ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ51ÖÜ
°ä²¼¹¦·ò 2020-12-21> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê12ÔÂ14ÈÕÖÁ12ÔÂ20ÈÕ¹²ÊÕ¼°²È«·ì϶58¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇFoxit Reader CVE-2020-13548ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»Dex Idp Dex samlÑéÖ¤ÈÆ¹ý·ì϶£»IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÒªÇóαÔì·ì϶£»DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾¾ç±¾·ì϶£»EPSON EPS TSE Server CVE-2020-28930¿çÕ¾¾ç±¾·ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇIntelµÄHabana LabsϰȾPay2Key£¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ£»ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷£»Apple°²È«¸üУ¬½¨¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö·ì϶£»ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý£»Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ó°Ïì300ÍòÓû§¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
> ³ÁÒª°²È«·ì϶Áбí
1.Foxit Reader CVE-2020-13548ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶
Foxit Reader´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.foxitsoftware.com/support/security-bulletins.html
2.Dex Idp Dex samlÑéÖ¤ÈÆ¹ý·ì϶
Dex Idp Dex saml´æÔÚÑéÖ¤ÈÆ¹ý·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨ½Ó¼û¡£
https://access.redhat.com/security/cve/cve-2020-27847
3.IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÒªÇóαÔì·ì϶
IBM Financial Transaction Manager for SWIFT Services´æÔÚ¿çÕ¾ÒªÇóαÔì·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâURI£¬ÓÕʹҪÇó£¬Äܹ»Ö¸±êÓû§¸ßµÍÎÄÖ´ÐжñÒâ²Ù×÷¡£
https://www.ibm.com/support/pages/node/6371260
4.DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾¾ç±¾·ì϶
DELL Dell EMC iDRAC9 webÀûÓôæÔÚ¿çÕ¾¾ç±¾·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶עÈë¶ñÒâ¾ç±¾»òHTML´úÂ룬µ±¶ñÒâÊý¾Ý±»²é¿´Ê±£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£
https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability
5.EPSON EPS TSE Server CVE-2020-28930¿çÕ¾¾ç±¾·ì϶
EPSON EPS TSE Server´æÔÚ¿çÕ¾¾ç±¾·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶עÈë¶ñÒâ¾ç±¾»òHTML´úÂ룬µ±¶ñÒâÊý¾Ý±»²é¿´Ê±£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£
https://www.seh-technology.com/services/downloads/download-fiscal-solutions/eps-tse-server-8.html
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢IntelµÄHabana LabsϰȾPay2Key£¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ

IntelµÄAI´¦ÖÃÆ÷¿ª·¢ÉÌHabana LabsÔâµ½ÁËPay2KeyÀÕË÷Èí¼þ¹¥»÷£¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ¡£Habana LabsÊÇÒÔÉ«ÁÐAI´¦ÖÃÆ÷µÄ¿ª·¢ÉÌ£¬ÓÚ2019Äê12ÔÂÒÔ20ÒÚÃÀÔªµÄ¼ÛÖµ±»IntelÊÕ¹º¡£Pay2KeyÔÚTwitterÉϰ䷢ÁËÕâ´Î¹¥»÷£¬²¢Ðû³ÆÒÑÇÔÈ¡ÁËÓйØÈËΪÖÇÄÜоƬ´úÂëGaudiµÄÐÅÏ¢Êý¾Ý¡£¸ÃÍÅ»ïÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉϹ«¿ªÁ˸ù«Ë¾µÄÔ´´úÂëºÍÄÚ²¿¹ý³ÌµÄͼƬ£¬ÒÔ¼°WindowsÓò½ÚÔìÆ÷Êý¾ÝºÍGerrit¿ª·¢´úÂë²é³ÏµÍ³µÄÎļþÁÐ±í¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112258/data-breach/pay2key-hacked-habana-labs.html
2¡¢ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷

ÃÀ¹ú²ÆÕþ²¿ºÍÉÌÎñ²¿¹ú¶ÈµçÐÅÓëÐÅÏ¢ÖÎÀí¾Ö£¨NTIA£©Ôâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷¡£°²È«¹«Ë¾FireEye½ñÌ찵ʾ£¬µ±¾ÖÖ§³ÖµÄºÚ¿Í¹¥»÷ÁËÈí¼þÌṩÉÌSolarWinds£¬¶øºóΪÆäOrionÈí¼þ²¿ÊðÁ˶ñÒâ¸üз¨Ê½£¬ÒÔϰȾ¶à¸öÃÀ¹ú¹«Ë¾ºÍµ±¾ÖÍøÂ磬FireEye֮ǰҲÔâµ½ÁËÐÎͬµÄ¹¥»÷¡£SolarWindsÈ·ÈÏÆäÔÚ2020Äê3ÔÂÖÁ6ÔÂÖ®¼ä°ä²¼µÄOrion¸üа汾2019.4ÖÁ2020.2.1Òѱ»¶ñÒâÈí¼þϰȾ¡£¾ÝÐÅ£¬Õâ´Î¹¥»÷»î¶¯Óë¶íÂÞ˹±í¹úµý±¨¾Ö£¨SVR£©ÓйصĺڿÍ×éÖ¯APT29Óйء£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/
3¡¢Apple°²È«¸üУ¬½¨¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö·ì϶

Apple°ä²¼ÁËiOSºÍiPadOSµÄ°²È«¸üУ¬½¨¸´Ô̺¬´úÂëÖ´Ðзì϶ÔÚÄÚµÄ11¸ö·ì϶¡£Õâ´Î½¨¸´µÄ×îΪÑϳÁµÄÊÇ´úÂëÖ´Ðзì϶£¨CVE-2020-27943ºÍCVE-2020-27944£©£¬¹¥»÷Õß¿ÉÀûÓöñÒâ×ÖÌåÎļþÔÚApple iPhoneºÍiPadÉÏÖ´ÐжñÒâ´úÂë¡£Æä´ÎΪÈý¸öÓ°ÏìÁËImageIO±à³Ì½Ó¿Ú¿ò¼ÜµÄ·ì϶CVE-2020-29617¡¢CVE-2020-29618ºÍCVE-2020-29619£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶ͨ¹ýÌØÔìͼÏñÖ´ÐÐËÁÒâ´úÂë¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112304/security/ios-ipados-flaws.html
4¡¢ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý

ÒÔÉ«ÁÐѧÕß·¢ÏÖеÄAIR-FI¼¼Êõ£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£AIR-FI¼¼ÊõµÄÖ÷ÌâÊÇ£¬µ±µçÁ÷ͨ¹ýÆÚ£¬Èκεç×ÓÔª¼þ³ÇÊвúÉúµç´Å²¨¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬¶øÎÞÏßµç¸ù»ùÉÏÊǵç´Å²¨£¬Òò¶ø¹¥»÷ÕßÄܹ»Í¨¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂ룬À´Äܹ»°Ñ³ÖRAM¿¨ÄÚ²¿µÄµçÁ÷²úÉúÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨¡£¶øºóÀûÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄÉ豸À´»ñÈ¡¸ÃÐźţ¬ÒԸߴï100 b/sµÄ¿ìÂÊÇÔÈ¡Ãô¸ÐÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/
5¡¢Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ó°Ïì300ÍòÓû§

°²È«¹«Ë¾Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ô̺¬15¸öChromeÀ©´óºÍ13¸öEdgeÀ©´ó£¬ÒÑÓ°Ïì300ÍòÓû§¡£Õâ28¿î²å¼þÔ̺¬´óÁ¿ÊµÏÖ¶ñÒâ²Ù×÷µÄ´úÂ룬ÀýÈ罫Óû§Á÷Á¿³Á¶¨Ïòµ½¸æ°×¡¢½«Óû§Á÷Á¿³Á¶¨Ïòµ½ÍøÂç´¹µöÕ¾µã¡¢ÍøÂçÓ×ÎÒÊý¾Ý¡¢ÍøÂçä¯ÀÀ¼Í¼¡¢½«¸ü¶à¶ñÒâÈí¼þÏÂÔØµ½Óû§É豸ÉÏ¡£Ä¿Ç°£¬GoogleÒÑɾ³ýÁË15¸ö¶ñÒâÀ©´ó·¨Ê½ÖеÄ3¸ö£¬¶øMicrosoftÒòÎÞ·¨È·ÈÏAvastµÄ»ã±¨¶øÉÐδ½øÐÐɾ³ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/three-million-users-installed-28-malicious-chrome-or-edge-extensions/


¾©¹«Íø°²±¸11010802024551ºÅ