AdobeÇå¾²¸üÐÂÐÞ¸´MagentoÖÐÁ½¸öÖ÷ÒªµÄ´úÂëÖ´ÐÐÎó²î£»£»£»Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÍêÈ«¿ØÖÆÐ§ÀÍÆ÷

Ðû²¼Ê±¼ä 2020-07-30

1.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´MagentoÖÐÁ½¸ö´úÂëÖ´ÐÐÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


AdobeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´Magento CommerceºÍMagento Open SourceÖеÄÁ½¸öÑÏÖØµÄ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÊÇÓÉ·¾¶±éÀú¹ýʧÒýÆðµÄ£¬£¬£¬£¬£¬£¬£¬£¬±»¸ú×ÙΪCVE-2020-9689£¬£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐí¾ßÓÐÖÎÀíԱȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÊÇ»ùÓÚDOMµÄ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬£¬£¬£¬£¬£¬±»×·×ÙΪCVE-2020-9691£¬£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐíʹδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËÓÉ¿ÉÊӲ쵽µÄʱ¼ä²îÒýÆðµÄÊðÃûÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-9690£©¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¸ÃÎó²îÉÐÎÞÒÑÖªµÄʹÓú͹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-gets-security-updates-for-severe-code-execution-bugs/


2.GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ChromeÖеÄ8¸öÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËChromeÖеÄ8¸öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËWindows¡¢MacºÍLinuxϵͳϵÄChrome°æ±¾84.0.4147.105¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂÖÐÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪV8ÖеÄÀàÐÍ»ìÏýÎÊÌ⣨CVE-2020-6537£©¡¢WebViewÖеÄʵÏÖ²»µ±ÎÊÌ⣨CVE-2020-6538£©¡¢SCTPÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6532£©¡¢CSSÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6539£©¡¢SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-6540£©ÒÔ¼°WebUSBÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6541£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/07/28/google-releases-security-updates-chrome


3.Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Positive TechnologiesÑо¿Ö°Ô±·¢Ã÷DellÔ¶³Ì»á¼û¿ØÖÆÆ÷£¨iDRAC£©Öб£´æ±éÀúÎó²î£¨CVE-2020-5366£©£¬£¬£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£Í¨¹ýʹÓôËÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¾­ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔ·­¿ªºÍ¹Ø±Õ²úÆ·£¬£¬£¬£¬£¬£¬£¬£¬»ò¸ü¸ÄÆäÉ¢ÈȺ͵çÔ´ÉèÖᣡ£¡£¡£¡£¡£³ý´ËÖ®Íâ £¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓöÁÈ¡¿ØÖÆÆ÷²Ù×÷ϵͳÖеÄÈκÎÎļþ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÔÚijЩÇéÐÎÏÂ×ÌÈÅ¿ØÖÆÆ÷µÄ²Ù×÷¡£¡£¡£¡£¡£¡£¸ÃÎó²î»áÓ°Ïì¹Ì¼þ°æ±¾Îª4.20.20.20֮ǰµÄDell EMC iDRAC9¿ØÖÆÆ÷£¬£¬£¬£¬£¬£¬£¬£¬Dell EMCÔÚ¼ì²âµ½¸ÃÎó²îÖ®ºó±ãÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬²¢±Þ²ßÓû§¾¡¿ì×°Öᣡ£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/dell-emc-patches-idrac/


4.ÐÂÐÍLinuxºóÃÅDokiʹÓÃDogecoin API£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔDockerʵÀý


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Intezer Labs·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÐÂÐÍLinuxºóÃųÌÐòDokiʹÓÃÁËDogecoin API£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔDockerʵÀý¡£¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯Ngrok×Ô2018Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬£¬×î³õÇãÏòÓÚʹÓÃNgrokЧÀÍÍйÜC£¦CЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¶øÔÚ¸Ã×éÖ¯×î½üÒ»´ÎµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÆäÕë¶Ôй¶ÁËÖÎÀíAPIµÄDockerʵÀý¡£¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýʹÓÃDocker APIÔÚÄ¿µÄ¹«Ë¾µÄÔÆ»ù´¡¼Ü¹¹Öа²ÅÅÐÂЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬ËæºóÔËÐÐѬȾÁ˼ÓÃÜÍÚ¿ó¶ñÒâÈí¼þDokiµÄAlpine LinuxЧÀÍÆ÷¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬DokiµÄÄ¿µÄÊÇÔÊÐíºÚ¿Í¿ØÖÆÆäа²ÅŵÄAlpine LinuxЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£¼ÓÃܲɿó²Ù×÷°´Ô¤ÆÚÔËÐС£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-linux-malware-uses-dogecoin-api-to-find-c-c-server-addresses/#ftag=RSSbaffb68


5.¿¨°Í˹»ù·¢Ã÷ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¿¨°Í˹»ùÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйء£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê3ÔÂÖÁ5ÔµÄÊÓ²ìÖз¢Ã÷ÁËÀÕË÷Èí¼þVHDµÄÑù±¾£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÑù±¾Ê¹ÓÃSMB±©Á¦ÆÆ½â·Ö·¢MATA¶ñÒâÈí¼þ¿ò¼Ü¡£¡£¡£¡£¡£¡£VHD¿ÉÒþ²ØµØÅþÁ¬µ½Êܺ¦ÕߵĵçÄÔÇý¶¯Æ÷£¬£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬£¬£¬²¢É¾³ýËùÓеÄSystem Volume InformationÎļþ¼Ð£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÆÆËðϵͳÖеÄWindows»¹Ô­¹¦Ð§¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔ½ûÓñÜÃâÖ÷ÒªÎļþ±»¸Ä¶¯µÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçMicrosoft Exchange»òSQL Server¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ù·¢Ã÷ManuscryptľÂíҲʹÓÃÁËMATA¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬£¬Òò´ËÅжÏͬÑùʹÓÃÁ˸öñÒâ¿ò¼ÜµÄVHDÓëLazarusÓйء£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-hackers-created-vhd-ransomware-for-enterprise-attacks/


6.IBMÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


IBMÓÚ±¾ÖÜÈýÐû²¼ÁËÄê¶ÈÊý¾Ýй¶±¾Ç®±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª¡£¡£¡£¡£¡£¡£Ö»¹ÜÓë2019ÄêÏà±È£¬£¬£¬£¬£¬£¬£¬£¬Æ½¾ù±¾Ç®Ï½µÁË1.5£¥£¬£¬£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶Áè¼Ý5000ÍòÌõ¼Í¼µÄ³¬´óÐÍ×ß©ÊÂÎñµÄ±¾Ç®¿ÉÄܸߴï3.92ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬£¬¸ßÓÚ2019ÄêµÄ3.88ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£×ÜÌå¶øÑÔ£¬£¬£¬£¬£¬£¬£¬£¬ÕÊ»§Æ¾Ö¤Ð¹Â¶ÒÔ¼°ÔÆÉèÖùýʧµ¼ÖÂÁ˽ü40£¥µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓõÚÈý·½Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈç0day£¬£¬£¬£¬£¬£¬£¬£¬Ò²ÊÇÔì³ÉÊý¾Ýй¶µÄÖ÷ÒªÒòËØ£¬£¬£¬£¬£¬£¬£¬£¬Ò»¼ÒÒò´ËÀàÎó²îµ¼ÖÂÊý¾Ýй¶µÄ¹«Ë¾¿ÉÄÜÐèÒªÖ§¸¶¸ß´ï450ÍòÃÀÔªµÄÅâ³¥¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÆóÒµ¹ºÖÃÁËÍøÂç°ü¹Ü£¬£¬£¬£¬£¬£¬£¬£¬Ôòƽ¾ù¿ÉïÔÌ­20ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/todays-mega-data-breaches-now-cost-companies-392-million-in-damages-lawsuits/