AdobeÇå¾²¸üÐÂÐÞ¸´MagentoÖÐÁ½¸öÖ÷ÒªµÄ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬£¬¿ÉÍêÈ«¿ØÖÆÐ§ÀÍÆ÷
Ðû²¼Ê±¼ä 2020-07-301.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´MagentoÖÐÁ½¸ö´úÂëÖ´ÐÐÎó²î
AdobeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬ÒÔÐÞ¸´Magento CommerceºÍMagento Open SourceÖеÄÁ½¸öÑÏÖØµÄ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÊÇÓÉ·¾¶±éÀú¹ýʧÒýÆðµÄ£¬£¬£¬£¬±»¸ú×ÙΪCVE-2020-9689£¬£¬£¬£¬ËüÔÊÐí¾ßÓÐÖÎÀíԱȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÊÇ»ùÓÚDOMµÄ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬£¬±»×·×ÙΪCVE-2020-9691£¬£¬£¬£¬ËüÔÊÐíʹδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËÓÉ¿ÉÊӲ쵽µÄʱ¼ä²îÒýÆðµÄÊðÃûÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-9690£©¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Õë¶Ô¸ÃÎó²îÉÐÎÞÒÑÖªµÄʹÓú͹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/magento-gets-security-updates-for-severe-code-execution-bugs/
2.GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ChromeÖеÄ8¸öÎó²î
GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËChromeÖеÄ8¸öÎó²î£¬£¬£¬£¬Ó°ÏìÁËWindows¡¢MacºÍLinuxϵͳϵÄChrome°æ±¾84.0.4147.105¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂÖÐÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪV8ÖеÄÀàÐÍ»ìÏýÎÊÌ⣨CVE-2020-6537£©¡¢WebViewÖеÄʵÏÖ²»µ±ÎÊÌ⣨CVE-2020-6538£©¡¢SCTPÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6532£©¡¢CSSÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6539£©¡¢SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-6540£©ÒÔ¼°WebUSBÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6541£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/07/28/google-releases-security-updates-chrome
3.Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷
Positive TechnologiesÑо¿Ö°Ô±·¢Ã÷DellÔ¶³Ì»á¼û¿ØÖÆÆ÷£¨iDRAC£©Öб£´æ±éÀúÎó²î£¨CVE-2020-5366£©£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£Í¨¹ýʹÓôËÎó²î£¬£¬£¬£¬¾ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔ·¿ªºÍ¹Ø±Õ²úÆ·£¬£¬£¬£¬»ò¸ü¸ÄÆäÉ¢ÈȺ͵çÔ´ÉèÖᣡ£¡£¡£¡£¡£³ý´ËÖ®Íâ £¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓöÁÈ¡¿ØÖÆÆ÷²Ù×÷ϵͳÖеÄÈκÎÎļþ£¬£¬£¬£¬²¢ÇÒÔÚijЩÇéÐÎÏÂ×ÌÈÅ¿ØÖÆÆ÷µÄ²Ù×÷¡£¡£¡£¡£¡£¡£¸ÃÎó²î»áÓ°Ïì¹Ì¼þ°æ±¾Îª4.20.20.20֮ǰµÄDell EMC iDRAC9¿ØÖÆÆ÷£¬£¬£¬£¬Dell EMCÔÚ¼ì²âµ½¸ÃÎó²îÖ®ºó±ãÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬²¢±Þ²ßÓû§¾¡¿ì×°Öᣡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/dell-emc-patches-idrac/
4.ÐÂÐÍLinuxºóÃÅDokiʹÓÃDogecoin API£¬£¬£¬£¬Õë¶ÔDockerʵÀý
Intezer Labs·¢Ã÷£¬£¬£¬£¬ÐÂÐÍLinuxºóÃųÌÐòDokiʹÓÃÁËDogecoin API£¬£¬£¬£¬Õë¶ÔDockerʵÀý¡£¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯Ngrok×Ô2018Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬×î³õÇãÏòÓÚʹÓÃNgrokЧÀÍÍйÜC£¦CЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¶øÔÚ¸Ã×éÖ¯×î½üÒ»´ÎµÄ¹¥»÷ÖУ¬£¬£¬£¬ÆäÕë¶Ôй¶ÁËÖÎÀíAPIµÄDockerʵÀý¡£¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýʹÓÃDocker APIÔÚÄ¿µÄ¹«Ë¾µÄÔÆ»ù´¡¼Ü¹¹Öа²ÅÅÐÂЧÀÍÆ÷£¬£¬£¬£¬ËæºóÔËÐÐѬȾÁ˼ÓÃÜÍÚ¿ó¶ñÒâÈí¼þDokiµÄAlpine LinuxЧÀÍÆ÷¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬DokiµÄÄ¿µÄÊÇÔÊÐíºÚ¿Í¿ØÖÆÆäа²ÅŵÄAlpine LinuxЧÀÍÆ÷£¬£¬£¬£¬ÒÔÈ·±£¼ÓÃܲɿó²Ù×÷°´Ô¤ÆÚÔËÐС£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-linux-malware-uses-dogecoin-api-to-find-c-c-server-addresses/#ftag=RSSbaffb68
5.¿¨°Í˹»ù·¢Ã÷ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ
¿¨°Í˹»ùÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬£¬ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйء£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê3ÔÂÖÁ5ÔµÄÊÓ²ìÖз¢Ã÷ÁËÀÕË÷Èí¼þVHDµÄÑù±¾£¬£¬£¬£¬ÕâЩÑù±¾Ê¹ÓÃSMB±©Á¦ÆÆ½â·Ö·¢MATA¶ñÒâÈí¼þ¿ò¼Ü¡£¡£¡£¡£¡£¡£VHD¿ÉÒþ²ØµØÅþÁ¬µ½Êܺ¦ÕߵĵçÄÔÇý¶¯Æ÷£¬£¬£¬£¬¼ÓÃÜÎļþ£¬£¬£¬£¬²¢É¾³ýËùÓеÄSystem Volume InformationÎļþ¼Ð£¬£¬£¬£¬´Ó¶øÆÆËðϵͳÖеÄWindows»¹Ô¹¦Ð§¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬Ëü¿ÉÒÔ½ûÓñÜÃâÖ÷ÒªÎļþ±»¸Ä¶¯µÄÀú³Ì£¬£¬£¬£¬ÀýÈçMicrosoft Exchange»òSQL Server¡£¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ù·¢Ã÷ManuscryptľÂíҲʹÓÃÁËMATA¿ò¼Ü£¬£¬£¬£¬Òò´ËÅжÏͬÑùʹÓÃÁ˸öñÒâ¿ò¼ÜµÄVHDÓëLazarusÓйء£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-hackers-created-vhd-ransomware-for-enterprise-attacks/
6.IBMÐû²¼±¨¸æ£¬£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª
IBMÓÚ±¾ÖÜÈýÐû²¼ÁËÄê¶ÈÊý¾Ýй¶±¾Ç®±¨¸æ£¬£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª¡£¡£¡£¡£¡£¡£Ö»¹ÜÓë2019ÄêÏà±È£¬£¬£¬£¬Æ½¾ù±¾Ç®Ï½µÁË1.5£¥£¬£¬£¬£¬µ«Ð¹Â¶Áè¼Ý5000ÍòÌõ¼Í¼µÄ³¬´óÐÍ×ß©ÊÂÎñµÄ±¾Ç®¿ÉÄܸߴï3.92ÒÚÃÀÔª£¬£¬£¬£¬¸ßÓÚ2019ÄêµÄ3.88ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£×ÜÌå¶øÑÔ£¬£¬£¬£¬ÕÊ»§Æ¾Ö¤Ð¹Â¶ÒÔ¼°ÔÆÉèÖùýʧµ¼ÖÂÁ˽ü40£¥µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ê¹ÓõÚÈý·½Îó²î£¬£¬£¬£¬ÀýÈç0day£¬£¬£¬£¬Ò²ÊÇÔì³ÉÊý¾Ýй¶µÄÖ÷ÒªÒòËØ£¬£¬£¬£¬Ò»¼ÒÒò´ËÀàÎó²îµ¼ÖÂÊý¾Ýй¶µÄ¹«Ë¾¿ÉÄÜÐèÒªÖ§¸¶¸ß´ï450ÍòÃÀÔªµÄÅâ³¥¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬ÈôÊÇÆóÒµ¹ºÖÃÁËÍøÂç°ü¹Ü£¬£¬£¬£¬Ôòƽ¾ù¿ÉïÔÌ20ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/todays-mega-data-breaches-now-cost-companies-392-million-in-damages-lawsuits/


¾©¹«Íø°²±¸11010802024551ºÅ