AdobeÐû²¼Çå¾²¸üР£¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î£»£»£» £»£»£»£»IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î

Ðû²¼Ê±¼ä 2020-08-13

1.AdobeÐû²¼Çå¾²¸üР£¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


AdobeÐû²¼Çå¾²¸üР£¬£¬ £¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑÏÖØµÄÎó²î £¬£¬ £¬£¬£¬£¬£¬¿É±»Ê¹ÓþÙÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ýÇå¾²¹¦Ð§ £¬£¬ £¬£¬£¬£¬£¬»®·ÖΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇø¹ýʧµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?ÊͷźóʹÓõ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/


2.GoogleΪChromeÐû²¼Çå¾²¸üР£¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


GoogleΪChromeÐû²¼ÁËÇå¾²¸üР£¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´Á˶à¸ö¿É±»Ê¹ÓÃÒÔ¿ØÖÆÊÜÓ°ÏìϵͳµÄÎó²î £¬£¬ £¬£¬£¬£¬£¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪÊͷźóʹÓÃÎó²î£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£© £¬£¬ £¬£¬£¬£¬£¬×°ÖóÌÐòÖ´Ðв»µ±£¨CVE-2020-6546£© £¬£¬ £¬£¬£¬£¬£¬Ã½ÌåÖеÄÇå¾²UI¹ýʧ£¨CVE-2020-6547£© £¬£¬ £¬£¬£¬£¬£¬SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨ CVE-2020-6548£© £¬£¬ £¬£¬£¬£¬£¬IndexedDBÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6550£©ºÍWebXRÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6551£©µÈ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome


3.IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Intel±¾ÖܶþÐû²¼Í¨Öª £¬£¬ £¬£¬£¬£¬£¬ÉùÃ÷ÆäÒÑÐÞ¸´ÁËЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂ×ܼÆÐÞ¸´ÁË20¶à¸öÎó²î £¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÁËЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿£¿£¿é £¬£¬ £¬£¬£¬£¬£¬ÆäÖеĴó²¿Îó²î¿É±»Ê¹ÓþÙÐÐÌáȨ £¬£¬ £¬£¬£¬£¬£¬ÉÐÓÐÒ»²¿·Ö¿É±»Ê¹ÓÃͨ¹ýÍâµØ»á¼ûÌᳫDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²î±»×·×ÙΪCVE-2020-8708 £¬£¬ £¬£¬£¬£¬£¬ÊÇÒ»¸ö¹ýʧµÄÉí·ÝÑéÖ¤ÎÊÌâ £¬£¬ £¬£¬£¬£¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓà £¬£¬ £¬£¬£¬£¬£¬Í¨¹ýÏàÁÚ»á¼ûÀ´ÌáȨ £¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁË1.59°æÖ®Ç°µÄЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards


4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄÑо¿Ö°Ô±·¢Ã÷ReVoLTE¹¥»÷¿ÉʹÓÃLTEÓïÒô£¨VoLTE£©Ð­ÒéÖеÄÎó²î £¬£¬ £¬£¬£¬£¬£¬ÆÆËð4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ £¬£¬ £¬£¬£¬£¬£¬Ö»¹ÜÒÆ¶¯ÔËÓªÉÌȷʵ֧³ÖÓïÒôºô½Ð¼ÓÃÜ £¬£¬ £¬£¬£¬£¬£¬¿ÉÊÇÐí¶àºô½Ð¶¼ÊÇʹÓÃÏàͬµÄ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ´ó´ó¶¼ÇéÐÎÏ £¬£¬ £¬£¬£¬£¬£¬»ùÕ¾»áÖØ¸´Ê¹ÓÃÏàͬµÄÁ÷ÃÜÂë £¬£¬ £¬£¬£¬£¬£¬»òÕßÓÿÉÕ¹ÍûµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£¡£Òò´Ë £¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒԼͼÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»° £¬£¬ £¬£¬£¬£¬£¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»° £¬£¬ £¬£¬£¬£¬£¬¾Í¿ÉÒÔ¶Ôͨ»°¾ÙÐнâÃÜ¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¡£



Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/


5.¿¨°Í˹»ùÐû²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¶íÂÞË¹ÍøÂçÇå¾²¹©Ó¦ÉÌ¿¨°Í˹»ùÐû²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ £¬£¬ £¬£¬£¬£¬£¬·¢Ã÷Óë2019ÄêµÚ¶þ¼¾¶ÈÏà±È £¬£¬ £¬£¬£¬£¬£¬2020ÄêµÄDDoS¹¥»÷ÊýĿͬ±ÈÔöÌíÁË217£¥¡£¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ù³Æ £¬£¬ £¬£¬£¬£¬£¬2020Äê¶ÈµÄÇ÷ÊÆÓëÍù³£ÄÏÔ¯±±ÕÞ £¬£¬ £¬£¬£¬£¬£¬Í¨³£ÇéÐÎÏÂDDoS¹¥»÷ÔÚÄêÍ·×îÏȵִïáÛ·å £¬£¬ £¬£¬£¬£¬£¬È»ºóÔÚ´ºÄ©ºÍÏÄÈÕϽµ £¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÄ¿ÔöÌíÁË30£¥¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ4ÔÂ9ÈÕ £¬£¬ £¬£¬£¬£¬£¬µ¥ÈյĹ¥»÷´ÎÊýµÖ´ïáÛ·å £¬£¬ £¬£¬£¬£¬£¬Îª½ü300´Î £¬£¬ £¬£¬£¬£¬£¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡£¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ùDDoS±£»£»£» £»£»£»£»¤ÍŶÓÒÔΪ £¬£¬ £¬£¬£¬£¬£¬ÕâÖÖÇ÷ÊÆµÄ¸Ä±ä»òÐíÓëCOVID19µÄ±¬·¢ÓйØ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/ddos-triple-q2/


6.Çå¾²Åàѵ»ú¹¹SANSÔâ´¹ÂÚ¹¥»÷ £¬£¬ £¬£¬£¬£¬£¬²¿·ÖÔ±¹¤ÐÅϢй¶


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ÍøÂçÇå¾²Åàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹ÂÚ¹¥»÷ £¬£¬ £¬£¬£¬£¬£¬µ¼Ö²¿·ÖÔ±¹¤ÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢Ã÷ÆäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÓ¦ÓóÌÐò £¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý²»°üÀ¨ÃÜÂë»òÐÅÓÿ¨µÈ²ÆÎñÐÅÏ¢ £¬£¬ £¬£¬£¬£¬£¬µ«°üÀ¨µç×ÓÓʼþµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢ÊÂÇéÃû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØµã¡£¡£¡£¡£¡£¡£¡£¡£SANSÌåÏÖ £¬£¬ £¬£¬£¬£¬£¬Æä¶Ô´ËÊÂÎñÕýÔÚÊÓ²ìÖÐ £¬£¬ £¬£¬£¬£¬£¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/