AdobeÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î£»IntelÇå¾²¸üÐÂÐÞ¸´Æä·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î

Ðû²¼Ê±¼ä 2020-08-13

1.AdobeÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


AdobeÐû²¼Çå¾²¸üУ¬×ܼÆÐÞ¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸öÎó²î¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑÏÖØµÄÎó²î£¬¿É±»Ê¹ÓþÙÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ýÇå¾²¹¦Ð§£¬»®·ÖΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇø¹ýʧµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?ÊͷźóʹÓõ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/


2.GoogleΪChromeÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¸öÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


GoogleΪChromeÐû²¼ÁËÇå¾²¸üУ¬ÐÞ¸´Á˶à¸ö¿É±»Ê¹ÓÃÒÔ¿ØÖÆÊÜÓ°ÏìϵͳµÄÎó²î£¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪÊͷźóʹÓÃÎó²î£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£©£¬×°ÖóÌÐòÖ´Ðв»µ±£¨CVE-2020-6546£©£¬Ã½ÌåÖеÄÇå¾²UI¹ýʧ£¨CVE-2020-6547£©£¬SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨ CVE-2020-6548£©£¬IndexedDBÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6550£©ºÍWebXRÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6551£©µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome


3.IntelÇå¾²¸üÐÂÐÞ¸´Æä·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Intel±¾ÖܶþÐû²¼Í¨Öª£¬ÉùÃ÷ÆäÒÑÐÞ¸´ÁË·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î¡£´Ë´Î¸üÐÂ×ܼÆÐÞ¸´ÁË20¶à¸öÎó²î£¬Ó°ÏìÁË·þÎñÆ÷Ö÷°å¡¢·þÎñÆ÷ϵͳºÍÅÌËãÄ£¿é£¬ÆäÖеĴó²¿Îó²î¿É±»Ê¹ÓþÙÐÐÌáȨ£¬ÉÐÓÐÒ»²¿·Ö¿É±»Ê¹ÓÃͨ¹ýÍâµØ»á¼ûÌᳫDoS¹¥»÷¡£ÆäÖÐ×îÑÏÖØµÄÎó²î±»×·×ÙΪCVE-2020-8708£¬ÊÇÒ»¸ö¹ýʧµÄÉí·ÝÑéÖ¤ÎÊÌ⣬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓã¬Í¨¹ýÏàÁÚ»á¼ûÀ´ÌáȨ£¬¸ÃÎó²îÓ°ÏìÁË1.59°æÖ®Ç°µÄ·þÎñÆ÷Ö÷°å¡¢·þÎñÆ÷ϵͳºÍÅÌËãÄ£¿é¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards


4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄÑо¿Ö°Ô±·¢Ã÷ReVoLTE¹¥»÷¿ÉʹÓÃLTEÓïÒô£¨VoLTE£©Ð­ÒéÖеÄÎó²î£¬ÆÆËð4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£Ñо¿Ö°Ô±·¢Ã÷£¬Ö»¹ÜÒÆ¶¯ÔËÓªÉÌȷʵ֧³ÖÓïÒôºô½Ð¼ÓÃÜ£¬¿ÉÊÇÐí¶àºô½Ð¶¼ÊÇʹÓÃÏàͬµÄ¼ÓÃÜÃÜÔ¿¡£ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬»ùÕ¾»áÖØ¸´Ê¹ÓÃÏàͬµÄÁ÷ÃÜÂ룬»òÕßÓÿÉÕ¹ÍûµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£Òò´Ë£¬¹¥»÷Õß¿ÉÒԼͼÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»°£¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»°£¬¾Í¿ÉÒÔ¶Ôͨ»°¾ÙÐнâÃÜ¡£ÏÖÔÚ£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£



Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/


5.¿¨°Í˹»ùÐû²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¶íÂÞË¹ÍøÂçÇå¾²¹©Ó¦ÉÌ¿¨°Í˹»ùÐû²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ£¬·¢Ã÷Óë2019ÄêµÚ¶þ¼¾¶ÈÏà±È£¬2020ÄêµÄDDoS¹¥»÷ÊýĿͬ±ÈÔöÌíÁË217£¥¡£¿¨°Í˹»ù³Æ£¬2020Äê¶ÈµÄÇ÷ÊÆÓëÍù³£ÄÏÔ¯±±ÕÞ£¬Í¨³£ÇéÐÎÏÂDDoS¹¥»÷ÔÚÄêÍ·×îÏȵִïá۷壬ȻºóÔÚ´ºÄ©ºÍÏÄÈÕϽµ£¬ÏÖÔÚÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÄ¿ÔöÌíÁË30£¥¡£ÔÚ4ÔÂ9ÈÕ£¬µ¥ÈյĹ¥»÷´ÎÊýµÖ´ïá۷壬Ϊ½ü300´Î£¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡£¿¨°Í˹»ùDDoS±£»¤ÍŶÓÒÔΪ£¬ÕâÖÖÇ÷ÊÆµÄ¸Ä±ä»òÐíÓëCOVID19µÄ±¬·¢ÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/ddos-triple-q2/


6.Çå¾²Åàѵ»ú¹¹SANSÔâ´¹ÂÚ¹¥»÷£¬²¿·ÖÔ±¹¤ÐÅϢй¶


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÍøÂçÇå¾²Åàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹ÂÚ¹¥»÷£¬µ¼Ö²¿·ÖÔ±¹¤ÐÅϢй¶¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢Ã÷ÆäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÓ¦ÓóÌÐò£¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£´Ë´Îй¶µÄÊý¾Ý²»°üÀ¨ÃÜÂë»òÐÅÓÿ¨µÈ²ÆÎñÐÅÏ¢£¬µ«°üÀ¨µç×ÓÓʼþµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢ÊÂÇéÃû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØµã¡£SANSÌåÏÖ£¬Æä¶Ô´ËÊÂÎñÕýÔÚÊÓ²ìÖУ¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/