ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ07ÖÜ
Ðû²¼Ê±¼ä 2020-02-17> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê02ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î94¸ö£¬£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApache Dubbo·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î; OpenVPN Access Server LDAPÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»£»£»IstioÑéÖ¤Õ½ÂÔexact-pathÂ߼ƥÅäÇå¾²ÈÆ¹ýÎó²î£»£»£»£»£»£»£»£»Adobe Framemaker CVE-2020-3731ÄÚ´æÒýÓôúÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»Microsoft Exchange Server CVE-2020-0692ȨÏÞÌáÉýÎó²î¡£¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ˼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCEÎó²î£»£»£»£»£»£»£»£»ÃÀµÂÇ鱨²¿·Ö¿ØÖÆÈðÊ¿¹«Ë¾ÊýÊ®Ä꣬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡120¹úÉñÃØÇ鱨£»£»£»£»£»£»£»£»MalwarebytesÐû²¼2020Äê¶ñÒâÈí¼þ״̬±¨¸æ£»£»£»£»£»£»£»£»ÑÅÊ«À¼÷ìÔÆÊý¾Ý¿â̻¶4.4ÒÚÌõÄÚ²¿¼Í¼£»£»£»£»£»£»£»£»Palo Alto NetworksÐû²¼2020Äê´º¼¾ÔÆÍþв±¨¸æ¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Apache Dubbo·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
Apache DubboÆôÓÃHTTPÐÒé¾ÙÐÐͨѶʱ±£´æ·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄPOSTÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
https://github.com/apache/dubbo/releases/tag/dubbo-2.7.5
2. OpenVPN Access Server LDAPÑéÖ¤ÈÆ¹ýÎó²î
OpenVPN Access Server ʹÓÃLDAPÑé֤ϵͳµÇ¼´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇóÈÆ¹ýÑéÖ¤£¬£¬£¬£¬£¬£¬£¬£¬Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£
https://openvpn.net/security-advisories/
3. IstioÑéÖ¤Õ½ÂÔexact-pathÂ߼ƥÅäÇå¾²ÈÆ¹ýÎó²î
IstioÑéÖ¤Õ½ÂÔexact-pathÂß¼´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄ°üÀ¨?»ò#×Ö·ûµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÑéÖ¤¡£¡£¡£¡£¡£¡£¡£
https://istio.io/news/security/istio-security-2020-001/
4. Adobe Framemaker CVE-2020-3731ÄÚ´æÒýÓôúÂëÖ´ÐÐÎó²î
Adobe Framemaker±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²î¹¹½¨¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÄ¿µÄÓû§ÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
https://helpx.adobe.com/security/products/framemaker/apsb20-04.html
5. Microsoft Exchange Server CVE-2020-0692ȨÏÞÌáÉýÎó²î
Microsoft Exchange Server±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ»ñµÃÓë Exchange Server µÄÆäËûÈκÎÓû§ÏàͬµÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-0692
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ë¼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCEÎó²î
˼¿ÆTalosÍŶÓÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î(CVE-2020-3868)£¬£¬£¬£¬£¬£¬£¬£¬µ±Óû§ÔÚSafariÖз¿ª¶ñÒâÍøÒ³Ê±£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᴥ·¢ÀàÐÍ»ìÏý£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÄÚ´æË𻵺ÍÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÐèҪͨ¹ýijÖÖ·½·¨ÓÕʹÓû§»á¼û¶ñÒâÍøÒ³À´´¥·¢´ËÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚSafariµÄ¡°×ÖÌ塱¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬£¬£¬Talos²âÊÔ²¢È·ÈÏ´ËÎó²îÓ°ÏìSafari°æ±¾13.0.3£¨15608.3.10.1.4£©¡¢SafariÊÖÒÕÔ¤ÀÀ°æ96£¨Safari 13.1£¬£¬£¬£¬£¬£¬£¬£¬WebKit 15609.1.9.7£©ºÍWebkit GIT e4cd3b4fab6166d1288984ded40c588439dab925£¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îа汾¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2020/02/vuln-spotlight-apple-safari-code-execution-feb-2020.html
2¡¢ÃÀµÂÇ鱨²¿·Ö¿ØÖÆÈðÊ¿¹«Ë¾ÊýÊ®Ä꣬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡120¹úÉñÃØÇ鱨
¾ÝÃÀ¹ú¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀµÂÇ鱨²¿·ÖÊýÊ®Äê¼äͨ¹ý¿ØÖÆÈðÊ¿¼ÓÃܹ«Ë¾Crypto AG£¬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÈ«ÇòÔ¼120¹úÕþ¸®µÄ×î¸ßÉñÃØÍ¨Ñ¶Ç鱨¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬£¬µÚ¶þ´ÎÌìÏ´óÕ½Õ½ºóµ½±¾ÊÀ¼Í³õ£¬£¬£¬£¬£¬£¬£¬£¬Crypto AG¹«Ë¾ÎªÔ¼120¸ö¹ú¼ÒµÄÕþ¸®Ìṩ¼ÓÃÜͨѶװÖ㬣¬£¬£¬£¬£¬£¬£¬ÒÁÀÊ¡¢ÄÏÃÀ¶à¹úÕþ¸®¡¢Ó¡¶ÈÓë°Í»ù˹̹½ÔΪЧÀ͹¤¾ß¡£¡£¡£¡£¡£¡£¡£µ«Crypto AGÄ»ºóÀϰå×ÅʵÊÇÃÀ¹úÖÐÑëÇ鱨¾Ö£¨CIA£©ÒÔ¼°µÂ¹úÁª°îÇ鱨¾Ö£¨BND£©¡£¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÇ鱨²¿·Ö¶ÔCrypto×°ÖÃÏÂÊֽţ¬£¬£¬£¬£¬£¬£¬£¬ÈÃ×°ÖÿÉÈÝÒ×±»ÆÆ½â£¬£¬£¬£¬£¬£¬£¬£¬½ø¶ø½â¶ÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÖÐÇé¾ÖÄÚ²¿ÓйØÓÚÕâ¸ö×î¸ßÉñÃØÍýÏëµÄÀúÊ·ÉñÃØµµ°¸£¬£¬£¬£¬£¬£¬£¬£¬µµ°¸Ö¸³öCrypto AG¿¿×ÅÈÃÎ÷·½Ç鱨»ú¹ØÈ¡µÃ¿Í»§ÉñÃØ£¬£¬£¬£¬£¬£¬£¬£¬×¬½øÊýÒÔ°ÙÍò¼ÆÃÀÔª¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬µµ°¸Ò²Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜʹÓÃCrypto AG²úÆ·µÄ¹ú¼Ò²»ÉÙ£¬£¬£¬£¬£¬£¬£¬£¬µ«ËÕÁª/¶íÂÞ˹ºÍÖйú£¬£¬£¬£¬£¬£¬£¬£¬È´ÀúÀ´¶¼²»ÊǸù«Ë¾µÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/us-german-spies-plundered-global-secrets-swiss-encryption-firm-report
3¡¢MalwarebytesÐû²¼2020Äê¶ñÒâÈí¼þ״̬±¨¸æ
Malwarebytes LabsÐû²¼2020Äê¶ñÒâÈí¼þ״̬±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬±¨¸æÖ¸³öÓëÕë¶ÔWindows PCµÄÍþвÏà±È£¬£¬£¬£¬£¬£¬£¬£¬MacÍþв³ÊÖ¸Êý¼¶ÔöÌí¡£¡£¡£¡£¡£¡£¡£MacÍþвµÄ×ÜÊýĿͬ±ÈÔöÌíÁË400£¥ÒÔÉÏ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÕâÒ»Êý×ÖÒ»¶¨Ë®Æ½ÉÏ¿ÉÄÜÊܵ½2019ÄêMalwarebytes MacÓû§ÈºÔöÌíµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¶Ôµ¥¸öÖն˶øÑÔ£¬£¬£¬£¬£¬£¬£¬£¬MacÍþвÈÔÈ»±ÈWindows¸ß£¬£¬£¬£¬£¬£¬£¬£¬ÏÕЩΪ2£º1¡£¡£¡£¡£¡£¡£¡£±¨¸æ»¹Ö¸³ö¹¥»÷ÐÔ¹ã¸æÈí¼þ¡¢Ä¾ÂíºÍHackToolsÖ÷µ¼ÁËÕë¶ÔÓªÒµ¶ËµãµÄÈ«ÇòÍþв£¬£¬£¬£¬£¬£¬£¬£¬±ÈÈ¥ÄêͬÆÚÔöÌíÁË13£¥¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÆóÒµµÄÀÕË÷Èí¼þ»î¶¯µÖ´ïÀúÊ·×î¸ßˮƽ£¬£¬£¬£¬£¬£¬£¬£¬RyukºÍSodinokibiµÈ¼Ò×å»®·ÖÔöÌíÁË543£¥ºÍ820£¥¡£¡£¡£¡£¡£¡£¡£EmotetºÍTrickBotÈÔÈ»ÊÇÕë¶ÔÆóÒµµÄÖ÷ÒªÍþв֮һ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/reports/2020/02/malwarebytes-labs-releases-2020-state-of-malware-report/
4¡¢ÑÅÊ«À¼÷ìÔÆÊý¾Ý¿â̻¶4.4ÒÚÌõÄÚ²¿¼Í¼
Çå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷ÑÅÊ«À¼÷ìµÄÒ»¸öÔÆÊý¾Ý¿âδÉèÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ4.4ÒÚÌõÄÚ²¿¼Í¼й¶£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨´¿Îı¾µç×ÓÓʼþµØµã£¨°üÀ¨À´×Ô@estee.comÓòµÄÄÚ²¿µç×ÓÓʼþµØµã£©ºÍCMS¡¢ÖÐÐļþµÄ»î¶¯ÈÕÖ¾µÈÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£µ«¼Í¼ÖÐûÓаüÀ¨¿Í»§µÄ¸¶¿îÊý¾Ý»òÃô¸ÐµÄÔ±¹¤ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£FowlerÖ¸³öÕâЩÈÕÖ¾Êý¾Ý¿ÉÒÔÓÃ×÷¸ü´óµÄÍøÂç¹¥»÷µÄÕì̽£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçÈÕÖ¾ÖаüÀ¨IPµØµã¡¢¶Ë¿Ú¡¢Â·¾¶ºÍ´æ´¢ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÓ³É乫˾µÄÄÚ²¿ÍøÂç¡£¡£¡£¡£¡£¡£¡£ÑÅÊ«À¼÷ìÔÚ½Óµ½±¨¸æºóµ±Ìì¹Ø±ÕÁ˶ÔÊý¾Ý¿âµÄ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âÔÚÍøÂçÉÏ̻¶Á˶೤ʱ¼äÒÔ¼°ÊÇ·ñÒÑÔâµ½ºÚ¿Í»á¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/estee-lauder-440m-records-email-network-info/152789/
5¡¢Palo Alto NetworksÐû²¼2020Äê´º¼¾ÔÆÍþв±¨¸æ
Palo Alto NetworksµÄUnit 42¿ËÈÕÐû²¼Á˰ëÄêÒ»´ÎµÄ¡¶ÔÆÍþв±¨¸æ¡·2020Äê´º¼¾°æ¡£¡£¡£¡£¡£¡£¡£ÎªÁËÔÚÔÆÖÐÔ½À´Ô½¶àµØ×Ô¶¯»¯¹¹½¨Á÷³Ì£¬£¬£¬£¬£¬£¬£¬£¬Ðí¶à×éÖ¯¶¼ÔÚ½ÓÄÉ»ù´¡¼Ü¹¹¼´´úÂ루IaC£©À´×ÊÖú¼ò»¯ÆäÔËÓª¡£¡£¡£¡£¡£¡£¡£Unit 42ÆÊÎöÁ˳ÉǧÉÏÍò¸öIaCÄ£°å£¬£¬£¬£¬£¬£¬£¬£¬ËûÃǵķ¢Ã÷Åú×¢IaCÄ£°åÖÐÓÐ199000¶à¸öDZÔÚÎó²î£¬£¬£¬£¬£¬£¬£¬£¬×îÖ÷ÒªµÄÊÇÏÖÔÚÓÐÁè¼Ý43£¥µÄÔÆÊý¾Ý¿âδ¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÖ»ÓÐ60£¥µÄÔÆ´æ´¢Ð§ÀÍÒÑÆôÓÃÈÕÖ¾¼Í¼¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://start.paloaltonetworks.com/unit-42-cloud-threat-report


¾©¹«Íø°²±¸11010802024551ºÅ