{"id":16754,"date":"2021-04-16T12:33:29","date_gmt":"2021-04-16T12:33:29","guid":{"rendered":"https:\/\/www.kaspersky.fr\/blog\/?p=16754"},"modified":"2021-04-16T12:33:29","modified_gmt":"2021-04-16T12:33:29","slug":"cve-2021-28310","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/cve-2021-28310\/16754\/","title":{"rendered":"CVE-2021-28310 : une fen\u00eatre bris\u00e9e"},"content":{"rendered":"<p>Des chercheurs de Kaspersky <a href=\"https:\/\/securelist.com\/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild\/101898\/\" target=\"_blank\" rel=\"noopener\">ont trouv\u00e9<\/a> une vuln\u00e9rabilit\u00e9 de type zero-day (CVE-2021-28310) dans l\u2019un des composants de Microsoft Windows appel\u00e9 Desktop Window Manager (DWM). Nous pensons que cette vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0 \u00e9t\u00e9 exploit\u00e9e par plusieurs individus mal intentionn\u00e9s. Microsoft vient juste de publier le correctif et nous vous recommandons de l\u2019installer le plus rapidement possible. Nous vous expliquons pourquoi.<\/p>\n<h2>Qu\u2019est-ce que Desktop Window Manager\u00a0?<\/h2>\n<p>De nos jours, quasiment tout le monde conna\u00eet l\u2019interface graphique des syst\u00e8mes d\u2019exploitation modernes\u00a0: chaque programme s\u2019ouvre dans une nouvelle fen\u00eatre qui ne prend pas forc\u00e9ment tout l\u2019\u00e9cran. En effet, les fen\u00eatres peuvent se superposer, projetant une belle ombre les unes sur les autres. Dans Microsoft Windows, le composant responsable de ces caract\u00e9ristiques, comme les ombres ou la transparence, est Desktop Window Manager.<\/p>\n<p>Pour comprendre pourquoi Desktop Window Manager est important en termes de cybers\u00e9curit\u00e9, il convient de souligner que les programmes ne font pas qu\u2019afficher les fen\u00eatres \u00e0 l\u2019\u00e9cran, mais entreposent aussi les donn\u00e9es dans une m\u00e9moire tampon. Windows Desktop Manager r\u00e9cup\u00e8re ensuite les donn\u00e9es de chacune des m\u00e9moires tampon et cr\u00e9e la vue d\u2019ensemble affich\u00e9e sur l\u2019\u00e9cran de l\u2019utilisateur. Par exemple, quand vous d\u00e9placez une fen\u00eatre sur l\u2019autre, les programmes ouverts ne savent pas si leurs fen\u00eatres doivent faire de l\u2019ombre ou \u00eatre dans l\u2019ombre\u00a0; c\u2019est le r\u00f4le de Windows Desktop Manager. Ce composant est l\u2019un des principaux services offerts par Windows. Il est disponible dans toutes les versions du syst\u00e8me d\u2019exploitation depuis Windows Vista et ne peut pas \u00eatre d\u00e9sactiv\u00e9 sous Windows 8 et les versions ult\u00e9rieures.<\/p>\n<h2>Vuln\u00e9rabilit\u00e9 de Desktop Window Manager<\/h2>\n<p>La vuln\u00e9rabilit\u00e9 d\u00e9couverte par notre technologie avanc\u00e9e de pr\u00e9vention d\u2019exploits est une vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/privilege-escalation\/\" target=\"_blank\" rel=\"noopener\">d\u2019\u00e9l\u00e9vation de privil\u00e8ges<\/a>, ce qui signifie qu\u2019un programme peut tromper Windows Desktop Manager pour obtenir un acc\u00e8s qu\u2019il ne devrait pas avoir. En l\u2019occurrence, la vuln\u00e9rabilit\u00e9 permettait aux cybercriminels d\u2019ex\u00e9cuter un code arbitraire sur l\u2019appareil de la victime et d\u2019en prendre le contr\u00f4le total.<\/p>\n<h2>Ce que vous pouvez faire pour \u00e9viter l\u2019exploitation de CVE-2021-28310<\/h2>\n<p>Il est primordial d\u2019agir rapidement. Voici ce que vous pouvez faire\u00a0:<\/p>\n<ul>\n<li>Installez imm\u00e9diatement les <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28310\" target=\"_blank\" rel=\"noopener nofollow\">correctifs que Microsoft a publi\u00e9s le 13 avril<\/a> sur les ordinateurs vuln\u00e9rables.<\/li>\n<li>Prot\u00e9gez tous vos appareils avec une solution de s\u00e9curit\u00e9 fiable comme <a href=\"https:\/\/www.kaspersky.fr\/small-to-medium-business-security?icid=fr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a> qui, gr\u00e2ce \u00e0 sa capacit\u00e9 avanc\u00e9e \u00e0 pr\u00e9venir les exploits, bloque toute tentative d\u2019utilisation de la vuln\u00e9rabilit\u00e9 CVE-2021-28310.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb\">\n","protected":false},"excerpt":{"rendered":"<p>Une vuln\u00e9rabilit\u00e9 de type zero-day a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows et aurait \u00e9t\u00e9 exploit\u00e9e. <\/p>\n","protected":false},"author":2581,"featured_media":16755,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6,2112,3150,686],"tags":[3864,3171,693,31,322,23,446],"class_list":{"0":"post-16754","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-business","9":"category-enterprise","10":"category-threats","11":"tag-0day","12":"tag-cve","13":"tag-exploits","14":"tag-microsoft","15":"tag-vulnerabilites","16":"tag-windows","17":"tag-zero-day"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cve-2021-28310\/16754\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cve-2021-28310\/22719\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cve-2021-28310\/18200\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cve-2021-28310\/9036\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cve-2021-28310\/24553\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cve-2021-28310\/22581\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cve-2021-28310\/21634\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cve-2021-28310\/25057\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cve-2021-28310\/24383\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cve-2021-28310\/30513\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2021-28310\/9524\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cve-2021-28310\/39352\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cve-2021-28310\/17310\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cve-2021-28310\/26518\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cve-2021-28310\/30464\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cve-2021-28310\/26903\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cve-2021-28310\/23747\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cve-2021-28310\/29092\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cve-2021-28310\/28890\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/vulnerabilites\/","name":"Vuln\u00e9rabilit\u00e9s"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/16754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=16754"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/16754\/revisions"}],"predecessor-version":[{"id":16756,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/16754\/revisions\/16756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/16755"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=16754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=16754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=16754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}