AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£»GoogleÑо¿Ö°Ô±Åû¶LinuxÄÚºËÖÐBleedingToothÎó²î
Ðû²¼Ê±¼ä 2020-10-15
AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷Ô˶¯¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓùÔ˶¯µÄÊý¾Ý£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊУ¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£
ÔÎÄÁ´½Ó£º
https://www.agari.com/email-security-blog/business-email-compromise-geography/
2.GoogleÑо¿Ö°Ô±Åû¶LinuxÄÚºËÖÐBleedingToothÎó²î

¹È¸èÇå¾²Ñо¿Ö°Ô±Andy NguyenÔÚLinuxÄÚºËÖз¢Ã÷ÁËÀ¶ÑÀÎó²î£¬³ÆÎªBleedingTooth£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔËÐÐí§Òâ´úÂë»ò»á¼ûÃô¸ÐÐÅÏ¢¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-12351¡¢CVE-2020-12352ºÍCVE-2020-24490¡£ÔÚÊܺ¦ÕßÀ¶ÑÀ¹æÄ£ÄÚ£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÒ»¸ö¶ñÒâµÄl2cap°üÀ´´¥·¢¸ÃÎó²î£¬¿Éµ¼Ö¾ܾø·þÎñ£¬ÉõÖÁʹÓÃÄÚºËȨÏÞÖ´ÐÐí§Òâ´úÂë¡£²¢ÇÒÕâÊÇÒ»¸öÁãµã»÷Îó²î£¬¼´ÎÞÐèÓëÓû§½»»¥¼´¿ÉʹÓá£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/109500/hacking/bluetooth-bleedingtooth-vulnerabilities.html
3.Hindotech HK1»ú¶¥ºÐ±£´æÌáȨÎó²î£¬¿ÉÓÃÀ´ÇÔÈ¡Êý¾Ý

Ñо¿Ö°Ô±·¢Ã÷Hindotech HK1»ú¶¥ºÐ±£´æÌáȨÎó²î£¬¿ÉÓÃÀ´ÇÔÈ¡Êý¾Ý¡£¸ÃÎó²îÔ´ÓÚ»á¼û¿ØÖƲ»µ±£¬ÌØÊâÊǵ±Í¨¹ý´®¿Ú(UART)ÅþÁ¬µ½×°±¸Ê±£¬»òÕß¿´³ÉΪ·ÇÌØÈ¨Óû§Ê¹ÓÃAndroidµ÷ÊÔÇŽÓ(adb)ʱ£¬ÔÊÐíÍâµØÎÞÌØÈ¨Óû§Éý¼¶ÎªrootÓû§¡£¹¥»÷ÕßÀֳɵÄʹÓøÃÎó²î¿ÉÇÔÈ¡Éç½»ÍøÂçÕÊ»§ÁîÅÆ¡¢Wi-FiÃÜÂë¡¢Cookie¡¢ÒÑÉúÑĵÄÃÜÂë¡¢Óû§Î»ÖÃÊý¾Ý¡¢ÐÂÎÅÀúÊ·¼Í¼¡¢µç×ÓÓʼþºÍÁªÏµÈ˵ȡ£
ÔÎÄÁ´½Ó£º
https://threatpost.com/authentication-bug-android-smart-tv-data-theft/160025/
4.΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´87¸öÇå¾²Îó²î

΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´87¸öÇå¾²Îó²î¡£´Ë´Î¸üÐÂÖÐÐÞ¸´ÁË6¸öÒѱ»¹ûÕæµÄÎó²î£¬°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2020-16938£©¡¢Windows Storage VSPÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16885£©¡¢WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2020-16901£©¡¢Windows×°ÖóÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16908£©¡¢Windows¹ýʧ±¨¸æÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16909£©ºÍ.NET FrameworkÐÅϢй¶Îó²î£¨CVE-2020-16937£©
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-october-2020-patch-tuesday-fixes-87-security-bugs/
5.ŲÍþÕþ¸®³ÆÆä8ÔÂÔâµ½µÄÍøÂç¹¥»÷Óë¶íÂÞ˹ºÚ¿ÍÓйØ

ŲÍþÕþ¸®³Æ8ÔÂ·ÝÆäÒé»á£¨Stortinget£©µç×ÓÓʼþϵͳÔâµ½µÄÍøÂç¹¥»÷Óë¶íÂÞ˹ºÚ¿ÍÓйء£StortingÓÚ8ÔÂ24ÈÕÐû²¼Æäµç×ÓÓʼþϵͳ±¬·¢Êý¾Ýй¶£¬¸ÃÊÂÎñÓ°ÏìÁ˸ùúÖÐÐĵ³ºÍ¹¤µ³µÄ´ú±í¼°³ÉÔ±¡£Å²ÍþÍâ½»²¿³¤Ine EriksenS?reideÓÚ10ÔÂ13ÈÕÌåÏÖ£¬¶íÂÞ˹ÊÇ´Ë´ÎÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖ¡£Ëæºó£¬Æ¾Ö¤ÐÂÎÅÉçTASSµÄ±¨µÀ£¬¶íÂÞ˹Õýʽ·ñ¶¨Ö¸¿Ø£¬³ÆÆäûÓÐÖ¤¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/norway-says-russia-behind-cyber-attack-parliament
6.¹ú¼ÊÂÉËùSeyfarthÔâÀÕË÷Èí¼þ¹¥»÷£¬ÓʼþϵͳÔÝʱ¹Ø±Õ

¹ú¼ÊÂÉËùSeyfarthÐû²¼ÆäÓÚÖÜÄ©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬ÓʼþϵͳÔÝʱ¹Ø±Õ¡£¸ÃÊÂÎñ±¬·¢ÔÚÉÏÖÜÁù£¬Seyfarth³ÆÐí¶àÆäËû¹«Ë¾Ò²Í¬Ê±Ôâµ½Á˹¥»÷¡£¸Ã¹«Ë¾µÄ¶à¸öϵͳ±»¼ÓÃÜ£¬×÷ΪԤ·À²½·¥£¬Æä¹Ø±ÕÁ˱»¼ÓÃÜÅÌËã»ú£¬°üÀ¨µç×ÓÓʼþϵͳ¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄΣº¦Ë®Æ½£¬¿ÉÊÇSeyfarth³ÆÃ»Óпͻ§»ò¹«Ë¾Êý¾Ýй¶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/international-law-firm-seyfarth-discloses-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ