Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵصãÀ¸ÓÕÆ­Îó²î£»£»£»£»£»£»Oracle 10ÔÂÇå¾²¸üÐÂÐÞ¸´402¸öÎó²î

Ðû²¼Ê±¼ä 2020-10-22

1.Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵصãÀ¸ÓÕÆ­Îó²î


1.jpg


ÍøÂçÇå¾²¹«Ë¾Rapid7Åû¶ÁË10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵصãÀ¸ÓÕÆ­Îó²î¡£¡£¡£´Ë´ÎÅû¶µÄÎó²î»®·ÖΪUCä¯ÀÀÆ÷ÖеÄCVE-2020-7363ºÍCVE-2020-7364¡¢Opera MiniºÍOpera TouchÖеÄCVE TBD-Opera¡¢Yandexä¯ÀÀÆ÷ÖеÄCVE-2020-7369¡¢Boltä¯ÀÀÆ÷ÖеÄCVE-2020-7370¡¢RITSä¯ÀÀÆ÷ÖеÄCVE-2020-7371ºÍApple SafariÖеÄCVE-2020-9987¡£¡£¡£¸ÃÎÊÌâÓÚ½ñÄêÄêÍ·±»·¢Ã÷ £¬£¬£¬ £¬²¢ÓÚ8Ô±¨¸æ¸øÖÆÔìÉÌ £¬£¬£¬ £¬ÏÖÔÚ´óÐͳ§ÉÌÁ¬Ã¦¾ÙÐÐÁËÐÞ¸´ £¬£¬£¬ £¬¶øÐ¡Ðͳ§ÉÌÈÔÎÞÈËÆÊÎö¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/seven-mobile-browsers-vulnerable-to-address-bar-spoofing-attacks/


2.Group-IB³Æ £¬£¬£¬ £¬¶íÂÞ˹¾ü¹¤ÆóÒµÔø¶à´ÎÔâµ½³¯Ïʺڿ͹¥»÷


2.jpg


¾Ý±¨µÀ £¬£¬£¬ £¬³¯ÏʺڿÍ×éÖ¯KimsukyÒѶԶíÂÞ˹¾ü¹¤ÆóÒµ¾ÙÐÐÁ˶à´Î¹¥»÷ £¬£¬£¬ £¬ÒÔ»ñÈ¡¶íÂÞ˹µÄ¾üʺÍÊÖÒÕÉñÃØ¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²¹«Ë¾Group-IBÊý¾Ý £¬£¬£¬ £¬³¯ÏʺڿÍÓÚ2020Äê´º¼¾¶Ô¶íÂÞ˹¹ú·À»ú¹¹¾ÙÐÐÁ˹¥»÷ £¬£¬£¬ £¬ÊÔͼ´ÓÆäº½¿Õº½Ìì¡¢¹ú·À»ú¹¹ÒÔ¼°Éú²ú»ðÅÚ×°±¸µÄ¹«Ë¾»ñÈ¡Êý¾Ý¡£¡£¡£µçÐÅÆµµÀSecAtor±¨¸æ³Æ £¬£¬£¬ £¬RostecÒ²ÔøÔâµ½¹ý¹¥»÷¡£¡£¡£±ðµÄ £¬£¬£¬ £¬RostecµÄ×Ó¹«Ë¾RT-Inform»¹Ö¸³ö £¬£¬£¬ £¬´Ó4Ôµ½9ÔÂÕë¶Ô¹úÓÐÆóÒµµÄÍøÂç¹¥»÷ÊýÄ¿ÓÐËùÔöÌí¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/10/russian-military-companies-were.html


3.ÃÉÌØÀû¶û¹«½»ÏµÍ³ÔâRansomExx¹¥»÷ £¬£¬£¬ £¬ÔÚÏßϵͳÊܵ½Ó°Ïì


3.jpg


10ÔÂ19ÈÕ £¬£¬£¬ £¬ÃÉÌØÀû¶ûµÄSTM¹«¹²½»Í¨ÏµÍ³Ôâµ½RansomExxÀÕË÷Èí¼þ¹¥ £¬£¬£¬ £¬ÆäITϵͳ¡¢ÍøÕ¾ºÍ¿Í»§Ö§³ÖÊܵ½Ó°Ïì¡£¡£¡£ËäÈ»´Ë´ÎÖÐÖ¹²¢Ã»ÓÐÓ°Ïìµ½¹«¹²Æû³µ»òµØÌúϵͳµÄÔËÐÐ £¬£¬£¬ £¬µ«ÓÉÓÚSTMʹÓõÄÊÇÔÚÏßϵͳ £¬£¬£¬ £¬ÒÀÀµSTM°¤¼Ò°¤»§¸¨ÖúЧÀ͵IJм²ÈËÊܵ½ÁËÓ°Ïì¡£¡£¡£ÏÖÔÚSTMÍøÕ¾ÈÔÈ»´¦ÓÚ̱»¾×´Ì¬ £¬£¬£¬ £¬»á¼ûÕß»á±»ÖØ¶¨Ïòµ½Ðû²¼ÁËÓйع«¹²½»Í¨Ð§Àͺ͹¥»÷ÐÅÏ¢µÄwww.lastm.infoÍøÕ¾¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/montreals-stm-public-transport-system-hit-by-ransomware-attack/


4.OracleÐû²¼10Ô²¹¶¡¸üР£¬£¬£¬ £¬ÐÞ¸´¶à¸ö²úÆ·ÖÐ402¸öÎó²î


4.jpg


OracleÐû²¼2020Äê10ÔÂÇå¾²¸üР£¬£¬£¬ £¬ÐÞ¸´Á˶à¿î²úÆ·ÖÐ402¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪ´óÊý¾ÝÊôÐÔͼÆÊÎöÖеÄÎó²î£¨CVE-2019-0192£©¡¢Oracle RESTÊý¾ÝЧÀÍÖÐÎó²î£¨CVE-2017-7658£©¡¢Oracle TimesTenÄÚ´æÊý¾Ý¿âÖÐÎó²î£¨CVE-2018-11058ºÍCVE-2017-5645£©¡¢OracleͨѶӦÓóÌÐòÖÐÎó²î£¨CVE-2019-10173¡¢CVE-2020-10683ºÍCVE-2019-10173£©ºÍOracleͨѶÖÐÎó²î£¨CVE-2020-10683¡¢CVE-2020-11973¡¢CVE-2020-2555¡¢ºÍCVE-2020-10683£©µÈÎó²î¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.oracle.com/security-alerts/cpuoct2020.html


5.AdobeÐû²¼Çå¾²¸üР£¬£¬£¬ £¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ20¸öÎó²î


5.jpg


AdobeÐû²¼Çå¾²¸üР£¬£¬£¬ £¬×ܼÆÐÞ¸´ÁË20¸öÎó²î £¬£¬£¬ £¬ÆäÖаüÀ¨18¸ö¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î¡¢1¸öÌáȨÎó²îºÍ1¸öXSSÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄÈí¼þ²úÆ·°üÀ¨Adobe Creative Cloud×ÀÃæÓ¦ÓóÌÐò¡¢Adobe InDesign¡¢Adobe Media Encoder¡¢Adobe Premiere Pro¡¢Adobe Photoshop¡¢Adobe After Effects¡¢Adobe Animate¡¢Adobe Dreamweaver¡¢Adobe IllustratorºÍMarketo¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-18-critical-bugs-affecting-its-windows-macos-apps/


6.Nefilimй¶LuxotticaÈËʺͲÆÎñ²¿·ÖÃô¸ÐÊý¾Ý


6.jpg


ÀÕË÷Èí¼þ×éÖ¯Nefilimй¶Òâ´óÀûÑÛ¾µ¹«Ë¾LuxotticaÈËʺͲÆÎñ²¿·ÖµÄÃô¸ÐÊý¾Ý¡£¡£¡£Luxottica Group SpAÊÇÒ»¼ÒÈ«Çò×î´óµÄÑÛ¾µ¹«Ë¾ £¬£¬£¬ £¬ÓÚ9ÔÂ18ÈÕÔâµ½ÁËÍøÂç¹¥»÷ £¬£¬£¬ £¬µ¼Ö¸ù«Ë¾µÄÄ³Ð©ÍøÕ¾Ì±»¾¡£¡£¡£Çå¾²¹«Ë¾Bad packetÍÆ²âÊÇÓÉÓڸù«Ë¾Ê¹ÓÃÁËCitrixµÄADX¿ØÖÆÆ÷×°±¸Ê¹ÆäÒ×Êܵ½CVE-2019-19781Îó²î¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±Odysseus·¢Ã÷Nefilim¹ûÕæÁË´ó×ÚÓë¸Ã¹«Ë¾ÈËʺͲÆÎñ²¿·ÖÓйصÄÎļþ £¬£¬£¬ £¬°üÀ¨ÕÐÆ¸Á÷³Ì¡¢×¨Òµ¼òÀú¡¢¼¯ÍÅÈËÁ¦×ÊÔ´²¿·ÖÄÚ²¿½á¹¹¡¢²ÆÎñÔ¤Ëã¡¢Êг¡Õ¹ÍûÆÊÎöºÍÆäËûÃô¸ÐÊý¾Ý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/109778/data-breach/luxottica-data-leak-ransomware.html