u0434\u0432\u0430 \u0442\u0438\u043f\u0430 \u0430\u0434\u043c\u0438\u043d\u043e\u0432 &#8212; \u0442\u0435, \u043a\u0442\u043e \u0432\u043e\u0432\u0440\u0435\u043c\u044f \u0441\u0442\u0430\u0432\u044f\u0442 \u043f\u0430\u0442\u0447\u0438, \u0438 \u0442\u0435, \u043a\u0442\u043e \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d \u043f\u043e\u043a\u0443\u043f\u0430\u0442\u044c \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u044b \ud83d\ude42<\/em><\/p>\n<\/blockquote>\n<div class=\"persona\" persona=\"true\">\n<h5 class=\"persona__heading\" persona=\"true\">\u0410\u0440\u0442\u0451\u043c \u0421\u0438\u043d\u0438\u0446\u044b\u043d<\/h5>\n<p><em>CISSP, CCSP, MCSE, Certified Azure Security Engineer\u0441\u0442\u0430\u0440\u0448\u0438\u0439 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0418\u0411 \u0432 \u0441\u0442\u0440\u0430\u043d\u0430\u0445 \u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0439 \u0438 \u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0415\u0432\u0440\u043e\u043f\u044b<br \/>Microsoft<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"v-portal\" style=\"display:none;\"><\/div>\n<\/div>\n<p> <!----> <!----><br \/> \u0441\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b \u0441\u0442\u0430\u0442\u044c\u0438 <a href=\"https:\/\/habr.com\/ru\/company\/microsoft\/blog\/645163\/\"> https:\/\/habr.com\/ru\/company\/microsoft\/blog\/645163\/<\/a><br \/><\/br><\/br><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-327897","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/posts\/327897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=327897"}],"version-history":[{"count":0,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/posts\/327897\/revisions"}],"wp:attachment":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=327897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=327897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=327897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}