AdobeÇå¾²¸üÐÂÐÞ¸´MagentoÖÐÁ½¸öÖ÷ÒªµÄ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬¿ÉÍêÈ«¿ØÖÆÐ§ÀÍÆ÷
Ðû²¼Ê±¼ä 2020-07-301.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´MagentoÖÐÁ½¸ö´úÂëÖ´ÐÐÎó²î
AdobeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬ÒÔÐÞ¸´Magento CommerceºÍMagento Open SourceÖеÄÁ½¸öÑÏÖØµÄ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£ÆäÖÐÒ»¸öÊÇÓÉ·¾¶±éÀú¹ýʧÒýÆðµÄ£¬£¬£¬±»¸ú×ÙΪCVE-2020-9689£¬£¬£¬ËüÔÊÐí¾ßÓÐÖÎÀíԱȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£ÁíÒ»¸öÊÇ»ùÓÚDOMµÄ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬±»×·×ÙΪCVE-2020-9691£¬£¬£¬ËüÔÊÐíʹδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£±ðµÄ£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËÓÉ¿ÉÊӲ쵽µÄʱ¼ä²îÒýÆðµÄÊðÃûÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-9690£©¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Õë¶Ô¸ÃÎó²îÉÐÎÞÒÑÖªµÄʹÓú͹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/magento-gets-security-updates-for-severe-code-execution-bugs/
2.GoogleÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´ChromeÖеÄ8¸öÎó²î
GoogleÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´ÁËChromeÖеÄ8¸öÎó²î£¬£¬£¬Ó°ÏìÁËWindows¡¢MacºÍLinuxϵͳϵÄChrome°æ±¾84.0.4147.105¡£¡£¡£¡£´Ë´Î¸üÐÂÖÐÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪV8ÖеÄÀàÐÍ»ìÏýÎÊÌ⣨CVE-2020-6537£©¡¢WebViewÖеÄʵÏÖ²»µ±ÎÊÌ⣨CVE-2020-6538£©¡¢SCTPÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6532£©¡¢CSSÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6539£©¡¢SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-6540£©ÒÔ¼°WebUSBÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6541£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/07/28/google-releases-security-updates-chrome
3.Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷
Positive TechnologiesÑо¿Ö°Ô±·¢Ã÷DellÔ¶³Ì»á¼û¿ØÖÆÆ÷£¨iDRAC£©Öб£´æ±éÀúÎó²î£¨CVE-2020-5366£©£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£Í¨¹ýʹÓôËÎó²î£¬£¬£¬¾ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔ·¿ªºÍ¹Ø±Õ²úÆ·£¬£¬£¬»ò¸ü¸ÄÆäÉ¢ÈȺ͵çÔ´ÉèÖᣡ£¡£¡£³ý´ËÖ®Íâ £¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓöÁÈ¡¿ØÖÆÆ÷²Ù×÷ϵͳÖеÄÈκÎÎļþ£¬£¬£¬²¢ÇÒÔÚijЩÇéÐÎÏÂ×ÌÈÅ¿ØÖÆÆ÷µÄ²Ù×÷¡£¡£¡£¡£¸ÃÎó²î»áÓ°Ïì¹Ì¼þ°æ±¾Îª4.20.20.20֮ǰµÄDell EMC iDRAC9¿ØÖÆÆ÷£¬£¬£¬Dell EMCÔÚ¼ì²âµ½¸ÃÎó²îÖ®ºó±ãÐû²¼ÁËÇå¾²¸üУ¬£¬£¬²¢±Þ²ßÓû§¾¡¿ì×°Öᣡ£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/dell-emc-patches-idrac/
4.ÐÂÐÍLinuxºóÃÅDokiʹÓÃDogecoin API£¬£¬£¬Õë¶ÔDockerʵÀý
Intezer Labs·¢Ã÷£¬£¬£¬ÐÂÐÍLinuxºóÃųÌÐòDokiʹÓÃÁËDogecoin API£¬£¬£¬Õë¶ÔDockerʵÀý¡£¡£¡£¡£ºÚ¿Í×éÖ¯Ngrok×Ô2018Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬×î³õÇãÏòÓÚʹÓÃNgrokЧÀÍÍйÜC£¦CЧÀÍÆ÷¡£¡£¡£¡£¶øÔÚ¸Ã×éÖ¯×î½üÒ»´ÎµÄ¹¥»÷ÖУ¬£¬£¬ÆäÕë¶Ôй¶ÁËÖÎÀíAPIµÄDockerʵÀý¡£¡£¡£¡£ºÚ¿Íͨ¹ýʹÓÃDocker APIÔÚÄ¿µÄ¹«Ë¾µÄÔÆ»ù´¡¼Ü¹¹Öа²ÅÅÐÂЧÀÍÆ÷£¬£¬£¬ËæºóÔËÐÐѬȾÁ˼ÓÃÜÍÚ¿ó¶ñÒâÈí¼þDokiµÄAlpine LinuxЧÀÍÆ÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬DokiµÄÄ¿µÄÊÇÔÊÐíºÚ¿Í¿ØÖÆÆäа²ÅŵÄAlpine LinuxЧÀÍÆ÷£¬£¬£¬ÒÔÈ·±£¼ÓÃܲɿó²Ù×÷°´Ô¤ÆÚÔËÐС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-linux-malware-uses-dogecoin-api-to-find-c-c-server-addresses/#ftag=RSSbaffb68
5.¿¨°Í˹»ù·¢Ã÷ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ
¿¨°Í˹»ùÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйء£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê3ÔÂÖÁ5ÔµÄÊÓ²ìÖз¢Ã÷ÁËÀÕË÷Èí¼þVHDµÄÑù±¾£¬£¬£¬ÕâЩÑù±¾Ê¹ÓÃSMB±©Á¦ÆÆ½â·Ö·¢MATA¶ñÒâÈí¼þ¿ò¼Ü¡£¡£¡£¡£VHD¿ÉÒþ²ØµØÅþÁ¬µ½Êܺ¦ÕߵĵçÄÔÇý¶¯Æ÷£¬£¬£¬¼ÓÃÜÎļþ£¬£¬£¬²¢É¾³ýËùÓеÄSystem Volume InformationÎļþ¼Ð£¬£¬£¬´Ó¶øÆÆËðϵͳÖеÄWindows»¹Ô¹¦Ð§¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬Ëü¿ÉÒÔ½ûÓñÜÃâÖ÷ÒªÎļþ±»¸Ä¶¯µÄÀú³Ì£¬£¬£¬ÀýÈçMicrosoft Exchange»òSQL Server¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù·¢Ã÷ManuscryptľÂíҲʹÓÃÁËMATA¿ò¼Ü£¬£¬£¬Òò´ËÅжÏͬÑùʹÓÃÁ˸öñÒâ¿ò¼ÜµÄVHDÓëLazarusÓйء£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-hackers-created-vhd-ransomware-for-enterprise-attacks/
6.IBMÐû²¼±¨¸æ£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª
IBMÓÚ±¾ÖÜÈýÐû²¼ÁËÄê¶ÈÊý¾Ýй¶±¾Ç®±¨¸æ£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª¡£¡£¡£¡£Ö»¹ÜÓë2019ÄêÏà±È£¬£¬£¬Æ½¾ù±¾Ç®Ï½µÁË1.5£¥£¬£¬£¬µ«Ð¹Â¶Áè¼Ý5000ÍòÌõ¼Í¼µÄ³¬´óÐÍ×ß©ÊÂÎñµÄ±¾Ç®¿ÉÄܸߴï3.92ÒÚÃÀÔª£¬£¬£¬¸ßÓÚ2019ÄêµÄ3.88ÒÚÃÀÔª¡£¡£¡£¡£×ÜÌå¶øÑÔ£¬£¬£¬ÕÊ»§Æ¾Ö¤Ð¹Â¶ÒÔ¼°ÔÆÉèÖùýʧµ¼ÖÂÁ˽ü40£¥µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ê¹ÓõÚÈý·½Îó²î£¬£¬£¬ÀýÈç0day£¬£¬£¬Ò²ÊÇÔì³ÉÊý¾Ýй¶µÄÖ÷ÒªÒòËØ£¬£¬£¬Ò»¼ÒÒò´ËÀàÎó²îµ¼ÖÂÊý¾Ýй¶µÄ¹«Ë¾¿ÉÄÜÐèÒªÖ§¸¶¸ß´ï450ÍòÃÀÔªµÄÅâ³¥¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬ÈôÊÇÆóÒµ¹ºÖÃÁËÍøÂç°ü¹Ü£¬£¬£¬Ôòƽ¾ù¿ÉïÔÌ20ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/todays-mega-data-breaches-now-cost-companies-392-million-in-damages-lawsuits/