ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ25ÖÜ

°ä²¼¹¦·ò 2020-06-23

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê06ÔÂ15ÈÕÖÁ06ÔÂ21ÈÕ¹²ÊÕ¼°²È«·ì϶75¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇTreck TCP/IP»ûÐÎIPV4±¨ÎÄ´¦ÖôúÂëÖ´Ðзì϶; Cisco Small Business RV Series Routers CVE-2020-3286Õ»Òç³öËÁÒâ´úÂëÖ´Ðзì϶£»Adobe Audition CVE-2020-9658Ô½½çд´úÂëÖ´Ðзì϶£»Cypress Semiconductor CYW20735 evaluation board»º³åÇøÒç¶Âí½Å£»Google Chrome V8Ô½½çд´úÂëÖ´Ðзì϶  ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇGTPºÍ̸´æÔÚ·ì϶ £¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷£»ÑÇÂíÑ·AWSÔøÂ½Ðø3ÌìÔâµ½2.3 Tbps DDoS¹¥»÷£»Ë¼¿Æ°ä²¼2020ÄêÏļ¾µÄÓ¦¼±ÏìÓ¦Ç÷Ïò»ã±¨£»ÃÀ¹ú´ó¹æÄ£DDoS¹¥»÷ʵΪT-MobileÅäÖÃÃýÎóµ¼Ö£»Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶ £¬¿ÉÀûÓô˷ì϶½øÐÐÌáȨ  ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖÐ  ¡£


>³ÁÒª°²È«·ì϶Áбí


1.Treck TCP/IP»ûÐÎIPV4±¨ÎÄ´¦ÖôúÂëÖ´Ðзì϶


Treck TCP/IP´¦ÖûûÐεÄIPv4±¨ÎÄ´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÖ´ÐÐËÁÒâ´úÂë  ¡£

https://www.jsof-tech.com/ripple20/


2. Cisco Small Business RV Series Routers CVE-2020-3286Õ»Òç³öËÁÒâ´úÂëÖ´Ðзì϶


Cisco Small Business RV Series RoutersµÄWEBÖÎÀí½Ó¿Ú´æÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐËÁÒâ´úÂë  ¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz


3. Adobe Audition CVE-2020-9658Ô½½çд´úÂëÖ´Ðзì϶


Adobe Audition´æÔÚÔ½½çд·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶¹¹½¨¶ñÒâÎļþ £¬ÓÕʹÓû§½âÎö £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë  ¡£

https://helpx.adobe.com/security/products/audition/apsb20-40.html


4. Cypress Semiconductor CYW20735 evaluation board»º³åÇøÒç¶Âí½Å


Cypress Semiconductor CYW20735 evaluation board´æÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿Éʹϵͳ±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë  ¡£

https://github.com/seemoo-lab/frankenstein/blob/master/doc/CVE_2019_18614.md


5. Google Chrome V8Ô½½çд´úÂëÖ´Ðзì϶


Google Chrome V8´æÔÚÔ½½çд·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó £¬ÓÕʹÓû§½âÎö £¬¿Éʹϵͳ±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë  ¡£

https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html



> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢GTPºÍ̸´æÔÚ·ì϶ £¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/vulnerabilities---threats/protocol-vulnerability-threatens-mobile-networks/d/d-id/1338068


2¡¢ÑÇÂíÑ·AWSÔøÂ½Ðø3ÌìÔâµ½2.3 Tbps DDoS¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://androidrookies.com/amazons-aws-hit-with-a-record-breaking-2-3-tbps-ddos-attack/


3¡¢Ë¼¿Æ°ä²¼2020ÄêÏļ¾µÄÓ¦¼±ÏìÓ¦Ç÷Ïò»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/06/CTIR-trends-q3-2020.html


4¡¢ÃÀ¹ú´ó¹æÄ£DDoS¹¥»÷ʵΪT-MobileÅäÖÃÃýÎóµ¼ÖÂ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-outage-caused-by-configuration-error-not-a-ddos-attack/


5¡¢Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶ £¬¿ÉÀûÓô˷ì϶½øÐÐÌáȨ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bug-in-usb-for-remote-desktop-lets-hackers-add-fake-devices/