AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£»£»GoogleÑо¿Ö°Ô±Åû¶LinuxÄÚºËÖÐBleedingToothÎó²î
Ðû²¼Ê±¼ä 2020-10-15
AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£¬£¬£¬£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷»î¶¯¡£¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓù»î¶¯µÄÊý¾Ý£¬£¬£¬£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò£¬£¬£¬£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ£¬£¬£¬£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú£¬£¬£¬£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊУ¬£¬£¬£¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.agari.com/email-security-blog/business-email-compromise-geography/
2.GoogleÑо¿Ö°Ô±Åû¶LinuxÄÚºËÖÐBleedingToothÎó²î

¹È¸èÇå¾²Ñо¿Ö°Ô±Andy NguyenÔÚLinuxÄÚºËÖз¢Ã÷ÁËÀ¶ÑÀÎó²î£¬£¬£¬£¬³ÆÎªBleedingTooth£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔËÐÐí§Òâ´úÂë»ò»á¼ûÃô¸ÐÐÅÏ¢¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-12351¡¢CVE-2020-12352ºÍCVE-2020-24490¡£¡£ÔÚÊܺ¦ÕßÀ¶ÑÀ¹æÄ£ÄÚ£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÒ»¸ö¶ñÒâµÄl2cap°üÀ´´¥·¢¸ÃÎó²î£¬£¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ£¬£¬£¬£¬ÉõÖÁʹÓÃÄÚºËȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£²¢ÇÒÕâÊÇÒ»¸öÁãµã»÷Îó²î£¬£¬£¬£¬¼´ÎÞÐèÓëÓû§½»»¥¼´¿ÉʹÓᣡ£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/109500/hacking/bluetooth-bleedingtooth-vulnerabilities.html
3.Hindotech HK1»ú¶¥ºÐ±£´æÌáȨÎó²î£¬£¬£¬£¬¿ÉÓÃÀ´ÇÔÈ¡Êý¾Ý

Ñо¿Ö°Ô±·¢Ã÷Hindotech HK1»ú¶¥ºÐ±£´æÌáȨÎó²î£¬£¬£¬£¬¿ÉÓÃÀ´ÇÔÈ¡Êý¾Ý¡£¡£¸ÃÎó²îÔ´ÓÚ»á¼û¿ØÖƲ»µ±£¬£¬£¬£¬ÌØÊâÊǵ±Í¨¹ý´®¿Ú(UART)ÅþÁ¬µ½×°±¸Ê±£¬£¬£¬£¬»òÕß¿´³ÉΪ·ÇÌØÈ¨Óû§Ê¹ÓÃAndroidµ÷ÊÔÇŽÓ(adb)ʱ£¬£¬£¬£¬ÔÊÐíÍâµØÎÞÌØÈ¨Óû§Éý¼¶ÎªrootÓû§¡£¡£¹¥»÷ÕßÀֳɵÄʹÓøÃÎó²î¿ÉÇÔÈ¡Éç½»ÍøÂçÕÊ»§ÁîÅÆ¡¢Wi-FiÃÜÂë¡¢Cookie¡¢ÒÑÉúÑĵÄÃÜÂë¡¢Óû§Î»ÖÃÊý¾Ý¡¢ÐÂÎÅÀúÊ·¼Í¼¡¢µç×ÓÓʼþºÍÁªÏµÈ˵ȡ£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/authentication-bug-android-smart-tv-data-theft/160025/
4.΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡£¬£¬£¬£¬×ܼÆÐÞ¸´87¸öÇå¾²Îó²î

΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡£¬£¬£¬£¬×ܼÆÐÞ¸´87¸öÇå¾²Îó²î¡£¡£´Ë´Î¸üÐÂÖÐÐÞ¸´ÁË6¸öÒѱ»¹ûÕæµÄÎó²î£¬£¬£¬£¬°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2020-16938£©¡¢Windows Storage VSPÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16885£©¡¢WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2020-16901£©¡¢Windows×°ÖóÌÐòÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16908£©¡¢Windows¹ýʧ±¨¸æÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-16909£©ºÍ.NET FrameworkÐÅϢй¶Îó²î£¨CVE-2020-16937£©
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-october-2020-patch-tuesday-fixes-87-security-bugs/
5.ŲÍþÕþ¸®³ÆÆä8ÔÂÔâµ½µÄÍøÂç¹¥»÷Óë¶íÂÞ˹ºÚ¿ÍÓйØ

ŲÍþÕþ¸®³Æ8ÔÂ·ÝÆäÒé»á£¨Stortinget£©µç×ÓÓʼþϵͳÔâµ½µÄÍøÂç¹¥»÷Óë¶íÂÞ˹ºÚ¿ÍÓйء£¡£StortingÓÚ8ÔÂ24ÈÕÐû²¼Æäµç×ÓÓʼþϵͳ±¬·¢Êý¾Ýй¶£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁ˸ùúÖÐÐĵ³ºÍ¹¤µ³µÄ´ú±í¼°³ÉÔ±¡£¡£Å²ÍþÍâ½»²¿³¤Ine EriksenS?reideÓÚ10ÔÂ13ÈÕÌåÏÖ£¬£¬£¬£¬¶íÂÞ˹ÊÇ´Ë´ÎÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£Ëæºó£¬£¬£¬£¬Æ¾Ö¤ÐÂÎÅÉçTASSµÄ±¨µÀ£¬£¬£¬£¬¶íÂÞ˹Õýʽ·ñ¶¨Ö¸¿Ø£¬£¬£¬£¬³ÆÆäûÓÐÖ¤¾Ý¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/norway-says-russia-behind-cyber-attack-parliament
6.¹ú¼ÊÂÉËùSeyfarthÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÓʼþϵͳÔÝʱ¹Ø±Õ

¹ú¼ÊÂÉËùSeyfarthÐû²¼ÆäÓÚÖÜÄ©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÓʼþϵͳÔÝʱ¹Ø±Õ¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚÉÏÖÜÁù£¬£¬£¬£¬Seyfarth³ÆÐí¶àÆäËû¹«Ë¾Ò²Í¬Ê±Ôâµ½Á˹¥»÷¡£¡£¸Ã¹«Ë¾µÄ¶à¸öϵͳ±»¼ÓÃÜ£¬£¬£¬£¬×÷ΪԤ·À²½·¥£¬£¬£¬£¬Æä¹Ø±ÕÁ˱»¼ÓÃÜÅÌËã»ú£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþϵͳ¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄΣº¦Ë®Æ½£¬£¬£¬£¬¿ÉÊÇSeyfarth³ÆÃ»Óпͻ§»ò¹«Ë¾Êý¾Ýй¶¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/international-law-firm-seyfarth-discloses-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ