¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬£¬£¬£¬£¬ £¬Ó°ÏìËùÓÐϵͳ°æ±¾£»£»£»£»£»À¶ÑÀÎó²îKNOB£¬£¬£¬£¬£¬ £¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý

Ðû²¼Ê±¼ä 2019-08-15
1¡¢Î¢ÈíÐÞ¸´RDPЧÀÍÖеÄÐÂÈ䳿¼¶Îó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

΢ÈíÔÚ8Ô·ݵÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË94¸öÎó²î£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨4¸öеÄRDPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1181¡¢CVE-2019-1182¡¢CVE-2019-1222¡¢CVE-2019-1226£©¡£¡£¡£¡£¡£¡£ÆäÖÐCVE-2019-1181ºÍCVE-2019-1182Óë5ÔÂ·ÝÆØ³öµÄBlueKeepÎó²î£¨CVE-2019-0708£©ÀàËÆ£¬£¬£¬£¬£¬ £¬¿ÉʵÏÖÈ䳿»¯¹¥»÷£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄϵͳ°æ±¾°üÀ¨win 7 SP1¡¢win 8.1¡¢win 10ÒÔ¼°windows server 2008 R2 SP1¡¢2012¡¢2012 R2¡¢2016¼°2019µÈ¡£¡£¡£¡£¡£¡£XP¡¢windows server 2003¼°2008²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷ÕâЩÎó²îÔÚÒ°ÍⱻʹÓ㬣¬£¬£¬£¬ £¬µ«Î¢ÈíÇ¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üÐÂÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-fixes-critical-windows-10-wormable-remote-desktop-flaws/


2¡¢IntelÐû²¼NUC¹Ì¼þ¸üУ¬£¬£¬£¬£¬ £¬ÐÞ¸´¶à¸öÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


IntelÐû²¼NUC KitµÄ¹Ì¼þ¸üУ¬£¬£¬£¬£¬ £¬ÐÞ¸´¿Éµ¼ÖÂÌáȨ¡¢¾Ü¾øÐ§ÀÍÒÔ¼°ÐÅϢй¶µÄÎó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-11140£¬£¬£¬£¬£¬ £¬CVSSÆÀ·ÖΪ7.5£©ÊÇÓÉÓÚ²»³ä·ÖµÄÑéÖ¤µ¼ÖµÄ£¬£¬£¬£¬£¬ £¬¿É±»¾ßÓÐÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßËùʹÓ㬣¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄ²úÆ·ÐͺŰüÀ¨Intel NUC Kit NUC7i7DNx¡¢NUC7i5DNx¡¢NUC7i3DNxÒÔ¼°Compute Stick STK2MV64CCºÍCompute Card CD1IV128MK¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬Intel»¹ÐÞ¸´ÁË´¦Öóͷ£Æ÷ʶ±ð¹¤¾ßÖеÄÎó²î£¨CVE-2019-11163£¬£¬£¬£¬£¬ £¬CVSSÆÀ·ÖΪ8.2£©ÒÔ¼°RAIDÖÎÀíÈí¼þÖеÄÎó²î£¨CVE-2019-0173£¬£¬£¬£¬£¬ £¬CVSSÆÀ·Ö6.8£©¡£¡£¡£¡£¡£¡£¸ü¶àÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-updates-nuc-firmware-to-patch-high-severity-bug/


3¡¢HTTP/2ÆØ³ö8¸öÐÂÎó²î£¬£¬£¬£¬£¬ £¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±Åû¶HTTP/2ЭÒéʵÏÖÖеÄ8¸öÐÂÎó²î£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏòδÐÞ²¹µÄЧÀÍÆ÷Ìᳫ¾Ü¾øÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£ÕâЩÎó²î£¨CVE-2019-9511~CVE-2019-9518£©ÊÇÓÉNetflixÑо¿Ô±Jonathan LooneyÒÔ¼°GoogleÑо¿Ô±Piotr Sikora·¢Ã÷µÄ£¬£¬£¬£¬£¬ £¬¿ÉÓÃÓÚ´¥·¢Ð§ÀÍÆ÷µÄ×ÊÔ´ºÄ¾¡£¬£¬£¬£¬£¬ £¬µ«²»¿ÉÓÃÓÚÈëÇÖЧÀÍÆ÷¡£¡£¡£¡£¡£¡£Æ¾Ö¤CERTÐû²¼µÄͨ¸æ£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨NGINX¡¢Apache¡¢H2O¡¢Nghttp2¡¢Microsoft(IIS)¡¢Cloudflare¡¢Akamai¡¢Apple(SwiftNIO)¡¢Amazon¡¢Facebook(Proxygen)¡¢Node.jsÒÔ¼°Envoy proxy£¬£¬£¬£¬£¬ £¬´ó´ó¶¼³§É̶¼ÒѾ­Ðû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/http2-dos-vulnerability.html


4¡¢ÐÂÀ¶ÑÀÎó²îKNOB£¬£¬£¬£¬£¬ £¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±Åû¶À¶ÑÀÖеÄÐÂÎó²î£¨CVE-2019-9506£©£¬£¬£¬£¬£¬ £¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß±©Á¦ÆÆ½âÅä¶Ô×°±¸ÔÚ´«ÊäÊý¾ÝʱʹÓõÄÃÜÔ¿²¢¸Ä¶¯Êý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁ˰汾ÔÚ1.0ÖÁ5.1Ö®¼äµÄBluetooth BR/EDR×°±¸¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿É×ÌÈÅÁ½Ì¨Åä¶Ô×°±¸ÉèÖüÓÃÜÅþÁ¬µÄÀú³Ì£¬£¬£¬£¬£¬ £¬ïÔ̭ʹÓõÄÃÜÔ¿µÄ³¤¶È£¬£¬£¬£¬£¬ £¬Ê¹µÃÃÜÔ¿µÄÇå¾²ÐÔÖè¼õ¡£¡£¡£¡£¡£¡£¼«¶ËÇéÐÎÏ£¬£¬£¬£¬£¬ £¬ÃÜÔ¿³¤¶È¿ÉÄܱ»ïÔ̭Ϊ1¸ö×Ö½Ú¡£¡£¡£¡£¡£¡£ÎªÁË»º½â¸ÃÎó²î£¬£¬£¬£¬£¬ £¬À¶ÑÀÊÖÒÕͬÃ˸üÐÂÁËÀ¶ÑÀ½¹µã¹æ·¶£¬£¬£¬£¬£¬ £¬½¨Òé×îСÃÜÔ¿³¤¶ÈΪ7¸ö×Ö½Ú¡£¡£¡£¡£¡£¡£Î¢ÈíÒ²ÔÚÎó²î£¨CVE-2019-9506£©µÄ²¹¶¡Öн«Ä¬ÈÏ×îСÃÜÔ¿³¤¶ÈÉèÖÃΪ7¸ö×Ö½Ú¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/

5¡¢¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬£¬£¬£¬£¬ £¬Ó°ÏìËùÓÐϵͳ°æ±¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¹È¸èÑо¿Ö°Ô±Tavis OrmandyÅû¶WindowsϵͳÖб£´æ³¤´ï20ÄêµÄÒ»¸öδÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows XPÒÔÀ´µÄËùÓÐWindows°æ±¾£¬£¬£¬£¬£¬ £¬°üÀ¨Win 10¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ΢ÈíµÄÎı¾Ð§ÀÍ¿ò¼Ü£¨MSCTF£©ÖУ¬£¬£¬£¬£¬ £¬ÓëMSCTF¿Í»§¶ËºÍЧÀÍÆ÷Ö®¼äµÄͨѶȱÉÙ»á¼û¿ØÖÆ/Éí·ÝÑéÖ¤»úÖÆÓйØ£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÅþÁ¬µ½CTF»á»°¡¢¶ÁдÆäËü´°¿Ú/»á»°µÄÄÚÈÝ¡¢Î±ÔìÏß³ÌID/Àú³ÌID/HWND¡¢Î±×°³ÉCTFЧÀÍÆ÷¡¢¾ÙÐÐɳÏäÌÓÒÝÒÔ¼°ÌáȨ¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹¿ÉÒÔÈÆ¹ýÓû§½Ó¿ÚȨÏÞ¸ôÀ루UIPI£©£¬£¬£¬£¬£¬ £¬»ñÈ¡SYSTEMȨÏÞÒÔ¼°¿ØÖÆUAC¶Ô»°¿òµÈ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËÔÚWin 10ÖлñÈ¡SYSTEMµÄPoCÊÓÆµ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/ctfmon-windows-vulnerabilities.html

6¡¢BioStar 2ÉúÎïʶ±ðÊý¾Ý¿âй¶£¬£¬£¬£¬£¬ £¬²¨¼°Êý°ÙÍòÓû§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


vpnMentorÑо¿Ö°Ô±·¢Ã÷BioStar 2µÄÒ»¸öElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬ £¬µ¼ÖÂÊý°ÙÍòÈ˵ÄÉúÎïʶ±ðÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨23GBÊý¾Ý£¨Áè¼Ý2780ÍòÌõ¼Í¼£©£¬£¬£¬£¬£¬ £¬ÕâЩÊý¾Ý°üÀ¨Ö¸ÎÆ/Ãæ²¿Ê¶±ðÊý¾Ý¡¢Î´¼ÓÃܵÄÓû§ÃûºÍÃÜÂëÒÔ¼°Ô±¹¤µÄÒþ˽ÐÅÏ¢¡£¡£¡£¡£¡£¡£Biostar 2±»¼¯³Éµ½µÚÈý·½ÏµÍ³ÖУ¬£¬£¬£¬£¬ £¬ÀýÈçNedapµÄAEOS»á¼û¿ØÖÆÏµÍ³£¬£¬£¬£¬£¬ £¬¸ÃϵͳÒѱ»83¸ö¹ú¼ÒµÄ5700¶à¸ö×é֯ʹÓ㬣¬£¬£¬£¬ £¬°üÀ¨Ó¢¹ú´ó¶¼»á¾¯Ô±¾Ö¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¹«Ë¾»¹°üÀ¨Ó¢¹ú¼Ò¾Ó×°ÊÎÉÌTile MountainÒÔ¼°Ó¡¶ÈºÍ˹ÀïÀ¼¿¨µÄ½¡Éí·¿Power World GymsµÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/millions-of-records-exposed/