关联漏洞
标题:Microsoft Outlook 安全漏洞 (CVE-2023-23397)Description:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook存在安全漏洞。以下产品和版本受到影响:Microsoft Office LTSC 2021 for 32-bit editions,Microsoft Outlook 2016 (32-bit edition),Microsoft Office LTSC 2021 for 64-bit editions,Microsoft 365 Apps for Enterprise for
Description
CVE-2023-23397 Remediation Script (Powershell)
介绍
# CVE-2023-23397
CVE-2023-23397 Remediation Script (Powershell)
There are 3 PowerShell scripts.
If your patch management software uses an **evaluation** and a **remediation script**, use the respective files/scripts.
Alternatively, if you wish to just push out the update without the above, the **All In One script** will evaluate the current version of Microsoft Office and if it is not one of the versions listed in the script, it will force an Office update.
The all in one script can be run manually or pushed out directly to the endpoint.
**Note that the All In One Scripts and Remediation scripts will force an update without notfying the user. They will force close Office in order to update; adjust as desired.**
Endpoints with Office Versions listed in the script (up-to-date as of 3/17/23) will not have to go through the update process or have Office force closed.
文件快照
[4.0K] /data/pocs/83c410f3a5c460873be99133cb9cd8ff94f72eb7
├── [ 34K] LICENSE
├── [4.0K] Patches
│ ├── [1009] AllInOnePatcher.ps1
│ ├── [ 608] EvaluationScript.ps1
│ └── [ 218] RemediationScript.ps1
└── [ 882] README.md
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →