AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î£»£»£»IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î
Ðû²¼Ê±¼ä 2020-08-131.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î
AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬×ܼÆÐÞ¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑÏÖØµÄÎó²î£¬£¬£¬£¬¿É±»Ê¹ÓþÙÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ýÇå¾²¹¦Ð§£¬£¬£¬£¬»®·ÖΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇø¹ýʧµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?ÊͷźóʹÓõ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/
2.GoogleΪChromeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î
GoogleΪChromeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Á˶à¸ö¿É±»Ê¹ÓÃÒÔ¿ØÖÆÊÜÓ°ÏìϵͳµÄÎó²î£¬£¬£¬£¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪÊͷźóʹÓÃÎó²î£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£©£¬£¬£¬£¬×°ÖóÌÐòÖ´Ðв»µ±£¨CVE-2020-6546£©£¬£¬£¬£¬Ã½ÌåÖеÄÇå¾²UI¹ýʧ£¨CVE-2020-6547£©£¬£¬£¬£¬SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨ CVE-2020-6548£©£¬£¬£¬£¬IndexedDBÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6550£©ºÍWebXRÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6551£©µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome
3.IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î
Intel±¾ÖܶþÐû²¼Í¨Öª£¬£¬£¬£¬ÉùÃ÷ÆäÒÑÐÞ¸´ÁËЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂ×ܼÆÐÞ¸´ÁË20¶à¸öÎó²î£¬£¬£¬£¬Ó°ÏìÁËЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬ÆäÖеĴó²¿Îó²î¿É±»Ê¹ÓþÙÐÐÌáȨ£¬£¬£¬£¬ÉÐÓÐÒ»²¿·Ö¿É±»Ê¹ÓÃͨ¹ýÍâµØ»á¼ûÌᳫDoS¹¥»÷¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²î±»×·×ÙΪCVE-2020-8708£¬£¬£¬£¬ÊÇÒ»¸ö¹ýʧµÄÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓ㬣¬£¬£¬Í¨¹ýÏàÁÚ»á¼ûÀ´ÌáȨ£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁË1.59°æÖ®Ç°µÄЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards
4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°
µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄÑо¿Ö°Ô±·¢Ã÷ReVoLTE¹¥»÷¿ÉʹÓÃLTEÓïÒô£¨VoLTE£©ÐÒéÖеÄÎó²î£¬£¬£¬£¬ÆÆËð4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Ö»¹ÜÒÆ¶¯ÔËÓªÉÌȷʵ֧³ÖÓïÒôºô½Ð¼ÓÃÜ£¬£¬£¬£¬¿ÉÊÇÐí¶àºô½Ð¶¼ÊÇʹÓÃÏàͬµÄ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬£¬£¬£¬»ùÕ¾»áÖØ¸´Ê¹ÓÃÏàͬµÄÁ÷ÃÜÂ룬£¬£¬£¬»òÕßÓÿÉÕ¹ÍûµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬¹¥»÷Õß¿ÉÒԼͼÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»°£¬£¬£¬£¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»°£¬£¬£¬£¬¾Í¿ÉÒÔ¶Ôͨ»°¾ÙÐнâÃÜ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/
5.¿¨°Í˹»ùÐû²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ
¶íÂÞË¹ÍøÂçÇå¾²¹©Ó¦ÉÌ¿¨°Í˹»ùÐû²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ£¬£¬£¬£¬·¢Ã÷Óë2019ÄêµÚ¶þ¼¾¶ÈÏà±È£¬£¬£¬£¬2020ÄêµÄDDoS¹¥»÷ÊýĿͬ±ÈÔöÌíÁË217£¥¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿¨°Í˹»ù³Æ£¬£¬£¬£¬2020Äê¶ÈµÄÇ÷ÊÆÓëÍù³£ÄÏÔ¯±±ÕÞ£¬£¬£¬£¬Í¨³£ÇéÐÎÏÂDDoS¹¥»÷ÔÚÄêÍ·×îÏȵִïá۷壬£¬£¬£¬È»ºóÔÚ´ºÄ©ºÍÏÄÈÕϽµ£¬£¬£¬£¬ÏÖÔÚÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÄ¿ÔöÌíÁË30£¥¡£¡£¡£¡£¡£¡£ÔÚ4ÔÂ9ÈÕ£¬£¬£¬£¬µ¥ÈյĹ¥»÷´ÎÊýµÖ´ïá۷壬£¬£¬£¬Îª½ü300´Î£¬£¬£¬£¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿¨°Í˹»ùDDoS±£»£»£»¤ÍŶÓÒÔΪ£¬£¬£¬£¬ÕâÖÖÇ÷ÊÆµÄ¸Ä±ä»òÐíÓëCOVID19µÄ±¬·¢Óйء£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-triple-q2/
6.Çå¾²Åàѵ»ú¹¹SANSÔâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬²¿·ÖÔ±¹¤ÐÅϢй¶
ÍøÂçÇå¾²Åàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬µ¼Ö²¿·ÖÔ±¹¤ÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢Ã÷ÆäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÓ¦ÓóÌÐò£¬£¬£¬£¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý²»°üÀ¨ÃÜÂë»òÐÅÓÿ¨µÈ²ÆÎñÐÅÏ¢£¬£¬£¬£¬µ«°üÀ¨µç×ÓÓʼþµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢ÊÂÇéÃû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØµã¡£¡£¡£¡£¡£¡£SANSÌåÏÖ£¬£¬£¬£¬Æä¶Ô´ËÊÂÎñÕýÔÚÊÓ²ìÖУ¬£¬£¬£¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/