ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ51ÖÜ

°ä²¼¹¦·ò 2020-12-21

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê12ÔÂ14ÈÕÖÁ12ÔÂ20ÈÕ¹²ÊÕ¼°²È«·ì϶58¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇFoxit Reader CVE-2020-13548ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»Dex Idp Dex samlÑéÖ¤ÈÆ¹ý·ì϶£»IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÒªÇóαÔì·ì϶£»DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾¾ç±¾·ì϶£»EPSON EPS TSE Server CVE-2020-28930¿çÕ¾¾ç±¾·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇIntelµÄHabana LabsϰȾPay2Key £¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ£»ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷£»Apple°²È«¸üР£¬½¨¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö·ì϶£»ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý£»Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ £¬Ó°Ïì300ÍòÓû§¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£


³ÁÒª°²È«·ì϶Áбí


1.Foxit Reader CVE-2020-13548ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶


Foxit Reader´æÔÚ¿ªÊͺóʹÓ÷ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://www.foxitsoftware.com/support/security-bulletins.html


2.Dex Idp Dex samlÑéÖ¤ÈÆ¹ý·ì϶


Dex Idp Dex saml´æÔÚÑéÖ¤ÈÆ¹ý·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉδÊÚȨ½Ó¼û¡£

https://access.redhat.com/security/cve/cve-2020-27847


3.IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÒªÇóαÔì·ì϶


IBM Financial Transaction Manager for SWIFT Services´æÔÚ¿çÕ¾ÒªÇóαÔì·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâURI £¬ÓÕʹҪÇó £¬Äܹ»Ö¸±êÓû§¸ßµÍÎÄÖ´ÐжñÒâ²Ù×÷¡£

https://www.ibm.com/support/pages/node/6371260


4.DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾¾ç±¾·ì϶


DELL Dell EMC iDRAC9 webÀûÓôæÔÚ¿çÕ¾¾ç±¾·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶עÈë¶ñÒâ¾ç±¾»òHTML´úÂë £¬µ±¶ñÒâÊý¾Ý±»²é¿´Ê± £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£

https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability


5.EPSON EPS TSE Server CVE-2020-28930¿çÕ¾¾ç±¾·ì϶


EPSON EPS TSE Server´æÔÚ¿çÕ¾¾ç±¾·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶עÈë¶ñÒâ¾ç±¾»òHTML´úÂë £¬µ±¶ñÒâÊý¾Ý±»²é¿´Ê± £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£

https://www.seh-technology.com/services/downloads/download-fiscal-solutions/eps-tse-server-8.html



> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢IntelµÄHabana LabsϰȾPay2Key £¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ


1.png


IntelµÄAI´¦ÖÃÆ÷¿ª·¢ÉÌHabana LabsÔâµ½ÁËPay2KeyÀÕË÷Èí¼þ¹¥»÷ £¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ¡£Habana LabsÊÇÒÔÉ«ÁÐAI´¦ÖÃÆ÷µÄ¿ª·¢ÉÌ £¬ÓÚ2019Äê12ÔÂÒÔ20ÒÚÃÀÔªµÄ¼ÛÖµ±»IntelÊÕ¹º¡£Pay2KeyÔÚTwitterÉϰ䷢ÁËÕâ´Î¹¥»÷ £¬²¢Ðû³ÆÒÑÇÔÈ¡ÁËÓйØÈËΪÖÇÄÜоƬ´úÂëGaudiµÄÐÅÏ¢Êý¾Ý¡£¸ÃÍÅ»ïÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉϹ«¿ªÁ˸ù«Ë¾µÄÔ´´úÂëºÍÄÚ²¿¹ý³ÌµÄͼƬ £¬ÒÔ¼°WindowsÓò½ÚÔìÆ÷Êý¾ÝºÍGerrit¿ª·¢´úÂë²é³­ÏµÍ³µÄÎļþÁбí¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112258/data-breach/pay2key-hacked-habana-labs.html


2¡¢ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷


2.jpg


ÃÀ¹ú²ÆÕþ²¿ºÍÉÌÎñ²¿¹ú¶ÈµçÐÅÓëÐÅÏ¢ÖÎÀí¾Ö£¨NTIA£©Ôâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷¡£°²È«¹«Ë¾FireEye½ñÌ찵ʾ £¬µ±¾ÖÖ§³ÖµÄºÚ¿Í¹¥»÷ÁËÈí¼þÌṩÉÌSolarWinds £¬¶øºóΪÆäOrionÈí¼þ²¿ÊðÁ˶ñÒâ¸üз¨Ê½ £¬ÒÔϰȾ¶à¸öÃÀ¹ú¹«Ë¾ºÍµ±¾ÖÍøÂç £¬FireEye֮ǰҲÔâµ½ÁËÐÎͬµÄ¹¥»÷¡£SolarWindsÈ·ÈÏÆäÔÚ2020Äê3ÔÂÖÁ6ÔÂÖ®¼ä°ä²¼µÄOrion¸üа汾2019.4ÖÁ2020.2.1Òѱ»¶ñÒâÈí¼þϰȾ¡£¾ÝÐÅ £¬Õâ´Î¹¥»÷»î¶¯Óë¶íÂÞ˹±í¹úµý±¨¾Ö£¨SVR£©ÓйصĺڿÍ×éÖ¯APT29ÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/


3¡¢Apple°²È«¸üР£¬½¨¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö·ì϶


3.jpg


Apple°ä²¼ÁËiOSºÍiPadOSµÄ°²È«¸üР£¬½¨¸´Ô̺¬´úÂëÖ´Ðзì϶ÔÚÄÚµÄ11¸ö·ì϶¡£Õâ´Î½¨¸´µÄ×îΪÑϳÁµÄÊÇ´úÂëÖ´Ðзì϶£¨CVE-2020-27943ºÍCVE-2020-27944£© £¬¹¥»÷Õß¿ÉÀûÓöñÒâ×ÖÌåÎļþÔÚApple iPhoneºÍiPadÉÏÖ´ÐжñÒâ´úÂë¡£Æä´ÎΪÈý¸öÓ°ÏìÁËImageIO±à³Ì½Ó¿Ú¿ò¼ÜµÄ·ì϶CVE-2020-29617¡¢CVE-2020-29618ºÍCVE-2020-29619 £¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶ͨ¹ýÌØÔìͼÏñÖ´ÐÐËÁÒâ´úÂë¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112304/security/ios-ipados-flaws.html


4¡¢ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý


4.jpg


ÒÔÉ«ÁÐѧÕß·¢ÏÖеÄAIR-FI¼¼Êõ £¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷ £¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£AIR-FI¼¼ÊõµÄÖ÷ÌâÊÇ £¬µ±µçÁ÷ͨ¹ýÆÚ £¬Èκεç×ÓÔª¼þ³ÇÊвúÉúµç´Å²¨¡£Wi-FiÐźÅÊÇÎÞÏߵ粨 £¬¶øÎÞÏßµç¸ù»ùÉÏÊǵç´Å²¨ £¬Òò¶ø¹¥»÷ÕßÄܹ»Í¨¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂë £¬À´Äܹ»°Ñ³ÖRAM¿¨ÄÚ²¿µÄµçÁ÷²úÉúÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨¡£¶øºóÀûÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄÉ豸À´»ñÈ¡¸ÃÐźÅ £¬ÒԸߴï100 b/sµÄ¿ìÂÊÇÔÈ¡Ãô¸ÐÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/


5¡¢Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ £¬Ó°Ïì300ÍòÓû§


5.png


°²È«¹«Ë¾Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ £¬Ô̺¬15¸öChromeÀ©´óºÍ13¸öEdgeÀ©´ó £¬ÒÑÓ°Ïì300ÍòÓû§¡£Õâ28¿î²å¼þÔ̺¬´óÁ¿ÊµÏÖ¶ñÒâ²Ù×÷µÄ´úÂë £¬ÀýÈ罫Óû§Á÷Á¿³Á¶¨Ïòµ½¸æ°×¡¢½«Óû§Á÷Á¿³Á¶¨Ïòµ½ÍøÂç´¹µöÕ¾µã¡¢ÍøÂçÓ×ÎÒÊý¾Ý¡¢ÍøÂçä¯ÀÀ¼Í¼¡¢½«¸ü¶à¶ñÒâÈí¼þÏÂÔØµ½Óû§É豸ÉÏ¡£Ä¿Ç° £¬GoogleÒÑɾ³ýÁË15¸ö¶ñÒâÀ©´ó·¨Ê½ÖеÄ3¸ö £¬¶øMicrosoftÒòÎÞ·¨È·ÈÏAvastµÄ»ã±¨¶øÉÐδ½øÐÐɾ³ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/three-million-users-installed-28-malicious-chrome-or-edge-extensions/