ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ43ÖÜ

Ðû²¼Ê±¼ä 2020-10-26

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê10ÔÂ19ÈÕÖÁ10ÔÂ25ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´82¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇAdobe IllustratorÄÚ´æÆÆ»µCVE-2020-24412´úÂëÖ´ÐЩ¶´£»Mozilla Firefox usersctpÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»Oracle Solaris CVE-2020-14871δÃ÷Ô¶³Ì´úÂëÖ´ÐЩ¶´£»HPE Intelligent Management Center UrlAccessControllerÑéÖ¤Èƹý©¶´£»VMware ESXi OpenSLPÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇHiscoxÐû²¼2020Äê¶ÈCyber Readiness·ÖÎö³ÂËߣ»DiscordÐÞ¸´Æä×ÀÃæÓ¦ÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄ©¶´£»GoogleÐû²¼ChromeÄþ¾²¸üР£¬ÐÞ¸´Òѱ»ÀûÓõÄ0day£»Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵØÖ·À¸ÆÛƭ©¶´£»Sophos·¢ÏÖLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿±ê¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


ÖØÒªÄþ¾²Â©¶´Áбí


1.Adobe IllustratorÄÚ´æÆÆ»µCVE-2020-24412´úÂëÖ´ÐЩ¶´


Adobe Illustrator´æÔÚÄÚ´æÆÆ»µÂ©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://helpx.adobe.com/security/products/illustrator/apsb20-53.html


2.Mozilla Firefox usersctpÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


Mozilla Firefox usersctp¿â´æÔÚÊͷźóʹÓ鶴 £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/


3.Oracle Solaris CVE-2020-14871δÃ÷Ô¶³Ì´úÂëÖ´ÐЩ¶´


Oracle SolarisЭÒé´¦ÖôæÔÚδÃ÷Äþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔϵͳÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.oracle.com/security-alerts/cpuoct2020.html


4.HPE Intelligent Management Center UrlAccessControllerÑéÖ¤Èƹý©¶´


HPE Intelligent Management Center UrlAccessController´æÔÚÑéÖ¤Èƹý©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbnw04036en_us


5.VMware ESXi OpenSLPÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


VMware ESXi OpenSLP·þÎñ´æÔÚÊͷźóʹÓ鶴 £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.vmware.com/security/advisories/VMSA-2020-0023.html


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢HiscoxÐû²¼2020Äê¶ÈCyber Readiness·ÖÎö³ÂËß


1.jpg


HiscoxÐû²¼2020Äê¶ÈCyber Readiness·ÖÎö³ÂËß £¬·¢ÏÖ¹ýÈ¥Ò»ÄêÖÐÈ«ÇòÍøÂçËðʧÔö³¤Á˽üÁù±¶¡£¸Ã³ÂËßÏÔʾ £¬ÊÜÓ°Ï칫˾µÄ×ÜËðʧΪ18ÒÚÃÀÔª £¬±ÈÈ¥ÄêµÄ12ÒÚÃÀÔªÔö³¤ÁË50£¥¡£³ÂËßÖÐÓÐ6£¥ÒÔÉϵÄÊÜ·ÃÕßÖ§¸¶ÁËÊê½ð £¬Ëðʧ×ܼÆΪ3.81ÒÚÃÀÔª¡£¾Ýͳ¼Æ £¬¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þ¡¢ÆóÒµµç×ÓÓʼþй¶ºÍÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©ÈÔÈ»ÊÇ×î³£ÓõĹ¥»÷ý½é £¬¶øDDoS¹¥»÷Ò²³ÉÁËÀÕË÷Èí¼þ¹¥»÷µÄÁíÒ»ÖÖÐÎʽ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hiscox.co.uk/sites/uk/files/documents/202006/Hiscox_Cyber_Readiness_Report_2020_UK.PDF


2¡¢DiscordÐÞ¸´Æä×ÀÃæÓ¦ÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄ©¶´


2.jpg


DiscordÒÑÐÞ¸´×ÀÃæ°æÓ¦Ó÷¨Ê½ÖеÄÒ»¸öÒªº¦Â©¶´ £¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷¡£¸Ã©¶´´æÔÚÓÚDiscon×ÀÃæÓ¦Ó÷¨Ê½Ê¹ÓõÄÈí¼þ¿ò¼ÜElectronÖÐ £¬ÆäcontextIsolation±»ÉèÖÃΪfalse £¬ÕâÔÊÐíÓ¦Ó÷¨Ê½ÍⲿµÄJavaScript´úÂëÓ°ÏìÄÚ²¿´úÂë £¬ÀýÈçwebÒ³ÃæÍⲿµÄJavaScript´úÂëʹÓÃnode.js¹¦Ð§¡£¸Ã©¶´±»×·×ÙΪCVE-2020-15174 £¬ÓëÆäËûÁ½¸ö©¶´½áºÏÀûÓÿÉÈƹýµ¼º½ÏÞÖƲ¢Ê¹ÓÃiframe XSS©¶´·ÃÎÊ°üÂÞ¶ñÒâ´úÂëµÄÍøÒ³À´Ö´ÐÐRCE¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/discord-desktop-app-vulnerable-to-remote-code-execution-bug/


3¡¢GoogleÐû²¼ChromeÄþ¾²¸üР£¬ÐÞ¸´Òѱ»ÀûÓõÄ0day


3.jpg


GoogleÐû²¼ÁËChrome°æ±¾86.0.4240.111µÄÄþ¾²¸üР£¬ÐÞ¸´Òѱ»ÔÚÒ°ÀûÓõÄ0day¡£¸Ã©¶´±»×·×ÙΪCVE-2020-15999 £¬ÊÇFreeType×ÖÌåäÖȾ¿âÖеÄÄÚ´æËð»µÂ©¶´¡£¹È¸èProject ZeroµÄÑо¿ÈËÔ±·¢ÏÖÁËÀûÓôËFreeType©¶´½øÐеÄÒ°Íâ¹¥»÷ £¬µ«ÊÇÓйظ鶴µÄÀûÓûµÄÏêϸÐÅÏ¢ÉÐδ¹ûÈ»¡£ÕâÊÇÔÚ¹ýÈ¥Ò»ÄêÀ´µÄµÚÈý¸ö±»ÔÚÒ°ÀûÓõÄChrome 0day £¬Ç°Á½¸öÊÇCVE-2019-13720£¨2019Äê10Ô£©ºÍCVE-2020-6418£¨2020Äê2Ô£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/


4¡¢Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵØÖ·À¸ÆÛƭ©¶´


4.jpg


ÍøÂçÄþ¾²¹«Ë¾Rapid7Åû¶ÁË10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵØÖ·À¸ÆÛƭ©¶´¡£´Ë´ÎÅû¶µÄ©¶´·Ö±ðΪUCä¯ÀÀÆ÷ÖеÄCVE-2020-7363ºÍCVE-2020-7364¡¢Opera MiniºÍOpera TouchÖеÄCVE TBD-Opera¡¢Yandexä¯ÀÀÆ÷ÖеÄCVE-2020-7369¡¢Boltä¯ÀÀÆ÷ÖеÄCVE-2020-7370¡¢RITSä¯ÀÀÆ÷ÖеÄCVE-2020-7371ºÍApple SafariÖеÄCVE-2020-9987¡£¸ÃÎÊÌâÓÚ½ñÄêÄê³õ±»·¢ÏÖ £¬²¢ÓÚ8Ô³ÂË߸øÖÆÔìÉÌ £¬Ä¿Ç°´óÐͳ§ÉÌÁ¢¼´½øÐÐÁËÐÞ¸´ £¬¶øСÐͳ§ÉÌÈÔÎÞÈËÀí»á¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/seven-mobile-browsers-vulnerable-to-address-bar-spoofing-attacks/


5¡¢Sophos·¢ÏÖLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿±ê


5.jpg


SophosÐû²¼³ÂËß £¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿±ê¡£Ñо¿ÈËԱͨ¹ý·ÖÎöÒ»ÄêÇ°·ºÆðµÄÑù±¾ £¬·¢ÏÖLockBitÒѾ­Ñ¸ËÙ³ÉÊì £¬²¢½ÓÄÉÁËһЩеÄÒªÁìÀ´ÈƹýWindowsÓû§ÕÊ»§¿ØÖÆ£¨UAC£©À´ÌáÉýÌØȨ¡£´ËÍâ £¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄÖØÃüÃû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉø͸²âÊÔ¹¤¾ßµÄ½Å±¾ £¬À´ËÑË÷°üÂÞÓмÛÖµÊý¾ÝµÄϵͳ £¬ÒÔ¹¥»÷СÐÍ×éÖ¯¡£


Ô­ÎÄÁ´½Ó£º

https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/