AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369

Ðû²¼Ê±¼ä 2023-09-14

1¡¢AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369


9ÔÂ12ÈÕ£¬£¬£¬AdobeÒÑÐû²¼±¾ÔµÄÖܶþ²¹¶¡£¬£¬£¬ÐÞ¸´ÁËAcrobatºÍReaderÖÐÒѱ»Ê¹ÓõÄÎó²î£¨CVE-2023-26369£©¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎó²î£¬£¬£¬ÀÖ³ÉʹÓÿÉÔÚÄ¿µÄÅÌËã»úÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶Óйع¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬µ«½¨ÒéÓû§×îÐÒ¿÷72СʱÄÚ×°ÖøüС£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Adobe»¹ÐÞ¸´ÁËConnectÖеÄXSSÎó²î£¨CVE-2023-29305ºÍCVE-2023-29306£©ºÍExperience ManagerÖеÄXSSÎó²î£¨CVE-2023-38214ºÍCVE-2023-38215£©¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html


2¡¢Microsoft TeamsЧÀÍÖÐÖ¹Ö÷ÒªÓ°Ïì±±ÃÀµØÇøµÄÓû§


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬MicrosoftÕýÔÚÊӲ쵼Ö¿ͻ§ÎÞ·¨Ê¹ÓÃMicrosoft TeamsÊÕ·¢ÐÂÎŵÄÖÐÖ¹ÎÊÌâ¡£¡£¡£¡£¡£¡£´Ó8µã×óÓÒ×îÏÈ£¬£¬£¬²¿·ÖÓû§·´Ó¦ÔÚÅþÁ¬TeamsЧÀÍÆ÷»òWebÓ¦ÓÃʱÓöµ½ÁËÎÊÌâ¡£¡£¡£¡£¡£¡£Î¢ÈíÏÖÔÚÒѾ­È·¶¨£¬£¬£¬¸ÃÎÊÌâ½ö±£´æÓÚͨ¹ý±±ÃÀÊÜÓ°Ïì»ù´¡ÉèÊ©ÌṩЧÀ͵IJ¿·ÖÓû§£¬£¬£¬ËûÃÇÕýÔÚ½«±»Ó°ÏìµÄЧÀÍÁ÷Á¿Â·Óɵ½ÎȽ¡µÄ»ù´¡ÉèÊ©£¬£¬£¬ÒÔ¼õ»ºÓ°Ïì¡£¡£¡£¡£¡£¡£×èÖ¹ÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ13ÈÕ13:25£¬£¬£¬Î¢ÈíÌåÏÖTeamsÐÂÎÅת´ïÎÊÌâÏÖÒѽâ¾ö¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-down-ongoing-outage-behind-message-failures-delays/


3¡¢GitHubÖÐÎó²î¿Éµ¼ÖÂ4ǧ¶à´æ´¢¿âÔâµ½Repojacking¹¥»÷


CheckmarxÔÚ9ÔÂ12ÈÕ³ÆÆä·¢Ã÷ÁËGitHubÖеÄÒ»¸öÐÂÎó²î£¬£¬£¬¿ÉÄܵ¼ÖÂ4000¶à¸ö´æ´¢¿âÔâµ½Repojacking¹¥»÷¡£¡£¡£¡£¡£¡£ÔÚRepoJacking¹¥»÷ÖУ¬£¬£¬¹¥»÷Õß¿ÉÔÚÕýµ±½¨ÉèÕ߸ü¸ÄÓû§ÃûºóʹÓô洢¿âµÄ¾ÉÓû§Ãû£¬£¬£¬È»ºóÐû²¼Í¬ÃûµÄ¶ñÒâ´æ´¢¿âÒÔÓÕÆ­Óû§ÏÂÔØÆäÄÚÈÝ¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÐ®ÖÆGo¡¢PHPºÍSwiftµÈÓïÑÔµÄ4000¶à¸ö´úÂë°üÒÔ¼°GitHub»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ3ÔÂ1ÈÕÅû¶Á˸ÃÎó²î£¬£¬£¬´úÂëÍÐ¹ÜÆ½Ì¨ÒÑÓÚ9ÔÂ1ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£


https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/


4¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæAirbusÊýǧ¼Ò¹©Ó¦É̵ÄÊý¾Ý


¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬º½¿Õ¹«Ë¾AirbusÕýÔÚÊÓ²ìÉæ¼°3200¼Ò¹©Ó¦É̵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£ÃûΪUSDoDµÄºÚ¿ÍÓÚ±¾ÖÜÒ»ÔÚBreachForumsÉÏ·¢Ìû³Æ£¬£¬£¬ËûÃÇÈëÇÖÁËÒ»ÃûÍÁ¶úÆäº½¿Õ¹«Ë¾Ô±¹¤µÄÕË»§²¢»ñµÃÁËAirbusÃÅ»§ÍøÕ¾µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£»£»£» £»£»£»£»¹Í¸Â¶ÓµÓÐÊýǧ¼ÒAirbus¹©Ó¦É̵ÄÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£¡£¡£USDoD×Ô³ÆÊÇRansomedµÄÕýʽ³ÉÔ±£¬£¬£¬²¢ÌåÏÖLockheed MartinºÍRaytheon¿ÉÄÜ»áÊÇÏÂÒ»¸öûĿµÄ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸ÃÍÅ»ïÔÚÈ¥Äê12Ô·ݻ¹Ôø³öÊÛÁËFBI¹²ÏíϵͳInfraGardµÄÊý¾Ý¿â¡£¡£¡£¡£¡£¡£


https://therecord.media/airbus-data-leak-suppliers-breachedforums


5¡¢Symantec·¢Ã÷RedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯


9ÔÂ12ÈÕ£¬£¬£¬SymantecÅû¶ÁËRedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯×îÔçµÄ¼£ÏóÓÚ2ÔÂ23ÈÕ±»¼Í¼£¬£¬£¬ÆäʱShadowPadÔÚһ̨ÅÌËã»úÉÏÖ´ÐУ¬£¬£¬ºóÓÚ5ÔÂ17ÈÕÔٴα»Ö´ÐУ¬£¬£¬×îºóµÄ»î¶¯¼£Ïó·ºÆðÓÚ8ÔÂ3ÈÕ¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓõŤ¾ß°üÀ¨£ºÄ£¿ £¿£¿£¿ £¿é»¯RAT ShadowPad£¬£¬£¬Ëüαװ³ÉVMwareÎļþ£¬£¬£¬Ö§³ÖÊý¾Ýй¶¡¢»÷¼ü¼Í¼¡¢ÎļþËÑË÷ÒÔ¼°Ô¶³ÌÏÂÁîÖ´ÐеÈ£»£»£» £»£»£»£»Packerloader£¬£¬£¬ÓÃÓÚÔÚÄܹ»ÈƹýAV¼ì²âµÄAES¼ÓÃÜÎļþÖмÓÔØºÍÖ´ÐÐshellcode£»£»£» £»£»£»£»ÒÔ¼°¼üÅ̼ͼ³ÌÐò£¬£¬£¬ÔÚÄ¿µÄϵͳÉϵÄÈÕÖ¾ÎļþÖв¶»ñ»÷¼ü¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬´Ë´Î¹¥»÷ÓëAPT41£¨ÓÖÃûWinnti£©µÄ»î¶¯ÓÐÖØµþ¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/critical-infrastructure-attacks


6¡¢KasperskyÅû¶Free Download Manager¹©Ó¦Á´¹¥»÷


9ÔÂ12ÈÕ£¬£¬£¬Kaspersky±¨¸æ³ÆFree Download Manager¹©Ó¦Á´¹¥»÷½«LinuxÓû§Öض¨Ïòµ½×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¶ñÒâDebianÈí¼þ°ü´æ´¢¿â¡£¡£¡£¡£¡£¡£KasperskyÔÚÊÓ²ì¿ÉÒÉÓòʱ·¢Ã÷Á˸û£¬£¬£¬ÏÖÔÚÒѾ­¾ÙÐÐÁËÈýÄê¶à¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâDebianÈí¼þ°üÓÃÓÚ×°ÖûùÓÚDebianµÄLinux¿¯Ðаæ£¬£¬£¬Ëü»á·Ö·¢Ò»¸öBashÐÅÏ¢ÇÔÈ¡¾ç±¾ºÍÒ»¸ö´ÓC2½¨Éè·´ÏòshellµÄcrondºóÃÅ¡£¡£¡£¡£¡£¡£crond×é¼þÔÚϵͳÉϽ¨ÉèÒ»¸öеÄcronʹÃü£¬£¬£¬¿ÉÔÚϵͳÆô¶¯Ê±ÔËÐÐÇÔÈ¡¾ç±¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÑÏòÈí¼þ¹©Ó¦ÉÌת´ïÁË´ËÊ£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´£¬£¬£¬Òò´ËÈ·ÇеÄÈëÇÖ·½·¨ÈÔ²»ÇåÎú¡£¡£¡£¡£¡£¡£


https://securelist.com/backdoored-free-download-manager-linux-malware/110465/