Schannel允许远程攻击者通过精心设计的数据包远程执行代码
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows 7 | SP1 | |||
Windows 8 | ||||
Windows 8.1 | ||||
Windows Rt | ||||
Windows Rt 8.1 | ||||
Windows Server 2003 | SP2 | |||
Windows Server 2008 | SP2 | |||
Windows Server 2008 | R2 | SP1 | ||
Windows Server 2012 | ||||
Windows Server 2012 | R2 | |||
Windows Vista | SP2 |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6321
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC,代码状态未知
- None