¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìËùÓÐϵͳ°æ±¾£»£»£»£»£»£»£»£»À¶ÑÀÎó²îKNOB£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý

Ðû²¼Ê±¼ä 2019-08-15
1¡¢Î¢ÈíÐÞ¸´RDPЧÀÍÖеÄÐÂÈ䳿¼¶Îó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

΢ÈíÔÚ8Ô·ݵÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË94¸öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨4¸öеÄRDPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1181¡¢CVE-2019-1182¡¢CVE-2019-1222¡¢CVE-2019-1226£© ¡£¡£¡£¡£ÆäÖÐCVE-2019-1181ºÍCVE-2019-1182Óë5ÔÂ·ÝÆØ³öµÄBlueKeepÎó²î£¨CVE-2019-0708£©ÀàËÆ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉʵÏÖÈ䳿»¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄϵͳ°æ±¾°üÀ¨win 7 SP1¡¢win 8.1¡¢win 10ÒÔ¼°windows server 2008 R2 SP1¡¢2012¡¢2012 R2¡¢2016¼°2019µÈ ¡£¡£¡£¡£XP¡¢windows server 2003¼°2008²»ÊÜÓ°Ïì ¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷ÕâЩÎó²îÔÚÒ°ÍⱻʹÓ㬣¬£¬£¬£¬£¬£¬£¬µ«Î¢ÈíÇ¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üÐÂÐÞ¸´²¹¶¡ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-fixes-critical-windows-10-wormable-remote-desktop-flaws/


2¡¢IntelÐû²¼NUC¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


IntelÐû²¼NUC KitµÄ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¿Éµ¼ÖÂÌáȨ¡¢¾Ü¾øÐ§ÀÍÒÔ¼°ÐÅϢй¶µÄÎó²î ¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-11140£¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.5£©ÊÇÓÉÓÚ²»³ä·ÖµÄÑéÖ¤µ¼ÖµÄ£¬£¬£¬£¬£¬£¬£¬£¬¿É±»¾ßÓÐÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßËùʹÓ㬣¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ²úÆ·ÐͺŰüÀ¨Intel NUC Kit NUC7i7DNx¡¢NUC7i5DNx¡¢NUC7i3DNxÒÔ¼°Compute Stick STK2MV64CCºÍCompute Card CD1IV128MK ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬Intel»¹ÐÞ¸´ÁË´¦Öóͷ£Æ÷ʶ±ð¹¤¾ßÖеÄÎó²î£¨CVE-2019-11163£¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.2£©ÒÔ¼°RAIDÖÎÀíÈí¼þÖеÄÎó²î£¨CVE-2019-0173£¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö6.8£© ¡£¡£¡£¡£¸ü¶àÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-updates-nuc-firmware-to-patch-high-severity-bug/


3¡¢HTTP/2ÆØ³ö8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Ñо¿Ö°Ô±Åû¶HTTP/2ЭÒéʵÏÖÖеÄ8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏòδÐÞ²¹µÄЧÀÍÆ÷Ìᳫ¾Ü¾øÐ§À͹¥»÷ ¡£¡£¡£¡£ÕâЩÎó²î£¨CVE-2019-9511~CVE-2019-9518£©ÊÇÓÉNetflixÑо¿Ô±Jonathan LooneyÒÔ¼°GoogleÑо¿Ô±Piotr Sikora·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ´¥·¢Ð§ÀÍÆ÷µÄ×ÊÔ´ºÄ¾¡£¬£¬£¬£¬£¬£¬£¬£¬µ«²»¿ÉÓÃÓÚÈëÇÖЧÀÍÆ÷ ¡£¡£¡£¡£Æ¾Ö¤CERTÐû²¼µÄͨ¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨NGINX¡¢Apache¡¢H2O¡¢Nghttp2¡¢Microsoft(IIS)¡¢Cloudflare¡¢Akamai¡¢Apple(SwiftNIO)¡¢Amazon¡¢Facebook(Proxygen)¡¢Node.jsÒÔ¼°Envoy proxy£¬£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼³§É̶¼ÒѾ­Ðû²¼ÁËÐÞ¸´²¹¶¡ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/http2-dos-vulnerability.html


4¡¢ÐÂÀ¶ÑÀÎó²îKNOB£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Åû¶À¶ÑÀÖеÄÐÂÎó²î£¨CVE-2019-9506£©£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß±©Á¦ÆÆ½âÅä¶Ô×°±¸ÔÚ´«ÊäÊý¾ÝʱʹÓõÄÃÜÔ¿²¢¸Ä¶¯Êý¾Ý ¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁ˰汾ÔÚ1.0ÖÁ5.1Ö®¼äµÄBluetooth BR/EDR×°±¸ ¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿É×ÌÈÅÁ½Ì¨Åä¶Ô×°±¸ÉèÖüÓÃÜÅþÁ¬µÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬ïÔ̭ʹÓõÄÃÜÔ¿µÄ³¤¶È£¬£¬£¬£¬£¬£¬£¬£¬Ê¹µÃÃÜÔ¿µÄÇå¾²ÐÔÖè¼õ ¡£¡£¡£¡£¼«¶ËÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬£¬ÃÜÔ¿³¤¶È¿ÉÄܱ»ïÔ̭Ϊ1¸ö×Ö½Ú ¡£¡£¡£¡£ÎªÁË»º½â¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬À¶ÑÀÊÖÒÕͬÃ˸üÐÂÁËÀ¶ÑÀ½¹µã¹æ·¶£¬£¬£¬£¬£¬£¬£¬£¬½¨Òé×îСÃÜÔ¿³¤¶ÈΪ7¸ö×Ö½Ú ¡£¡£¡£¡£Î¢ÈíÒ²ÔÚÎó²î£¨CVE-2019-9506£©µÄ²¹¶¡Öн«Ä¬ÈÏ×îСÃÜÔ¿³¤¶ÈÉèÖÃΪ7¸ö×Ö½Ú ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/

5¡¢¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìËùÓÐϵͳ°æ±¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¹È¸èÑо¿Ö°Ô±Tavis OrmandyÅû¶WindowsϵͳÖб£´æ³¤´ï20ÄêµÄÒ»¸öδÐÞ¸´Îó²î ¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows XPÒÔÀ´µÄËùÓÐWindows°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Win 10 ¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ΢ÈíµÄÎı¾Ð§ÀÍ¿ò¼Ü£¨MSCTF£©ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÓëMSCTF¿Í»§¶ËºÍЧÀÍÆ÷Ö®¼äµÄͨѶȱÉÙ»á¼û¿ØÖÆ/Éí·ÝÑéÖ¤»úÖÆÓйØ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÅþÁ¬µ½CTF»á»°¡¢¶ÁдÆäËü´°¿Ú/»á»°µÄÄÚÈÝ¡¢Î±ÔìÏß³ÌID/Àú³ÌID/HWND¡¢Î±×°³ÉCTFЧÀÍÆ÷¡¢¾ÙÐÐɳÏäÌÓÒÝÒÔ¼°ÌáȨ ¡£¡£¡£¡£¹¥»÷Õß»¹¿ÉÒÔÈÆ¹ýÓû§½Ó¿ÚȨÏÞ¸ôÀ루UIPI£©£¬£¬£¬£¬£¬£¬£¬£¬»ñÈ¡SYSTEMȨÏÞÒÔ¼°¿ØÖÆUAC¶Ô»°¿òµÈ ¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËÔÚWin 10ÖлñÈ¡SYSTEMµÄPoCÊÓÆµ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/ctfmon-windows-vulnerabilities.html

6¡¢BioStar 2ÉúÎïʶ±ðÊý¾Ý¿âй¶£¬£¬£¬£¬£¬£¬£¬£¬²¨¼°Êý°ÙÍòÓû§

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


vpnMentorÑо¿Ö°Ô±·¢Ã÷BioStar 2µÄÒ»¸öElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍòÈ˵ÄÉúÎïʶ±ðÊý¾Ýй¶ ¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨23GBÊý¾Ý£¨Áè¼Ý2780ÍòÌõ¼Í¼£©£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý°üÀ¨Ö¸ÎÆ/Ãæ²¿Ê¶±ðÊý¾Ý¡¢Î´¼ÓÃܵÄÓû§ÃûºÍÃÜÂëÒÔ¼°Ô±¹¤µÄÒþ˽ÐÅÏ¢ ¡£¡£¡£¡£Biostar 2±»¼¯³Éµ½µÚÈý·½ÏµÍ³ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçNedapµÄAEOS»á¼û¿ØÖÆÏµÍ³£¬£¬£¬£¬£¬£¬£¬£¬¸ÃϵͳÒѱ»83¸ö¹ú¼ÒµÄ5700¶à¸ö×é֯ʹÓ㬣¬£¬£¬£¬£¬£¬£¬°üÀ¨Ó¢¹ú´ó¶¼»á¾¯Ô±¾Ö ¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¹«Ë¾»¹°üÀ¨Ó¢¹ú¼Ò¾Ó×°ÊÎÉÌTile MountainÒÔ¼°Ó¡¶ÈºÍ˹ÀïÀ¼¿¨µÄ½¡Éí·¿Power World GymsµÈ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/millions-of-records-exposed/