¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181011

°ä²¼¹¦·ò 2018-10-11
1¡¢Adobe°ä²¼10Ô°²È«¸üР£¬¹²½¨¸´11¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Adobe°ä²¼10Ô°²È«¸üР£¬½¨¸´¶à¿î²úÆ·ÖеÄ11¸ö°²È«·ì϶ £¬ÆäÖÐÔ̺¬4¸ö¸ßΣ·ì϶¡£Adobe»¹°ä²¼ÁËFlash PlayerµÄа汾 £¬µ«¸Ã°æ±¾²¢Î´Ô̺¬Èκβ¹¶¡½¨¸´¡£´Ë±í £¬±¾Ô½¨¸´µÄ11¸ö·ì϶¶¼Ã»Óб»¹«¿ªÅû¶»òÒ°±íÀûÓùý¡£ËùÓеÄ4¸ö¸ßΣ·ì϶ £¬Ô̺¬3¸ö¶ÑÒç¶Âí½ÅºÍ1¸öUse after free·ì϶ £¬¶¼´æÔÚÓÚµç×ÓÊéÔĶÁÖÎÀíÈí¼þAdobe Digital EditionsÖÐ £¬ÕâЩ·ì϶¿ÉÔÊÐí¹¥»÷ÕßÔÚµ±Ç°Óû§µÄ¸ßµÍÎÄÖÐÖ´ÐÐËÁÒâ´úÂë¡£½¨ÒéÓû§¾¡¿ì½«ÊÜÓ°ÏìµÄÈí¼þ¸üÐÂÖÁ×îа汾¡£


  Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/10/adobe-security-updates.html


2¡¢SAP°ä²¼10Ô°²È«¸üР£¬½¨¸´¶à¸ö°²È«·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SAPµÄ10Ô°²È«¸üй²Ô̺¬11¸öSecurity Notes £¬½¨¸´Á˶à¸ö°²È«·ì϶ £¬Ô̺¬SAP BusinessObjects BI¿Í»§¶ËÖеÄÐÅϢй¶·ì϶£¨CVE-2018-2471 £¬CVSSÆÀ·ÖΪ9.8£©ÒÔ¼°GardenerÖеĶÌÈ±ÍøÂç¸ôÀë·ì϶£¨CVE-2018-2475£©¡¢SAP Plant ConnectivityÖеĻؾø·þÎñ·ì϶£¨CVE-2018-12585ºÍCVE-2018-12086£©µÈ¡£ÐÅϢй¶·ì϶ÊÇ×î³£¼ûµÄ·ì϶ £¬Æä´ÎÊÇXSS¡¢XXEºÍCSRFµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sap-patches-critical-vulnerability-businessobjects

3¡¢Ë¼¿ÆTalosÍŶÓÅû¶VMware WorkstationÖеĿɵ¼ÖÂDoSµÄ°²È«·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÍŶÓÅû¶VMware WorkstationÖеÄÒ»¸ö¿Éµ¼Ö»ؾø·þÎñµÄ°²È«·ì϶¡£¸Ã·ì϶£¨TALOS-2018-0589/CVE-2018-6977£©´æÔÚÓÚVMware Workstation 14µÄÏñËØ×ÅÉ«Æ÷ÖÐ £¬Äܹ»´ÓVMware¿Í»§»ú»òVMwareÖ÷»úÖд¥·¢´Ë·ì϶ £¬µ¼Ö¹ý³Ì±ÀÀ£ºÍDoS״̬¡£Æ¾¾ÝVMware°ä²¼µÄ°²È«²¼¸æ £¬¸Ã·ì϶ĿǰûÓн¨¸´²¹¶¡ £¬µ«Äܹ»Í¨¹ý½ûÓÃ3D¼Ó¿ìÖ°ÄܵÄworkaroundÀ´½â¾ö¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/10/vuln-spot-vmware-dos.html

4¡¢ÈüÃÅÌú¿Ë·¢ÏÖÖØÒªÕë¶Ôµ±¾ÖºÍ¾üÊÂÖ¸±êµÄз¸×ïÍÅ»ïGallmaker


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÈüÃÅÌú¿Ë×êÑÐÈËÔ±·¢ÏÖÒ»¸öÒÔǰδ֪µÄ·¸×ïÍÅ»ïGallmaker¡£¸Ã×éÖ¯ÖÁÉÙ´Ó2017Äê12ÔÂÆðÍ·»îÔ¾ £¬Æä¹¥»÷»î¶¯ÔÚ2018ÄêµÚ¶þ¼¾¶Å×ÐËùÔö³¤ £¬ÆäÖÐÔÚ2018Äê4Ô³öÏÖÁËì­Éý¡£¸Ã×éÖ¯ÖØÒªÕë¶Ôµ±¾Ö¡¢¾ü¶ÓºÍ¹ú·ÀÖ¸±ê £¬Ô̺¬¶«Å·¹ú¶ÈµÄº£±í´óʹ¹Ý¡¢Öж«µÄ²¿Ãžüʺ͹ú·ÀÖ¸±êµÈ¡£¸Ã×éÖ¯µÄ»î¶¯ËƺõÊǸ߶ÈÕë¶ÔÐ﵀ £¬ÆäËÆºõÆëÈ«ÒÀÀµÓÚLotLÕ½ÊõºÍ¹«¿ªµÄºÚ¿Í¹¤¾ß £¬ÕâʹµÃÆä»î¶¯¼«Äѱ»·¢ÏÖ¡£¸Ã×éÖ¯¿ÉÄÜÊÇÓɹú¶ÈÔÞÖúµÄÒ»¸öÍøÂç¼äµý»î¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.symantec.com/blogs/threat-intelligence/gallmaker-attack-group


5¡¢¿¨°Í˹»ù°ä²¼¹ØÓÚAPT×éÖ¯MuddyWaterµÄ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù³¢ÊÔÊҹ۲쵽APT×éÖ¯MuddyWaterµÄй¥»÷»î¶¯¡£MuddyWater³öÏÖÓÚ2017Äê £¬×êÑÐÍŶӹ۲쵽¸Ã×éÖ¯×î½üµÄ´¹µöÓʼþ¹¥»÷»î¶¯¡£¸Ã´¹µö»î¶¯ÖØÒªÕë¶ÔÔ¼µ©¡¢ÍÁ¶úÆä¡¢°¢Èû°Ý½®¡¢°Í»ù˹̹ÒÔ¼°ÒÁÀ­¿ËºÍÉ³ÌØ°¢À­²®È·µ±¾Ö»ú¹¹¡¢¾üÊÂʵÌå¡¢µçÐŹ«Ë¾ºÍ½ÌÓý»ú¹¹µÈ £¬ÆäËüÖ¸±ê»¹Ô̺¬ÂíÀï¡¢°ÂµØÀû¡¢¶íÂÞ˹¡¢ÒÁÀʺͰÍÁÖ¡£¸Ã´¹µö¹¥»÷´Ó2018ËêÊׯðÍ· £¬²¢´Ó5ÔÂÆðÖð²½Éý¼¶ £¬Ä¿Ç°»¹ÔÚ³ÖÐø½øÐÐÖ®ÖС£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/muddywater/88059/

6¡¢GAO°ä²¼»ã±¨³ÆÃÀ¹úÖØÒªµÄ±øÆ÷ϵͳ´æÔÚ´óÁ¿°²È«·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹úµ±¾ÖÎÊÔð¾Ö£¨GAO£©°ä²¼»ã±¨³ÆÃÀ¹ú¹ú·À²¿¿ª·¢µÄÖØÒª±øÆ÷ϵͳ´æÔÚ´óÁ¿°²È«·ì϶ £¬¼«Ò×Ôâµ½ºÚ¿Í¹¥»÷¡£GAOµÄÉ󼯴Ó2017Äê7Ô³ÖÐøµ½2018Äê10Ô¡£Õâ·ÝÈ«ÃæµÄ»ã±¨½è¼øÁ˽ü30ÄêÀ´µÄ×êÑÐ³É¾Í £¬Ô̺¬½üÆÚ¶ÔÌØ¶¨±øÆ÷ϵͳµÄÍøÂ簲ȫÆÀ¹ÀÒÔ¼°¶ÔÃÀ¹ú¹ú·À²¿¡¢¹ú¶È°²È«¾ÖºÍ±øÆ÷²âÊÔ»ú¹¹ÈËÔ±µÄ²É·Ã £¬º­¸ÇÁË´óÁìÓòµÄÃÀ¹ú±øÆ÷ £¬²¢²é³­ÁËËùÓбøÖÖ¼°Ì«¿ÕÖеÄϵͳ¡£»ã±¨³Æ £¬²âÊÔÍŶÓÀûÓÃÏà¶Ôµ¥Ò»µÄ¹¤¾ßºÍ¼¼Êõ £¬Í¨¹ýÖîÈçÈõÃÜÂëºÍδ¼ÓÃܵÄͨѶµÈ¸ù»ùÎÊÌâ £¬Äܹ»µÈÏеØÔÚ²»±»¾õ²ìµÄÇé¿öÏÂÊÕÊÜÕæÊµµÄ±øÆ÷ϵͳ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-advanced-weaponry-is-easy-to-hack-even-by-low-skilled-attackers/

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù