Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐÅ·¹¥»÷£»Î¢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£»ÂÞ¿ËΤ¶û¼°½­É­×Կؽ¨¸´¶à¸ö·ì϶

°ä²¼¹¦·ò 2020-03-12

1.×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐÅ·¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÕë¶ÔIntel CPUµÄÐÂLVI£¨¸ºÔØÖµ×¢È룩¹¥»÷£¬¸Ã¹¥»÷ÔÊÐí¹¥»÷Õ߸ü¸Ä·¨Ê½µÄÕý³£Ö´ÐкÍÇÔÈ¡SGX°²È«ÇøÓòÄÚµÄÃÜÂë¡¢Ö¤Êé˽ԿµÈÃô¸ÐÊý¾Ý¡£¸ÃÎÊÌâ±»×·×ÙΪCVE-2020-0551£¬ÓÉÒ»×é×êÑÐÍŶÓÔÚ2019Äê4ÔÂ4Èջ㱨¸øIntel£¬Bitdefender×êÑÐÈËÔ±»¹¶ÀÁ¢·¢ÏÖÁËLVIÀ๥»÷µÄÒ»ÖÖ±äÌ壨LVI-LFB£©£¬²¢ÓÚ2020Äê2Ô»㱨¸øÁËIntel¡£Ö»¹Ü¸Ã¹¥»÷½ö±»ÊÓΪÀíÂÛÉϵÄÍþв£¬µ«IntelÒѰ䲼ÁËÏàÓ¦µÄ¹Ì¼þ²¹¶¡ÒÔ¼õÇá¶Ôµ±Ç°CPUµÄ¹¥»÷£¬²¢½«±ÉÈËÒ»´ú£¨Ó²¼þÉè¼Æ£©Öв¿Êð¸Ã½¨¸´·¨Ê½¡£´Ó¼¼ÊõÉϽ²£¬LVIÊÇMeltdown¹¥»÷µÄ·´Ïò£¬ËüÔÊÐí¹¥»÷Õß½«´úÂë×¢ÈëCPUÄÚ²¢Ê¹Æä×÷Ϊ¹ý¶ÉµÄ¡°Ò»Ê±¡±²Ù×÷Ö´ÐУ¬´Ó¶øÊ¹¹¥»÷Õß»ñµÃ¸üºÃµÄ½ÚÔìȨ¡£ÔÚÏÖʵ²âÊÔÖÐÖ»ÓÐÓ¢ÌØ¶ûCPU±»È·ÈÏÊÜеÄLVI¹¥»÷Ó°Ï죬µ«×êÑÐÈËÔ±²¢²»ÅųýAMDºÍARMÒ²¿ÉÄÜÊܵ½Ó°Ïì¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-lvi-intel-cpu-data-theft-vulnerability-requires-hardware-fix/


2.΢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£¬Ï°È¾È«Çò900Íǫ̀µçÄÔ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢Èí°ä·¢µ·»ÙÀ¬»øÓʼþ½©Ê¬ÍøÂçNecurs£¬NecursÊǵ±Ç°È«Çò×î´óµÄ½©Ê¬ÍøÂçÖ®Ò»£¬¾Ý³ÆËüÔÚÈ«ÇòϰȾÁ˳¬¹ý900ÍòÌ¨ÍÆËã»ú¡£3ÔÂ5ÈÕÃÀ¹úŦԼ¶«Çø´¦Ëù·¨Ôº°ä²¼ÁËÒ»ÏîºÅÁÔÊÐí΢ÈíÊÕÊÜNecursÔÚÃÀ¹úµÄ»ù´¡ÉèÊ©¡£´Ë±í£¬Î¢Èíͨ¹ý¶ÈÎöºÍÆÆ½âNecursʹÓõÄÓòÃûÌìÉúËã·¨£¨DGA£©£¬¿ÉÄÜÕýÈ·µØÔ¤²âÔÚ½«À´25¸öÔÂÄÚNecurs½«´´½¨²¢ÓÃ×÷»ù´¡ÉèÊ©µÄ³¬¹ý600Íò¸öÓòÃû¡£Î¢Èí½«ÕâЩÓòÃû»ã±¨¸øÁËÊÀ½çÁйúµÄ×¢²áÖÎÀí»ú¹¹£¬´Ó¶ø×èÖ¹ÕâЩÓòÃû±»×¢²áºÍ³ÉΪNecurs»ù´¡¼Ü¹¹µÄÒ»²¿ÃÅ¡£Í¨¹ý½ÚÔìÆäÏÖÓлù´¡ÉèÊ©ºÍÒÖÔìÆä½«À´×¢²áÐÂÓòÃûµÄÄÜÁ¦£¬Î¢Èí³É¹¦µ·»ÙNecurs¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-takes-control-of-necurs-us-based-infrastructure/


3.΢Èí°ä²¼3ÔÂWindows°²È«¸üУ¬½¨¸´115¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢Èí°ä²¼µÄ3ÔÂWindows°²È«¸üн¨¸´ÁË115¸ö·ì϶£¬ÕâÊǸù«Ë¾º¹ÇàÉÏ×î´óµÄÒ»¸öÖܶþ²¹¶¡¸üС£ÆäÖÐWindows LNK¿ì½ÝÎļþÖеķì϶£¨CVE-2020-0684£©±ØÒª¹Ø×¢£¬¸Ã·ì϶¿Éµ¼Ö¹¥»÷ÕßÒÔÓû§È¨ÏÞÔ¶³ÌÖ´ÐдúÂë¡£¹¥»÷ÕßÄܹ»ÏòÓû§ÌṩÔ̺¬¶ñÒâ.LNKÎļþºÍÓйضñÒâ¶þ½øÔìÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷»òÔ¶³Ì¹²Ïí£¬µ±Óû§ÔÚWindows×ÊÔ´ÖÎÀíÆ÷»òÈÎºÎÆäËû½âÎö.LNKÎļþµÄÀûÓ÷¨Ê½Öдò¿ª´ËÇý¶¯Æ÷£¨»òÔ¶³Ì¹²Ïí£©Ê±£¬¶ñÒâ¶þ½øÔìÎļþ½«ÔÚÖ¸±êϵͳÉÏÖ´Ðй¥»÷ÕߵĴúÂë¡£ÆëÈ«·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities/


4.ÂÞ¿ËΤ¶û¼°½­É­×Կؽ¨¸´ICSÉ豸ÖеĶà¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÂÞ¿ËΤ¶û×Ô¶¯»¯£¨Rockwell Automation£©ºÍ½­É­×Ô¿Ø£¨Johnson Controls£©½¨¸´ÆäICSÉ豸ÖеĶà¸ö·ì϶¡£ÂÞ¿ËΤ¶û×Ô¶¯»¯½¨¸´µÄ¶à¸ö¹Ø¼ü·ì϶ӰÏìÁËMicroLogix 1400½ÚÔìÆ÷¡¢MicroLogix 1100½ÚÔìÆ÷ºÍRSLogix 500Èí¼þ£¬·ì϶ÁìÓòÔ̺¬Ó²±àÂëµÄ¼ÓÃÜÃÜÔ¿£¨CVE-2020-6990£©¡¢ÈõÃÜÂë±£»¤Ëã·¨£¨CVE-2020-6984£©¡¢Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2020-6988£©ÒÔ¼°Ã÷ÎÄ´æ´¢Ãô¸ÐÐÅÏ¢£¨CVE-2020-6980£©¡£½­É­×Ô¿ØÔò½¨¸´ÁËKantech EntraPass²úÆ·ÖеIJ»ÕýÈ·ÊäÈëÑéÖ¤·ì϶£¨CVE-2019-7589£©¡£ÕâЩ·ì϶µÄCVSS v3ÆÀ·Ö¾ùΪ9.8·Ö£¬½¨ÒéÓû§¾¡¿ìÀûÓøüлò»º½â´ëÊ©¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/critical-bugs-in-rockwell-johnson-controls-ics-gear/153602/


5.Intel°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö²úÆ·ÖеÄ27¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢ÌØ¶û±¾Öܰ䲼°²È«¸üУ¬½¨¸´Í¼ÐÎÇý¶¯·¨Ê½¡¢FPGA¡¢´¦ÖÃÆ÷NUC¡¢BlueZµÈ²úÆ·ÖеÄ27¸ö·ì϶¡£IntelÔÚͼÐÎÇý¶¯·¨Ê½Öн¨¸´ÁË17¸ö·ì϶£¬ÆäÖÐ×îÑϳÁµÄ·ì϶ÊÇ»º³åÇøÒç¶Âí½Å£¨CVE-2020-0504£©£¬¸Ã·ì϶¿ÉÄܵ¼Ö»ؾø·þÎñ£¬ÆäCVSSÆÀ·ÖΪ8.4¡£IntelÔÚFPGA PAC N3000Öн¨¸´ÁËÁ½¸ö·ì϶£¬Ô̺¬ÌØÈ¨Éý¼¶·ì϶£¨CVE-2019-14626£©ºÍ»Ø¾ø·þÎñ·ì϶£¨CVE-2019-14625£©£¬ÕâÁ½¸ö·ì϶¾ùΪÖÐΣ·ì϶¡£´Ë±í£¬Intel»¹ÎªNUC¹Ì¼þ½¨¸´Á˲»Êʵ±µÄ»º³åÇøÏ޶ȺÍÊäÈëÑéÖ¤·ì϶£¬ÕâÁ½¸ö·ì϶±ðÀë±»¸ú×ÙΪCVE-2020-0530ºÍCVE-2020-0526£¬ÆäCVSSÆÀ·Ö±ðÀëΪ7.8ºÍ7.7£¬¶¼¿ÉÄܵ¼ÖÂÌØÈ¨Éý¼¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/intel-patches-27-vulnerabilities-across-product-portfolio


6.WhisperÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬Ð¹Â¶Ô¼9Òڱʼͼ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾Ý¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨Â·£¬ÄäÃû°ÂÃØ¹²ÏíÀûÓÃWhisperÓÉÓÚÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬µ¼ÖÂÔ¼9Òڱʼͼй¶¡£×êÑÐÈËÔ±Matthew PorterºÍDan Ehrlich·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖд洢µÄÊý¾ÝÊÇ´Ó2012Äê¸ÃAPP°ä²¼Ò»Ïòµ½´Ë¿ÌµÄËùº±¼û¾Ý¡£Ö»¹Ü¼Í¼Öв»Ô̺¬Óû§Ãû£¬µ«ÆäÖÐÔ̺¬êdzơ¢´ºÇï¡¢ÖÖ×å¡¢ÐԱ𡢼ÒÏç¡¢¼¯Ìå³ÉÔ±¹ØÏµÒÔ¼°Óë·¢ÌûÓйصĵØÎ»Êý¾Ý¡£ÕâЩλÏàÐÅÏ¢Ô̺¬À´×ÔÓû§×î½ü·¢ÌûµÄ×ø±ê£¬ÀýÈçÌØ¶¨µÄѧÌᢹ¤×÷³¡ËùºÍ¾ÓÃñÇø¡£WhisperÔÚ½Óµ½Í¨Öªºó³·ÏúÁ˸ÃÊý¾Ý¿âµÄ½Ó¼ûȨÏÞ£¬²¢Í¨ÖªÁËÁª¹ú·¨ÂÉ»ú¹¹¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private/