Adobe°ä²¼°²È«¸üР£¬½¨¸´¶à¿î²úÆ·ÖеÄ26¸ö·ì϶£»Intel°²È«¸üн¨¸´Æä·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨ·ì϶

°ä²¼¹¦·ò 2020-08-13

1.Adobe°ä²¼°²È«¸üР£¬½¨¸´¶à¿î²úÆ·ÖеÄ26¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Adobe°ä²¼°²È«¸üР£¬×ܼƽ¨¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸ö·ì϶¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑϳÁµÄ·ì϶ £¬¿É±»ÀûÓýøÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ý°²È«Ö°ÄÜ £¬±ðÀëΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?°²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇøÃýÎóµ¼ÖµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?¿ªÊͺóʹÓõ¼ÖµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/


2.GoogleΪChrome°ä²¼°²È«¸üР£¬½¨¸´¶à¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GoogleΪChrome°ä²¼Á˰²È«¸üР£¬½¨¸´Á˶à¸ö¿É±»ÀûÓÃÒÔ½ÚÔìÊÜÓ°ÏìϵͳµÄ·ì϶ £¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£ÆäÖнÏΪÑϳÁµÄ·ì϶Ϊ¿ªÊͺóʹÓ÷ì϶£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£© £¬×°Ö÷¨Ê½Ö´Ðв»µ±£¨CVE-2020-6546£© £¬Ã½ÌåÖеݲȫUIÃýÎó£¨CVE-2020-6547£© £¬SkiaÖеĶѻº³åÇøÒç¶Âí½Å£¨ CVE-2020-6548£© £¬IndexedDBÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-6550£©ºÍWebXRÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-6551£©µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome


3.Intel°²È«¸üн¨¸´Æä·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨ·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Intel±¾Öܶþ°ä²¼Í¨Öª £¬ÉêÃ÷ÆäÒѽ¨¸´ÁË·þÎñÆ÷Ö÷°åÖеĶà¸öÌáȨ·ì϶¡£Õâ´Î¸üÐÂ×ܼƽ¨¸´ÁË20¶à¸ö·ì϶ £¬Ó°ÏìÁË·þÎñÆ÷Ö÷°å¡¢·þÎñÆ÷ϵͳºÍÍÆËãÄ £¿é £¬ÆäÖеĴ󲿷ì϶¿É±»ÀûÓýøÐÐÌáȨ £¬»¹ÓÐÒ»²¿Ãſɱ»ÀûÓÃͨ¹ý±¾µØ½Ó¼ûÌáÒéDoS¹¥»÷¡£ÆäÖÐ×îÑϳÁµÄ·ì϶±»×·×ÙΪCVE-2020-8708 £¬ÊÇÒ»¸öÃýÎóµÄÉí·ÝÑéÖ¤ÎÊÌâ £¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓà £¬Í¨¹ýÏàÁÚ½Ó¼ûÀ´ÌáȨ £¬¸Ã·ì϶ӰÏìÁË1.59°æÖ®Ç°µÄ·þÎñÆ÷Ö÷°å¡¢·þÎñÆ÷ϵͳºÍÍÆËãÄ £¿é¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards


4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄ×êÑÐÈËÔ±·¢ÏÖReVoLTE¹¥»÷¿ÉÀûÓÃLTEÓïÒô£¨VoLTE£©ºÍ̸Öеķì϶ £¬·ÛËé4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£×êÑÐÈËÔ±·¢ÏÖ £¬Ö»¹ÜÒÆ¶¯ÔËÓªÉ̵ÄÈ·Ö§³ÖÓïÒôºô½Ð¼ÓÃÜ £¬µ«ÊǺܶàºô½Ð¶¼ÊÇʹÓÃÒ»ÑùµÄ¼ÓÃÜÃÜÔ¿¡£ÔÚ´óÎÞÊýÇé¿öÏ £¬»ùÕ¾»á³Á¸´Ê¹ÓÃÒ»ÑùµÄÁ÷ÃÜÂë £¬»òÕßÓÿÉÔ¤²âµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£Òò¶ø £¬¹¥»÷ÕßÄܹ»¼Í¼ÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»° £¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»° £¬¾ÍÄܹ»¶Ôͨ»°½øÐнâÃÜ¡£Ä¿Ç° £¬¸Ã·ì϶Òѱ»½¨¸´¡£



Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/


5.¿¨°Í˹»ù°ä²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¶íÂÞË¹ÍøÂ簲ȫ¹©¸øÉÌ¿¨°Í˹»ù°ä²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄ·ÖÎö»ã±¨ £¬·¢ÏÖÓë2019ÄêµÚ¶þ¼¾¶ÈÏà±È £¬2020ÄêµÄDDoS¹¥»÷ÊýÁ¿Í¬±ÈÔö³¤ÁË217£¥¡ £¿¨°Í˹»ù³Æ £¬2020Äê¶ÈµÄÇ÷ÏòÓëÆ½·²±³Â·¶ø³Û £¬Í¨³£Çé¿öÏÂDDoS¹¥»÷ÔÚËêÊׯðÍ·´ïµ½¶¥·å £¬¶øºóÔÚ´ºÄ©ºÍÏļ¾½µÂä £¬¶ø½ñÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÁ¿Ôö³¤ÁË30£¥¡£ÔÚ4ÔÂ9ÈÕ £¬µ¥ÈյĹ¥»÷´ÎÊý´ïµ½¶¥·å £¬Îª½ü300´Î £¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡ £¿¨°Í˹»ùDDoS±£»¤ÍŶÓÒÔΪ £¬ÕâÖÖÇ÷ÏòµÄŤת»òÐíÓëCOVID19µÄ·¢×÷ÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/ddos-triple-q2/


6.°²È«Åàѵ»ú¹¹SANSÔâ´¹µö¹¥»÷ £¬²¿ÃÅÔ±¹¤ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫÅàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹µö¹¥»÷ £¬µ¼Ö²¿ÃÅÔ±¹¤ÐÅϢй¶¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢ÏÔìäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÀûÓ÷¨Ê½ £¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄÓ×ÎÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£Õâ´Îй¶µÄÊý¾Ý²»Ô̺¬ÃÜÂë»òÐÅÓþ¿¨µÈ²ÆÕþÐÅÏ¢ £¬µ«Ô̺¬µç×ÓÓʼþµØÖ·¡¢È«Ãû¡¢µç»°ºÅÂë¡¢¹¤×÷Ãû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØÖ·¡£SANS°µÊ¾ £¬Æä¶Ô´ËÊÂÎñÔÚµ÷²éÖÐ £¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/