版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
十二月份資訊安全公告
Dec14,2006RichardChen陳政鋒
(Net+,Sec+,MCSE2003+Security,CISSP)
資深技術(shù)支援工程師
臺灣微軟技術(shù)支援處QuestionsandAnswersSubmittextquestionsusingthe
“AskaQuestion”buttonWhatWeWillCoverRecapNov.releasesknownissuesReviewDec.
releasesOthersecurityresourcesPreparefornewWSUSSCAN.CABarchitectureIE7overAULifecycleInformationWindowsMaliciousSoftwareRemovalToolResourcesQuestionsandanswersRecapNov.KnownissuesandMS06-066NetwareGetofferingevennoCSNWisinstalled:NormalproactivepatchingMS06-067IEpatch3rdpartyAPcompatibilityissue,seeKB922760MS06-069AdobeFlashPlayerRe-offering,installthelatestFlashPlayertosolvetheissueMS06-070WorkstationserviceWormvulnerability,installthepatchimmediatelyMS06-071MSXMLWSUScategory/descriptionerror,fixingnow.MSXML4installfailure,seeKB927978Dec2006SecurityBulletins
SummaryOnDec13:7NewSecurityBulletins5Windows(1critical,4important)1VisualStudio(critical)1MediaPlayer(critical)1re-releaseMS06-059(critical)5High-prioritynon-securityupdatesNovember2006SecurityBulletinsOverviewBulletinNumberTitleMaximumSeverityRatingProductsAffectedMS06-072CumulativeSecurityUpdateforInternetExplorer(925454)CriticalInternetExplorer5.01&6MS06-073VulnerabilityVisualStudio2005CouldAllowRemoteCodeExecution(925674)CriticalVisualStudio2005MS06-074VulnerabilityinSNMPCouldAllowRemoteCodeExecution(926247)ImportantWindows2000,XP,2003MS06-075VulnerabilityinWindowsCouldAllowElevationofPrivilege(926255)ImportantWindowsXP,2003MS06-076CumulativeSecurityUpdateforOutlookExpress(923694)ImportantOutlookExpressonWindows2000,XP,2003MS06-077VulnerabilityinRemoteInstallationServiceCouldAllowRemoteCodeExecution(926121)ImportantWindows2000MS06-078VulnerabilityinWindowsMediaFormatCouldAllowRemoteCodeExecution(923689)CriticalWindowsMediaFormat7.1–9.5andWindowsMediaPlayer6.4onWindows2000,XP,2003December
2006SecurityBulletins
SeveritySummaryBulletinNumberWindows2000SP4WindowsXPSP2WindowsServer2003WindowsServer2003SP1MS06-072CriticalCriticalModerateCriticalWindows2000SP4WindowsXPSP2WindowsServer2003WindowsServer2003SP1MS06-074ImportantImportantImportantImportantMS06-075NotAffectedImportantImportantNotAffectedMS06-077ImportantNotAffectedNotAffectedNotAffectedVisualStudio2005MS06-073CriticalWindowsMediaPlayer6.4Windows2000SP4WindowsXPSP2WindowsServer2003&SP1MS06-078CriticalCriticalCriticalCriticalOutlookExpress5.5OutlookExpress6WindowsVistaMS06-076ImportantImportantNotAffectedMS06-072:InternetExplorer–
CriticalTitle&KBArticle:CumulativeSecurityUpdateforInternetExplorer(925454)AffectedSoftware:
IE5.01SP4onWindows2000SP4IE6SP1onWindows2000SP4IE6forWindowsXPSP2IE6forWindowsServer2003RTMandSP1IE6forWindowsServer2003RTMia64andSP1ia64IE6forWindowsServer2003x64IE6forWindowsXPProx64ReplacedUpdates:
MS06-067andallpreviousCumulativeSecurityUpdatesforInternetExplorerVulnerabilities:CVE-2006-5577-TIFFolderInformationDisclosureVulnCVE-2006-5578-TIFFolderInformationDisclosureVulnCVE-2006-5579-ScriptErrorHandlingMemoryCorruptionVuln
CVE-2006-5581-DHTMLScriptFunctionMemoryCorruptionVulnPubliclyDisclosed:NoKnownExploits:NoMS06-072:InternetExplorer–
CriticalIssueSummary:Two“RemoteCodeExploit”vulnerabilitiesandtwo“InformationDisclosure”vulnerabilitiesexistinIEthatcouldallowanattackertorunarbitrarycodeFixDescription:ThefixmodifiesthehandlingofDHTMLscriptfunctioncallsandscripterrorexceptions.ItalsorestrictsOBJECTtagsfromexposingsensitivepathstoscriptsandaccesstocachedcontentintheTIFfolderAttackVectors:
MaliciousWebPageMaliciousEmailMitigations:AuserwouldhavetobepersuadedtovisitamaliciousWebsiteExploitationonlyallowstheprivilegeleveloftheloggedonuserBydefault,IEonWindows2003runsinarestrictedmodeOutlookExpress6,Outlook2002,andOutlook2003openHTMLe-mailmessagesintheRestrictedsiteszoneInternetExplorer7isnotaffectedWorkaround:Disable“DragandDroporcopyandpastefiles”DisableActiveScriptingorsetto“Prompt”SetIEsecuritytoHighforInternetandIntranetzonesOpenHTMLe-mailmessagesintheRestrictedsiteszone,applyupdate235309forOutlook2000RestartRequirement:NOInstallationandRemoval:
Add/RemoveProgramsCommandlineuninstalloptionScriptableDeploymentMoreInformation:/taiwan/technet/security/bulletin/ms06-072.mspxMS06-073:WMIObjectBroker-
Critical
Title&KBArticle:VulnerabilityVisualStudio2005CouldAllowRemoteCodeExecution(925674)AffectedSoftware:MicrosoftVisualStudio2005ReplacedUpdates:NONEVulnerabilities:WMIObjectBrokerVulnerability-CVE-2006-4704:AremotecodeexecutionvulnerabilityexistsintheWMIObjectBrokercontrolthattheWMIWizardusesinVisualStudio2005.AnattackercouldexploitthevulnerabilitybyconstructingaspeciallycraftedWebpagethatcouldpotentiallyallowremotecodeexecutionifauserviewedtheWebpage.Anattackerwhosuccessfullyexploitedthisvulnerabilitycouldtakecompletecontrolofanaffectedsystem.PubliclyDisclosed:YesKnownExploits?:Yes.CVE-2006-4704.MS06-073:WMIObjectBroker-
CriticalIssueSummary:Thisupdateresolvesapublicvulnerability.Anattackerwhohassuccessfullyexploitedthisvulnerabilitycouldtakecompletecontrolofanaffectedsystem.Anattackercouldtheninstallprograms;view,change,ordeletedata;orcreatenewaccountswithfulluserrights.Ifauserisloggedonwithadministrativeuserrights,anattackerwhohassuccessfullyexploitedthisvulnerabilitycouldtakecompletecontrolofanaffectedsystem.Userswhoseaccountsareconfiguredtohavefeweruserrightsonthesystemcouldbelessimpactedthanuserswhooperatewithadministrativeuserrights.FixDescription:TheupdateremovesthevulnerabilitybymodifyingthewaythattheWMIObjectBrokerinstantiatesothercontrols.AttackVectors:
MaliciousWebPageEmailswithMaliciousComponentsMS06-073:WMIObjectBroker-
Critical
Mitigations:AuserwouldhavetobepersuadedtovisitamaliciousWebsiteThisActiveXcontrolisnotinthedefaultallow-listforActiveXcontrolsinInternetExplorer7.OnlycustomerswhohaveexplicitlyapprovedthiscontrolbyusingtheActiveXOpt-inFeatureareatrisktoattemptstoexploitthisvulnerability.ExploitationonlyallowsthesameprivilegesastheloggedonuserTheRestrictedsiteszonehelpsreduceattacksthatcouldtrytoexploitthisvulnerabilitybypreventingActiveScripting/ActiveXcontrolsfrombeingusedwhenreadingHTMLe-mail.Thevulnerabilitycouldnotbeexploitedautomaticallythroughe-mail.Foranattacktobesuccessfulausermustopenanattachmentthatissentinane-mailmessageormustclickonalinkwithinane-mail.Bydefault,InternetExploreronWindowsServer2003runsinarestrictedmodethatisknownasEnhancedSecurityConfiguration.Workaround:DisableattemptstoinstantiatetheWMIObjectBrokercontrolwithinInternetExplorer(seeMicrosoftKnowledgeBaseArticle240797.)ConfigureInternetExplorertopromptbeforerunningActiveXControlsordisableActiveXControlsintheInternetandLocalintranetsecurityzoneSetInternetandLocalintranetsecurityzonesettingsto“High”topromptbeforerunningActiveXControlsandActiveScriptinginthesezonesForOutlook2000,installOutlookE-mailSecurityUpdatesothatOutlook2000opensHTMLe-mailmessagesintheRestrictedsiteszone.ForOutlookExpress5.5ServicePack2,installMicrosoftSecurityBulletinMS04-018sothatOutlookExpress5.5opensHTMLe-mailmessagesintheRestrictedsiteszone.MS06-073:WMIObjectBroker-
Critical
RestartRequirement:Thisupdatedoesnotrequirearestartunlesstherequiredservicescannotbestoppedbytheinstaller.InstallationandRemoval:
Add/RemoveProgramsCommandlineinstall/uninstalloptionScriptableDeploymentMoreInformation:/taiwan/technet/security/bulletin/ms06-073.mspxMS06-074:SNMP-ImportantTitle&KBArticle:VulnerabilityinSNMPCouldAllowRemoteCodeExecution(926247)AffectedSoftware:Windows2000SP4WindowsXPSP2WindowsXPProx64WindowsServer2003WindowsServer2003&WindowsServer2003SP1WindowsServer2003ia64&WindowsServer2003SP1ia64WindowsServer2003x64ReplacedUpdates:NoneVulnerabilities:CVE-2006-5583PubliclyDisclosed:NoKnownExploits?:NoMS06-074:SNMP-ImportantIssueSummary:AremotecodeexecutionvulnerabilityexistsinSNMPServicethatcouldallowanattackerwhosuccessfullyexploitedthisvulnerabilitytotakecompletecontroloftheaffectedsystem.FixDescription:TheupdateremovesthevulnerabilitybymodifyingthewaythatSNMPServicevalidatesthelengthofamessagebeforeitpassesthemessagetotheallocatedbuffer.AttackVectors:
MaliciouspackettransmissionoverthenetworkMitigations:
SNMPserviceisnotinstalledbydefault.Forcustomerswhorequiretheaffectedcomponent,firewallbestpracticesandstandarddefaultfirewallconfigurationscanhelpprotectnetworksfromattacksthatoriginateoutsidetheenterpriseperimeter.Workaround:RestricttheIPaddressesthatareallowedtomanagethecomputer.
BlockUDPport161atthefirewall.Tohelpprotectfromnetwork-basedattemptstoexploitthisvulnerability,useapersonalfirewall,suchastheWindowsFirewall,whichisincludedwithWindowsXP.RestartRequirement:YesInstallationandRemoval:Add/RemoveProgramsCommandlineuninstalloptionScriptableDeploymentMoreInformation:/taiwan/technet/security/bulletin/ms06-074.mspxMS06-075:FileManifest-ImportantTitle&KBArticle:VulnerabilityinWindowsCouldAllowElevationofPrivilege(926255)AffectedSoftware:
WindowsXPSP2
WindowsServer2003?WindowsServer2003ia64ReplacedUpdates:
NoneVulnerabilities:FileManifestCorruptionVulnerability-CVE-2006-5585PubliclyDisclosed:NoKnownExploits?:NoMS06-075:FileManifest-ImportantIssueSummary:AprivilegeelevationvulnerabilityexistsinthewaythatMicrosoftWindowsstartsapplicationswithspeciallycraftedfilemanifests.Thisvulnerabilitycouldallowaloggedonusertotakecompletecontrolofthesystem.FixDescription:TheupdateremovesthevulnerabilitybymodifyingthewaythatClientServerRun-timeSubsystemvalidatesembeddedfilemanifestsbeforeitpassesdatatotheallocatedbuffer.Thissecurityupdatecorrectsanintegeroverflowinsxs.dll.Anyapplicationthatusesside-by-sideassemblieswithRequestedPrivilegessectionmayBSODthemachine.Compctl32.dllandGDIplus.dllaretwoside-by-sideassembliescommonlyusedbyMicrosoft.IntheworstcasealocalauthenticatedusercanrunexecutecodebeforethemachineBSOD;thereforelocalEoP(fromlocaltosystemispossible).AttackVectors:LoggedonuserMitigations:
Anattackermusthavevalidlogoncredentialsandbeabletologonlocallytoexploitthisvulnerability.Thevulnerabilitycouldnotbeexploitedremotelyorbyanonymoususers.Workaround:NoneRestartRequirement:YesInstallationandRemoval:Add/RemoveProgramsCommandlineuninstalloptionScriptableDeploymentMoreInformation:/taiwan/technet/security/bulletin/ms06-075.mspxMS06-076:OutlookExpress-ImportantTitle&KBArticle:CumulativeSecurityUpdateforOutlookExpress(923694)AffectedSoftware:Win2KSP4WinXPSP2,x64EditionWin2K3andWin2K3SP1,2K3Itanium&Sp1forItanium,Win2K3x64OE5.5SP2onWin2KSP4OE6SP1onWinXPSP2OE6onWinXPSP2,x64EditionOE6onWin2K3andWin2K3SP1,x64Edition,Itanium&ItaniumSP1ReplacedUpdates:MS06-016&MS06-043withOE6onWinXPSP2&x64andOE6onWin2K3Sp1&x64Vulnerabilities:CVE-2006-2386:WindowsAddressBookContactRecordPubliclyDisclosed:CVE-2006-2386–NoKnownExploits?:NoIssueSummary:CVE-2006-2386:AnuncheckedbufferintheWindowsAddressBook(WAB)functionswithinOutlookExpressleadsaremotecodeexecutionattacksFixDescription:CVE-2006-2386:RemovesthevulnerabilitybymodifyingthewaythatOutlookExpress,whenusinga.wabfile,validatesthelengthofafieldbeforeitpassesittotheallocatedbufferAttackVectors:MaliciousEmailMaliciousWebPageMitigations:AuserwouldhavetobepersuadedtovisitamaliciousWebsiteExploitationonlyallowsthesameprivilegesastheloggedonuserAusermustopenanattachmentthatissentinane-mailWorkaround:Backupandremovethe.wabfileassociationImpactofWorkaround:Userswillnotbeabletoopenaddressbooksbydoubleclickingthem.TheywillhavetomanuallystarttheWindowsAddressBookapplicationandpasstheaddressbooktobeusedasacommandlineparameterortheycanimporttheaddressbookfromtheFilemenu.ThisdoesnotaffecttheuseofaddressbooksinOutlookExpressRestartRequirement
NoInstallationandRemoval:Add/RemovePrograms,CommandlineuninstalloptionScriptableDeploymentMoreInformation:/taiwan/technet/security/bulletin/ms06-076.mspxMS06-076:OutlookExpress-ImportantMS06-077:RIS-ImportantTitle&KBArticle:VulnerabilityinRemoteInstallationServiceCouldAllowRemoteCodeExecution(926121)AffectedSoftware:
Windows2000SP4ONLYReplacedUpdates:NoneVulnerabilities:CVE-2006-5584-RISWritablePathVulnerabilityPubliclyDisclosed:NoKnownExploits?:NoMS06-077:RIS-ImportantIssueSummary:RISallowsanonymousaccesstothefilestructureofahostedoperatingsystembuildthroughtheTFTPservice.FixDescription:TheupdatepreventsanonymousTFTPuserstheabilitytowritetotheRIShostedoperatingsystembuild’sfilestructurebyaddingtheregistrykeyidentifiedintheWorkaroundssectionofthebulletin.AttackVectors:MaliciouspackettransmissionoverthenetworkMitigations:AnattackerwouldneedTFTPaccesstoexploitthisvulnerabilityRISisnotinstalledbydefaultStandardFirewallconfigurationsshouldblockthisfromthewebWorkaround:ConfiguretheTFTPserviceasreadonlyDisabletheTFTPServiceBlockUDPport69atthefirewallRestartRequirement:NoInstallationandRemoval:Add/RemoveProgramsCommandlineuninstalloptionScriptableDeploymentMoreInformation:/taiwan/technet/security/bulletin/ms06-077.mspxMS06-078:WindowsMediaPlayer-Critical
Title&KBArticle:VulnerabilityinWindowsMediaPlayerCouldAllowRemoteCodeExecutionKB925398addressesWindowsMediaPlayer6.4KB923689addressesWindowsMediaFormatRuntimesAffectedSoftware:MicrosoftWindowsMediaFormat7.1through9.5SeriesRuntimeonthefollowingoperatingsystemversionsMicrosoftWindows2000ServicePack4-(KB923689)MicrosoftWindowsXPServicePack2-(KB923689)MicrosoftWindowsXPProfessionalx64Edition-(KB923689)MicrosoftWindowsServer2003orMicrosoftWindowsServer2003ServicePack1-(KB923689)MicrosoftWindowsServer2003x64Edition-(KB923689)AffectedSoftware:MicrosoftWindowsMediaFormat9.5SeriesRuntimex64Editiononthefollowingoperatingsystemversions:MicrosoftWindowsXPProfessionalx64Edition-(KB923689)MicrosoftWindowsServer2003x64Edition-(KB923689)MicrosoftWindowsMediaPlayer6.4onthefollowingoperatingsystemversions:Windows2000ServicePack4-(KB925398)MicrosoftWindowsXPServicePack2-(KB925398)MicrosoftWindowsXPProfessionalx64Edition–(KB925398)MicrosoftWindowsServer2003oronMicrosoftWindowsServer2003ServicePack1–(KB925398)MicrosoftWindowsServer2003x64Edition–(KB925398)ReplacedUpdates:NoneVulnerabilities:CVE-2006-4702WindowsMediaFormatVulnerabilityCVE-2006-6134WindowsMediaFormatWMVCOREASXVulnerabilityPubliclyDisclosed:NoKnownExploits?:NoMS06-078:WindowsMediaPlayer-CriticalIssueSummary:BufferoverflowRemoteCodeExecutionWMVCoreASFexploitedASXexploitedFixDescription:
UpdatemodifiesWMVCOREvalidationprocess.AttackVectors:MaliciousWebPageMaliciousEmailMitigations:RequiresaccessingmaliciousWebsite/openingmaliciousemailExploitationonlyallowsthesameprivilegesastheloggedonuserBydefault,IEonWindows2003runsinarestrictedmodeWindowsMediaFormat11runtimeisnotaffectedbythisvulnerabilityandcouldbeusedtopreventanattempttoexploitthisvulnerability.Workaround:DisabletheWindowsMediaPlayerActiveXcontrolsfromrunninginInternetExplorerModifytheAccessControlListonStrmdll.dlltopreventshellbasedattacksonplayersonWindows2000
Unregister
Shmedia.dlltopreventshellbasedattacksonplayersWindowsXPandWindows2003MS06-078:WindowsMediaPlayer-CriticalRestartRequirement:None,ifrequiredservicesareterminable.InstallationandRemoval:Add/RemoveProgramsCommandlineuninstalloptionScriptableDeploymentMoreInformation:
http:///taiwan/technet/security/bulletin/ms06-078.mspxMS06-078:WindowsMediaPlayer-CriticalRe-ReleaseofMS06-059-ExcelCriticalInstallMS06-059mightfailifALLconditionsaretrue:RunningExcel2002MSI2.0PreviouslyinstalledMS06-037Details:Basically,becausethe059patchdoesnotcontaintheMSI2.0patchcodefor037,installingExcel2002’s059ontopof037willtriggeraWindowsInstaller2.0buginsomecases&resultinexcel.exenotgettingupdatedtoversion6816.Resolution:InstallMS06-059v2DetectionandDeploymentBulletinComponentOfficeUpdateWU/MUMBSA1.2+ODTMBSA2.0/
2.0.1SUSWSUSESTSMSSUITSMSITMUDetectanddeployDetectanddeployDetectonlyDetectonlyDetectanddeployDetectanddeployDetectonlyDetectanddeployDetectanddeployMS06-072MicrosoftInternetExplorerNotapplicableYesYesYesYesYesNotapplicableYesYesMS06-073MicrosoftVisualStudioNotapplicableYesNoYesNoYesYesYes,withESUITYesMS06-074SNMPNotapplicableYesYesYesYesYesNotapplicableYesYesMS06-075FileManifestNotapplicableYesYesYesYesYesNotapplicableYesYesMS06-076MicrosoftOutlookExpressNotapplicableYesNoYesYesYesYesYes,withESUITYesMS06-077RemoteInstallationServices(RIS)NotapplicableYesNoYesYesYesYesYesYesMS06-078WindowsMediaPlayerNotapplicableYesPartialYesYesYesYesYes,withESUITPartialOtherUpdateInformationBulletinRestartUninstallReplacesOnproductsMS06-072YesYesMS06-067andallpreviousCumulativeSecurityUpdatesforIEIE5.01SP4,IE6,IE6SP1MS06-073MaybeYesN/AVisualStudio2005MS06-074YesYesN/AWindows2000SP4,XPSP2,W2K3,W2K3SP1MS06-075YesYesN/AXPSP2andW2K3MS06-076NoYesMS06-016&MS06-043withOE6onWinXPSP2&x64andOE6onW2K3SP1&x64OE5.5SP2andOE6MS06-077NoYesN/AW2KOnlyMS06-078MaybeYesN/A
MicrosoftWindowsMediaFormat7.1through9.5SeriesRuntimeonthefollowingoperatingsystemversions
MicrosoftWindowsMediaPlayer6.4December2006Non-SecurityUpdatesNUMBERTITLEDistribution911897UpdateforWindowsServerWU,MU926251UpdateforWindowsXPMediaCenterEditionfor2005WU,MU928388UpdateforWindowsWU,MU929120UpdateforWindowsWU,MU924886UpdateforOffice2003MUNewWSUSSCAN.CABarchitectureNewarchitectureforwsusscan.cabbeginssinceNovember2006Supportforexistingwsusscan.cabarchitectureendsonMarch2007SMSITMUcustomers:downloadanddeployupdatedversionoftheSMSITMU/technet/downloads/sms/2003/tools/msupdates.mspxMBSA2.0offlinescancustomers:
DownloadupdatedversionofMBSA2.0.1nowOrdownloadthenewofflinescanfile,wsusscn2.cab,byclicking/fwlink/?LinkId=76054.
SavethisfiletoC:\DocumentsandSettings\<username>\LocalSettings\ApplicationData\Microsoft\MBSA\2.0\Cache\wsusscn2.cab.IfyouonlyrunMBSA2.0intheonlinemode,doanything.SeeMicrosoftKBArticle926464formoreinformation/kb/926464IE7overAUManualdownload(ENversion)isavailable.InternetExplorer7begandistributionoverAUinNovember
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年度金融服務協(xié)議書字體規(guī)范與風險控制協(xié)議3篇
- 2024年度地暖工程節(jié)能效果檢測與施工監(jiān)理合同3篇
- 2024年度林業(yè)用地離婚雙方權(quán)益保障協(xié)議3篇
- 2024年施工圍墻工程快速搭建與拆除服務合同3篇
- 2024年度帶花園民房租賃及附屬設施使用合同3篇
- 2024年度大型礦山資源開采承包合同范本大全3篇
- 2024年度高品質(zhì)地磚鋪設與維護服務合同3篇
- 2024年住宅小區(qū)物業(yè)產(chǎn)權(quán)轉(zhuǎn)移及交接協(xié)議書3篇
- 《求婚策劃的步驟》課件
- 2024年二級造價師考試題庫(全優(yōu))
- 我國農(nóng)民專業(yè)合作社及其發(fā)展政策研究的開題報告
- 小學數(shù)學重量單位克、千克、噸換算練習100道及答案
- 生物信息學研究現(xiàn)狀及發(fā)展趨勢
- 漁業(yè)安全與事故預防
- 國開電大軟件工程形考作業(yè)3參考答案
- 中職產(chǎn)教融合建設實施方案
- GB/T 16462.1-2023數(shù)控車床和車削中心檢驗條件第1部分:臥式機床幾何精度檢驗
- 廣東省深圳市南山區(qū)2023-2024學年八年級上學期期末數(shù)學試題(含解析)
- 檢驗科的分子組出科小結(jié)
- 安全生產(chǎn)合規(guī)性評估報告
- 2019北師大版高中英語選修一UNIT 3 單詞短語句子復習默寫單
評論
0/150
提交評論