Discord½¨¸´Æä×ÀÃæÀûÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´Ðеķì϶£»TalosÅû¶F2FS¹¤¾ß¼¯ÖдæÔÚ´úÂëÖ´ÐкÍÐÅϢй¶·ì϶

°ä²¼¹¦·ò 2020-10-20
1.Discord½¨¸´Æä×ÀÃæÀûÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´Ðеķì϶


1.jpg


DiscordÒѽ¨¸´×ÀÃæ°æÀûÓ÷¨Ê½ÖеÄÒ»¸ö¹Ø¼ü·ì϶ £¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷¡£¸Ã·ì϶´æÔÚÓÚDiscon×ÀÃæÀûÓ÷¨Ê½Ê¹ÓõÄÈí¼þ¿ò¼ÜElectronÖÐ £¬ÆäcontextIsolation±»ÉèÖÃΪfalse £¬ÕâÔÊÐíÀûÓ÷¨Ê½±í²¿µÄJavaScript´úÂëÓ°ÏìÄÚ²¿´úÂë £¬ÀýÈçwebÒ³Ãæ±í²¿µÄJavaScript´úÂëʹÓÃnode.jsÖ°ÄÜ¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15174 £¬ÓëÆäËûÁ½¸ö·ì϶½áºÏÀûÓÿÉÈÆ¹ýµ¼º½Ï޶Ȳ¢Ê¹ÓÃiframe XSS·ì϶½Ó¼ûÔ̺¬¶ñÒâ´úÂëµÄÍøÒ³À´Ö´ÐÐRCE¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/discord-desktop-app-vulnerable-to-remote-code-execution-bug/


2.TalosÅû¶F2FS¹¤¾ß¼¯ÖдæÔÚ´úÂëÖ´ÐкÍÐÅϢй¶·ì϶


2.png


˼¿ÆTalos·¢ÏÖF2FS¹¤¾ß¼¯ÖдæÔÚ¶à¸ö´úÂëÖ´ÐкÍÐÅϢй¶·ì϶¡£F2FSÊÇÔÚǶÈëʽÉ豸Öг£¼ûµÄÎļþϵͳ¹¤¾ß¼¯ £¬¿É´´½¨¡¢ÑéÖ¤ºÍ½¨¸´Flash-Friendly File SystemÎļþ¡£Õâ´ÎÅû¶µÄ·ì϶ΪF2fs-Tools F2fs.FsckÎļþϵͳ²é³­ÐÅϢй¶·ì϶£¨CVE-2020-6104£©¡¢F2fs-Tools F2fs.Fsck¶à¸öÉ豸´úÂëÖ´Ðзì϶£¨CVE-2020-6105£©¡¢F2fs-Tools F2fs.Fsck init_node_managerÐÅϢй¶·ì϶£¨CVE-2020-6106£©¡¢F2fs-Tools F2fs.Fsck dev_readÐÅϢй¶·ì϶£¨CVE-2020-6107£©ºÍF2fs-Tools F2fs.Fsck¶à¸öÉ豸´úÂëÖ´Ðзì϶£¨CVE-2020-6108£©¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/10/vuln-spotlight-f2fs-tools-.html


3.ºÚ¿ÍÐû³ÆÒÑÈëÇÖ5Íǫ̀¼ÒÓÃÉãÏñÍ·²¢ÔÚ°µÍø¹«¿ª²¿ÃżÏñ


3.png


Ò»¸öºÚ¿Í×éÖ¯Ðû³ÆÆäÒÑÈëÇÖ5Íǫ̀¼ÒÓÃÉãÏñÍ· £¬²¢ÔÚ³ÉÈËÍøÕ¾Éϰ䲼²¿ÃżÏñ¡£Ð¹Â¶µÄ´ó²¿ÃÅÊÓÆÂ·´×ÔÐÂ¼ÓÆÂ £¬´Ë±í»¹Éæ¼°µ½À´×ÔÌ©¹ú¡¢º«¹úºÍ¼ÓÄôó¡£¾ÝThe New Paper±¨Â· £¬ÏÖÒÑÓÐ70¶àÃû³ÉÔ±Ö§¸¶ÁË150ÃÀÔªµÄ¶©ÔÄ·Ñ £¬¹²ÏíÁ˳¬¹ý3 TBµÄ¼ô¼­ÊÓÆµ¡£Ä¿Ç°ÈÔ²»Ã÷ÏÔºÚ¿ÍÈôºÎ·ÛËéIPÉãÏñ»ú £¬Æä¿ÉÄÜÀûÓÃÁËÉ豸Öзì϶ £¬»òÕßÖ»ÊÇͨ¹ý²Â²âÈõÃÜÂë¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/109671/hacking/50000-home-cameras-hacked.html


4.ÒÁÀÊÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷ £¬Á½¸ö³ÁÒª»ú¹¹Êܵ½Ó°Ïì


4.png


ÒÁÀʵ±¾ÖIT²¿ÃŻ㱨ÆäÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷ £¬Á½¸ö³ÁÒª»ú¹¹Êܵ½Ó°Ïì¡£¾ÝÒ»¼ÒÐÂÎÅÉç»ã±¨ £¬¹¥»÷ÊÂÎñÒѰܻµÒÁÀʸۿڵĵç×Ó»ù´¡ÉèÊ©¡£ÃÀ¹úµç̨Radio Farda°µÊ¾ £¬Õâ´Î¹¥»÷µÄÖ¸±êºÜ¿ÉÄÜÊÇÒÁÀʵĸۿڡ¢ÒøÐкͺ£ÊÂ×éÖ¯ £¬µ«¸ÃÐÂÎÅÉÐδµÃµ½Ö¤Êµ¡£ÒÁÀʵ±¾ÖIT²¿Ã޲»°ÈËAbolghasem Sadeghi°µÊ¾ £¬Õâ´Î¹¥»÷µ¼Ö¶à¸öµ±¾Ö»ú¹¹ÁÙʱÖÕ³¡»¥ÁªÍø·þÎñ £¬ÒÔÔ¤·À½øÒ»²½µÄ·ÛËé¡£³ý´ËÖ®±í £¬ÒÁÀʵ±¾Ö²¢Î´Ìṩ¹ØÓÚ¸ÃÊÂÎñµÄ¸ü¶àϸ½Ú¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/10/iran-suffers-largescale-cyberattacks.html


5.ºÚ¿ÍÒÔCoinbaseΪµö¶üͨ¹ýOAuthÀûÓÃÌáÒé´¹µö¹¥»÷


5.jpg


ºÚ¿ÍÒÔCoinbaseÖ÷ÌâΪµö¶ü £¬Í¨¹ýOAuthÀûÓÃÌáÒéÐÂÒ»ÂÖ´¹µö¹¥»÷¡£¸Ã´¹µöÓʼþ¼ÙװΪзþÎñÌõ¿î £¬CoinbaseÓû§±ØÐëÔĶÁ²¢½ÓÊÜÄÜÁ¦³ÖÐøÊ¹Óø÷þÎñ¡£µ±Óû§µã»÷ÔĶÁ²¢½ÓÊÜÁ´½Óʱ £¬½«±»³Á¶¨Ïòµ½ºÏ·¨µÄMicrosoftÍøÕ¾À´µÇ¼ÆäÕÊ»§¡£³É¹¦µÇ¼ºóϵͳ»áÌáÐÑÊÇ·ñÔÊÐícoinbasetermsµÄÀûÓ÷¨Ê½½Ó¼ûËûÃǵÄÕË»§¡£Ò»µ©Óû§µã»÷ÊÇ £¬ºÚ¿Í½«Õ¼ÓжÁÈ¡ÕÊ»§ÅäÖÃÎļþ¼°Æäµç×ÓÓʼþµÄÆëÈ«½Ó¼ûȨÏÞ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/coinbase-phishing-hijacks-microsoft-365-accounts-via-oauth-app/


6.Devolutions°ä²¼2020ÄêÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫÇé¿ö»ã±¨


6.jpg


Devolutions°ä²¼2020ÄêÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫÇé¿ö»ã±¨¡£ÎªÁ˸üÉî¿ÌµØÏàʶÖÐÓ×ÐÍÆóÒµ¶ÔÍøÂ簲ȫµÄ¹Ûµã £¬Devolutions¶ÔÀ´×ÔIT¡¢Ò½ÁƱ£½¡¡¢½ÌÓýºÍ½ðÈڵȸ÷¸öÐÐÒµµÄ182¸öÖÐÓ×ÐÍÆóÒµ½øÐÐÁ˵÷²é¡£µ÷²é·¢ÏÖ £¬62£¥µÄÖÐÓׯóҵÿÄêÖÁÉÙ½øÐÐÒ»´Î°²È«ÉóºË £¬14£¥µÄÖÐÓׯóÒµ´Ó²»½øÐÐÉóºË£»57£¥µÄÖÐÓ×ÐÍÆóÒµ°µÊ¾ÔÚ´ÓǰÈýÄêÖÐÔâ·êÁËÍøÂç´¹µö¹¥»÷£»47£¥µÄÆóÒµÔÊÐíÖÕ¶ËÓû§ÔÚÓ×ÎÒºÍרҵÕÊ»§ÖгÁ¸´Ê¹ÓÃÃÜÂë¡£    


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/10/15/smbs-size-doesnt-make-them-immune-to-cyberattacks/