ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ25ÖÜ

Ðû²¼Ê±¼ä 2020-06-23

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê06ÔÂ15ÈÕÖÁ06ÔÂ21ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´75¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇTreck TCP/IP»ûÐÎIPV4±¨ÎÄ´¦ÖôúÂëÖ´ÐЩ¶´; Cisco Small Business RV Series Routers CVE-2020-3286Õ»Òç³öÈÎÒâ´úÂëÖ´ÐЩ¶´£»Adobe Audition CVE-2020-9658Ô½½çд´úÂëÖ´ÐЩ¶´£»Cypress Semiconductor CYW20735 evaluation board»º³åÇøÒç³ö©¶´£»Google Chrome V8Ô½½çд´úÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇGTPЭÒé´æÔÚ©¶´ £¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷£»ÑÇÂíÑ·AWSÔøÁ¬Ðø3ÌìÔâµ½2.3 Tbps DDoS¹¥»÷£»Ë¼¿ÆÐû²¼2020ÄêÏļ¾µÄÓ¦¼±ÏìÓ¦Ç÷ÊƳÂËߣ»ÃÀ¹ú´ó¹æÄ£DDoS¹¥»÷ʵΪT-MobileÅäÖôíÎóµ¼Ö£»Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ©¶´ £¬¿ÉÀûÓôË©¶´½øÐÐÌáȨ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1.Treck TCP/IP»ûÐÎIPV4±¨ÎÄ´¦ÖôúÂëÖ´ÐЩ¶´


Treck TCP/IP´¦ÖûûÐεÄIPv4±¨ÎÄ´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.jsof-tech.com/ripple20/


2. Cisco Small Business RV Series Routers CVE-2020-3286Õ»Òç³öÈÎÒâ´úÂëÖ´ÐЩ¶´


Cisco Small Business RV Series RoutersµÄWEB¹ÜÀí½Ó¿Ú´æÔÚ»º³åÇøÒç³ö©¶´ £¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz


3. Adobe Audition CVE-2020-9658Ô½½çд´úÂëÖ´ÐЩ¶´


Adobe Audition´æÔÚÔ½½ç䩶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴¹¹½¨¶ñÒâÎļþ £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://helpx.adobe.com/security/products/audition/apsb20-40.html


4. Cypress Semiconductor CYW20735 evaluation board»º³åÇøÒç³ö©¶´


Cypress Semiconductor CYW20735 evaluation board´æÔÚ»º³åÇøÒç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿Éʹϵͳ±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://github.com/seemoo-lab/frankenstein/blob/master/doc/CVE_2019_18614.md


5. Google Chrome V8Ô½½çд´úÂëÖ´ÐЩ¶´


Google Chrome V8´æÔÚÔ½½ç䩶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿Éʹϵͳ±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html



> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢GTPЭÒé´æÔÚ©¶´ £¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/vulnerabilities---threats/protocol-vulnerability-threatens-mobile-networks/d/d-id/1338068


2¡¢ÑÇÂíÑ·AWSÔøÁ¬Ðø3ÌìÔâµ½2.3 Tbps DDoS¹¥»÷


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://androidrookies.com/amazons-aws-hit-with-a-record-breaking-2-3-tbps-ddos-attack/


3¡¢Ë¼¿ÆÐû²¼2020ÄêÏļ¾µÄÓ¦¼±ÏìÓ¦Ç÷ÊƳÂËß


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/06/CTIR-trends-q3-2020.html


4¡¢ÃÀ¹ú´ó¹æÄ£DDoS¹¥»÷ʵΪT-MobileÅäÖôíÎóµ¼ÖÂ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-outage-caused-by-configuration-error-not-a-ddos-attack/


5¡¢Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ©¶´ £¬¿ÉÀûÓôË©¶´½øÐÐÌáȨ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bug-in-usb-for-remote-desktop-lets-hackers-add-fake-devices/