¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181115

Ðû²¼Ê±¼ä 2018-11-15
1¡¢Ñо¿ÍŶÓÅû¶7ÖÖÐÂÈÛ»ÙºÍÓÄÁé¹¥»÷£¬ £¬£¬£¬£¬Intel¡¢AMDºÍARM¾ùÊÜÓ°Ïì

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÓÉ9ÃûÑо¿Ö°Ô±×é³ÉµÄÑо¿Ð¡×éÅû¶ÁË7ÖÖеÄÈÛ»ÙºÍÓÄÁé¹¥»÷£¬ £¬£¬£¬£¬ÆäÖÐ2ÖÖÊÇMeltdown¹¥»÷µÄ±äÖÖ£¬ £¬£¬£¬£¬ÁíÍâ5ÖÖÊÇSpectre¹¥»÷µÄ±äÖÖ¡£¡£¡£¡£Èý´óÖ÷Òª´¦Öóͷ£Æ÷³§ÉÌ-Intel¡¢AMDºÍARM¾ùÊÜÓ°Ïì¡£¡£¡£¡£¸ÃÑо¿Ð¡×éÏòIntel¡¢AMDºÍARM±¨¸æÁËÕâЩÎó²î£¬ £¬£¬£¬£¬ÆäÖÐIntelºÍARMÒѾ­ÈÏ¿ÉÁËËûÃǵÄÑо¿Ð§¹û¡£¡£¡£¡£¸ÃÍŶӻ¹ÌåÏÖ£¬ £¬£¬£¬£¬ÓÉÓÚ¹©Ó¦ÉÌÕýÔÚÆð¾¢ÐÞ¸´ÕâЩÎÊÌ⣬ £¬£¬£¬£¬ËûÃǾöÒéÔݲ»Åû¶Ïà¹ØPoC¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/meltdown-spectre-vulnerabilities.html


2¡¢FacebookÔÙÆØÐÂÎó²î£¬ £¬£¬£¬£¬»ò¿Éµ¼ÖÂÓû§Ë½ÈËÐÅϢй¶

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ImpervaÑо¿Ô±Ron Masas·¢Ã÷FacebookÖеÄÒ»¸öÐÂÎó²î£¬ £¬£¬£¬£¬»ò¿Éµ¼ÖÂÓû§¼°ÆäÅóÙ­µÄ˽ÈËÐÅϢй¶¡£¡£¡£¡£¸ÃÎó²îÓëFacebookËÑË÷¹¦Ð§µÄЧ¹ûÏÔʾÓйØ£¬ £¬£¬£¬£¬Æ¾Ö¤MasasµÄ˵·¨£¬ £¬£¬£¬£¬ÏÔʾÓû§ËÑË÷Ч¹ûµÄÒ³Ãæ°üÀ¨ÓëÿһÌõËÑË÷Ч¹ûÏà¹ØÁªµÄiFrameÔªËØ£¬ £¬£¬£¬£¬¶øÕâЩiFrameÔªËØµÄ¹ØÁªURLÒ×ÊÜCSRF¹¥»÷¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÇ¿ÆÈÓû§Ö´ÐÐí§ÒâËÑË÷ÅÌÎÊ£¬ £¬£¬£¬£¬²¢»ñµÃ·µ»ØµÄÓû§ÐÅÏ¢¡£¡£¡£¡£FacebookÒѾ­ÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/facebook-vulnerability-hack.html


3¡¢Çå¾²³§ÉÌÐû²¼2019ÄêÍøÂçÇå¾²Ç÷ÊÆÕ¹Íû±¨¸æ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ForcepointÐû²¼2019ÄêÍøÂçÇå¾²Ç÷ÊÆÕ¹Íû±¨¸æ£¬ £¬£¬£¬£¬±¨¸æµÄÖ÷Ìâ°üÀ¨£ºÍøÂçÇå¾²ÖеÄAIÊÇ·ñÒÑÖÁ¶¬Ì죿£¿£¿£¿ £¿£¿£¿´ó¹æÄ£µÄ¹¤ÒµÎïÁªÍøÖÐÖ¹Íþв£»£»£»ÉúÎïʶ±ðÊÖÒÕÖеĴ¹ÂÚÍþв£»£»£»¹ØÓÚÊÂÇ鳡ºÏÇå¾²²½·¥¼à²âµÄÖ´ÂÉÀýÔò£¿£¿£¿£¿ £¿£¿£¿ÉÌÒµÕ½Óë¹ú¼ÒÖ§³ÖµÄ¹¤ÒµÌع¤»î¶¯£»£»£»±ßÑØÅÌËãµÄÔ¶¾°Óë×è°­£»£»£»¶ÔÏàÖúͬ°éµÄÇå¾²ÐÅÈÎÆÀ¼¶»ò½«Ô½À´Ô½Ö÷Òª¡£¡£¡£¡£ÍêÕû±¨¸æÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.forcepoint.com/blog/insights/2019-forcepoint-cybersecurity-predictions-report


4¡¢ÔÚÏßÊÐËÁInfowarsÔâMagecart¹¥»÷£¬ £¬£¬£¬£¬Ô¼1600ÃûÓû§ÒÉÊÜÓ°Ïì

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ºÉÀ¼Çå¾²Ñо¿Ô±Willem de Groot·¢Ã÷ÔÚÏßÊÐËÁInfowarsѬȾÁËÓÃÓÚÇÔÈ¡Óû§ÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâ¾ç±¾Magecart¡£¡£¡£¡£¸Ã¶ñÒâ¾ç±¾ÔÚInfowarsÉϱ£´æÁËԼĪ24¸öСʱ£¬ £¬£¬£¬£¬Ëæºó¾Í±»Infowarsɾ³ý£¬ £¬£¬£¬£¬Ô¼1600ÃûÓû§¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâЩMagecart´úÂëÒþ²ØÔÚGoogle Analytics´úÂë¿éÖУ¬ £¬£¬£¬£¬½öÔÚÓû§½áÕËʱ¼¤»î£¬ £¬£¬£¬£¬Ã¿¸ô1.5Ãëץȡһ´Î½áÕË±íµ¥ÖеÄ×Ö¶ÎÄÚÈÝ£¬ £¬£¬£¬£¬²¢·¢ËÍÖÁλÓÚÁ¢ÌÕÍðµÄÔ¶³ÌЧÀÍÆ÷google-analyitics[.]org¡£¡£¡£¡£Ñо¿Ö°Ô±»¹³ÆÕâЩ¶ñÒâ´úÂëµÄÆø¸ÅÓëRiskIQºÍFlashpointµÄMagecart¹¥»÷±¨¸æÖÐÌá¼°µÄ7¸ö·¸·¨ÍŻﶼ²»Ïàͬ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/card-skimming-malware-removed-from-infowars-online-store/


5¡¢AdobeÐû²¼11ÔÂÇå¾²¸üУ¬ £¬£¬£¬£¬ÐÞ¸´Flash PlayerµÈ²úÆ·ÖеÄ3¸öÎó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


AdobeÐû²¼2018Äê11ÔµÄÔ¶ÈÇå¾²¸üУ¬ £¬£¬£¬£¬»®·ÖÐÞ¸´ÁËAcrobat reader¡¢Flash Player¼°Photoshop CCÖеÄÇå¾²Îó²î¡£¡£¡£¡£ÆäÖÐAcrobat readerÖеÄÎó²î£¨CVE-2018-15979£©¿Éµ¼ÖÂÓû§µÄNTLM¹þÏ£ÃÜÂëй¶£¬ £¬£¬£¬£¬²¢ÇÒ¸ÃÎó²îµÄPoC¹ûÕæ¿ÉÓᣡ£¡£¡£Flash PlayerÖеÄÎó²î£¨CVE-2018-15978£©ºÍPhotoshop CCÖеÄÎó²î£¨CVE-2018-15980£©¶¼Êǿɵ¼ÖÂÐÅϢй¶µÄÔ½½ç¶ÁÎó²î¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-releases-security-update-for-acrobat-vulnerability-with-public-poc/


6¡¢SAPÐû²¼11ÔÂÇå¾²¸üУ¬ £¬£¬£¬£¬¹²ÐÞ¸´11¸öÎó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


±¾ÖܶþSAPÐû²¼ÁË2018Äê11ÔÂÇå¾²¸üУ¬ £¬£¬£¬£¬ÐÞ¸´Á˶à¿î²úÆ·ÖеÄ11¸öÎó²î¡£¡£¡£¡£Îó²î¹æÄ£°üÀ¨´úÂë×¢Èë¡¢XSS¡¢XXE¡¢SSRF¡¢¾Ü¾øÐ§ÀÍ¡¢È±ÉÙXMLÑéÖ¤ºÍURLÖØ¶¨ÏòµÈ¡£¡£¡£¡£ÆäÖнÏÑÏÖØµÄÎó²î°üÀ¨SAP HANA Streaming AnalyticsµÄSpring¿ò¼Ü¿âÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-1270ºÍCVE-2018-1275£©ÒÔ¼°SAP Fiori¿Í»§¶ËÖеÄDoSÎó²î£¨CVE-2018-2488£©µÈ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sap-patches-critical-vulnerability-hana-streaming-analytics


ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí