Android libpac¿âRCEÎó²î£»£»£»£»Intel CPU TPM-FAILÎó²îʹÊýÊ®ÒŲ́װ±¸ÃæÁÙΣº¦
Ðû²¼Ê±¼ä 2019-11-18
NowSecureÑо¿Ö°Ô±·¢Ã÷AndroidϵͳʹÓõÄlibpac¿âÖб£´æRCEÎó²î£¨CVE-2019-2205£©¡£¡£¡£¡£¡£¡£¡£¡£libpacÊÇÒ»¸ö»ùÓÚChromiumÏîÄ¿´úÂëµÄ¿â£¬£¬£¬¸Ã¿âʹÓþ²Ì¬Á´½ÓµÄV8 JSÒýÇæÀ´ÆÊÎöJavaScript£¬£¬£¬ÕâΪƽ̨ӦÓóÌÐò´øÀ´ÁËÖØ´óµÄ¹¥»÷Ãæ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷JSº¯ÊýFindProxyForUrlÉÏÏÂÎÄÖеÄArrayBuffers·ÖÅÉÆ÷ÉùÃ÷²»×¼È·£¬£¬£¬¿ÉÖÂÕ»ÉϵÄVPTR±»ÁýÕÖ£¬£¬£¬Õâ¿ÉÄܱ»ÓÃÓÚÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£¹È¸èÔÚ11ÔÂAndroidÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.nowsecure.com/blog/2019/11/13/nowsecure-discovers-critical-android-vuln-that-may-lead-to-remote-code-execution/2¡¢Intel CPU TPM-FAILÎó²îʹÊýÊ®ÒŲ́װ±¸ÃæÁÙΣº¦
Ñо¿Ö°Ô±ÔÚ»ùÓÚÓ¢ÌØ¶û¹Ì¼þµÄTPM£¨fTPM£©ºÍSTMicroelectronicsµÄTPMоƬÖз¢Ã÷ÁËÁ½¸ö±»³ÆÎªTPM-FAILµÄÐÂÎó²î£¬£¬£¬ÕâÁ½¸öÎó²î£¨CVE-2019-11090ºÍCVE-2019-16863£©Ê¹ºÚ¿Í¿ÉÒÔ¹æ±ÜÇå¾²ÆÁÕÏ£¬£¬£¬²¢ÇÔÈ¡TPMÖд洢µÄÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨ÊðÃûÃÜÔ¿µÈ¡£¡£¡£¡£¡£¡£¡£¡£ÌáÈ¡µ½ÃÜÔ¿ºó£¬£¬£¬¹¥»÷Õß¾ÍÄÜʹÓÃËüαÔìÊý×ÖÊðÃû¡¢¸Ä¶¯²Ù×÷ϵͳ»òÈÆ¹ýÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼±ãЯʽÅÌËã»ú¡¢Ì¨Ê½»úºÍЧÀÍÆ÷¶¼ÈÝÒ×Êܵ½TPM-FAIL¹¥»÷£¬£¬£¬°üÀ¨´÷¶û¡¢»ÝÆÕºÍåÚÏëµÈÆ·ÅÆÖÆÔìÉÌ¡£¡£¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î¶¼ÒÑÔÚеĹ̼þ»òTPMоƬÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tpm-fail-security-flaws-impact-modern-devices-with-intel-cpus/3¡¢Wizards of Coastй¶45ÍòÓÎÏ·Íæ¼ÒÊý¾Ý
¡¶Magic£ºThe Gathering¡·ÓÎÏ·µÄ¿ª·¢ÉÌWizards of CoastÒѾȷÈÏÊýÊ®ÍòÓÎÏ·Íæ¼ÒµÄÊý¾ÝÔâй¶¡£¡£¡£¡£¡£¡£¡£¡£Ó¢¹úÇå¾²³§ÉÌFidus Information Security·¢Ã÷ÁË̻¶µÄÊý¾Ý¿âÎļþ£¬£¬£¬ÕâЩÎļþ±»ÉúÑÄÔÚûÓÐÃÜÂëµÄAmazon´æ´¢Í°ÖС£¡£¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÖÐÒ»¹²°üÀ¨452634ÃûÍæ¼ÒµÄÊý¾Ý£¬£¬£¬Éæ¼°ÐÕÃûºÍÓû§Ãû¡¢µç×ÓÓʼþµØµã¡¢ÕË»§µÄ½¨Éèʱ¼äÒÔ¼°¾ÓɹþÏ£ºÍ¼ÓÑδ¦Öóͷ£µÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±¶ÔÊý¾ÝµÄÉó²é£¬£¬£¬ÕâЩÕË»§µÄÈÕÆÚ×îÔç¿É×·ËÝÖÁ2012Ä꣬£¬£¬×îÐÂÔòΪ2018ÄêÖÐÆÚ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2019/11/16/magic-the-gathering-wizards-data-exposure/4¡¢Sunshine Behavioralй¶9.3Íò·Ý»¼Õßµµ°¸
Sunshine Behavioral HealthÊÇÃÀ¹úÒ»¼ÒÖÎÁƶ¾Æ·ºÍ¾Æ¾«³Éñ«»¼ÕßµÄÒ½Áƹ«Ë¾£¬£¬£¬ÂþÑÜÔÚ¼ÓÀû¸£ÄáÑÇÖÝ¡¢µÂ¿ËÈøË¹ÖݺͿÆÂÞÀ¶àÖÝ¡£¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚAWS s3´æ´¢Í°ÉèÖùýʧ£¬£¬£¬¸Ã¹«Ë¾µÄԼĪ9.3Íò¸ö»¼Õßµµ°¸Ôâй¶¡£¡£¡£¡£¡£¡£¡£¡£µµ°¸ÖаüÀ¨µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÓÊÕþµØµãºÍµç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÍêÕûµÄÐÅÓÿ¨ºÅÂëºÍCVVÂë¼°²¿·ÖÓÐÓÃÈÕÆÚ£¨ÔÂ/ÈÕ£©¡¢Ò½Áưü¹ÜÕ˺š¢ÒÑÖ§¸¶½ð¶îµÈ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾¶ÔÊý¾Ý¿â¾ÙÐÐÁ˱£»£»£»£»¤£¬£¬£¬µ«Ã»ÓÐÔÚÍøÕ¾ÉÏÐû²¼Ð¹Â¶Í¨Öª£¬£¬£¬Ò²Î´ÌåÏÖÊÇ·ñÒÑ֪ͨ»¼Õß/î¿Ïµ»ú¹¹¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/exclusive-more-than-90000-patient-billing-files-from-an-alcohol-and-drug-addiction-treatment-network-exposed-online/
5¡¢°Ä´óÀûÑǹú»áÔÚ2019ÄêÍ·Ôâµ½ºÚ¿ÍÈëÇÖ
ƾ֤°Ä´óÀûÑǹ㲥¹«Ë¾£¨ABC£©µÄ±¨µÀ£¬£¬£¬°Ä´óÀûÑǹú»áµÄÅÌËã»úÍøÂçÔÚ½ñÄêÔçЩʱ¼ä±»ºÚ¿ÍÈëÇÖ£¬£¬£¬²¢´Ó¼¸Î»ÖÐÑ¡¹ÙÔ±µÄÅÌËã»úÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷±¬·¢ÔÚ2019Äê1ÔÂ31ÈÕ£¬£¬£¬Æäʱ°Ä´óÀûÑÇÇå¾²»ú¹¹·¢Ã÷ÁËÈëÇÖ²¢¶ÔÆä¾ÙÐÐÒ»ÖܵļàÊÓ£¬£¬£¬È»ºó¹Ø±ÕÍøÂç²¢ÊÔͼ׷²¶¹¥»÷Õß¡£¡£¡£¡£¡£¡£¡£¡£°Ä´óÀûÑÇÕþ¸®Î´ÌṩÓйظúڿ͹¥»÷µÄ¸ü¶àÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/93898/cyber-warfare-2/australian-parliament-hacked.html
6¡¢Î¢ÈíÐû²¼Intel CPUÇý¶¯³ÌÐòÎó²îµÄÐÞ¸´Ö¸ÄÏ
΢ÈíÐû²¼ÁË×ÊÖúÓû§ÐÞ¸´Intel CPU¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2018-12207£©ºÍTSXÒì²½ÖÐÖ¹Îó²î£¨CVE-2019-11135£©µÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃDoSÎó²îÓ°ÏìÁ˵Ú8´ú¼°ÒÔϵÄIntel¿á¦Öóͷ£Æ÷£¬£¬£¬Î¢ÈíÔÚ11ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬µ«ÔÚĬÈÏÇéÐÎϸñ£»£»£»£»¤¹¦Ð§±»½ûÓ㬣¬£¬Óû§±ØÐèÉèÖÃÌØ¶¨µÄ×¢²á±íÏîÆôÓøù¦Ð§¡£¡£¡£¡£¡£¡£¡£¡£¶øTSX¹¦Ð§ÖеÄÍÆ²âÖ´ÐÐÎó²îÔòÓ°ÏìÁËIntelµÚ10´ú֮ǰµÄ´¦Öóͷ£Æ÷£¬£¬£¬Î¢ÈíÖ¸µ¼Óû§ÔÚÒ×Êܹ¥»÷µÄIntel´¦Öóͷ£Æ÷ÉϽûÓÃIntel TSX¹¦Ð§£¬£¬£¬ÒÔ×èֹDZÔÚµÄZombieload 2¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-guidance-for-intel-cpu-driver-security-flaws/


¾©¹«Íø°²±¸11010802024551ºÅ