AdobeÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î£»£»£»£»£»IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î
Ðû²¼Ê±¼ä 2020-08-131.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î
AdobeÐû²¼Çå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸öÎó²î¡£¡£¡£¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑÏÖØµÄÎó²î£¬£¬£¬¿É±»Ê¹ÓþÙÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ýÇå¾²¹¦Ð§£¬£¬£¬»®·ÖΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇø¹ýʧµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?ÊͷźóʹÓõ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/
2.GoogleΪChromeÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´¶à¸öÎó²î
GoogleΪChromeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬ÐÞ¸´Á˶à¸ö¿É±»Ê¹ÓÃÒÔ¿ØÖÆÊÜÓ°ÏìϵͳµÄÎó²î£¬£¬£¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪÊͷźóʹÓÃÎó²î£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£©£¬£¬£¬×°ÖóÌÐòÖ´Ðв»µ±£¨CVE-2020-6546£©£¬£¬£¬Ã½ÌåÖеÄÇå¾²UI¹ýʧ£¨CVE-2020-6547£©£¬£¬£¬SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨ CVE-2020-6548£©£¬£¬£¬IndexedDBÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6550£©ºÍWebXRÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6551£©µÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome
3.IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î
Intel±¾ÖܶþÐû²¼Í¨Öª£¬£¬£¬ÉùÃ÷ÆäÒÑÐÞ¸´ÁËЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î¡£¡£¡£¡£´Ë´Î¸üÐÂ×ܼÆÐÞ¸´ÁË20¶à¸öÎó²î£¬£¬£¬Ó°ÏìÁËЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿é£¬£¬£¬ÆäÖеĴó²¿Îó²î¿É±»Ê¹ÓþÙÐÐÌáȨ£¬£¬£¬ÉÐÓÐÒ»²¿·Ö¿É±»Ê¹ÓÃͨ¹ýÍâµØ»á¼ûÌᳫDoS¹¥»÷¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²î±»×·×ÙΪCVE-2020-8708£¬£¬£¬ÊÇÒ»¸ö¹ýʧµÄÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓ㬣¬£¬Í¨¹ýÏàÁÚ»á¼ûÀ´ÌáȨ£¬£¬£¬¸ÃÎó²îÓ°ÏìÁË1.59°æÖ®Ç°µÄЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards
4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°
µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄÑо¿Ö°Ô±·¢Ã÷ReVoLTE¹¥»÷¿ÉʹÓÃLTEÓïÒô£¨VoLTE£©ÐÒéÖеÄÎó²î£¬£¬£¬ÆÆËð4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬Ö»¹ÜÒÆ¶¯ÔËÓªÉÌȷʵ֧³ÖÓïÒôºô½Ð¼ÓÃÜ£¬£¬£¬¿ÉÊÇÐí¶àºô½Ð¶¼ÊÇʹÓÃÏàͬµÄ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬£¬£¬»ùÕ¾»áÖØ¸´Ê¹ÓÃÏàͬµÄÁ÷ÃÜÂ룬£¬£¬»òÕßÓÿÉÕ¹ÍûµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£Òò´Ë£¬£¬£¬¹¥»÷Õß¿ÉÒԼͼÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»°£¬£¬£¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»°£¬£¬£¬¾Í¿ÉÒÔ¶Ôͨ»°¾ÙÐнâÃÜ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/
5.¿¨°Í˹»ùÐû²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ
¶íÂÞË¹ÍøÂçÇå¾²¹©Ó¦ÉÌ¿¨°Í˹»ùÐû²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ£¬£¬£¬·¢Ã÷Óë2019ÄêµÚ¶þ¼¾¶ÈÏà±È£¬£¬£¬2020ÄêµÄDDoS¹¥»÷ÊýĿͬ±ÈÔöÌíÁË217£¥¡£¡£¡£¡£¿£¿£¿£¿£¿¨°Í˹»ù³Æ£¬£¬£¬2020Äê¶ÈµÄÇ÷ÊÆÓëÍù³£ÄÏÔ¯±±ÕÞ£¬£¬£¬Í¨³£ÇéÐÎÏÂDDoS¹¥»÷ÔÚÄêÍ·×îÏȵִïá۷壬£¬£¬È»ºóÔÚ´ºÄ©ºÍÏÄÈÕϽµ£¬£¬£¬ÏÖÔÚÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÄ¿ÔöÌíÁË30£¥¡£¡£¡£¡£ÔÚ4ÔÂ9ÈÕ£¬£¬£¬µ¥ÈյĹ¥»÷´ÎÊýµÖ´ïá۷壬£¬£¬Îª½ü300´Î£¬£¬£¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡£¡£¡£¡£¿£¿£¿£¿£¿¨°Í˹»ùDDoS±£»£»£»£»£»¤ÍŶÓÒÔΪ£¬£¬£¬ÕâÖÖÇ÷ÊÆµÄ¸Ä±ä»òÐíÓëCOVID19µÄ±¬·¢Óйء£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-triple-q2/
6.Çå¾²Åàѵ»ú¹¹SANSÔâ´¹ÂÚ¹¥»÷£¬£¬£¬²¿·ÖÔ±¹¤ÐÅϢй¶
ÍøÂçÇå¾²Åàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬µ¼Ö²¿·ÖÔ±¹¤ÐÅϢй¶¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢Ã÷ÆäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÓ¦ÓóÌÐò£¬£¬£¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý²»°üÀ¨ÃÜÂë»òÐÅÓÿ¨µÈ²ÆÎñÐÅÏ¢£¬£¬£¬µ«°üÀ¨µç×ÓÓʼþµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢ÊÂÇéÃû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØµã¡£¡£¡£¡£SANSÌåÏÖ£¬£¬£¬Æä¶Ô´ËÊÂÎñÕýÔÚÊÓ²ìÖУ¬£¬£¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/


¾©¹«Íø°²±¸11010802024551ºÅ