AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369

Ðû²¼Ê±¼ä 2023-09-14

1¡¢AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369


9ÔÂ12ÈÕ£¬£¬£¬£¬ £¬£¬£¬AdobeÒÑÐû²¼±¾ÔµÄÖܶþ²¹¶¡£¡£¡£¡£¬£¬£¬£¬ £¬£¬£¬ÐÞ¸´ÁËAcrobatºÍReaderÖÐÒѱ»Ê¹ÓõÄÎó²î£¨CVE-2023-26369£©¡£¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎó²î£¬£¬£¬£¬ £¬£¬£¬ÀÖ³ÉʹÓÿÉÔÚÄ¿µÄÅÌËã»úÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶Óйع¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬µ«½¨ÒéÓû§×îÐÒ¿÷72СʱÄÚ×°ÖøüС£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬Adobe»¹ÐÞ¸´ÁËConnectÖеÄXSSÎó²î£¨CVE-2023-29305ºÍCVE-2023-29306£©ºÍExperience ManagerÖеÄXSSÎó²î£¨CVE-2023-38214ºÍCVE-2023-38215£©¡£¡£¡£¡£


https://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html


2¡¢Microsoft TeamsЧÀÍÖÐÖ¹Ö÷ÒªÓ°Ïì±±ÃÀµØÇøµÄÓû§


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬£¬MicrosoftÕýÔÚÊӲ쵼Ö¿ͻ§ÎÞ·¨Ê¹ÓÃMicrosoft TeamsÊÕ·¢ÐÂÎŵÄÖÐÖ¹ÎÊÌâ¡£¡£¡£¡£´Ó8µã×óÓÒ×îÏÈ£¬£¬£¬£¬ £¬£¬£¬²¿·ÖÓû§·´Ó¦ÔÚÅþÁ¬TeamsЧÀÍÆ÷»òWebÓ¦ÓÃʱÓöµ½ÁËÎÊÌâ¡£¡£¡£¡£Î¢ÈíÏÖÔÚÒѾ­È·¶¨£¬£¬£¬£¬ £¬£¬£¬¸ÃÎÊÌâ½ö±£´æÓÚͨ¹ý±±ÃÀÊÜÓ°Ïì»ù´¡ÉèÊ©ÌṩЧÀ͵IJ¿·ÖÓû§£¬£¬£¬£¬ £¬£¬£¬ËûÃÇÕýÔÚ½«±»Ó°ÏìµÄЧÀÍÁ÷Á¿Â·Óɵ½ÎȽ¡µÄ»ù´¡ÉèÊ©£¬£¬£¬£¬ £¬£¬£¬ÒÔ¼õ»ºÓ°Ïì¡£¡£¡£¡£×èÖ¹ÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ13ÈÕ13:25£¬£¬£¬£¬ £¬£¬£¬Î¢ÈíÌåÏÖTeamsÐÂÎÅת´ïÎÊÌâÏÖÒѽâ¾ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-down-ongoing-outage-behind-message-failures-delays/


3¡¢GitHubÖÐÎó²î¿Éµ¼ÖÂ4ǧ¶à´æ´¢¿âÔâµ½Repojacking¹¥»÷


CheckmarxÔÚ9ÔÂ12ÈÕ³ÆÆä·¢Ã÷ÁËGitHubÖеÄÒ»¸öÐÂÎó²î£¬£¬£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂ4000¶à¸ö´æ´¢¿âÔâµ½Repojacking¹¥»÷¡£¡£¡£¡£ÔÚRepoJacking¹¥»÷ÖУ¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÔÚÕýµ±½¨ÉèÕ߸ü¸ÄÓû§ÃûºóʹÓô洢¿âµÄ¾ÉÓû§Ãû£¬£¬£¬£¬ £¬£¬£¬È»ºóÐû²¼Í¬ÃûµÄ¶ñÒâ´æ´¢¿âÒÔÓÕÆ­Óû§ÏÂÔØÆäÄÚÈÝ¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÐ®ÖÆGo¡¢PHPºÍSwiftµÈÓïÑÔµÄ4000¶à¸ö´úÂë°üÒÔ¼°GitHub»î¶¯¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ3ÔÂ1ÈÕÅû¶Á˸ÃÎó²î£¬£¬£¬£¬ £¬£¬£¬´úÂëÍÐ¹ÜÆ½Ì¨ÒÑÓÚ9ÔÂ1ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£


https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/


4¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæAirbusÊýǧ¼Ò¹©Ó¦É̵ÄÊý¾Ý


¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬£¬º½¿Õ¹«Ë¾AirbusÕýÔÚÊÓ²ìÉæ¼°3200¼Ò¹©Ó¦É̵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£ÃûΪUSDoDµÄºÚ¿ÍÓÚ±¾ÖÜÒ»ÔÚBreachForumsÉÏ·¢Ìû³Æ£¬£¬£¬£¬ £¬£¬£¬ËûÃÇÈëÇÖÁËÒ»ÃûÍÁ¶úÆäº½¿Õ¹«Ë¾Ô±¹¤µÄÕË»§²¢»ñµÃÁËAirbusÃÅ»§ÍøÕ¾µÄ»á¼ûȨÏÞ¡£¡£¡£¡£»£»£» £»£»¹Í¸Â¶ÓµÓÐÊýǧ¼ÒAirbus¹©Ó¦É̵ÄÏêϸÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£USDoD×Ô³ÆÊÇRansomedµÄÕýʽ³ÉÔ±£¬£¬£¬£¬ £¬£¬£¬²¢ÌåÏÖLockheed MartinºÍRaytheon¿ÉÄÜ»áÊÇÏÂÒ»¸öûĿµÄ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÔÚÈ¥Äê12Ô·ݻ¹Ôø³öÊÛÁËFBI¹²ÏíϵͳInfraGardµÄÊý¾Ý¿â¡£¡£¡£¡£


https://therecord.media/airbus-data-leak-suppliers-breachedforums


5¡¢Symantec·¢Ã÷RedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯


9ÔÂ12ÈÕ£¬£¬£¬£¬ £¬£¬£¬SymantecÅû¶ÁËRedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷»î¶¯×îÔçµÄ¼£ÏóÓÚ2ÔÂ23ÈÕ±»¼Í¼£¬£¬£¬£¬ £¬£¬£¬ÆäʱShadowPadÔÚһ̨ÅÌËã»úÉÏÖ´ÐУ¬£¬£¬£¬ £¬£¬£¬ºóÓÚ5ÔÂ17ÈÕÔٴα»Ö´ÐУ¬£¬£¬£¬ £¬£¬£¬×îºóµÄ»î¶¯¼£Ïó·ºÆðÓÚ8ÔÂ3ÈÕ¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓõŤ¾ß°üÀ¨£ºÄ£¿£¿£¿£¿£¿é»¯RAT ShadowPad£¬£¬£¬£¬ £¬£¬£¬Ëüαװ³ÉVMwareÎļþ£¬£¬£¬£¬ £¬£¬£¬Ö§³ÖÊý¾Ýй¶¡¢»÷¼ü¼Í¼¡¢ÎļþËÑË÷ÒÔ¼°Ô¶³ÌÏÂÁîÖ´ÐеÈ£»£»£» £»£»Packerloader£¬£¬£¬£¬ £¬£¬£¬ÓÃÓÚÔÚÄܹ»ÈƹýAV¼ì²âµÄAES¼ÓÃÜÎļþÖмÓÔØºÍÖ´ÐÐshellcode£»£»£» £»£»ÒÔ¼°¼üÅ̼ͼ³ÌÐò£¬£¬£¬£¬ £¬£¬£¬ÔÚÄ¿µÄϵͳÉϵÄÈÕÖ¾ÎļþÖв¶»ñ»÷¼ü¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷ÓëAPT41£¨ÓÖÃûWinnti£©µÄ»î¶¯ÓÐÖØµþ¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/critical-infrastructure-attacks


6¡¢KasperskyÅû¶Free Download Manager¹©Ó¦Á´¹¥»÷


9ÔÂ12ÈÕ£¬£¬£¬£¬ £¬£¬£¬Kaspersky±¨¸æ³ÆFree Download Manager¹©Ó¦Á´¹¥»÷½«LinuxÓû§Öض¨Ïòµ½×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¶ñÒâDebianÈí¼þ°ü´æ´¢¿â¡£¡£¡£¡£KasperskyÔÚÊÓ²ì¿ÉÒÉÓòʱ·¢Ã÷Á˸û£¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚÒѾ­¾ÙÐÐÁËÈýÄê¶à¡£¡£¡£¡£¸Ã¶ñÒâDebianÈí¼þ°üÓÃÓÚ×°ÖûùÓÚDebianµÄLinux¿¯Ðа棬£¬£¬£¬ £¬£¬£¬Ëü»á·Ö·¢Ò»¸öBashÐÅÏ¢ÇÔÈ¡¾ç±¾ºÍÒ»¸ö´ÓC2½¨Éè·´ÏòshellµÄcrondºóÃÅ¡£¡£¡£¡£crond×é¼þÔÚϵͳÉϽ¨ÉèÒ»¸öеÄcronʹÃü£¬£¬£¬£¬ £¬£¬£¬¿ÉÔÚϵͳÆô¶¯Ê±ÔËÐÐÇÔÈ¡¾ç±¾¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÑÏòÈí¼þ¹©Ó¦ÉÌת´ïÁË´ËÊ£¬£¬£¬£¬ £¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´£¬£¬£¬£¬ £¬£¬£¬Òò´ËÈ·ÇеÄÈëÇÖ·½·¨ÈÔ²»ÇåÎú¡£¡£¡£¡£


https://securelist.com/backdoored-free-download-manager-linux-malware/110465/