ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ51ÖÜ
Ðû²¼Ê±¼ä 2020-12-21> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê12ÔÂ14ÈÕÖÁ12ÔÂ20ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´58¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇFoxit Reader CVE-2020-13548ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»Dex Idp Dex samlÑéÖ¤Èƹý©¶´£»IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÇëÇóαÔ쩶´£»DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾½Å±¾Â©¶´£»EPSON EPS TSE Server CVE-2020-28930¿çÕ¾½Å±¾Â©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇIntelµÄHabana LabsѬȾPay2Key£¬ÉÌÒµÎĵµºÍÔ´´úÂë±»µÁ£»ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷£»AppleÄþ¾²¸üУ¬ÐÞ¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö©¶´£»ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡Æø϶ϵͳÖÐÊý¾Ý£»Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ó°Ïì300ÍòÓû§¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
> ÖØÒªÄþ¾²Â©¶´Áбí
1.Foxit Reader CVE-2020-13548ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´
Foxit Reader´æÔÚÊͷźóʹÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÕßÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.foxitsoftware.com/support/security-bulletins.html
2.Dex Idp Dex samlÑéÖ¤Èƹý©¶´
Dex Idp Dex saml´æÔÚÑéÖ¤Èƹý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊ¡£
https://access.redhat.com/security/cve/cve-2020-27847
3.IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÇëÇóαÔ쩶´
IBM Financial Transaction Manager for SWIFT Services´æÔÚ¿çÕ¾ÇëÇóαÔ쩶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴¹¹½¨¶ñÒâURI£¬ÓÕʹÇëÇ󣬿ÉÒÔÄ¿±êÓû§ÉÏÏÂÎÄÖ´ÐжñÒâ²Ù×÷¡£
https://www.ibm.com/support/pages/node/6371260
4.DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾½Å±¾Â©¶´
DELL Dell EMC iDRAC9 webÓ¦ÓôæÔÚ¿çÕ¾½Å±¾Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴עÈë¶ñÒâ½Å±¾»òHTML´úÂ룬µ±¶ñÒâÊý¾Ý±»¼ì²ìʱ£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£
https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability
5.EPSON EPS TSE Server CVE-2020-28930¿çÕ¾½Å±¾Â©¶´
EPSON EPS TSE Server´æÔÚ¿çÕ¾½Å±¾Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴עÈë¶ñÒâ½Å±¾»òHTML´úÂ룬µ±¶ñÒâÊý¾Ý±»¼ì²ìʱ£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»°¡£
https://www.seh-technology.com/services/downloads/download-fiscal-solutions/eps-tse-server-8.html
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢IntelµÄHabana LabsѬȾPay2Key£¬ÉÌÒµÎĵµºÍÔ´´úÂë±»µÁ
IntelµÄAI´¦ÖÃÆ÷¿ª·¢ÉÌHabana LabsÔâµ½ÁËPay2KeyÀÕË÷Èí¼þ¹¥»÷£¬ÉÌÒµÎĵµºÍÔ´´úÂë±»µÁ¡£Habana LabsÊÇÒÔÉ«ÁÐAI´¦ÖÃÆ÷µÄ¿ª·¢ÉÌ£¬ÓÚ2019Äê12ÔÂÒÔ20ÒÚÃÀÔªµÄ¼Û¸ñ±»IntelÊÕ¹º¡£Pay2KeyÔÚTwitterÉÏÐû²¼Á˴˴ι¥»÷£¬²¢Éù³ÆÒÑÇÔÈ¡ÁËÓйØÈ˹¤ÖÇÄÜоƬ´úÂëGaudiµÄÐÅÏ¢Êý¾Ý¡£¸ÃÍÅ»ïÔÚÆäÊý¾Ýй¶ÍøÕ¾ÉϹûÈ»Á˸ù«Ë¾µÄÔ´´úÂëºÍÄÚ²¿½ø³ÌµÄͼƬ£¬ÒÔ¼°WindowsÓò¿ØÖÆÆ÷Êý¾ÝºÍGerrit¿ª·¢´úÂë¼ì²éϵͳµÄÎļþÁÐ±í¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112258/data-breach/pay2key-hacked-habana-labs.html
2¡¢ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷
ÃÀ¹ú²ÆÕþ²¿ºÍÉÌÎñ²¿¹ú¼ÒµçÐÅÓëÐÅÏ¢¹ÜÀí¾Ö£¨NTIA£©Ôâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷¡£Äþ¾²¹«Ë¾FireEye½ñÌìÌåÏÖ£¬Õþ¸®Ö§³ÖµÄºÚ¿Í¹¥»÷ÁËÈí¼þÌṩÉÌSolarWinds£¬È»ºóΪÆäOrionÈí¼þ²¿ÊðÁ˶ñÒâ¸üз¨Ê½£¬ÒÔѬȾ¶à¸öÃÀ¹ú¹«Ë¾ºÍÕþ¸®ÍøÂ磬FireEye֮ǰҲÔâµ½ÁËÐÎͬµÄ¹¥»÷¡£SolarWindsÈ·ÈÏÆäÔÚ2020Äê3ÔÂÖÁ6ÔÂÖ®¼äÐû²¼µÄOrion¸üа汾2019.4ÖÁ2020.2.1Òѱ»¶ñÒâÈí¼þѬȾ¡£¾ÝÐÅ£¬´Ë´Î¹¥»÷»î¶¯Óë¶íÂÞ˹Íâ¹úÇ鱨¾Ö£¨SVR£©Ïà¹ØµÄºÚ¿Í×éÖ¯APT29Óйء£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/
3¡¢AppleÄþ¾²¸üУ¬ÐÞ¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö©¶´
AppleÐû²¼ÁËiOSºÍiPadOSµÄÄþ¾²¸üУ¬ÐÞ¸´°üÂÞ´úÂëÖ´ÐЩ¶´ÔÚÄÚµÄ11¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖصÄÊÇ´úÂëÖ´ÐЩ¶´£¨CVE-2020-27943ºÍCVE-2020-27944£©£¬¹¥»÷Õß¿ÉÀûÓöñÒâ×ÖÌåÎļþÔÚApple iPhoneºÍiPadÉÏÖ´ÐжñÒâ´úÂë¡£Æä´ÎΪÈý¸öÓ°ÏìÁËImageIO±à³Ì½Ó¿Ú¿ò¼ÜµÄ©¶´CVE-2020-29617¡¢CVE-2020-29618ºÍCVE-2020-29619£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ©¶´Í¨¹ýÌØÖÆͼÏñÖ´ÐÐÈÎÒâ´úÂë¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112304/security/ios-ipados-flaws.html
4¡¢ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡Æø϶ϵͳÖÐÊý¾Ý
ÒÔÉ«ÁÐѧÕß·¢ÏÖеÄAIR-FI¼¼Êõ£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆø϶ϵͳÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£AIR-FI¼¼ÊõµÄºËÐÄÊÇ£¬µ±µçÁ÷ͨ¹ýʱ£¬Èκεç×ÓÔª¼þ¶¼Êз¢Éúµç´Å²¨¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬¶øÎÞÏßµç»ù±¾ÉÏÊǵç´Å²¨£¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÏòÆø϶ϵͳÖÐÖ²Èë¶ñÒâ´úÂ룬À´¿ÉÒÔÀûÓÃRAM¿¨ÄÚ²¿µÄµçÁ÷·¢ÉúÇкÏÕý³£µÄwifiÐźÅƵÆ׵ĵç´Å²¨¡£È»ºóÀûÓÃÆø϶ϵͳ´øÓÐWi-FiÌìÏßµÄÉ豸À´»ñÈ¡¸ÃÐźţ¬ÒԸߴï100 b/sµÄËÙ¶ÈÇÔÈ¡Ãô¸ÐÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/
5¡¢Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ó°Ïì300ÍòÓû§
Äþ¾²¹«Ë¾Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬°üÂÞ15¸öChromeÀ©Õ¹ºÍ13¸öEdgeÀ©Õ¹£¬ÒÑÓ°Ïì300ÍòÓû§¡£Õâ28¿î²å¼þ°üÂÞ´óÁ¿ÊµÏÖ¶ñÒâ²Ù×÷µÄ´úÂ룬ÀýÈ罫Óû§Á÷Á¿Öض¨Ïòµ½¹ã¸æ¡¢½«Óû§Á÷Á¿Öض¨Ïòµ½ÍøÂçµöÓãÕ¾µã¡¢ÊÕ¼¯¸öÈËÊý¾Ý¡¢ÊÕ¼¯ä¯ÀÀ¼Ç¼¡¢½«¸ü¶à¶ñÒâÈí¼þÏÂÔص½Óû§É豸ÉÏ¡£Ä¿Ç°£¬GoogleÒÑɾ³ýÁË15¸ö¶ñÒâÀ©Õ¹·¨Ê½ÖеÄ3¸ö£¬¶øMicrosoftÒòÎÞ·¨È·ÈÏAvastµÄ³ÂË߶øÉÐδ½øÐÐɾ³ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/three-million-users-installed-28-malicious-chrome-or-edge-extensions/