POC详情: f88b70b2d9c0b77dba11da857970f5ff67b86972

来源
关联漏洞
标题: Microsoft Outlook 安全漏洞 (CVE-2023-23397)
描述:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook存在安全漏洞。以下产品和版本受到影响:Microsoft Office LTSC 2021 for 32-bit editions,Microsoft Outlook 2016 (32-bit edition),Microsoft Office LTSC 2021 for 64-bit editions,Microsoft 365 Apps for Enterprise for
描述
Patch for MS Outlook Critical Vulnerability - CVSS 9.8
介绍
# CVE-2023-23397
Patch for MS Outlook Critical Vulnerability - CVSS 9.8

3 PowerShell scripts are included in the Patch folder.

* If your patch management software uses an evaluation and a remediation script, use the respective files/scripts.

* The All In One script will evaluate the current version of Microsoft Office and if it is not one of the versions listed in the script, it will force an Office update.
  
  The all in one script can be run manually or pushed out directly to the endpoint.

The All In One Script and Remediation scripts will **force an update without notfying the user.** 
* They will **force close Office** in order to update. Please adjust as desired.

* Endpoints with Office Versions listed in the script (up-to-date as of 3/20/23) will be force to go through the update process or have Office force closed.

Please read the comments in the PowerShell script comments for more details.
文件快照

[4.0K] /data/pocs/f88b70b2d9c0b77dba11da857970f5ff67b86972 ├── [ 34K] LICENSE ├── [4.0K] Patches │   ├── [1009] AllInOnePatcher.ps1 │   ├── [ 608] EvaluationScript.ps1 │   └── [ 218] RemediationScript.ps1 └── [ 918] README.md 1 directory, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。