关联漏洞
标题:
Microsoft Outlook 安全漏洞
(CVE-2023-23397)
描述:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook存在安全漏洞。以下产品和版本受到影响:Microsoft Office LTSC 2021 for 32-bit editions,Microsoft Outlook 2016 (32-bit edition),Microsoft Office LTSC 2021 for 64-bit editions,Microsoft 365 Apps for Enterprise for
描述
CVE-2023-23397 Remediation Script (Powershell)
介绍
# CVE-2023-23397
CVE-2023-23397 Remediation Script (Powershell)
There are 3 PowerShell scripts.
If your patch management software uses an **evaluation** and a **remediation script**, use the respective files/scripts.
Alternatively, if you wish to just push out the update without the above, the **All In One script** will evaluate the current version of Microsoft Office and if it is not one of the versions listed in the script, it will force an Office update.
The all in one script can be run manually or pushed out directly to the endpoint.
**Note that the All In One Scripts and Remediation scripts will force an update without notfying the user. They will force close Office in order to update; adjust as desired.**
Endpoints with Office Versions listed in the script (up-to-date as of 3/17/23) will not have to go through the update process or have Office force closed.
文件快照
[4.0K] /data/pocs/83c410f3a5c460873be99133cb9cd8ff94f72eb7
├── [ 34K] LICENSE
├── [4.0K] Patches
│ ├── [1009] AllInOnePatcher.ps1
│ ├── [ 608] EvaluationScript.ps1
│ └── [ 218] RemediationScript.ps1
└── [ 882] README.md
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。