AdobeÇå¾²¸üÐÂÐÞ¸´MagentoÖÐÁ½¸öÖ÷ÒªµÄ´úÂëÖ´ÐÐÎó²î£»£»£»£»Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÍêÈ«¿ØÖÆÐ§ÀÍÆ÷

Ðû²¼Ê±¼ä 2020-07-30

1.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´MagentoÖÐÁ½¸ö´úÂëÖ´ÐÐÎó²î


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


AdobeÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´Magento CommerceºÍMagento Open SourceÖеÄÁ½¸öÑÏÖØµÄ´úÂëÖ´ÐÐÎó²î¡£ ¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÊÇÓÉ·¾¶±éÀú¹ýʧÒýÆðµÄ£¬£¬£¬£¬£¬£¬£¬±»¸ú×ÙΪCVE-2020-9689£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐí¾ßÓÐÖÎÀíԱȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£¡£¡£ÁíÒ»¸öÊÇ»ùÓÚDOMµÄ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬£¬£¬£¬£¬±»×·×ÙΪCVE-2020-9691£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐíʹδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËÓÉ¿ÉÊӲ쵽µÄʱ¼ä²îÒýÆðµÄÊðÃûÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-9690£©¡£ ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¸ÃÎó²îÉÐÎÞÒÑÖªµÄʹÓú͹¥»÷¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-gets-security-updates-for-severe-code-execution-bugs/


2.GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ChromeÖеÄ8¸öÎó²î


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËChromeÖеÄ8¸öÎó²î£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËWindows¡¢MacºÍLinuxϵͳϵÄChrome°æ±¾84.0.4147.105¡£ ¡£¡£¡£¡£¡£´Ë´Î¸üÐÂÖÐÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪV8ÖеÄÀàÐÍ»ìÏýÎÊÌ⣨CVE-2020-6537£©¡¢WebViewÖеÄʵÏÖ²»µ±ÎÊÌ⣨CVE-2020-6538£©¡¢SCTPÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6532£©¡¢CSSÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6539£©¡¢SkiaÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-6540£©ÒÔ¼°WebUSBÊͷźóʹÓÃÎÊÌ⣨CVE-2020-6541£©¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/07/28/google-releases-security-updates-chrome


3.Dell iDRAC±£´æ±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Positive TechnologiesÑо¿Ö°Ô±·¢Ã÷DellÔ¶³Ì»á¼û¿ØÖÆÆ÷£¨iDRAC£©Öб£´æ±éÀúÎó²î£¨CVE-2020-5366£©£¬£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£ ¡£¡£¡£¡£¡£Í¨¹ýʹÓôËÎó²î£¬£¬£¬£¬£¬£¬£¬¾­ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔ·­¿ªºÍ¹Ø±Õ²úÆ·£¬£¬£¬£¬£¬£¬£¬»ò¸ü¸ÄÆäÉ¢ÈȺ͵çÔ´ÉèÖᣠ¡£¡£¡£¡£¡£³ý´ËÖ®Íâ £¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓöÁÈ¡¿ØÖÆÆ÷²Ù×÷ϵͳÖеÄÈκÎÎļþ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÔÚijЩÇéÐÎÏÂ×ÌÈÅ¿ØÖÆÆ÷µÄ²Ù×÷¡£ ¡£¡£¡£¡£¡£¸ÃÎó²î»áÓ°Ïì¹Ì¼þ°æ±¾Îª4.20.20.20֮ǰµÄDell EMC iDRAC9¿ØÖÆÆ÷£¬£¬£¬£¬£¬£¬£¬Dell EMCÔÚ¼ì²âµ½¸ÃÎó²îÖ®ºó±ãÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬²¢±Þ²ßÓû§¾¡¿ì×°Öᣠ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/dell-emc-patches-idrac/


4.ÐÂÐÍLinuxºóÃÅDokiʹÓÃDogecoin API£¬£¬£¬£¬£¬£¬£¬Õë¶ÔDockerʵÀý


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Intezer Labs·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÐÂÐÍLinuxºóÃųÌÐòDokiʹÓÃÁËDogecoin API£¬£¬£¬£¬£¬£¬£¬Õë¶ÔDockerʵÀý¡£ ¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯Ngrok×Ô2018Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬×î³õÇãÏòÓÚʹÓÃNgrokЧÀÍÍйÜC£¦CЧÀÍÆ÷¡£ ¡£¡£¡£¡£¡£¶øÔÚ¸Ã×éÖ¯×î½üÒ»´ÎµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ÆäÕë¶Ôй¶ÁËÖÎÀíAPIµÄDockerʵÀý¡£ ¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýʹÓÃDocker APIÔÚÄ¿µÄ¹«Ë¾µÄÔÆ»ù´¡¼Ü¹¹Öа²ÅÅÐÂЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ËæºóÔËÐÐѬȾÁ˼ÓÃÜÍÚ¿ó¶ñÒâÈí¼þDokiµÄAlpine LinuxЧÀÍÆ÷¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬DokiµÄÄ¿µÄÊÇÔÊÐíºÚ¿Í¿ØÖÆÆäа²ÅŵÄAlpine LinuxЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£¼ÓÃܲɿó²Ù×÷°´Ô¤ÆÚÔËÐС£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-linux-malware-uses-dogecoin-api-to-find-c-c-server-addresses/#ftag=RSSbaffb68


5.¿¨°Í˹»ù·¢Ã÷ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


¿¨°Í˹»ùÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þVHDÓ볯ÏʺڿÍ×éÖ¯LazarusÓйØ¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê3ÔÂÖÁ5ÔµÄÊÓ²ìÖз¢Ã÷ÁËÀÕË÷Èí¼þVHDµÄÑù±¾£¬£¬£¬£¬£¬£¬£¬ÕâЩÑù±¾Ê¹ÓÃSMB±©Á¦ÆÆ½â·Ö·¢MATA¶ñÒâÈí¼þ¿ò¼Ü¡£ ¡£¡£¡£¡£¡£VHD¿ÉÒþ²ØµØÅþÁ¬µ½Êܺ¦ÕߵĵçÄÔÇý¶¯Æ÷£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬£¬²¢É¾³ýËùÓеÄSystem Volume InformationÎļþ¼Ð£¬£¬£¬£¬£¬£¬£¬´Ó¶øÆÆËðϵͳÖеÄWindows»¹Ô­¹¦Ð§¡£ ¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔ½ûÓñÜÃâÖ÷ÒªÎļþ±»¸Ä¶¯µÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÀýÈçMicrosoft Exchange»òSQL Server¡£ ¡£¡£¡£¡£¡£¿ £¿£¿£¿£¿ £¿¨°Í˹»ù·¢Ã÷ManuscryptľÂíҲʹÓÃÁËMATA¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬Òò´ËÅжÏͬÑùʹÓÃÁ˸öñÒâ¿ò¼ÜµÄVHDÓëLazarusÓйØ¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-hackers-created-vhd-ransomware-for-enterprise-attacks/


6.IBMÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


IBMÓÚ±¾ÖÜÈýÐû²¼ÁËÄê¶ÈÊý¾Ýй¶±¾Ç®±¨¸æ£¬£¬£¬£¬£¬£¬£¬2020Äê¶Èƽ¾ùÊý¾Ýй¶±¾Ç®Îª386ÍòÃÀÔª¡£ ¡£¡£¡£¡£¡£Ö»¹ÜÓë2019ÄêÏà±È£¬£¬£¬£¬£¬£¬£¬Æ½¾ù±¾Ç®Ï½µÁË1.5£¥£¬£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶Áè¼Ý5000ÍòÌõ¼Í¼µÄ³¬´óÐÍ×ß©ÊÂÎñµÄ±¾Ç®¿ÉÄܸߴï3.92ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬¸ßÓÚ2019ÄêµÄ3.88ÒÚÃÀÔª¡£ ¡£¡£¡£¡£¡£×ÜÌå¶øÑÔ£¬£¬£¬£¬£¬£¬£¬ÕÊ»§Æ¾Ö¤Ð¹Â¶ÒÔ¼°ÔÆÉèÖùýʧµ¼ÖÂÁ˽ü40£¥µÄÊý¾Ýй¶ÊÂÎñ¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓõÚÈý·½Îó²î£¬£¬£¬£¬£¬£¬£¬ÀýÈç0day£¬£¬£¬£¬£¬£¬£¬Ò²ÊÇÔì³ÉÊý¾Ýй¶µÄÖ÷ÒªÒòËØ£¬£¬£¬£¬£¬£¬£¬Ò»¼ÒÒò´ËÀàÎó²îµ¼ÖÂÊý¾Ýй¶µÄ¹«Ë¾¿ÉÄÜÐèÒªÖ§¸¶¸ß´ï450ÍòÃÀÔªµÄÅâ³¥¡£ ¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÆóÒµ¹ºÖÃÁËÍøÂç°ü¹Ü£¬£¬£¬£¬£¬£¬£¬Ôòƽ¾ù¿ÉïÔÌ­20ÍòÃÀÔªµÄËðʧ¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/todays-mega-data-breaches-now-cost-companies-392-million-in-damages-lawsuits/