¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î £¬Ó°ÏìËùÓÐϵͳ°æ±¾£»À¶ÑÀÎó²îKNOB £¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý

Ðû²¼Ê±¼ä 2019-08-15
1¡¢Î¢ÈíÐÞ¸´RDP·þÎñÖеÄÐÂÈ䳿¼¶Îó²î

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

΢ÈíÔÚ8Ô·ݵÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË94¸öÎó²î £¬ÆäÖаüÀ¨4¸öеÄRDPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1181¡¢CVE-2019-1182¡¢CVE-2019-1222¡¢CVE-2019-1226£© ¡£ÆäÖÐCVE-2019-1181ºÍCVE-2019-1182Óë5ÔÂ·ÝÆØ³öµÄBlueKeepÎó²î£¨CVE-2019-0708£©ÀàËÆ £¬¿ÉʵÏÖÈ䳿»¯¹¥»÷ £¬ÊÜÓ°ÏìµÄϵͳ°æ±¾°üÀ¨win 7 SP1¡¢win 8.1¡¢win 10ÒÔ¼°windows server 2008 R2 SP1¡¢2012¡¢2012 R2¡¢2016¼°2019µÈ ¡£XP¡¢windows server 2003¼°2008²»ÊÜÓ°Ïì ¡£ÏÖÔÚÉÐδ·¢Ã÷ÕâЩÎó²îÔÚÒ°ÍⱻʹÓà £¬µ«Î¢ÈíÇ¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üÐÂÐÞ¸´²¹¶¡ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-fixes-critical-windows-10-wormable-remote-desktop-flaws/


2¡¢IntelÐû²¼NUC¹Ì¼þ¸üР£¬ÐÞ¸´¶à¸öÎó²î

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


IntelÐû²¼NUC KitµÄ¹Ì¼þ¸üР£¬ÐÞ¸´¿Éµ¼ÖÂÌáȨ¡¢¾Ü¾ø·þÎñÒÔ¼°ÐÅϢй¶µÄÎó²î ¡£¸ÃÎó²î£¨CVE-2019-11140 £¬CVSSÆÀ·ÖΪ7.5£©ÊÇÓÉÓÚ²»³ä·ÖµÄÑéÖ¤µ¼Ö嵀 £¬¿É±»¾ßÓÐÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßËùʹÓà £¬ÊÜÓ°ÏìµÄ²úÆ·ÐͺŰüÀ¨Intel NUC Kit NUC7i7DNx¡¢NUC7i5DNx¡¢NUC7i3DNxÒÔ¼°Compute Stick STK2MV64CCºÍCompute Card CD1IV128MK ¡£±ðµÄ £¬Intel»¹ÐÞ¸´ÁË´¦Öóͷ£Æ÷ʶ±ð¹¤¾ßÖеÄÎó²î£¨CVE-2019-11163 £¬CVSSÆÀ·ÖΪ8.2£©ÒÔ¼°RAID¹ÜÀíÈí¼þÖеÄÎó²î£¨CVE-2019-0173 £¬CVSSÆÀ·Ö6.8£© ¡£¸ü¶àÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-updates-nuc-firmware-to-patch-high-severity-bug/


3¡¢HTTP/2ÆØ³ö8¸öÐÂÎó²î £¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

Ñо¿Ö°Ô±Åû¶HTTP/2ЭÒéʵÏÖÖеÄ8¸öÐÂÎó²î £¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏòδÐÞ²¹µÄ·þÎñÆ÷Ìᳫ¾Ü¾ø·þÎñ¹¥»÷ ¡£ÕâЩÎó²î£¨CVE-2019-9511~CVE-2019-9518£©ÊÇÓÉNetflixÑо¿Ô±Jonathan LooneyÒÔ¼°GoogleÑо¿Ô±Piotr Sikora·¢Ã÷µÄ £¬¿ÉÓÃÓÚ´¥·¢·þÎñÆ÷µÄ×ÊÔ´ºÄ¾¡ £¬µ«²»¿ÉÓÃÓÚÈëÇÖ·þÎñÆ÷ ¡£Æ¾Ö¤CERTÐû²¼µÄͨ¸æ £¬ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨NGINX¡¢Apache¡¢H2O¡¢Nghttp2¡¢Microsoft(IIS)¡¢Cloudflare¡¢Akamai¡¢Apple(SwiftNIO)¡¢Amazon¡¢Facebook(Proxygen)¡¢Node.jsÒÔ¼°Envoy proxy £¬´ó´ó¶¼³§É̶¼ÒѾ­Ðû²¼ÁËÐÞ¸´²¹¶¡ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/http2-dos-vulnerability.html


4¡¢ÐÂÀ¶ÑÀÎó²îKNOB £¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


Ñо¿Ö°Ô±Åû¶À¶ÑÀÖеÄÐÂÎó²î£¨CVE-2019-9506£© £¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß±©Á¦ÆÆ½âÅä¶Ô×°±¸ÔÚ´«ÊäÊý¾ÝʱʹÓõÄÃÜÔ¿²¢¸Ä¶¯Êý¾Ý ¡£¸ÃÎó²îÓ°ÏìÁ˰汾ÔÚ1.0ÖÁ5.1Ö®¼äµÄBluetooth BR/EDR×°±¸ ¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö £¬¹¥»÷Õß¿É×ÌÈÅÁ½Ì¨Åä¶Ô×°±¸ÉèÖüÓÃÜÅþÁ¬µÄÀú³Ì £¬ïÔ̭ʹÓõÄÃÜÔ¿µÄ³¤¶È £¬Ê¹µÃÃÜÔ¿µÄÇå¾²ÐÔÖè¼õ ¡£¼«¶ËÇéÐÎÏ £¬ÃÜÔ¿³¤¶È¿ÉÄܱ»ïÔ̭Ϊ1¸ö×Ö½Ú ¡£ÎªÁË»º½â¸ÃÎó²î £¬À¶ÑÀÊÖÒÕͬÃ˸üÐÂÁËÀ¶ÑÀ½¹µã¹æ·¶ £¬½¨Òé×îСÃÜÔ¿³¤¶ÈΪ7¸ö×Ö½Ú ¡£Î¢ÈíÒ²ÔÚÎó²î£¨CVE-2019-9506£©µÄ²¹¶¡Öн«Ä¬ÈÏ×îСÃÜÔ¿³¤¶ÈÉèÖÃΪ7¸ö×Ö½Ú ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/

5¡¢¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î £¬Ó°ÏìËùÓÐϵͳ°æ±¾


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


¹È¸èÑо¿Ö°Ô±Tavis OrmandyÅû¶WindowsϵͳÖб£´æ³¤´ï20ÄêµÄÒ»¸öδÐÞ¸´Îó²î ¡£¸ÃÎó²îÓ°ÏìÁËWindows XPÒÔÀ´µÄËùÓÐWindows°æ±¾ £¬°üÀ¨Win 10 ¡£¸ÃÎó²î±£´æÓÚ΢ÈíµÄÎı¾·þÎñ¿ò¼Ü£¨MSCTF£©ÖÐ £¬ÓëMSCTF¿Í»§¶ËºÍ·þÎñÆ÷Ö®¼äµÄͨѶȱÉÙ»á¼û¿ØÖÆ/Éí·ÝÑéÖ¤»úÖÆÓÐ¹Ø £¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÅþÁ¬µ½CTF»á»°¡¢¶ÁдÆäËü´°¿Ú/»á»°µÄÄÚÈÝ¡¢Î±ÔìÏß³ÌID/Àú³ÌID/HWND¡¢Î±×°³ÉCTF·þÎñÆ÷¡¢¾ÙÐÐɳÏäÌÓÒÝÒÔ¼°ÌáȨ ¡£¹¥»÷Õß»¹¿ÉÒÔÈÆ¹ýÓû§½Ó¿ÚȨÏÞ¸ôÀ루UIPI£© £¬»ñÈ¡SYSTEMȨÏÞÒÔ¼°¿ØÖÆUAC¶Ô»°¿òµÈ ¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËÔÚWin 10ÖлñÈ¡SYSTEMµÄPoCÊÓÆµ ¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/ctfmon-windows-vulnerabilities.html

6¡¢BioStar 2ÉúÎïʶ±ðÊý¾Ý¿âй¶ £¬²¨¼°Êý°ÙÍòÓû§

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


vpnMentorÑо¿Ö°Ô±·¢Ã÷BioStar 2µÄÒ»¸öElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û £¬µ¼ÖÂÊý°ÙÍòÈ˵ÄÉúÎïʶ±ðÊý¾Ýй¶ ¡£¸ÃÊý¾Ý¿â°üÀ¨23GBÊý¾Ý£¨Áè¼Ý2780ÍòÌõ¼Í¼£© £¬ÕâЩÊý¾Ý°üÀ¨Ö¸ÎÆ/Ãæ²¿Ê¶±ðÊý¾Ý¡¢Î´¼ÓÃܵÄÓû§ÃûºÍÃÜÂëÒÔ¼°Ô±¹¤µÄÒþ˽ÐÅÏ¢ ¡£Biostar 2±»¼¯³Éµ½µÚÈý·½ÏµÍ³ÖÐ £¬ÀýÈçNedapµÄAEOS»á¼û¿ØÖÆÏµÍ³ £¬¸ÃϵͳÒѱ»83¸ö¹ú¼ÒµÄ5700¶à¸ö×é֯ʹÓà £¬°üÀ¨Ó¢¹ú´ó¶¼»á¾¯Ô±¾Ö ¡£ÊÜÓ°ÏìµÄ¹«Ë¾»¹°üÀ¨Ó¢¹ú¼Ò¾Ó×°ÊÎÉÌTile MountainÒÔ¼°Ó¡¶ÈºÍ˹ÀïÀ¼¿¨µÄ½¡Éí·¿Power World GymsµÈ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/millions-of-records-exposed/