AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£»£»£»£»£» £»£»£»GoogleÑо¿Ö°Ô±Åû¶LinuxÄÚºËÖÐBleedingToothÎó²î

Ðû²¼Ê±¼ä 2020-10-15
1.AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ


1.jpg


AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ £¬£¬£¬£¬ £¬£¬£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷»î¶¯¡£¡£¡£¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓù»î¶¯µÄÊý¾Ý £¬£¬£¬£¬ £¬£¬£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò £¬£¬£¬£¬ £¬£¬£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£¡£¡£¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ £¬£¬£¬£¬ £¬£¬£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú £¬£¬£¬£¬ £¬£¬£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊÐ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.agari.com/email-security-blog/business-email-compromise-geography/


2.GoogleÑо¿Ö°Ô±Åû¶LinuxÄÚºËÖÐBleedingToothÎó²î


2.jpg


¹È¸èÇå¾²Ñо¿Ö°Ô±Andy NguyenÔÚLinuxÄÚºËÖз¢Ã÷ÁËÀ¶ÑÀÎó²î £¬£¬£¬£¬ £¬£¬£¬³ÆÎªBleedingTooth £¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔËÐÐí§Òâ´úÂë»ò»á¼ûÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-12351¡¢CVE-2020-12352ºÍCVE-2020-24490¡£¡£¡£¡£ÔÚÊܺ¦ÕßÀ¶ÑÀ¹æÄ£ÄÚ £¬£¬£¬£¬ £¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÒ»¸ö¶ñÒâµÄl2cap°üÀ´´¥·¢¸ÃÎó²î £¬£¬£¬£¬ £¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ £¬£¬£¬£¬ £¬£¬£¬ÉõÖÁʹÓÃÄÚºËȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£²¢ÇÒÕâÊÇÒ»¸öÁãµã»÷Îó²î £¬£¬£¬£¬ £¬£¬£¬¼´ÎÞÐèÓëÓû§½»»¥¼´¿ÉʹÓᣡ£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/109500/hacking/bluetooth-bleedingtooth-vulnerabilities.html


3.Hindotech HK1»ú¶¥ºÐ±£´æÌáȨÎó²î £¬£¬£¬£¬ £¬£¬£¬¿ÉÓÃÀ´ÇÔÈ¡Êý¾Ý


3.png


Ñо¿Ö°Ô±·¢Ã÷Hindotech HK1»ú¶¥ºÐ±£´æÌáȨÎó²î £¬£¬£¬£¬ £¬£¬£¬¿ÉÓÃÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ»á¼û¿ØÖƲ»µ± £¬£¬£¬£¬ £¬£¬£¬ÌØÊâÊǵ±Í¨¹ý´®¿Ú(UART)ÅþÁ¬µ½×°±¸Ê± £¬£¬£¬£¬ £¬£¬£¬»òÕß¿´³ÉΪ·ÇÌØÈ¨Óû§Ê¹ÓÃAndroidµ÷ÊÔÇŽÓ(adb)ʱ £¬£¬£¬£¬ £¬£¬£¬ÔÊÐíÍâµØÎÞÌØÈ¨Óû§Éý¼¶ÎªrootÓû§¡£¡£¡£¡£¹¥»÷ÕßÀֳɵÄʹÓøÃÎó²î¿ÉÇÔÈ¡Éç½»ÍøÂçÕÊ»§ÁîÅÆ¡¢Wi-FiÃÜÂë¡¢Cookie¡¢ÒÑÉúÑĵÄÃÜÂë¡¢Óû§Î»ÖÃÊý¾Ý¡¢ÐÂÎÅÀúÊ·¼Í¼¡¢µç×ÓÓʼþºÍÁªÏµÈ˵ȡ£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/authentication-bug-android-smart-tv-data-theft/160025/


4.΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡ £¬£¬£¬£¬ £¬£¬£¬×ܼÆÐÞ¸´87¸öÇå¾²Îó²î


4.png


΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡ £¬£¬£¬£¬ £¬£¬£¬×ܼÆÐÞ¸´87¸öÇå¾²Îó²î¡£¡£¡£¡£´Ë´Î¸üÐÂÖÐÐÞ¸´ÁË6¸öÒѱ»¹ûÕæµÄÎó²î £¬£¬£¬£¬ £¬£¬£¬°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2020-16938£©¡¢Windows Storage VSPÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16885£©¡¢WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2020-16901£©¡¢Windows×°ÖóÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16908£©¡¢Windows¹ýʧ±¨¸æÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16909£©ºÍ.NET FrameworkÐÅϢй¶Îó²î£¨CVE-2020-16937£©


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-october-2020-patch-tuesday-fixes-87-security-bugs/


5.ŲÍþÕþ¸®³ÆÆä8ÔÂÔâµ½µÄÍøÂç¹¥»÷Óë¶íÂÞ˹ºÚ¿ÍÓйØ


5.png


ŲÍþÕþ¸®³Æ8ÔÂ·ÝÆäÒé»á£¨Stortinget£©µç×ÓÓʼþϵͳÔâµ½µÄÍøÂç¹¥»÷Óë¶íÂÞ˹ºÚ¿ÍÓйء£¡£¡£¡£StortingÓÚ8ÔÂ24ÈÕÐû²¼Æäµç×ÓÓʼþϵͳ±¬·¢Êý¾Ýй¶ £¬£¬£¬£¬ £¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁ˸ùúÖÐÐĵ³ºÍ¹¤µ³µÄ´ú±í¼°³ÉÔ±¡£¡£¡£¡£Å²ÍþÍâ½»²¿³¤Ine EriksenS?reideÓÚ10ÔÂ13ÈÕÌåÏÖ £¬£¬£¬£¬ £¬£¬£¬¶íÂÞ˹ÊÇ´Ë´ÎÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£¡£¡£Ëæºó £¬£¬£¬£¬ £¬£¬£¬Æ¾Ö¤ÐÂÎÅÉçTASSµÄ±¨µÀ £¬£¬£¬£¬ £¬£¬£¬¶íÂÞ˹Õýʽ·ñ¶¨Ö¸¿Ø £¬£¬£¬£¬ £¬£¬£¬³ÆÆäûÓÐÖ¤¾Ý¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/norway-says-russia-behind-cyber-attack-parliament


6.¹ú¼ÊÂÉËùSeyfarthÔâÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬ÓʼþϵͳÔÝʱ¹Ø±Õ


6.png


¹ú¼ÊÂÉËùSeyfarthÐû²¼ÆäÓÚÖÜÄ©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬ÓʼþϵͳÔÝʱ¹Ø±Õ¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚÉÏÖÜÁù £¬£¬£¬£¬ £¬£¬£¬Seyfarth³ÆÐí¶àÆäËû¹«Ë¾Ò²Í¬Ê±Ôâµ½Á˹¥»÷¡£¡£¡£¡£¸Ã¹«Ë¾µÄ¶à¸öϵͳ±»¼ÓÃÜ £¬£¬£¬£¬ £¬£¬£¬×÷ΪԤ·À²½·¥ £¬£¬£¬£¬ £¬£¬£¬Æä¹Ø±ÕÁ˱»¼ÓÃÜÅÌËã»ú £¬£¬£¬£¬ £¬£¬£¬°üÀ¨µç×ÓÓʼþϵͳ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄΣº¦Ë®Æ½ £¬£¬£¬£¬ £¬£¬£¬¿ÉÊÇSeyfarth³ÆÃ»Óпͻ§»ò¹«Ë¾Êý¾Ýй¶¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/international-law-firm-seyfarth-discloses-ransomware-attack/