{"id":265438,"date":"2022-05-18T10:25:52","date_gmt":"2022-05-18T08:25:52","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=265438"},"modified":"2022-05-18T10:47:43","modified_gmt":"2022-05-18T08:47:43","slug":"0patch-fixt-schwachstellen-cve-2022-26809-and-cve-2022-22019-in-windows","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/05\/18\/0patch-fixt-schwachstellen-cve-2022-26809-and-cve-2022-22019-in-windows\/","title":{"rendered":"0Patch fixt Schwachstellen (CVE-2022-26809 und CVE-2022-22019) in Windows"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Windows\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2022\/05\/18\/0patch-fixt-schwachstellen-cve-2022-26809-and-cve-2022-22019-in-windows\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Das Sicherheitsteam von ACROS Security rund um den Gr\u00fcnder Mitja Kolsek hat einen Micro-Patch zum Schlie\u00dfen der Remote Procedure Call Runtime Integer Overflows Schwachstellen CVE-2022-26809 und CVE-2022-22019) ver\u00f6ffentlicht. Der Patch steht f\u00fcr Windows 7 SP1, Windows Server 2008 R2, bis hin zu Windows 10 (v1803 bis v2004) zur Verf\u00fcgung. Der Micro-Patch steht f\u00fcr alle Kunden mit dem 0patch-Agenten bereit, die eine Pro oder Enterprise-Lizenz von ACROS Security besitzte. Hier einige Informationen dazu.<\/p>\n<p><!--more--><\/p>\n<h2>CVE-2022-26809 und CVE-2022-22019<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/eaceaa44c81c424e9afbaff4079f42cb\" alt=\"\" width=\"1\" height=\"1\" \/>Die Windows-Updates vom April 2022 enthielten einen Fix f\u00fcr eine kritische, aus der Ferne ausnutzbare Sicherheitsl\u00fccke in Windows Remote Procedure Call Runtime (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26809\" target=\"_blank\" rel=\"noopener\">CVE-2022-26809<\/a>). Mitja Kolsek hat dann herausgefunden, dass der Fix einen Integer-\u00dcberlauf bei RPC-Paketen an den RPC-Server behebt. Bei sehr vielen RPC-Paketen, die an den Server geschickt werden, kann die Puffergr\u00f6\u00dfe auf der Serverseite 4 GB \u00fcberschreiten (max. mit 32-Bit darstellbar). Ein \u00dcberlauf bietet das Riskio, dass neue RPC-Pakete Daten und Code \u00fcberschreiben, was von einem Angreifer zumindest theoretisch genutzt werden k\u00f6nnten, um beliebigen Code w\u00e4hrend des RPC-Aufrufs auszuf\u00fchren. Die Details hat Kolsek in <a href=\"https:\/\/blog.0patch.com\/2022\/05\/micropatches-for-remote-procedure-call.html\" target=\"_blank\" rel=\"noopener\">diesem Blog-Beitrag<\/a> beschrieben.<\/p>\n<h2>Neuer Micro-Patch f\u00fcr die Schwachstellen<\/h2>\n<p>Nach Analyse der Schwachstellen hat das Team von ACROS Security, welches seit Jahren die 0Patch-L\u00f6sung bereitstellt, Micro-Patches f\u00fcr nicht mehr offiziell unterst\u00fctzte Windows-Versionen entwickelt und stellt diese nun f\u00fcr Kunden bereit. Mitja Kolsek hat \u00fcber <a href=\"https:\/\/twitter.com\/0patch\/status\/1526566745301200898\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> auf diese L\u00f6sung aufmerksam gemacht.<\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1526566745301200898\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"ACROS Security 0patch micro patch\" src=\"https:\/\/i.imgur.com\/E4m9keW.png\" alt=\"ACROS Security 0patch micro patch\" \/><\/a>#<\/p>\n<p>Das Ganze wird in <a href=\"https:\/\/blog.0patch.com\/2022\/05\/micropatches-for-remote-procedure-call.html\" target=\"_blank\" rel=\"noopener\">diesem Blog-Beitrag<\/a>\u00a0 vom 17. Mai 2022 von 0patch detaillierter beschrieben. Die 0patch Micropatches stehen f\u00fcr alle Kunden Pro und Enterprise-Lizenz \u00fcber den 0patch-Agenten f\u00fcr folgende Windows-Versionen zur Verf\u00fcgung.<\/p>\n<ol>\n<li>Windows 10 v1803 updated to May 2021<\/li>\n<li>Windows 10 v1809 updated to May 2021<\/li>\n<li>Windows 10 v1903 updated to December 2020<\/li>\n<li>Windows 10 v2004 updated to December 2021<\/li>\n<li>Windows 7 updated with ESU year 2, ESU year 1 or updated to January 2020<\/li>\n<li>Windows Server 2008 R2 updated with ESU year 2, ESU year 1 or updated to January 2020<\/li>\n<\/ol>\n<p>Hinweise zur Funktionsweise des 0patch-Agenten, der die Micropatches zur Laufzeit einer Anwendung in den Speicher l\u00e4dt, finden Sie in den Blog-Posts (wie z.B. <a href=\"https:\/\/borncity.com\/blog\/2020\/03\/05\/windows-7-mit-der-0patch-lsung-absichern-teil-2\/\">hier<\/a>).<\/p>\n<p><strong>\u00c4hnliche Artikel<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/blog\/?p=229094\">Windows 7: Februar 2020-Sicherheitsupdates erzwingen<\/a> \u2013 Teil 1<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/?p=229096\">Windows 7: Mit der 0patch-L\u00f6sung absichern<\/a> \u2013 Teil 2<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/09\/21\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch liefert Sicherheitspatches nach Supportende<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/01\/30\/0patch-1-probemonat-fr-windows-7-server-2008-r2-patches\/\">Windows 7\/Server 2008\/R2 Life Extension-Projekt &amp; 0patch Probemonat<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/01\/21\/0patch-fix-fr-internetexplorer-0day-schwachstelle-cve-2020-0674\/\">0patch: Fix f\u00fcr Internet Explorer 0-day-Schwachstelle CVE-2020-0674<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/03\/13\/0patch-fix-fr-windows-installer-schwachstelle-cve-2020-0683\/\">0patch-Fix f\u00fcr Windows Installer-Schwachstelle CVE-2020-0683<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/03\/20\/0patch-fix-fr-windows-gdi-schwachstelle-cve-2020-0881\/\">0patch-Fix f\u00fcr Windows GDI+-Schwachstelle CVE-2020-0881<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/03\/24\/0-day-schwachstelle-in-windows-adobe-library\/\">0-Day-Schwachstelle in Windows Adobe Type Library<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/03\/27\/0patch-fixt-0-day-adobe-type-library-bug-in-windows-7\/\">0patch fixt 0-day Adobe Type Library bug in Windows 7<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/06\/18\/0patch-fixt-cve-2020-1281-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-1281 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixt Zerologon (CVE-2020-1472) in Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/12\/24\/0patch-fixt-cve-2020-1013-in-windows-7-server-2008-r2\/\">0patch fixt CVE-2020-1013 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/01\/08\/0patch-fixt-local-privilege-escalation-0-day-in-sysinternals-psexec\/\">0patch fixt Local Privilege Escalation 0-day in Sysinternals PsExec<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/01\/28\/0patch-fixt-windows-installer-0-day-local-privilege-escalation-schwachstelle\/\">0patch fixt Windows Installer 0-day Local Privilege Escalation Schwachstelle<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/\">0patch fixt 0-day im Internet Explorer<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/24\/0patch-fixt-cve-2021-2687-im-dns-server-von-windows-server-2008-r2\/\">0patch fixt CVE-2021-26877 im DNS Server von Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/05\/07\/0patch-fixt-windows-installer-lpe-bug-cve-2021-26415\/\">0patch fixt Windows Installer LPE-Bug (CVE-2021-26415)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/05\/18\/0patch-bietet-support-fr-windows-10-version-1809-nach-eol\/\">0Patch bietet Support f\u00fcr Windows 10 Version 1809 nach EOL<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/06\/21\/windows-10-v180x-0patch-fixt-ie-schwachstelle-cve-2021-31959\/\">Windows 10 V180x: 0Patch fixt IE-Schwachstelle CVE-2021-31959<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches f\u00fcr PrintNightmare-Schwachstelle (CVE-2021-34527)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch-Fix f\u00fcr neue Windows PrintNightmare 0-day-Schwachstelle (5. Aug. 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/08\/07\/0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-6-aug-2021\/\">0patch-Fix f\u00fcr Windows PetitPotam 0-day-Schwachstelle (6. Aug. 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/08\/20\/2-0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-19-aug-2021\/\">2. 0patch-Fix f\u00fcr Windows PetitPotam 0-day-Schwachstelle (19. Aug. 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/09\/27\/windows-10-0patch-fix-fr-mshtml-schwachstelle-cve-2021-40444\/\">Windows 10: 0patch-Fix f\u00fcr MSHTML-Schwachstelle (CVE-2021-40444)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/11\/13\/0patch-fixt-lpe-schwachstelle-cve-2021-34484-in-windows-user-profile-service\/\">0patch fixt LPE-Schwachstelle (CVE-2021-34484) in Windows User Profile Service<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/11\/27\/0patch-fixt-lpe-schwachstelle-cve-2021-24084-in-mobile-device-management-service\/\">0patch fixt LPE-Schwachstelle (CVE-2021-24084) in Mobile Device Management Service<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/12\/03\/0patch-fixt-installertakeover-lpe-schwachstelle-in-windows\/\">0patch fixt InstallerTakeOver LPE-Schwachstelle in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/12\/24\/0patch-fixt-ms-officecmd-rce-schwachstelle-in-windows\/\">0patch fixt ms-officecmd RCE-Schwachstelle in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2022\/01\/14\/0patch-fixt-remotepotato0-schwachstelle-in-windows\/\">0patch fixt RemotePotato0-Schwachstelle in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2022\/03\/22\/0patch-fixt-erneut-schwachstelle-cve-2021-34484-in-windows-10-server-2019\/\">0patch fixt erneut Schwachstelle CVE-2021-34484 in Windows 10\/Server 2019<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Das Sicherheitsteam von ACROS Security rund um den Gr\u00fcnder Mitja Kolsek hat einen Micro-Patch zum Schlie\u00dfen der Remote Procedure Call Runtime Integer Overflows Schwachstellen CVE-2022-26809 und CVE-2022-22019) ver\u00f6ffentlicht. Der Patch steht f\u00fcr Windows 7 SP1, Windows Server 2008 R2, bis &hellip; <a href=\"https:\/\/borncity.com\/blog\/2022\/05\/18\/0patch-fixt-schwachstellen-cve-2022-26809-and-cve-2022-22019-in-windows\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3694,2557],"tags":[7875,2452,4328,3288],"class_list":["post-265438","post","type-post","status-publish","format-standard","hentry","category-windows-10","category-windows-server","tag-0patch","tag-patch","tag-sicherheit","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/265438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=265438"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/265438\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=265438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=265438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=265438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}