Adobe°²È«¸üн¨¸´MagentoÖÐÁ½¸ö³ÁÒªµÄ´úÂëÖ´Ðзì϶£»Dell iDRAC´æÔÚ±éÀú·ì϶£¬¿ÉÆëÈ«½ÚÔì·þÎñÆ÷

°ä²¼¹¦·ò 2020-07-30

1.Adobe°ä²¼°²È«¸üУ¬½¨¸´MagentoÖÐÁ½¸ö´úÂëÖ´Ðзì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Adobe°ä²¼Á˰²È«¸üУ¬ÒÔ½¨¸´Magento CommerceºÍMagento Open SourceÖеÄÁ½¸öÑϳÁµÄ´úÂëÖ´Ðзì϶¡£ÆäÖÐÒ»¸öÊÇÓÉõè¾¶±éÀúÃýÎóÒýÆðµÄ£¬±»¸ú×ÙΪCVE-2020-9689£¬ËüÔÊÐíÓµÓÐÖÎÀíԱȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐËÁÒâ´úÂë¡£ÁíÒ»¸öÊÇ»ùÓÚDOMµÄ¿çÕ¾¾ç±¾·ì϶£¬±»×·×ÙΪCVE-2020-9691£¬ËüÔÊÐíʹδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐËÁÒâ´úÂë¡£´Ë±í£¬Õâ´Î¸üл¹½¨¸´ÁËÓɿɹ۲쵽µÄ¹¦·ò²îÒýÆðµÄÊðÃûÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2020-9690£©¡£Ä¿Ç°£¬Õë¶Ô¸Ã·ì϶ÉÐÎÞÒÑÖªµÄÀûÓú͹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-gets-security-updates-for-severe-code-execution-bugs/


2.Google°ä²¼°²È«¸üУ¬½¨¸´ChromeÖеÄ8¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Google°ä²¼°²È«¸üУ¬½¨¸´ÁËChromeÖеÄ8¸ö·ì϶£¬Ó°ÏìÁËWindows¡¢MacºÍLinuxϵͳϵÄChrome°æ±¾84.0.4147.105¡£Õâ´Î¸üÐÂÖн¨¸´µÄ½ÏΪÑϳÁµÄ·ì϶ΪV8ÖеÄÀàÐÍ»ìºÏÎÊÌ⣨CVE-2020-6537£©¡¢WebViewÖеÄʵÏÖ²»µ±ÎÊÌ⣨CVE-2020-6538£©¡¢SCTP¿ªÊͺóʹÓÃÎÊÌ⣨CVE-2020-6532£©¡¢CSS¿ªÊͺóʹÓÃÎÊÌ⣨CVE-2020-6539£©¡¢SkiaÖеĶѻº³åÇøÒç¶Âí½Å£¨CVE-2020-6540£©ÒÔ¼°WebUSB¿ªÊͺóʹÓÃÎÊÌ⣨CVE-2020-6541£©¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/07/28/google-releases-security-updates-chrome


3.Dell iDRAC´æÔÚ±éÀú·ì϶£¬¿É±»ºÚ¿ÍÀûÓÃÆëÈ«½ÚÔì·þÎñÆ÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Positive Technologies×êÑÐÈËÔ±·¢ÏÖDellÔ¶³Ì½Ó¼û½ÚÔìÆ÷£¨iDRAC£©ÖдæÔÚ±éÀú·ì϶£¨CVE-2020-5366£©£¬¿É±»ºÚ¿ÍÀûÓÃÆëÈ«½ÚÔì·þÎñÆ÷¡£Í¨¹ýÀûÓô˷ì϶£¬¾­¹ýÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»´ò¿ªºÍ¹Ø¹Ø²úÆ·£¬»ò¸ü¸ÄÆäÉ¢ÈȺ͵çÔ´ÉèÖᣳý´ËÖ®±í £¬¸Ã·ì϶¿É±»ÀûÓöÁÈ¡½ÚÔìÆ÷²Ù×÷ϵͳÖеÄÈκÎÎļþ£¬²¢ÇÒÔÚijЩÇé¿öÏÂ×ÌÈŽÚÔìÆ÷µÄ²Ù×÷¡£¸Ã·ì϶»áÓ°Ïì¹Ì¼þ°æ±¾Îª4.20.20.20֮ǰµÄDell EMC iDRAC9½ÚÔìÆ÷£¬Dell EMCÔÚ¼ì²âµ½¸Ã·ì϶֮ºó±ã°ä²¼Á˰²È«¸üУ¬²¢¶½´ÙÓû§¾¡¿ì×°Öá£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/dell-emc-patches-idrac/


4.ÐÂÐÍLinuxºóÃÅDokiʹÓÃDogecoin API£¬Õë¶ÔDockerÊ·ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Intezer Labs·¢ÏÖ£¬ÐÂÐÍLinuxºóÃÅ·¨Ê½DokiʹÓÃÁËDogecoin API£¬Õë¶ÔDockerÊ·ý¡£ºÚ¿Í×éÖ¯Ngrok×Ô2018Äêµ×ÒÔÀ´Ò»Ïò»îÔ¾£¬×î³õÆ«²îÓÚʹÓÃNgrok·þÎñÍйÜC£¦C·þÎñÆ÷¡£¶øÔÚ¸Ã×éÖ¯×î½üÒ»´ÎµÄ¹¥»÷ÖУ¬ÆäÕë¶Ôй¶ÁËÖÎÀíAPIµÄDockerÊ·ý¡£ºÚ¿Íͨ¹ýÀûÓÃDocker APIÔÚÖ¸±ê¹«Ë¾µÄÔÆ»ù´¡¼Ü¹¹Öв¿ÊðзþÎñÆ÷£¬ËæºóÔËÐÐϰȾÁ˼ÓÃÜÍÚ¿ó¶ñÒâÈí¼þDokiµÄAlpine Linux·þÎñÆ÷¡£×êÑÐÈËÔ±°µÊ¾£¬DokiµÄÖ÷ÕÅÊÇÔÊÐíºÚ¿Í½ÚÔìÆäв¿ÊðµÄAlpine Linux·þÎñÆ÷£¬ÒÔÈ·±£¼ÓÃܲɿó²Ù×÷°´Ô¤ÆÚÔËÐС£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-linux-malware-uses-dogecoin-api-to-find-c-c-server-addresses/#ftag=RSSbaffb68


5.¿¨°Í˹»ù·¢ÏÖÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù°ä²¼µÄ»ã±¨ÏÔʾ£¬ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ¡£×êÑÐÈËÔ±ÔÚ2020Äê3ÔÂÖÁ5Ôµĵ÷²éÖз¢ÏÖÁËÀÕË÷Èí¼þVHDµÄÑù±¾£¬ÕâЩÑù±¾ÀûÓÃSMB±©Á¦ÆÆ½â·Ö·¢MATA¶ñÒâÈí¼þ¿ò¼Ü¡£VHD¿ÉÒñ±ÎµØÏνӵ½Êܺ¦ÕߵĵçÄÔÇý¶¯Æ÷£¬¼ÓÃÜÎļþ£¬²¢É¾³ýËùÓеÄSystem Volume InformationÎļþ¼Ð£¬´Ó¶ø·ÛËéϵͳÖеÄWindows»¹Ô­Ö°ÄÜ¡£²¢ÇÒ£¬ËüÄܹ»½ûÓÃÔ¤·À³ÁÒªÎļþ±»´Û¸ÄµÄ¹ý³Ì£¬ÀýÈçMicrosoft Exchange»òSQL Server¡£¿¨°Í˹»ù·¢ÏÖManuscryptľÂíҲʹÓÃÁËMATA¿ò¼Ü£¬Òò¶øÅжÏͬÑùʹÓÃÁ˸öñÒâ¿ò¼ÜµÄVHDÓëLazarusÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-hackers-created-vhd-ransomware-for-enterprise-attacks/


6.IBM°ä²¼»ã±¨£¬2020Äê¶È¾ùÔÈÊý¾Ýй¶³É±¾Îª386ÍòÃÀÔª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IBMÓÚ±¾ÖÜÈý°ä²¼ÁËÄê¶ÈÊý¾Ýй¶³É±¾»ã±¨£¬2020Äê¶È¾ùÔÈÊý¾Ýй¶³É±¾Îª386ÍòÃÀÔª¡£Ö»¹ÜÓë2019ÄêÏà±È£¬¾ùÔȳɱ¾½µÂäÁË1.5£¥£¬µ«Ð¹Â¶³¬¹ý5000Íò±Ê¼Í¼µÄ³¬´óÐÍй©ÊÂÎñµÄ³É±¾¿ÉÄܸߴï3.92ÒÚÃÀÔª£¬¸ßÓÚ2019ÄêµÄ3.88ÒÚÃÀÔª¡£×ÜÌå¶øÑÔ£¬ÕÊ»§Í´´¦Ð¹Â¶ÒÔ¼°ÔÆÅäÖÃÃýÎóµ¼ÖÂÁ˽ü40£¥µÄÊý¾Ýй¶ÊÂÎñ¡£´Ë±í£¬ÀûÓõÚÈý·½·ì϶£¬ÀýÈç0day£¬Ò²ÊÇÔì³ÉÊý¾Ýй¶µÄ³ÁÒª³É·Ö£¬Ò»¼ÒÒò¶øÀà·ì϶µ¼ÖÂÊý¾Ýй¶µÄ¹«Ë¾¿ÉÄܱØÒªÖ§¸¶¸ß´ï450ÍòÃÀÔªµÄÅâ³¥¡£µ«ÊÇ£¬ÈôÊÇÆóÒµ²É°ìÁËÍøÂç±£ÏÕ£¬Ôò¾ùÔÈ¿ÉÏ÷¼õ20ÍòÃÀÔªµÄËðʧ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/todays-mega-data-breaches-now-cost-companies-392-million-in-damages-lawsuits/