Adobe°ä²¼°²È«¸üУ¬½¨¸´¶à¿î²úÆ·ÖеÄ26¸ö·ì϶£»Intel°²È«¸üн¨¸´Æä·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨ·ì϶
°ä²¼¹¦·ò 2020-08-131.Adobe°ä²¼°²È«¸üУ¬½¨¸´¶à¿î²úÆ·ÖеÄ26¸ö·ì϶
Adobe°ä²¼°²È«¸üУ¬×ܼƽ¨¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸ö·ì϶¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑϳÁµÄ·ì϶£¬¿É±»ÀûÓýøÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ý°²È«Ö°ÄÜ£¬±ðÀëΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?°²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇøÃýÎóµ¼ÖµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?¿ªÊͺóʹÓõ¼ÖµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/
2.GoogleΪChrome°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö·ì϶
GoogleΪChrome°ä²¼Á˰²È«¸üУ¬½¨¸´Á˶à¸ö¿É±»ÀûÓÃÒÔ½ÚÔìÊÜÓ°ÏìϵͳµÄ·ì϶£¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£ÆäÖнÏΪÑϳÁµÄ·ì϶Ϊ¿ªÊͺóʹÓ÷ì϶£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£©£¬×°Ö÷¨Ê½Ö´Ðв»µ±£¨CVE-2020-6546£©£¬Ã½ÌåÖеݲȫUIÃýÎó£¨CVE-2020-6547£©£¬SkiaÖеĶѻº³åÇøÒç¶Âí½Å£¨ CVE-2020-6548£©£¬IndexedDBÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-6550£©ºÍWebXRÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-6551£©µÈ¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome
3.Intel°²È«¸üн¨¸´Æä·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨ·ì϶
Intel±¾Öܶþ°ä²¼Í¨Öª£¬ÉêÃ÷ÆäÒѽ¨¸´ÁË·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨ·ì϶¡£Õâ´Î¸üÐÂ×ܼƽ¨¸´ÁË20¶à¸ö·ì϶£¬Ó°ÏìÁË·þÎñÆ÷Ö÷°å¡¢·þÎñÆ÷ϵͳºÍÍÆËãÄ£¿é£¬ÆäÖеĴ󲿷ì϶¿É±»ÀûÓýøÐÐÌáȨ£¬»¹ÓÐÒ»²¿Ãſɱ»ÀûÓÃͨ¹ý±¾µØ½Ó¼ûÌáÒéDoS¹¥»÷¡£ÆäÖÐ×îÑϳÁµÄ·ì϶±»×·×ÙΪCVE-2020-8708£¬ÊÇÒ»¸öÃýÎóµÄÉí·ÝÑéÖ¤ÎÊÌ⣬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓã¬Í¨¹ýÏàÁÚ½Ó¼ûÀ´ÌáȨ£¬¸Ã·ì϶ӰÏìÁË1.59°æÖ®Ç°µÄ·þÎñÆ÷Ö÷°å¡¢·þÎñÆ÷ϵͳºÍÍÆËãÄ£¿é¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards
4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°
µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄ×êÑÐÈËÔ±·¢ÏÖReVoLTE¹¥»÷¿ÉÀûÓÃLTEÓïÒô£¨VoLTE£©ºÍ̸Öеķì϶£¬·ÛËé4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£×êÑÐÈËÔ±·¢ÏÖ£¬Ö»¹ÜÒÆ¶¯ÔËÓªÉ̵ÄÈ·Ö§³ÖÓïÒôºô½Ð¼ÓÃÜ£¬µ«ÊǺܶàºô½Ð¶¼ÊÇʹÓÃÒ»ÑùµÄ¼ÓÃÜÃÜÔ¿¡£ÔÚ´óÎÞÊýÇé¿öÏ£¬»ùÕ¾»á³Á¸´Ê¹ÓÃÒ»ÑùµÄÁ÷ÃÜÂ룬»òÕßÓÿÉÔ¤²âµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£Òò¶ø£¬¹¥»÷ÕßÄܹ»¼Í¼ÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»°£¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»°£¬¾ÍÄܹ»¶Ôͨ»°½øÐнâÃÜ¡£Ä¿Ç°£¬¸Ã·ì϶Òѱ»½¨¸´¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/
5.¿¨°Í˹»ù°ä²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄ·ÖÎö»ã±¨
¶íÂÞË¹ÍøÂ簲ȫ¹©¸øÉÌ¿¨°Í˹»ù°ä²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄ·ÖÎö»ã±¨£¬·¢ÏÖÓë2019ÄêµÚ¶þ¼¾¶ÈÏà±È£¬2020ÄêµÄDDoS¹¥»÷ÊýÁ¿Í¬±ÈÔö³¤ÁË217£¥¡£¿¨°Í˹»ù³Æ£¬2020Äê¶ÈµÄÇ÷ÏòÓëÆ½·²±³Â·¶ø³Û£¬Í¨³£Çé¿öÏÂDDoS¹¥»÷ÔÚËêÊׯðÍ·´ïµ½¶¥·å£¬¶øºóÔÚ´ºÄ©ºÍÏļ¾½µÂ䣬¶ø½ñÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÁ¿Ôö³¤ÁË30£¥¡£ÔÚ4ÔÂ9ÈÕ£¬µ¥ÈյĹ¥»÷´ÎÊý´ïµ½¶¥·å£¬Îª½ü300´Î£¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡£¿¨°Í˹»ùDDoS±£»¤ÍŶÓÒÔΪ£¬ÕâÖÖÇ÷ÏòµÄŤת»òÐíÓëCOVID19µÄ·¢×÷Óйء£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-triple-q2/
6.°²È«Åàѵ»ú¹¹SANSÔâ´¹µö¹¥»÷£¬²¿ÃÅÔ±¹¤ÐÅϢй¶
ÍøÂ簲ȫÅàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹µö¹¥»÷£¬µ¼Ö²¿ÃÅÔ±¹¤ÐÅϢй¶¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢ÏÔìäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÀûÓ÷¨Ê½£¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄÓ×ÎÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£Õâ´Îй¶µÄÊý¾Ý²»Ô̺¬ÃÜÂë»òÐÅÓþ¿¨µÈ²ÆÕþÐÅÏ¢£¬µ«Ô̺¬µç×ÓÓʼþµØÖ·¡¢È«Ãû¡¢µç»°ºÅÂë¡¢¹¤×÷Ãû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØÖ·¡£SANS°µÊ¾£¬Æä¶Ô´ËÊÂÎñÔÚµ÷²éÖУ¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/


¾©¹«Íø°²±¸11010802024551ºÅ