ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ45ÖÜ

Ðû²¼Ê±¼ä 2020-11-09

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ02ÈÕÖÁ11ÔÂ08ÈÕ¹²ÊÕ¼Çå¾²Îó²î61¸ö£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³öÎó²î£»£»£»£»£»£»£»£»Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»SaltStack Salt APIí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»Apache Shiro CVE-2020-17510ÊÚÈ¨ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇHackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»£»£»£»£»£»£»£»Pulse SecureÐû²¼ÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»£»GoogleÐû²¼Çå¾²¸üУ¬£¬ £¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0day£»£»£»£»£»£»£»£»Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬£¬ £¬ÉÐÎÞÏà¹Ø²¹¶¡£¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»£»AppleÐû²¼¸üУ¬£¬ £¬ÐÞ¸´Òѱ»Æð¾¢Ê¹ÓõÄ3¸ö0day¡£¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Adobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³öÎó²î


Adobe Acrobat Reader´¦Öóͷ£PDFÎļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬ £¬ÓÕʹÓû§ÆÊÎö£¬£¬ £¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://helpx.adobe.com/security/products/acrobat/apsb20-67.html


2.Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Google Android¸ßͨ¹Ø±ÕÔ´×é¼þ±£´æÇå¾²Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://source.android.com/security/bulletin/2020-11-01


3.Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Oracle WebLogic Server Oracle Fusion Middleware Console±£´æÇå¾²Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄHTTPÇëÇ󣬣¬ £¬¿ÉʹϵͳÍ߽⻣»£»£»£»£»£»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://www.oracle.com/security-alerts/alert-cve-2020-14750.html


4.SaltStack Salt APIí§Òâ´úÂëÖ´ÐÐÎó²î


SaltStack Salt API±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉδÊÚȨ»á¼ûí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://www.auscert.org.au/bulletins/ESB-2020.3863/


5.Apache Shiro CVE-2020-17510ÊÚÈ¨ÈÆ¹ýÎó²î


Apache Shiro±£´æÊÚÈ¨ÈÆ¹ýÎó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉδÊÚȨ»á¼ûÓ¦Óᣡ£¡£¡£¡£¡£¡£¡£

https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ


1.jpg


HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬£¬ £¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬£¬ £¬±È2019ÄêÔöÌíÁË134%¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬ £¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬£¬ £¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%)¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬£¬ £¬¸ßµÖ´ï400ÍòÃÀÔª£¬£¬ £¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬£¬ £¬Í¬±ÈÔöÌí63£¥¡£¡£¡£¡£¡£¡£¡£¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬£¬ £¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

hackerone.com/hacker-powered-security-report


2¡¢Pulse SecureÐû²¼ÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ


2.jpg


Pulse SecureÐû²¼ÁËÓÐ¹ØÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£ÄÇÐ©ÍÆ¶¯ºÍÍýÏëÁãÐÅÈÎÁ÷³ÌºÍÊÖÒÕʵÑ鯫ÏòµÄ×éÖ¯£¬£¬ £¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬ £¬ÁãÐÅÈÎÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬£¬ £¬ËѼ¯ÁËÇå¾²ºÍÍøÂçÍŶÓ¡£¡£¡£¡£¡£¡£¡£¡£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖЭ×÷·½·¨£¬£¬ £¬»®·ÖÊÇЭµ÷²î±ðϵͳ֮¼äµÄ»á¼ûÇå¾²¿ØÖÆ(48%)¡¢ÆÀ¹À»á¼ûÇå¾²¿ØÖÆÐèÇó(41%)ºÍƾ֤Óû§¡¢½ÇÉ«¡¢Êý¾ÝºÍÓ¦ÓóÌÐò½ç˵»á¼ûÐèÇó(40%)¡£¡£¡£¡£¡£¡£¡£¡£ÆóÒµÖÎÀíЭ»á¸±×ÜShamus McGillicuddyÌåÏÖ£¬£¬ £¬ÆóÒµÏÔÈ»ÕýÔÚ¼ÓËÙ½ÓÄÉÁãÐÅÈÎÍøÂçµÄ³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/


3¡¢GoogleÐû²¼Çå¾²¸üУ¬£¬ £¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0day


3.jpg


GoogleÐû²¼Çå¾²¸üУ¬£¬ £¬ÐÞ¸´ChromeÖеÄ10¸öÎó²î£¬£¬ £¬ÆäÖаüÀ¨Ò»¸öÔÚÒ°ÍâÒѱ»Æð¾¢Ê¹ÓõÄ0day¡£¡£¡£¡£¡£¡£¡£¡£¸Ã0day±»×·×ÙΪCVE-2020-16009£¬£¬ £¬ÓÉGoogleµÄÍþвÆÊÎöС×飨TAG£©·¢Ã÷£¬£¬ £¬µ«¸ÃС×鲢δ¹ûÕæ¹ØÓÚ¸ÃÎó²îµÄÏêϸÐÅÏ¢ÒÔ¼°Ê¹Ó㬣¬ £¬½öÌåÏÖ¸ÃÎó²îλÓÚ´¦Öóͷ£JavaScript´úÂëµÄChrome×é¼þV8ÖС£¡£¡£¡£¡£¡£¡£¡£²»¾Ãºó£¬£¬ £¬GoogleÓÖÐû²¼ÁËAndroid°æChromeÖеÄ0dayµÄ²¹¶¡³ÌÐò£¬£¬ £¬¸ÃÎó²î±»×·×ÙΪCVE-2020-16010£¬£¬ £¬ÎªChrome for AndroidÓû§½çÃæ£¨UI£©×é¼þÖеĶѻº³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/


4¡¢Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬£¬ £¬ÉÐÎÞÏà¹Ø²¹¶¡


4.jpg


˼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÈí¼þµÄ0day£¬£¬ £¬ÏÖÔÚÒÑÓйûÕæ¿ÉÓõĿ´·¨Ñé֤ʹÓôúÂ룬£¬ £¬µ«ÉÐÎÞÕë¶ÔÕâ¸öí§Òâ´úÂëÖ´ÐÐÎó²îµÄÇå¾²¸üС£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-3556£¬£¬ £¬±£´æÓÚCisco AnyConnect ClientµÄÀú³Ì¼äͨѶ£¨IPC£©Í¨µÀÖУ¬£¬ £¬¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕߺÍÍâµØ¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐжñÒâ¾ç±¾¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows¡¢LinuxºÍmacOS°æ±¾µÄAnyConnect¿Í»§¶Ë£¬£¬ £¬Ö»¹ÜûÓв¹¶¡³ÌÐò£¬£¬ £¬¿ÉÊÇ¿ÉÒÔͨ¹ý½ûÓÃ×Ô¶¯¸üкÍ×èÖ¹ÆôÓþ籾ÉèÖÃÀ´»º½â¸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-discloses-anyconnect-vpn-zero-day-exploit-code-available/


5¡¢AppleÐû²¼¸üУ¬£¬ £¬ÐÞ¸´Òѱ»Æð¾¢Ê¹ÓõÄ3¸ö0day


5.jpg


AppleÐÞ¸´ÁËÆäiOS 14.2ÖеÄ3¸ö0day£¬£¬ £¬ÕâЩÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Óò¢Ó°ÏìÁËiPhone¡¢iPadºÍiPod¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î»®·ÖΪԶ³ÌÖ´ÐдúÂ루RCE£©Îó²î£¨CVE-2020-27930 £©£¬£¬ £¬FontParser¿â´¦Öóͷ£¶ñÒâ×ÖÌåʱÓÉÄÚ´æËð»µÎÊÌâµ¼Ö£»£»£»£»£»£»£»£»ÄÚºËÄÚ´æ×ß©Îó²î£¨CVE-2020-27950£©£¬£¬ £¬¸ÃÎó²îÓÉÄÚ´æ³õʼ»¯ÎÊÌâÒýÆð£¬£¬ £¬ÔÊÐí¶ñÒâÓ¦Óûá¼ûÄÚºËÄڴ棻£»£»£»£»£»£»£»ÄÚºËÌáȨÎó²î(CVE-2020-27932)£¬£¬ £¬ÓÉÀàÐÍ»ìÏýµ¼Ö£¬£¬ £¬¿É±»Ê¹ÓÃÀ´Ê¹ÓÃÄÚºËȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/apple-patches-three-actively-exploited-ios-zero-days/