ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ51ÖÜ

Ðû²¼Ê±¼ä 2020-12-21

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê12ÔÂ14ÈÕÖÁ12ÔÂ20ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´58¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇFoxit Reader CVE-2020-13548ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»Dex Idp Dex samlÑéÖ¤Èƹý©¶´£»IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÇëÇóαÔ쩶´£»DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾½Å±¾Â©¶´£»EPSON EPS TSE Server CVE-2020-28930¿çÕ¾½Å±¾Â©¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇIntelµÄHabana LabsѬȾPay2Key £¬ÉÌÒµÎĵµºÍÔ´´úÂë±»µÁ£»ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷£»AppleÄþ¾²¸üР£¬ÐÞ¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö©¶´£»ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡Æø϶ϵͳÖÐÊý¾Ý£»Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ £¬Ó°Ïì300ÍòÓû§¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


ÖØÒªÄþ¾²Â©¶´Áбí


1.Foxit Reader CVE-2020-13548ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


Foxit Reader´æÔÚÊͷźóʹÓ鶴 £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÕßÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.foxitsoftware.com/support/security-bulletins.html


2.Dex Idp Dex samlÑéÖ¤Èƹý©¶´


Dex Idp Dex saml´æÔÚÑéÖ¤Èƹý©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉδÊÚȨ·ÃÎÊ¡£

https://access.redhat.com/security/cve/cve-2020-27847


3.IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÇëÇóαÔ쩶´


IBM Financial Transaction Manager for SWIFT Services´æÔÚ¿çÕ¾ÇëÇóαÔ쩶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴¹¹½¨¶ñÒâURI £¬ÓÕʹÇëÇó £¬¿ÉÒÔÄ¿±êÓû§ÉÏÏÂÎÄÖ´ÐжñÒâ²Ù×÷¡£

https://www.ibm.com/support/pages/node/6371260


4.DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾½Å±¾Â©¶´


DELL Dell EMC iDRAC9 webÓ¦ÓôæÔÚ¿çÕ¾½Å±¾Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴עÈë¶ñÒâ½Å±¾»òHTML´úÂë £¬µ±¶ñÒâÊý¾Ý±»¼ì²ìʱ £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£

https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability


5.EPSON EPS TSE Server CVE-2020-28930¿çÕ¾½Å±¾Â©¶´


EPSON EPS TSE Server´æÔÚ¿çÕ¾½Å±¾Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴עÈë¶ñÒâ½Å±¾»òHTML´úÂë £¬µ±¶ñÒâÊý¾Ý±»¼ì²ìʱ £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£

https://www.seh-technology.com/services/downloads/download-fiscal-solutions/eps-tse-server-8.html



> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢IntelµÄHabana LabsѬȾPay2Key £¬ÉÌÒµÎĵµºÍÔ´´úÂë±»µÁ


1.png


IntelµÄAI´¦ÖÃÆ÷¿ª·¢ÉÌHabana LabsÔâµ½ÁËPay2KeyÀÕË÷Èí¼þ¹¥»÷ £¬ÉÌÒµÎĵµºÍÔ´´úÂë±»µÁ¡£Habana LabsÊÇÒÔÉ«ÁÐAI´¦ÖÃÆ÷µÄ¿ª·¢ÉÌ £¬ÓÚ2019Äê12ÔÂÒÔ20ÒÚÃÀÔªµÄ¼Û¸ñ±»IntelÊÕ¹º¡£Pay2KeyÔÚTwitterÉÏÐû²¼Á˴˴ι¥»÷ £¬²¢Éù³ÆÒÑÇÔÈ¡ÁËÓйØÈ˹¤ÖÇÄÜоƬ´úÂëGaudiµÄÐÅÏ¢Êý¾Ý¡£¸ÃÍÅ»ïÔÚÆäÊý¾Ýй¶ÍøÕ¾ÉϹûÈ»Á˸ù«Ë¾µÄÔ´´úÂëºÍÄÚ²¿½ø³ÌµÄͼƬ £¬ÒÔ¼°WindowsÓò¿ØÖÆÆ÷Êý¾ÝºÍGerrit¿ª·¢´úÂë¼ì²éϵͳµÄÎļþÁбí¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112258/data-breach/pay2key-hacked-habana-labs.html


2¡¢ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷


2.jpg


ÃÀ¹ú²ÆÕþ²¿ºÍÉÌÎñ²¿¹ú¼ÒµçÐÅÓëÐÅÏ¢¹ÜÀí¾Ö£¨NTIA£©Ôâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷¡£Äþ¾²¹«Ë¾FireEye½ñÌìÌåÏÖ £¬Õþ¸®Ö§³ÖµÄºÚ¿Í¹¥»÷ÁËÈí¼þÌṩÉÌSolarWinds £¬È»ºóΪÆäOrionÈí¼þ²¿ÊðÁ˶ñÒâ¸üз¨Ê½ £¬ÒÔѬȾ¶à¸öÃÀ¹ú¹«Ë¾ºÍÕþ¸®ÍøÂç £¬FireEye֮ǰҲÔâµ½ÁËÐÎͬµÄ¹¥»÷¡£SolarWindsÈ·ÈÏÆäÔÚ2020Äê3ÔÂÖÁ6ÔÂÖ®¼äÐû²¼µÄOrion¸üа汾2019.4ÖÁ2020.2.1Òѱ»¶ñÒâÈí¼þѬȾ¡£¾ÝÐÅ £¬´Ë´Î¹¥»÷»î¶¯Óë¶íÂÞ˹Íâ¹úÇ鱨¾Ö£¨SVR£©Ïà¹ØµÄºÚ¿Í×éÖ¯APT29ÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/


3¡¢AppleÄþ¾²¸üР£¬ÐÞ¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö©¶´


3.jpg


AppleÐû²¼ÁËiOSºÍiPadOSµÄÄþ¾²¸üР£¬ÐÞ¸´°üÂÞ´úÂëÖ´ÐЩ¶´ÔÚÄÚµÄ11¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖصÄÊÇ´úÂëÖ´ÐЩ¶´£¨CVE-2020-27943ºÍCVE-2020-27944£© £¬¹¥»÷Õß¿ÉÀûÓöñÒâ×ÖÌåÎļþÔÚApple iPhoneºÍiPadÉÏÖ´ÐжñÒâ´úÂë¡£Æä´ÎΪÈý¸öÓ°ÏìÁËImageIO±à³Ì½Ó¿Ú¿ò¼ÜµÄ©¶´CVE-2020-29617¡¢CVE-2020-29618ºÍCVE-2020-29619 £¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ©¶´Í¨¹ýÌØÖÆͼÏñÖ´ÐÐÈÎÒâ´úÂë¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112304/security/ios-ipados-flaws.html


4¡¢ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡Æø϶ϵͳÖÐÊý¾Ý


4.jpg


ÒÔÉ«ÁÐѧÕß·¢ÏÖеÄAIR-FI¼¼Êõ £¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷ £¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆø϶ϵͳÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£AIR-FI¼¼ÊõµÄºËÐÄÊÇ £¬µ±µçÁ÷ͨ¹ýʱ £¬Èκεç×ÓÔª¼þ¶¼Êз¢Éúµç´Å²¨¡£Wi-FiÐźÅÊÇÎÞÏߵ粨 £¬¶øÎÞÏßµç»ù±¾ÉÏÊǵç´Å²¨ £¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÏòÆø϶ϵͳÖÐÖ²Èë¶ñÒâ´úÂë £¬À´¿ÉÒÔÀûÓÃRAM¿¨ÄÚ²¿µÄµçÁ÷·¢ÉúÇкÏÕý³£µÄwifiÐźÅƵÆ׵ĵç´Å²¨¡£È»ºóÀûÓÃÆø϶ϵͳ´øÓÐWi-FiÌìÏßµÄÉ豸À´»ñÈ¡¸ÃÐźŠ£¬ÒԸߴï100 b/sµÄËÙ¶ÈÇÔÈ¡Ãô¸ÐÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/


5¡¢Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ £¬Ó°Ïì300ÍòÓû§


5.png


Äþ¾²¹«Ë¾Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ £¬°üÂÞ15¸öChromeÀ©Õ¹ºÍ13¸öEdgeÀ©Õ¹ £¬ÒÑÓ°Ïì300ÍòÓû§¡£Õâ28¿î²å¼þ°üÂÞ´óÁ¿ÊµÏÖ¶ñÒâ²Ù×÷µÄ´úÂë £¬ÀýÈ罫Óû§Á÷Á¿Öض¨Ïòµ½¹ã¸æ¡¢½«Óû§Á÷Á¿Öض¨Ïòµ½ÍøÂçµöÓãÕ¾µã¡¢ÊÕ¼¯¸öÈËÊý¾Ý¡¢ÊÕ¼¯ä¯ÀÀ¼Ç¼¡¢½«¸ü¶à¶ñÒâÈí¼þÏÂÔص½Óû§É豸ÉÏ¡£Ä¿Ç° £¬GoogleÒÑɾ³ýÁË15¸ö¶ñÒâÀ©Õ¹·¨Ê½ÖеÄ3¸ö £¬¶øMicrosoftÒòÎÞ·¨È·ÈÏAvastµÄ³ÂË߶øÉÐδ½øÐÐɾ³ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/three-million-users-installed-28-malicious-chrome-or-edge-extensions/