¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìËùÓÐϵͳ°æ±¾£»£»£»£»£»£»£»£»À¶ÑÀÎó²îKNOB£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý
Ðû²¼Ê±¼ä 2019-08-15
΢ÈíÔÚ8Ô·ݵÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË94¸öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨4¸öеÄRDPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1181¡¢CVE-2019-1182¡¢CVE-2019-1222¡¢CVE-2019-1226£©¡£¡£¡£¡£ÆäÖÐCVE-2019-1181ºÍCVE-2019-1182Óë5ÔÂ·ÝÆØ³öµÄBlueKeepÎó²î£¨CVE-2019-0708£©ÀàËÆ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉʵÏÖÈ䳿»¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄϵͳ°æ±¾°üÀ¨win 7 SP1¡¢win 8.1¡¢win 10ÒÔ¼°windows server 2008 R2 SP1¡¢2012¡¢2012 R2¡¢2016¼°2019µÈ¡£¡£¡£¡£XP¡¢windows server 2003¼°2008²»ÊÜÓ°Ïì¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷ÕâЩÎó²îÔÚÒ°ÍⱻʹÓ㬣¬£¬£¬£¬£¬£¬£¬µ«Î¢ÈíÇ¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üÐÂÐÞ¸´²¹¶¡¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-fixes-critical-windows-10-wormable-remote-desktop-flaws/
2¡¢IntelÐû²¼NUC¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-updates-nuc-firmware-to-patch-high-severity-bug/
3¡¢HTTP/2ÆØ³ö8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷
Ñо¿Ö°Ô±Åû¶HTTP/2ÐÒéʵÏÖÖеÄ8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏòδÐÞ²¹µÄЧÀÍÆ÷Ìᳫ¾Ü¾øÐ§À͹¥»÷¡£¡£¡£¡£ÕâЩÎó²î£¨CVE-2019-9511~CVE-2019-9518£©ÊÇÓÉNetflixÑо¿Ô±Jonathan LooneyÒÔ¼°GoogleÑо¿Ô±Piotr Sikora·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ´¥·¢Ð§ÀÍÆ÷µÄ×ÊÔ´ºÄ¾¡£¬£¬£¬£¬£¬£¬£¬£¬µ«²»¿ÉÓÃÓÚÈëÇÖЧÀÍÆ÷¡£¡£¡£¡£Æ¾Ö¤CERTÐû²¼µÄͨ¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨NGINX¡¢Apache¡¢H2O¡¢Nghttp2¡¢Microsoft(IIS)¡¢Cloudflare¡¢Akamai¡¢Apple(SwiftNIO)¡¢Amazon¡¢Facebook(Proxygen)¡¢Node.jsÒÔ¼°Envoy proxy£¬£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼³§É̶¼ÒѾÐû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/http2-dos-vulnerability.html
4¡¢ÐÂÀ¶ÑÀÎó²îKNOB£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý
Ñо¿Ö°Ô±Åû¶À¶ÑÀÖеÄÐÂÎó²î£¨CVE-2019-9506£©£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß±©Á¦ÆÆ½âÅä¶Ô×°±¸ÔÚ´«ÊäÊý¾ÝʱʹÓõÄÃÜÔ¿²¢¸Ä¶¯Êý¾Ý¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁ˰汾ÔÚ1.0ÖÁ5.1Ö®¼äµÄBluetooth BR/EDR×°±¸¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿É×ÌÈÅÁ½Ì¨Åä¶Ô×°±¸ÉèÖüÓÃÜÅþÁ¬µÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬ïÔÌʹÓõÄÃÜÔ¿µÄ³¤¶È£¬£¬£¬£¬£¬£¬£¬£¬Ê¹µÃÃÜÔ¿µÄÇå¾²ÐÔÖè¼õ¡£¡£¡£¡£¼«¶ËÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬£¬ÃÜÔ¿³¤¶È¿ÉÄܱ»ïÔÌΪ1¸ö×Ö½Ú¡£¡£¡£¡£ÎªÁË»º½â¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬À¶ÑÀÊÖÒÕͬÃ˸üÐÂÁËÀ¶ÑÀ½¹µã¹æ·¶£¬£¬£¬£¬£¬£¬£¬£¬½¨Òé×îСÃÜÔ¿³¤¶ÈΪ7¸ö×Ö½Ú¡£¡£¡£¡£Î¢ÈíÒ²ÔÚÎó²î£¨CVE-2019-9506£©µÄ²¹¶¡Öн«Ä¬ÈÏ×îСÃÜÔ¿³¤¶ÈÉèÖÃΪ7¸ö×Ö½Ú¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/
5¡¢¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìËùÓÐϵͳ°æ±¾
¹È¸èÑо¿Ö°Ô±Tavis OrmandyÅû¶WindowsϵͳÖб£´æ³¤´ï20ÄêµÄÒ»¸öδÐÞ¸´Îó²î¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows XPÒÔÀ´µÄËùÓÐWindows°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Win 10¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ΢ÈíµÄÎı¾Ð§ÀÍ¿ò¼Ü£¨MSCTF£©ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÓëMSCTF¿Í»§¶ËºÍЧÀÍÆ÷Ö®¼äµÄͨѶȱÉÙ»á¼û¿ØÖÆ/Éí·ÝÑéÖ¤»úÖÆÓйأ¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÅþÁ¬µ½CTF»á»°¡¢¶ÁдÆäËü´°¿Ú/»á»°µÄÄÚÈÝ¡¢Î±ÔìÏß³ÌID/Àú³ÌID/HWND¡¢Î±×°³ÉCTFЧÀÍÆ÷¡¢¾ÙÐÐɳÏäÌÓÒÝÒÔ¼°ÌáȨ¡£¡£¡£¡£¹¥»÷Õß»¹¿ÉÒÔÈÆ¹ýÓû§½Ó¿ÚȨÏÞ¸ôÀ루UIPI£©£¬£¬£¬£¬£¬£¬£¬£¬»ñÈ¡SYSTEMȨÏÞÒÔ¼°¿ØÖÆUAC¶Ô»°¿òµÈ¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËÔÚWin 10ÖлñÈ¡SYSTEMµÄPoCÊÓÆµ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/ctfmon-windows-vulnerabilities.html
6¡¢BioStar 2ÉúÎïʶ±ðÊý¾Ý¿âй¶£¬£¬£¬£¬£¬£¬£¬£¬²¨¼°Êý°ÙÍòÓû§
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/millions-of-records-exposed/


¾©¹«Íø°²±¸11010802024551ºÅ