¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180816

Ðû²¼Ê±¼ä 2018-08-16

¡¾Îó²î²¹¶¡¡¿Intel CPUÔÙ±»ÆØ¹â3¸öеıßÐŵÀ¹¥»÷Îó²îForeshadow


Çå¾²Ñо¿Ö°Ô±Åû¶ÁËÈý¸öÓ°ÏìIntel CPUµÄÇå¾²Îó²îµÄϸ½Ú£¬£¬£¬ÕâÈý¸öÎó²îÓë֮ǰµÄSpectreÊÇͳһÀàÎó²î£¬£¬£¬¶¼ÊÇʹÓÃÁËÏÖ´úCPUÆÕ±é¾ßÓеÄÍÆ²âÖ´Ðй¦Ð§À´ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÏÖÔÚ±»ÃüÃûΪL1TF/Foreshadow(NG)£¬£¬£¬Îó²î±àºÅΪForeshadow£¨CVE-2018-3615£©ÒÔ¼°Foreshadow-NG£¨CVE-2018-3620ºÍCVE-2018-3646£©¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÖ»ÓÐIntel CPUÊܵ½´ËÈý¸öÎó²îµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/foreshadow-intel-processor-vulnerability.html


¡¾Îó²î²¹¶¡¡¿AdobeÐû²¼8ÔÂÇå¾²¸üУ¬£¬£¬¹²ÐÞ¸´11¸öÇå¾²Îó²î


AdobeÔÚ2018Äê8ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁË11¸öÎó²î£¬£¬£¬Ó°ÏìÁËFlash Player¡¢Creative Cloud ¡¢Experience ManagerºÍAcrobat ReaderËÄ¿îÊ¢ÐеIJúÆ·¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐAcrobat ReaderÖеÄÁ½¸öÎó²î£¨CVE-2018-12808ºÍCVE-2018-12799£©ÊǸßΣµÄí§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¡£Ã»Óм£ÏóÅú×¢±¾ÔÂÇå¾²¸üÐÂÐÞ¸´µÄÎó²îÔÚÒ°Íâ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£¡£Adobe½¨ÒéÓû§ºÍÖÎÀíÔ±¾¡¿ìÏÂÔØºÍ×°ÖÃ×îеÄÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/adobe-patch-updates.html


¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿Ö°Ô±ÑÝʾÔõÑù´ÓVPNÅþÁ¬Öлָ´HTTPÊý¾Ý


Çå¾²Ñо¿Ô±Ahamed NafeezÑÝʾ¿ÉÔÚijЩÌõ¼þÏ»ָ´Í¨¹ý¼ÓÃÜVPNÅþÁ¬·¢Ë͵ÄHTTPÁ÷Á¿µÄVORACLE¹¥»÷ÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£¡£VORACLE×Ô¼º²¢²»ÊÇÒ»ÖÖÐµĹ¥»÷£¬£¬£¬¶øÊǾɵļÓÃܹ¥»÷£¨ÈçCRIME¡¢TIMEºÍBREACH£©µÄ±äÒìºÍ»ìÏý¡£¡£¡£¡£¡£¡£¡£¡£Nafeez³Æ¸Ã¹¥»÷½öÊÊÓÃÓÚ¹¹½¨ÔÚOpenVPNЭÒéÖ®ÉϵÄVPNЧÀÍ£¬£¬£¬ÓÉÓÚ¿ªÔ´µÄOpenVPNЭÒéµÄĬÈÏÉèÖÃÖª×ã¸Ã¹¥»÷µÄÌõ¼þ¡£¡£¡£¡£¡£¡£¡£¡£OpenVPNÔÚ½Óµ½±¨¸æºóÔÚÆäÎĵµÖÐÃ÷È·ÖÒÑÔÁ˸ÃΣº¦¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/voracle-attack-can-recover-http-data-from-vpn-connections/


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÅû¶¹ØÓÚIE 0day(CVE-2018-8373)µÄ¸ü¶àϸ½Ú


Ç÷ÊÆ¿Æ¼¼ZDIÍŶÓÅû¶Á˹ØÓÚIE 0day£¨CVE-2018-8373£©µÄ¸ü¶àϸ½Ú¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ7ÔÂ11ÈÕ·¢Ã÷Á˸ÃÎó²î£¬£¬£¬ËäÈ»¸ÃÎó²îÓ°ÏìÁË×îа汾µÄWindowsÖеÄVBScriptÒýÇæ£¬£¬£¬µ«IE 11ûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÒ°Íâ·¢Ã÷ÁËʹÓøÃÎó²îµÄ¶ñÒâ¹¥»÷»î¶¯£¬£¬£¬ÆäÑù±¾Óë5Ô·ÝÐÞ¸´µÄVBScriptÒýÇæRCEÎó²î£¨CVE-2018-8174£©Ê¹ÓÃÁËÏàͬµÄ»ìÏýÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪÕâÁ½¸öÎó²îµÄʹÓôúÂë¿ÉÄܳö×Ôͳһ×÷ÕßÖ®ÊÖ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/use-after-free-uaf-vulnerability-cve-2018-8373-in-vbscript-engine-affects-internet-explorer-to-run-shellcode/


¡¾Ö´ÂÉÀýÔò¡¿Ç°Î¢Èí¹¤³ÌʦÒò¼ÓÈëÀÕË÷Èí¼þRevetonµÄÏ´Ç®°¸±»ÅÐÐÌ18¸öÔÂ


ǰ΢ÈíÍøÂ繤³ÌʦRaymond Odigie Uadiale£¨41Ë꣩ÒòÉæ¼°ÀÕË÷Èí¼þRevetonµÄÏ´Ç®°¸±»ÅÐÈëÓü18¸öÔ¡£¡£¡£¡£¡£¡£¡£¡£Uadiale²»ÊÇÀÕË÷Èí¼þRevetonµÄÏÖʵ×÷Õߣ¬£¬£¬µ«Ëû×ÊÖúÀÕË÷Èí¼þµÄ×÷Õß½«´ÓÊܺ¦ÕßÄÇÀïÊÕÈ¡µÄÊê½ð¾ÙÐÐÏ´Ç®£¬£¬£¬²¢ÊÕÈ¡30%µÄÓöÈ£¬£¬£¬Éæ°¸½ð¶îΪ93640ÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/microsoft-reveton-ransomware.html


¡¾¹¥»÷ÊÂÎñ¡¿Ó¡¶ÈÒøÐÐCosmos BankÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ÈýÌìÄÚËðʧÁè¼Ý1350ÍòÃÀÔª


ÉÏÖÜĩӡ¶ÈÒøÐÐCosmos BankÔâµ½ºÚ¿ÍµÄÈëÇÖ£¬£¬£¬¹¥»÷ÕßÔÚÈýÌìÄÚÇÔÈ¡ÁËÁè¼Ý9.4ÒÚ¬±È£¨Ô¼1350ÍòÃÀÔª£©µÄ×ʽ𡣡£¡£¡£¡£¡£¡£¡£¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬Ç°Á½´Î͵ÇÔ±¬·¢ÔÚ8ÔÂ11ÈÕÐÇÆÚÁù£¬£¬£¬¹¥»÷Õßͨ¹ý28¸ö¹ú¼ÒµÄ14849±ÊATMÉúÒâÇÔÈ¡ÁËÔ¼1140ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£ËæºóÔÚ8ÔÂ13ÈÕÐÇÆÚÒ»£¬£¬£¬¹¥»÷ÕßÔÙ´Îͨ¹ýSWIFTϵͳÇÔÈ¡ÁËÔ¼200ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷À´×Ô¼ÓÄô󣬣¬£¬¸ÃÒøÐÐÌåÏִ˴ι¥»÷µÄÊÖÒÕϸ½ÚÈÔÔÚ½øÒ»³ÌÐò²éÖ®ÖС£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-steal-135-million-across-three-days-from-indian-bank/