ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ43ÖÜ
°ä²¼¹¦·ò 2020-10-26> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê10ÔÂ19ÈÕÖÁ10ÔÂ25ÈÕ¹²ÊÕ¼°²È«·ì϶82¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe IllustratorÄÚ´æ·ÛËéCVE-2020-24412´úÂëÖ´Ðзì϶£»Mozilla Firefox usersctpÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»Oracle Solaris CVE-2020-14871δÃ÷Ô¶³Ì´úÂëÖ´Ðзì϶£»HPE Intelligent Management Center UrlAccessControllerÑéÖ¤ÈÆ¹ý·ì϶£»VMware ESXi OpenSLPÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇHiscox°ä²¼2020Äê¶ÈCyber Readiness·ÖÎö»ã±¨£»Discord½¨¸´Æä×ÀÃæÀûÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´Ðеķì϶£»Google°ä²¼Chrome°²È«¸üУ¬½¨¸´Òѱ»ÀûÓõÄ0day£»Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷ÀûÓõĵØÖ·À¸ºýŪ·ì϶£»Sophos·¢ÏÖLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´¼ø±ð¿ÉÒÉÖ¸±ê¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
> ³ÁÒª°²È«·ì϶Áбí
1.Adobe IllustratorÄÚ´æ·ÛËéCVE-2020-24412´úÂëÖ´Ðзì϶
Adobe Illustrator´æÔÚÄÚ´æ·ÛËé·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://helpx.adobe.com/security/products/illustrator/apsb20-53.html
2.Mozilla Firefox usersctpÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶
Mozilla Firefox usersctp¿â´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/
3.Oracle Solaris CVE-2020-14871δÃ÷Ô¶³Ì´úÂëÖ´Ðзì϶
Oracle SolarisºÍ̸´¦ÖôæÔÚδÃ÷°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÏµÍ³¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.oracle.com/security-alerts/cpuoct2020.html
4.HPE Intelligent Management Center UrlAccessControllerÑéÖ¤ÈÆ¹ý·ì϶
HPE Intelligent Management Center UrlAccessController´æÔÚÑéÖ¤ÈÆ¹ý·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbnw04036en_us
5.VMware ESXi OpenSLPÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶
VMware ESXi OpenSLP·þÎñ´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.vmware.com/security/advisories/VMSA-2020-0023.html
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢Hiscox°ä²¼2020Äê¶ÈCyber Readiness·ÖÎö»ã±¨

Hiscox°ä²¼2020Äê¶ÈCyber Readiness·ÖÎö»ã±¨£¬·¢ÏÖ´ÓǰһÄêÖÐÈ«ÇòÍøÂçËðʧÔö³¤Á˽üÁù±¶¡£¸Ã»ã±¨ÏÔʾ£¬ÊÜÓ°Ï칫˾µÄ×ÜËðʧΪ18ÒÚÃÀÔª£¬±ÈÈ¥ÄêµÄ12ÒÚÃÀÔªÔö³¤ÁË50£¥¡£»ã±¨ÖÐÓÐ6£¥ÒÔÉϵÄÊÜ·ÃÕßÖ§¸¶ÁËÊê½ð£¬Ëðʧ×ܼÆÎª3.81ÒÚÃÀÔª¡£¾Ýͳ¼Æ£¬¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þ¡¢ÆóÒµµç×ÓÓʼþй¶ºÍÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©ÒÀÈ»ÊÇ×î³£ÓõĹ¥»÷ý½é£¬¶øDDoS¹¥»÷Ò²³ÉÁËÀÕË÷Èí¼þ¹¥»÷µÄÁíÒ»ÖÖ´ó¾Ö¡£
ÔÎÄÁ´½Ó£º
https://www.hiscox.co.uk/sites/uk/files/documents/202006/Hiscox_Cyber_Readiness_Report_2020_UK.PDF
2¡¢Discord½¨¸´Æä×ÀÃæÀûÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´Ðеķì϶

DiscordÒѽ¨¸´×ÀÃæ°æÀûÓ÷¨Ê½ÖеÄÒ»¸ö¹Ø¼ü·ì϶£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷¡£¸Ã·ì϶´æÔÚÓÚDiscon×ÀÃæÀûÓ÷¨Ê½Ê¹ÓõÄÈí¼þ¿ò¼ÜElectronÖУ¬ÆäcontextIsolation±»ÉèÖÃΪfalse£¬ÕâÔÊÐíÀûÓ÷¨Ê½±í²¿µÄJavaScript´úÂëÓ°ÏìÄÚ²¿´úÂ룬ÀýÈçwebÒ³Ãæ±í²¿µÄJavaScript´úÂëʹÓÃnode.jsÖ°ÄÜ¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15174£¬ÓëÆäËûÁ½¸ö·ì϶½áºÏÀûÓÿÉÈÆ¹ýµ¼º½Ï޶Ȳ¢Ê¹ÓÃiframe XSS·ì϶½Ó¼ûÔ̺¬¶ñÒâ´úÂëµÄÍøÒ³À´Ö´ÐÐRCE¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/discord-desktop-app-vulnerable-to-remote-code-execution-bug/
3¡¢Google°ä²¼Chrome°²È«¸üУ¬½¨¸´Òѱ»ÀûÓõÄ0day

Google°ä²¼ÁËChrome°æ±¾86.0.4240.111µÄ°²È«¸üУ¬½¨¸´Òѱ»ÔÚÒ°ÀûÓõÄ0day¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15999£¬ÊÇFreeType×ÖÌåäÖȾ¿âÖеÄÄÚ´æ°Ü»µ·ì϶¡£¹È¸èProject ZeroµÄ×êÑÐÈËÔ±·¢ÏÖÁËÀûÓôËFreeType·ì϶½øÐеÄÒ°±í¹¥»÷£¬µ«ÊÇÓйظ÷ì϶µÄÀûÓûµÄ¾ßÌåÐÅÏ¢ÉÐδ¹«¿ª¡£ÕâÊÇÔÚ´ÓǰһÄêÀ´µÄµÚÈý¸ö±»ÔÚÒ°ÀûÓõÄChrome 0day£¬Ç°Á½¸öÊÇCVE-2019-13720£¨2019Äê10Ô£©ºÍCVE-2020-6418£¨2020Äê2Ô£©¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
4¡¢Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷ÀûÓõĵØÖ·À¸ºýŪ·ì϶

ÍøÂ簲ȫ¹«Ë¾Rapid7Åû¶ÁË10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷ÀûÓõĵØÖ·À¸ºýŪ·ì϶¡£Õâ´ÎÅû¶µÄ·ì϶±ðÀëΪUCä¯ÀÀÆ÷ÖеÄCVE-2020-7363ºÍCVE-2020-7364¡¢Opera MiniºÍOpera TouchÖеÄCVE TBD-Opera¡¢Yandexä¯ÀÀÆ÷ÖеÄCVE-2020-7369¡¢Boltä¯ÀÀÆ÷ÖеÄCVE-2020-7370¡¢RITSä¯ÀÀÆ÷ÖеÄCVE-2020-7371ºÍApple SafariÖеÄCVE-2020-9987¡£¸ÃÎÊÌâÓÚ½ñÄêËêÊ×±»·¢ÏÖ£¬²¢ÓÚ8Ô»㱨¸øÔì×÷ÉÌ£¬Ä¿Ç°´óÐͳ§É̵±¼´½øÐÐÁ˽¨¸´£¬¶øÓ×Ðͳ§ÉÌÈÔÎÞÈËÀí²Ç¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/seven-mobile-browsers-vulnerable-to-address-bar-spoofing-attacks/
5¡¢Sophos·¢ÏÖLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´¼ø±ð¿ÉÒÉÖ¸±ê

Sophos°ä²¼»ã±¨£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´¼ø±ð¿ÉÒÉÖ¸±ê¡£×êÑÐÈËԱͨ¹ý¶ÈÎöÒ»Äêǰ³öÏÖµÄÑù±¾£¬·¢ÏÖLockBitÒѾѸ¿ì³ÉÊ죬²¢Ñ¡È¡ÁËһЩеIJ½ÖèÀ´ÈƹýWindowsÓû§ÕÊ»§½ÚÔ죨UAC£©À´ÌáÉýÌØÈ¨¡£´Ë±í£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄ³Á¶¨Ãû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÈë²âÊÔ¹¤¾ßµÄ¾ç±¾£¬À´ËÑË÷Ô̺¬ÓмÛÖµÊý¾ÝµÄϵͳ£¬ÒÔ¹¥»÷Ó×ÐÍ×éÖ¯¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/


¾©¹«Íø°²±¸11010802024551ºÅ