ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ51ÖÜ

°ä²¼¹¦·ò 2020-12-21

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê12ÔÂ14ÈÕÖÁ12ÔÂ20ÈÕ¹²ÊÕ¼°²È«·ì϶58¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇFoxit Reader CVE-2020-13548ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶ £»Dex Idp Dex samlÑéÖ¤ÈÆ¹ý·ì϶ £»IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÒªÇóαÔì·ì϶ £»DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾¾ç±¾·ì϶ £»EPSON EPS TSE Server CVE-2020-28930¿çÕ¾¾ç±¾·ì϶ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇIntelµÄHabana LabsϰȾPay2Key£¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ £»ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷ £»Apple°²È«¸üУ¬½¨¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö·ì϶ £»ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý £»Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ó°Ïì300ÍòÓû§ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ ¡£


³ÁÒª°²È«·ì϶Áбí


1.Foxit Reader CVE-2020-13548ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶


Foxit Reader´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£

https://www.foxitsoftware.com/support/security-bulletins.html


2.Dex Idp Dex samlÑéÖ¤ÈÆ¹ý·ì϶


Dex Idp Dex saml´æÔÚÑéÖ¤ÈÆ¹ý·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨ½Ó¼û ¡£

https://access.redhat.com/security/cve/cve-2020-27847


3.IBM Financial Transaction Manager for SWIFT Services CVE-2020-4904¿çÕ¾ÒªÇóαÔì·ì϶


IBM Financial Transaction Manager for SWIFT Services´æÔÚ¿çÕ¾ÒªÇóαÔì·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâURI£¬ÓÕʹҪÇó£¬Äܹ»Ö¸±êÓû§¸ßµÍÎÄÖ´ÐжñÒâ²Ù×÷ ¡£

https://www.ibm.com/support/pages/node/6371260


4.DELL Dell EMC iDRAC9 CVE-2020-26198¿çÕ¾¾ç±¾·ì϶


DELL Dell EMC iDRAC9 webÀûÓôæÔÚ¿çÕ¾¾ç±¾·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶עÈë¶ñÒâ¾ç±¾»òHTML´úÂ룬µ±¶ñÒâÊý¾Ý±»²é¿´Ê±£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»° ¡£

https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability


5.EPSON EPS TSE Server CVE-2020-28930¿çÕ¾¾ç±¾·ì϶


EPSON EPS TSE Server´æÔÚ¿çÕ¾¾ç±¾·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶עÈë¶ñÒâ¾ç±¾»òHTML´úÂ룬µ±¶ñÒâÊý¾Ý±»²é¿´Ê±£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò½Ù³ÖÓû§»á»° ¡£

https://www.seh-technology.com/services/downloads/download-fiscal-solutions/eps-tse-server-8.html



> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢IntelµÄHabana LabsϰȾPay2Key£¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ


1.png


IntelµÄAI´¦ÖÃÆ÷¿ª·¢ÉÌHabana LabsÔâµ½ÁËPay2KeyÀÕË÷Èí¼þ¹¥»÷£¬Ã³Ò×ÎĵµºÍÔ´´úÂë±»µÁ ¡£Habana LabsÊÇÒÔÉ«ÁÐAI´¦ÖÃÆ÷µÄ¿ª·¢ÉÌ£¬ÓÚ2019Äê12ÔÂÒÔ20ÒÚÃÀÔªµÄ¼ÛÖµ±»IntelÊÕ¹º ¡£Pay2KeyÔÚTwitterÉϰ䷢ÁËÕâ´Î¹¥»÷£¬²¢Ðû³ÆÒÑÇÔÈ¡ÁËÓйØÈËΪÖÇÄÜоƬ´úÂëGaudiµÄÐÅÏ¢Êý¾Ý ¡£¸ÃÍÅ»ïÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉϹ«¿ªÁ˸ù«Ë¾µÄÔ´´úÂëºÍÄÚ²¿¹ý³ÌµÄͼƬ£¬ÒÔ¼°WindowsÓò½ÚÔìÆ÷Êý¾ÝºÍGerrit¿ª·¢´úÂë²é³­ÏµÍ³µÄÎļþÁбí ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112258/data-breach/pay2key-hacked-habana-labs.html


2¡¢ÃÀ¹ú²ÆÕþ²¿µÈ²¿ÃÅÔâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷


2.jpg


ÃÀ¹ú²ÆÕþ²¿ºÍÉÌÎñ²¿¹ú¶ÈµçÐÅÓëÐÅÏ¢ÖÎÀí¾Ö£¨NTIA£©Ôâµ½ÓëFireEyeÒ»ÑùµÄ¹©¸øÁ´¹¥»÷ ¡£°²È«¹«Ë¾FireEye½ñÌ찵ʾ£¬µ±¾ÖÖ§³ÖµÄºÚ¿Í¹¥»÷ÁËÈí¼þÌṩÉÌSolarWinds£¬¶øºóΪÆäOrionÈí¼þ²¿ÊðÁ˶ñÒâ¸üз¨Ê½£¬ÒÔϰȾ¶à¸öÃÀ¹ú¹«Ë¾ºÍµ±¾ÖÍøÂ磬FireEye֮ǰҲÔâµ½ÁËÐÎͬµÄ¹¥»÷ ¡£SolarWindsÈ·ÈÏÆäÔÚ2020Äê3ÔÂÖÁ6ÔÂÖ®¼ä°ä²¼µÄOrion¸üа汾2019.4ÖÁ2020.2.1Òѱ»¶ñÒâÈí¼þϰȾ ¡£¾ÝÐÅ£¬Õâ´Î¹¥»÷»î¶¯Óë¶íÂÞ˹±í¹úµý±¨¾Ö£¨SVR£©ÓйصĺڿÍ×éÖ¯APT29ÓйØ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/


3¡¢Apple°²È«¸üУ¬½¨¸´Ó°ÏìiOSºÍiPadOSµÄ11¸ö·ì϶


3.jpg


Apple°ä²¼ÁËiOSºÍiPadOSµÄ°²È«¸üУ¬½¨¸´Ô̺¬´úÂëÖ´Ðзì϶ÔÚÄÚµÄ11¸ö·ì϶ ¡£Õâ´Î½¨¸´µÄ×îΪÑϳÁµÄÊÇ´úÂëÖ´Ðзì϶£¨CVE-2020-27943ºÍCVE-2020-27944£©£¬¹¥»÷Õß¿ÉÀûÓöñÒâ×ÖÌåÎļþÔÚApple iPhoneºÍiPadÉÏÖ´ÐжñÒâ´úÂë ¡£Æä´ÎΪÈý¸öÓ°ÏìÁËImageIO±à³Ì½Ó¿Ú¿ò¼ÜµÄ·ì϶CVE-2020-29617¡¢CVE-2020-29618ºÍCVE-2020-29619£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶ͨ¹ýÌØÔìͼÏñÖ´ÐÐËÁÒâ´úÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112304/security/ios-ipados-flaws.html


4¡¢ÐµÄAIR-FI¼¼Êõ¿ÉÀûÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý


4.jpg


ÒÔÉ«ÁÐѧÕß·¢ÏÖеÄAIR-FI¼¼Êõ£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£AIR-FI¼¼ÊõµÄÖ÷ÌâÊÇ£¬µ±µçÁ÷ͨ¹ýÆÚ£¬Èκεç×ÓÔª¼þ³ÇÊвúÉúµç´Å²¨ ¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬¶øÎÞÏßµç¸ù»ùÉÏÊǵç´Å²¨£¬Òò¶ø¹¥»÷ÕßÄܹ»Í¨¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂ룬À´Äܹ»°Ñ³ÖRAM¿¨ÄÚ²¿µÄµçÁ÷²úÉúÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨ ¡£¶øºóÀûÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄÉ豸À´»ñÈ¡¸ÃÐźÅ£¬ÒԸߴï100 b/sµÄËÙ¶ÈÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/


5¡¢Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ó°Ïì300ÍòÓû§


5.png


°²È«¹«Ë¾Avast½üÆÚ·¢ÏÖ28¿î¶ñÒâµÄä¯ÀÀÆ÷²å¼þ£¬Ô̺¬15¸öChromeÀ©´óºÍ13¸öEdgeÀ©´ó£¬ÒÑÓ°Ïì300ÍòÓû§ ¡£Õâ28¿î²å¼þÔ̺¬´óÁ¿ÊµÏÖ¶ñÒâ²Ù×÷µÄ´úÂ룬ÀýÈ罫Óû§Á÷Á¿³Á¶¨Ïòµ½¸æ°×¡¢½«Óû§Á÷Á¿³Á¶¨Ïòµ½ÍøÂç´¹µöÕ¾µã¡¢ÍøÂçÓ×ÎÒÊý¾Ý¡¢ÍøÂçä¯ÀÀ¼Í¼¡¢½«¸ü¶à¶ñÒâÈí¼þÏÂÔØµ½Óû§É豸ÉÏ ¡£Ä¿Ç°£¬GoogleÒÑɾ³ýÁË15¸ö¶ñÒâÀ©´ó·¨Ê½ÖеÄ3¸ö£¬¶øMicrosoftÒòÎÞ·¨È·ÈÏAvastµÄ»ã±¨¶øÉÐδ½øÐÐɾ³ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/three-million-users-installed-28-malicious-chrome-or-edge-extensions/