AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î£»£»IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î
Ðû²¼Ê±¼ä 2020-08-131.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î
AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁËAdobe Acrobat¡¢ReaderºÍLightroomµÄÖеÄ×ܹ²26¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐÓÐ11¸öÊǽÏΪÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓþÙÐÐÔ¶³Ì´úÂëÖ´ÐлòÈÆ¹ýÇå¾²¹¦Ð§£¬£¬£¬£¬£¬£¬»®·ÖΪAdobe AcrobatºÍReaderÖеÄÔ½½çдµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9693ºÍCVE-2020-9694£©¡¢?Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2020-9696ºÍCVE-2020-9712£©¡¢»º³åÇø¹ýʧµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9698¡¢CVE-2020-9699¡¢CVE-2020-9700¡¢CVE-2020-9701ºÍCVE-2020-9704£©ºÍ?ÊͷźóʹÓõ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9715ºÍCVE-2020-9722£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/
2.GoogleΪChromeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î
GoogleΪChromeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Á˶à¸ö¿É±»Ê¹ÓÃÒÔ¿ØÖÆÊÜÓ°ÏìϵͳµÄÎó²î£¬£¬£¬£¬£¬£¬Õë¶ÔWindows¡¢MacºÍLinux°æ±¾¡£¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪÊͷźóʹÓÃÎó²î£¨CVE-2020-6542¡¢CVE-2020-6543¡¢CVE-2020-6544ºÍCVE-2020-6545£©£¬£¬£¬£¬£¬£¬×°ÖóÌÐòÖ´Ðв»µ±£¨CVE-2020-6546£©£¬£¬£¬£¬£¬£¬Ã½ÌåÖеÄÇå¾²UI¹ýʧ£¨CVE-2020-6547£©£¬£¬£¬£¬£¬£¬SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨ CVE-2020-6548£©£¬£¬£¬£¬£¬£¬IndexedDBÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6550£©ºÍWebXRÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-6551£©µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/08/11/google-releases-security-updates-chrome
3.IntelÇå¾²¸üÐÂÐÞ¸´ÆäЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î
Intel±¾ÖܶþÐû²¼Í¨Öª£¬£¬£¬£¬£¬£¬ÉùÃ÷ÆäÒÑÐÞ¸´ÁËЧÀÍÆ÷Ö÷°åÖеĶà¸öÌáȨÎó²î¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂ×ܼÆÐÞ¸´ÁË20¶à¸öÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÁËЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬ÆäÖеĴó²¿Îó²î¿É±»Ê¹ÓþÙÐÐÌáȨ£¬£¬£¬£¬£¬£¬ÉÐÓÐÒ»²¿·Ö¿É±»Ê¹ÓÃͨ¹ýÍâµØ»á¼ûÌᳫDoS¹¥»÷¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²î±»×·×ÙΪCVE-2020-8708£¬£¬£¬£¬£¬£¬ÊÇÒ»¸ö¹ýʧµÄÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓ㬣¬£¬£¬£¬£¬Í¨¹ýÏàÁÚ»á¼ûÀ´ÌáȨ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁË1.59°æÖ®Ç°µÄЧÀÍÆ÷Ö÷°å¡¢Ð§ÀÍÆ÷ϵͳºÍÅÌËãÄ£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/intel-patches-many-privilege-escalation-vulnerabilities-server-boards
4.еÄReVoLTE¹¥»÷¿É½âÃÜ4GÓïÒôºô½ÐÒÔÇÔÌý¶Ô»°
µÂ¹ú²¨ºèµÄ³¶û´óѧ£¨Ruhr University£©µÄÑо¿Ö°Ô±·¢Ã÷ReVoLTE¹¥»÷¿ÉʹÓÃLTEÓïÒô£¨VoLTE£©ÐÒéÖеÄÎó²î£¬£¬£¬£¬£¬£¬ÆÆËð4GÓïÒôµÄ¼ÓÃܺô½ÐÀ´ÇÔÌý¶Ô»°¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬Ö»¹ÜÒÆ¶¯ÔËÓªÉÌȷʵ֧³ÖÓïÒôºô½Ð¼ÓÃÜ£¬£¬£¬£¬£¬£¬¿ÉÊÇÐí¶àºô½Ð¶¼ÊÇʹÓÃÏàͬµÄ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬£¬£¬£¬£¬£¬»ùÕ¾»áÖØ¸´Ê¹ÓÃÏàͬµÄÁ÷ÃÜÂ룬£¬£¬£¬£¬£¬»òÕßÓÿÉÕ¹ÍûµÄËã·¨À´ÌìÉú¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒԼͼÏÂÁ½¸ö4GÓû§Ö®¼äµÄ¶Ô»°£¬£¬£¬£¬£¬£¬ÔÙÓëÆäÖÐÒ»¸öÊܺ¦Õß´òµç»°²¢¼Í¼¶Ô»°£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔ¶Ôͨ»°¾ÙÐнâÃÜ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations/
5.¿¨°Í˹»ùÐû²¼2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ
¶íÂÞË¹ÍøÂçÇå¾²¹©Ó¦ÉÌ¿¨°Í˹»ùÐû²¼ÁË2020Äê¶ÈQ2 DDoS¹¥»÷µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬·¢Ã÷Óë2019ÄêµÚ¶þ¼¾¶ÈÏà±È£¬£¬£¬£¬£¬£¬2020ÄêµÄDDoS¹¥»÷ÊýĿͬ±ÈÔöÌíÁË217£¥¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù³Æ£¬£¬£¬£¬£¬£¬2020Äê¶ÈµÄÇ÷ÊÆÓëÍù³£ÄÏÔ¯±±ÕÞ£¬£¬£¬£¬£¬£¬Í¨³£ÇéÐÎÏÂDDoS¹¥»÷ÔÚÄêÍ·×îÏȵִïá۷壬£¬£¬£¬£¬£¬È»ºóÔÚ´ºÄ©ºÍÏÄÈÕϽµ£¬£¬£¬£¬£¬£¬ÏÖÔÚÄêµÄµÚ¶þ¼¾¶È±ÈµÚÒ»¼¾¶È¹¥»÷ÊýÄ¿ÔöÌíÁË30£¥¡£¡£¡£¡£¡£¡£ÔÚ4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬µ¥ÈյĹ¥»÷´ÎÊýµÖ´ïá۷壬£¬£¬£¬£¬£¬Îª½ü300´Î£¬£¬£¬£¬£¬£¬¶øµÚÒ»¼¾¶È·åÖµÖ»ÓÐ242´Î¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùDDoS±£»£»¤ÍŶÓÒÔΪ£¬£¬£¬£¬£¬£¬ÕâÖÖÇ÷ÊÆµÄ¸Ä±ä»òÐíÓëCOVID19µÄ±¬·¢Óйء£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-triple-q2/
6.Çå¾²Åàѵ»ú¹¹SANSÔâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬²¿·ÖÔ±¹¤ÐÅϢй¶
ÍøÂçÇå¾²Åàѵ×éÖ¯SANSÔâµ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÔ±¹¤ÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ8ÔÂ6ÈÕ·¢Ã÷ÆäÒ»ÃûÔ±¹¤Òò¼ÓÔØÁ˶ñÒâOffice 365 OauthÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼28000ÌõSANS³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Ð¹Â¶¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý²»°üÀ¨ÃÜÂë»òÐÅÓÿ¨µÈ²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«°üÀ¨µç×ÓÓʼþµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢ÊÂÇéÃû³Æ¡¢¹«Ë¾Ãû³ÆºÍÏÖʵµØµã¡£¡£¡£¡£¡£¡£SANSÌåÏÖ£¬£¬£¬£¬£¬£¬Æä¶Ô´ËÊÂÎñÕýÔÚÊÓ²ìÖУ¬£¬£¬£¬£¬£¬²¢ÒÑ֪ͨ¿ÉÄÜ»áÊܵ½Ó°ÏìµÄÈË¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sans-infosec-training-org-suffers-data-breach-after-phishing-attack/


¾©¹«Íø°²±¸11010802024551ºÅ