{"id":18435,"date":"2022-01-17T10:55:29","date_gmt":"2022-01-17T08:55:29","guid":{"rendered":"https:\/\/www.kaspersky.fr\/blog\/?p=18435"},"modified":"2022-01-17T10:55:29","modified_gmt":"2022-01-17T08:55:29","slug":"microsoft-patches-about-a-hundred-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/18435\/","title":{"rendered":"Nouvelle ann\u00e9e, nouveau Patch Tuesday"},"content":{"rendered":"<p>Pour bien commencer l\u2019ann\u00e9e, Microsoft a corrig\u00e9 une vuln\u00e9rabilit\u00e9 de taille. Non seulement l\u2019entreprise a publi\u00e9 sa toute premi\u00e8re mise \u00e0 jour Patch Tuesday, qui corrige <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\" target=\"_blank\" rel=\"noopener nofollow\">pas moins de 96 vuln\u00e9rabilit\u00e9s<\/a>, mais en plus elle a publi\u00e9 tout un ensemble de correctifs pour le navigateur Microsoft Edge, principalement \u00e0 cause du moteur Chromium. Au total, ce sont 120 vuln\u00e9rabilit\u00e9s corrig\u00e9es depuis le d\u00e9but de l\u2019ann\u00e9e. Il ne fait aucun doute que vous devez mettre \u00e0 jour votre syst\u00e8me d\u2019exploitation et certaines applications Microsoft d\u00e8s que possible.<\/p>\n<h2>Les vuln\u00e9rabilit\u00e9s les plus s\u00e9rieuses<\/h2>\n<p>Neuf des vuln\u00e9rabilit\u00e9s publi\u00e9es lors de ce Patch Tuesday ont obtenu un score CVSS de 3,1. Parmi elles, deux sont li\u00e9es \u00e0 une <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/privilege-escalation\/\" target=\"_blank\" rel=\"noopener\">\u00e9l\u00e9vation des privil\u00e8ges\u00a0<\/a>: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21833\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21833<\/a> dans le lecteur IDE pour ordinateur virtuel et <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21857\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21857<\/a> dans les services de domaine Active Directory. L\u2019exploitation des autres sept vuln\u00e9rabilit\u00e9s permet <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-code-execution-rce\/\" target=\"_blank\" rel=\"noopener\">l\u2019ex\u00e9cution d\u2019un code \u00e0 distance<\/a> :<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21917\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21917<\/a> dans les extensions de vid\u00e9o HEVC ;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21912\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21912<\/a> et <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21898\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21898<\/a> dans le fichier de noyau graphique de DirectX ;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21846\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21846<\/a> dans le serveur Microsoft Exchange ;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21840\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21840<\/a> dans Microsoft Office ;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-22947\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2021-22947<\/a> dans l\u2019interface Open Source cURL ;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21907\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21907<\/a> dans la pile du protocole HTTP.<\/li>\n<\/ul>\n<p>Cette derni\u00e8re semble \u00eatre la vuln\u00e9rabilit\u00e9 la moins agr\u00e9able. Un bug dans la pile du protocole HTTP permet, du moins en th\u00e9orie, aux cybercriminels d\u2019ex\u00e9cuter un code \u00e0 distance sur l\u2019ordinateur affect\u00e9 et de diffuser l\u2019attaque sur le r\u00e9seau local. Selon la terminologie de Microsoft, la vuln\u00e9rabilit\u00e9 est class\u00e9e comme <em>wormable<\/em> puisqu\u2019elle peut \u00eatre utilis\u00e9e pour cr\u00e9er un <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/worm\/\" target=\"_blank\" rel=\"noopener\">ver<\/a>. Cette vuln\u00e9rabilit\u00e9 concerne Windows 10, Windows 11, Windows Server 2022 et Windows Server 2019. Pourtant, selon Microsoft, elle n\u2019est dangereuse que pour les utilisateurs de Windows Server 2019 et Windows 10 version 1809 s\u2019ils activent le HTTP Trailer Support en utilisant la cl\u00e9 EnableTrailerSupport dans le registre.<\/p>\n<p>Une autre vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server inqui\u00e8te aussi les experts. Il s\u2019agit de <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21846\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21846<\/a> qui, cela dit en passant, n\u2019est pas le seul probl\u00e8me d\u2019Exchange qui appara\u00eet dans la liste\u00a0; c\u2019est seulement le plus dangereux. Ces inqui\u00e9tudes sont justifi\u00e9es puisque personne ne veut revivre la m\u00eame situation que l\u2019an dernier, avec l\u2019exploitation massive de vuln\u00e9rabilit\u00e9s dans Exchange.<\/p>\n<h2>Des vuln\u00e9rabilit\u00e9s avec des preuves de concept<\/h2>\n<p>Certaines des vuln\u00e9rabilit\u00e9s corrig\u00e9es \u00e9taient d\u00e9j\u00e0 connues par la communaut\u00e9 des experts en s\u00e9curit\u00e9. De plus, quelques-uns avaient m\u00eame publi\u00e9 des preuves de concept\u00a0:<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21836\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21836<\/a> \u2014 Vuln\u00e9rabilit\u00e9 d\u2019usurpation d\u2019identit\u00e9 dans le certificat Windows ;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21839\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21839<\/a> \u2014 Vuln\u00e9rabilit\u00e9 de d\u00e9ni de service dans la liste de contr\u00f4le d\u2019acc\u00e8s discr\u00e9tionnaire du suivi d\u2019\u00e9v\u00e9nements pour Windows\u00a0;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21919\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-21919<\/a> \u2014 Vuln\u00e9rabilit\u00e9 d\u2019\u00e9l\u00e9vation de privil\u00e8ges dans le service Profil utilisateur de Windows.<\/li>\n<\/ul>\n<p>Nous n\u2019avons pas encore constat\u00e9 d\u2019attaques r\u00e9elles exploitant ces vuln\u00e9rabilit\u00e9s. Les preuves de concept sont d\u00e9j\u00e0 publiques et les attaques pourraient d\u00e9buter \u00e0 tout moment.<\/p>\n<h2>Comment vous prot\u00e9ger<\/h2>\n<p>Tout d\u2019abord, vous devez mettre \u00e0 jour votre syst\u00e8me d\u2019exploitation et les autres programmes Microsoft d\u00e8s que possible. En g\u00e9n\u00e9ral, il vaut mieux ne pas retarder l\u2019installation des patchs pour les programmes critiques.<\/p>\n<p>Ensuite, tout ordinateur ou serveur connect\u00e9 \u00e0 Internet doit \u00eatre \u00e9quip\u00e9 d\u2019une <a href=\"https:\/\/www.kaspersky.fr\/small-to-medium-business-security?icid=fr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">solution de s\u00e9curit\u00e9<\/a> fiable et capable d\u2019emp\u00eacher l\u2019exploitation des vuln\u00e9rabilit\u00e9s connues et de d\u00e9tecter les attaques des exploits encore inconnus.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb\">\n","protected":false},"excerpt":{"rendered":"<p>Microsoft corrige plus de 100 vuln\u00e9rabilit\u00e9s pour Windows 10 et 11, Windows Server 2019 et 2022, Exchanger Server, Office et le navigateur Edge.<\/p>\n","protected":false},"author":2698,"featured_media":18436,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2112,3150,686,3151],"tags":[3864,3600,4091,31,322,23],"class_list":{"0":"post-18435","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-threats","10":"category-smb","11":"tag-0day","12":"tag-edge","13":"tag-exchange","14":"tag-microsoft","15":"tag-vulnerabilites","16":"tag-windows"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/18435\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/23840\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/19337\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/9695\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/26072\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/24040\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/23756\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/26728\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/26321\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/32215\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/10458\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/43348\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/18816\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/microsoft-patches-about-a-hundred-vulnerabilities\/15695\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/27974\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/microsoft-patches-about-a-hundred-vulnerabilities\/32313\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/28027\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/microsoft-patches-about-a-hundred-vulnerabilities\/24784\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/30185\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/microsoft-patches-about-a-hundred-vulnerabilities\/29975\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/vulnerabilites\/","name":"Vuln\u00e9rabilit\u00e9s"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/2698"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=18435"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18435\/revisions"}],"predecessor-version":[{"id":18437,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18435\/revisions\/18437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/18436"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=18435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=18435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=18435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}