Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐŵÀ¹¥»÷£»£»£»£»£»£»Î¢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£»£»£»£»£»£»ÂÞ¿ËΤ¶û¼°½­É­×Ô¿ØÐÞ¸´¶à¸öÎó²î

Ðû²¼Ê±¼ä 2020-03-12

1.Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐŵÀ¹¥»÷


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔIntel CPUµÄÐÂLVI£¨¸ºÔØÖµ×¢È룩¹¥»÷£¬£¬£¬£¬¸Ã¹¥»÷ÔÊÐí¹¥»÷Õ߸ü¸Ä³ÌÐòµÄÕý³£Ö´ÐкÍÇÔÈ¡SGXÇå¾²ÇøÓòÄÚµÄÃÜÂë¡¢Ö¤Êé˽ԿµÈÃô¸ÐÊý¾Ý¡£¡£¸ÃÎÊÌâ±»×·×ÙΪCVE-2020-0551£¬£¬£¬£¬ÓÉÒ»×éÑо¿ÍŶÓÔÚ2019Äê4ÔÂ4ÈÕ±¨¸æ¸øIntel£¬£¬£¬£¬BitdefenderÑо¿Ö°Ô±»¹×ÔÁ¦·¢Ã÷ÁËLVIÀ๥»÷µÄÒ»ÖÖ±äÌ壨LVI-LFB£©£¬£¬£¬£¬²¢ÓÚ2020Äê2Ô±¨¸æ¸øÁËIntel¡£¡£Ö»¹Ü¸Ã¹¥»÷½ö±»ÊÓΪÀíÂÛÉϵÄÍþв£¬£¬£¬£¬µ«IntelÒÑÐû²¼ÁËÏìÓ¦µÄ¹Ì¼þ²¹¶¡ÒÔ¼õÇá¶ÔÄ¿½ñCPUµÄ¹¥»÷£¬£¬£¬£¬²¢½«ÔÚÏÂÒ»´ú£¨Ó²¼þÉè¼Æ£©Öа²ÅŸÃÐÞ¸´³ÌÐò¡£¡£´ÓÊÖÒÕÉϽ²£¬£¬£¬£¬LVIÊÇMeltdown¹¥»÷µÄ·´Ïò£¬£¬£¬£¬ËüÔÊÐí¹¥»÷Õß½«´úÂë×¢ÈëCPUÄÚ²¢Ê¹Æä×÷Ϊ¹ý¶ÉµÄ¡°ÔÝʱ¡±²Ù×÷Ö´ÐУ¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß»ñµÃ¸üºÃµÄ¿ØÖÆÈ¨¡£¡£ÔÚÏÖʵ²âÊÔÖÐÖ»ÓÐÓ¢ÌØ¶ûCPU±»È·ÈÏÊÜеÄLVI¹¥»÷Ó°Ï죬£¬£¬£¬µ«Ñо¿Ö°Ô±²¢²»É¨³ýAMDºÍARMÒ²¿ÉÄÜÊܵ½Ó°Ïì¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-lvi-intel-cpu-data-theft-vulnerability-requires-hardware-fix/


2.΢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£¬£¬£¬£¬Ñ¬È¾È«Çò900Íǫ̀µçÄÔ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


΢ÈíÐû²¼µ·»ÙÀ¬»øÓʼþ½©Ê¬ÍøÂçNecurs£¬£¬£¬£¬NecursÊÇÄ¿½ñÈ«Çò×î´óµÄ½©Ê¬ÍøÂçÖ®Ò»£¬£¬£¬£¬¾Ý³ÆËüÔÚÈ«ÇòѬȾÁËÁè¼Ý900Íǫ̀ÅÌËã»ú¡£¡£3ÔÂ5ÈÕÃÀ¹úŦԼ¶«ÇøµØÒªÁìÔºÐû²¼ÁËÒ»ÏîÏÂÁ£¬£¬£¬ÔÊÐí΢Èí½ÓÊÜNecursÔÚÃÀ¹úµÄ»ù´¡ÉèÊ©¡£¡£±ðµÄ£¬£¬£¬£¬Î¢Èí̫ͨ¹ýÎöºÍÆÆ½âNecursʹÓõÄÓòÃûÌìÉúËã·¨£¨DGA£©£¬£¬£¬£¬Äܹ»×¼È·µØÕ¹ÍûÔÚδÀ´25¸öÔÂÄÚNecurs½«½¨Éè²¢ÓÃ×÷»ù´¡ÉèÊ©µÄÁè¼Ý600Íò¸öÓòÃû¡£¡£Î¢Èí½«ÕâЩÓòÃû±¨¸æ¸øÁËÌìϸ÷¹úµÄ×¢²áÖÎÀí»ú¹¹£¬£¬£¬£¬´Ó¶ø×èÖ¹ÕâЩÓòÃû±»×¢²áºÍ³ÉΪNecurs»ù´¡¼Ü¹¹µÄÒ»²¿·Ö¡£¡£Í¨¹ý¿ØÖÆÆäÏÖÓлù´¡ÉèÊ©ºÍÒÖÖÆÆäδÀ´×¢²áÐÂÓòÃûµÄÄÜÁ¦£¬£¬£¬£¬Î¢ÈíÀֳɵ·»ÙNecurs¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-takes-control-of-necurs-us-based-infrastructure/


3.΢ÈíÐû²¼3ÔÂWindowsÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´115¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


΢ÈíÐû²¼µÄ3ÔÂWindowsÇå¾²¸üÐÂÐÞ¸´ÁË115¸öÎó²î£¬£¬£¬£¬ÕâÊǸù«Ë¾ÀúÊ·ÉÏ×î´óµÄÒ»¸öÖܶþ²¹¶¡¸üС£¡£ÆäÖÐWindows LNK¿ì½ÝÎļþÖеÄÎó²î£¨CVE-2020-0684£©ÐèÒª¹Ø×¢£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼Ö¹¥»÷ÕßÒÔÓû§È¨ÏÞÔ¶³ÌÖ´ÐдúÂë¡£¡£¹¥»÷Õß¿ÉÒÔÏòÓû§Ìṩ°üÀ¨¶ñÒâ.LNKÎļþºÍÏà¹Ø¶ñÒâ¶þ½øÖÆÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷»òÔ¶³Ì¹²Ïí£¬£¬£¬£¬µ±Óû§ÔÚWindows×ÊÔ´ÖÎÀíÆ÷»òÈÎºÎÆäËûÆÊÎö.LNKÎļþµÄÓ¦ÓóÌÐòÖз­¿ª´ËÇý¶¯Æ÷£¨»òÔ¶³Ì¹²Ïí£©Ê±£¬£¬£¬£¬¶ñÒâ¶þ½øÖÆÎļþ½«ÔÚÄ¿µÄϵͳÉÏÖ´Ðй¥»÷ÕߵĴúÂë¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities/


4.ÂÞ¿ËΤ¶û¼°½­É­×Ô¿ØÐÞ¸´ICS×°±¸ÖеĶà¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÂÞ¿ËΤ¶û×Ô¶¯»¯£¨Rockwell Automation£©ºÍ½­É­×Ô¿Ø£¨Johnson Controls£©ÐÞ¸´ÆäICS×°±¸ÖеĶà¸öÎó²î¡£¡£ÂÞ¿ËΤ¶û×Ô¶¯»¯ÐÞ¸´µÄ¶à¸öÒªº¦Îó²îÓ°ÏìÁËMicroLogix 1400¿ØÖÆÆ÷¡¢MicroLogix 1100¿ØÖÆÆ÷ºÍRSLogix 500Èí¼þ£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨Ó²±àÂëµÄ¼ÓÃÜÃÜÔ¿£¨CVE-2020-6990£©¡¢ÈõÃÜÂë±£»£»£»£»£»£»¤Ëã·¨£¨CVE-2020-6984£©¡¢Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2020-6988£©ÒÔ¼°Ã÷ÎÄ´æ´¢Ãô¸ÐÐÅÏ¢£¨CVE-2020-6980£©¡£¡£½­É­×Ô¿ØÔòÐÞ¸´ÁËKantech EntraPass²úÆ·ÖеIJ»×¼È·ÊäÈëÑéÖ¤Îó²î£¨CVE-2019-7589£©¡£¡£ÕâЩÎó²îµÄCVSS v3ÆÀ·Ö¾ùΪ9.8·Ö£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÓ¦Óøüлò»º½â²½·¥¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/critical-bugs-in-rockwell-johnson-controls-ics-gear/153602/


5.IntelÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄ27¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ó¢ÌØ¶û±¾ÖÜÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Í¼ÐÎÇý¶¯³ÌÐò¡¢FPGA¡¢´¦Öóͷ£Æ÷NUC¡¢BlueZµÈ²úÆ·ÖеÄ27¸öÎó²î¡£¡£IntelÔÚͼÐÎÇý¶¯³ÌÐòÖÐÐÞ¸´ÁË17¸öÎó²î£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇ»º³åÇøÒç³öÎó²î£¨CVE-2020-0504£©£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ8.4¡£¡£IntelÔÚFPGA PAC N3000ÖÐÐÞ¸´ÁËÁ½¸öÎó²î£¬£¬£¬£¬°üÀ¨ÌØÈ¨Éý¼¶Îó²î£¨CVE-2019-14626£©ºÍ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2019-14625£©£¬£¬£¬£¬ÕâÁ½¸öÎó²î¾ùΪÖÐΣÎó²î¡£¡£±ðµÄ£¬£¬£¬£¬Intel»¹ÎªNUC¹Ì¼þÐÞ¸´Á˲»Êʵ±µÄ»º³åÇøÏÞÖÆºÍÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÕâÁ½¸öÎó²î»®·Ö±»¸ú×ÙΪCVE-2020-0530ºÍCVE-2020-0526£¬£¬£¬£¬ÆäCVSSÆÀ·Ö»®·ÖΪ7.8ºÍ7.7£¬£¬£¬£¬¶¼¿ÉÄܵ¼ÖÂÌØÈ¨Éý¼¶¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/intel-patches-27-vulnerabilities-across-product-portfolio


6.WhisperÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬Ð¹Â¶Ô¼9ÒÚÌõ¼Í¼


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¾Ý¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨µÀ£¬£¬£¬£¬ÄäÃûÉñÃØ¹²ÏíÓ¦ÓÃWhisperÓÉÓÚÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬µ¼ÖÂÔ¼9ÒÚÌõ¼Í¼й¶¡£¡£Ñо¿Ö°Ô±Matthew PorterºÍDan Ehrlich·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬Êý¾Ý¿âÖд洢µÄÊý¾ÝÊÇ´Ó2012Äê¸ÃAPPÐû²¼Ò»Ö±µ½ÏÖÔÚµÄËùÓÐÊý¾Ý¡£¡£Ö»¹Ü¼Í¼Öв»°üÀ¨Óû§Ãû£¬£¬£¬£¬µ«ÆäÖаüÀ¨êdzơ¢ÄêËê¡¢ÖÖ×å¡¢ÐԱ𡢼ÒÏç¡¢ÕûÌå³ÉÔ±¹ØÏµÒÔ¼°Óë·¢ÌûÏà¹ØµÄλÖÃÊý¾Ý¡£¡£ÕâЩλÖÃÐÅÏ¢°üÀ¨À´×ÔÓû§×î½ü·¢ÌûµÄ×ø±ê£¬£¬£¬£¬ÀýÈçÌØ¶¨µÄѧУ¡¢ÊÂÇ鳡ºÏºÍסÃñÇø¡£¡£WhisperÔÚ½Óµ½Í¨Öªºó×÷·ÏÁ˸ÃÊý¾Ý¿âµÄ»á¼ûȨÏÞ£¬£¬£¬£¬²¢Í¨ÖªÁËÁª°îÖ´·¨»ú¹¹¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private/