ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ39ÖÜ
Ðû²¼Ê±¼ä 2018-10-03Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇFacebookÔâ0dayÎó²î¹¥»÷£¬£¬Ô¼5000ÍòÓû§µÄ»á¼ûÁîÅÆ±»ÇÔ£»£»£»£»£»£»Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚUSBÍþвÏÖ×´µÄÆÊÎö±¨¸æ£»£»£»£»£»£»¿¨°Í˹»ùÐû²¼¹ØÓÚICSϵͳÖеÄRATΣº¦µÄÆÊÎö±¨¸æ£»£»£»£»£»£»Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶£»£»£»£»£»£»ÔÆÅÌË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ð¡Ê±£¬£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1. Foxit Reader for Windows¶à¸ö¹¤¾ßÊͷźóʹÓÃÎó²î
Foxit Reader for Windows CalculateÊÂÎñ´¦Öóͷ£±£´æÊͷźóʹÓÃÎó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬ÓÕʹÓû§ÆÊÎö£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
2. Wecon LeviStudioU CVE-2018-10610»º³åÇøÒç³öÎó²î
Wecon LeviStudioU TIFFͼÏñµÄÆÊÎö±£´æ»º³åÇøÒç³öÎó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
3. Cisco Video Surveillance Manager ApplianceĬÈÏÃÜÂëÎó²î
Cisco Video Surveillance Manager Appliance ROOTÕË»§Ê¹ÓÃÓ²±àÂëÆ¾Ö¤£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ÒÔrootÓû§Éí·ÝÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
4. ISC BIND CVE-2018-5741Çå¾²ÏÞÖÆÈÆ¹ýÎó²î
ISC BINDʵÏÖ±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ÈƹýÇå¾²ÏÞÖÆ£¬£¬Ö´ÐÐδÊÚȨµÄ²Ù×÷¡£¡£¡£¡£
5. DedeCMS XML×¢Èëí§Òâ´úÂëÎó²î
DedeCMS´¦Öóͷ£<file type='file' name='../×Ö·û´®±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
9ÔÂ28ÈÕFacebookÈ·ÈÏÆäÔâµ½ºÚ¿Í¹¥»÷£¬£¬¹¥»÷ÕßʹÓÃ0dayÎó²îÇÔÈ¡ÁËÁè¼Ý5000ÍòÓû§µÄ»á¼ûÁîÅÆ¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚFacebookµÄView As¹¦Ð§ÖУ¬£¬¿ÉÔÊÐí¹¥»÷ÕßÇÔÈ¡Óû§µÄ»á¼ûÁîÅÆ²¢»á¼ûÓû§µÄ˽ÈËÐÅÏ¢£¬£¬¶øÎÞÐèÕË»§ÃÜÂë»òË«ÒòËØÑéÖ¤Âë¡£¡£¡£¡£FacebookÒѽÓÄɲ½·¥×ÊÖú½ü9000ÍòÓû§ÖØÖÃÁË»á¼ûÁîÅÆ£¬£¬²¢½ûÓÃÁËView As¹¦Ð§¡£¡£¡£¡£ÓÉÓÚÊÓ²ìÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬£¬FacebookÉÐδȷ¶¨ÊÇ·ñÓÐÈκÎÕË»§±»ÀÄÓûòÐÅÏ¢±»»á¼û¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/09/facebook-account-hack.html
2¡¢Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚUSBÍþвÏÖ×´µÄÆÊÎö±¨¸æ
ÔÎÄÁ´½Ó£º
https://securelist.com/usb-threats-from-malware-to-miners/87989/
3¡¢¿¨°Í˹»ùÐû²¼¹ØÓÚICSϵͳÖеÄRATΣº¦µÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚICSÖеÄRATΣº¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£Ô¶³ÌÖÎÀí¹¤¾ß£¨RAT£©±»ÆÕ±éÓÃÓÚ¹¤ÒµÍøÂçÖ®ÖУ¬£¬ÓÃÓÚ¾ÙÐÐICS¼à²â¡¢¿ØÖƺÍά»¤¡£¡£¡£¡£Ô¶³Ì²Ù×÷ICSµÄÄÜÁ¦¿ÉÒÔ´ó´ó½µµÍά»¤±¾Ç®£¬£¬µ«²»ÊÜ¿ØÖƵÄÔ¶³Ì»á¼û¡¢ÎÞ·¨100%µØÌṩԶ³Ì¿Í»§¶ËµÄÕýµ±ÐÔÑéÖ¤ÒÔ¼°RAT´úÂëºÍÉèÖÃÖеÄÎó²î¶¼´ó´óÔöÌíÁ˹¥»÷Ãæ¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬¹¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃRATºÍÆäËüÕýµ±¹¤¾ßÀ´ÑÚÊÎÆä¶ñÒâ»î¶¯£¬£¬Ê¹µÃ¶Ô¶ñÒâ»î¶¯¾ÙÐйéÒòÔ½·¢ÄÑÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threats-posed-by-using-rats-in-ics/88011/
4¡¢Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶
ʱװÁãÊÛÉÌSHEINÉÏÖÜÎåÐû²¼ÆäÔâµ½ºÚ¿Í¹¥»÷£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚÑ×Ì죬£¬¼´6ÔµÄij¸öʱ¼ä£¬£¬¹¥»÷Õß»á¼ûÁËÓû§µÄµç×ÓÓʼþµØµãºÍ¼ÓÃܵÄÃÜÂë¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ8ÔÂ22ÈÕ·¢Ã÷ÁËÕâÒ»ÊÂÎñ£¬£¬²¢ÕýÔÚÁªÏµÊÜÓ°ÏìµÄÓû§ÐÞ¸ÄÆäÃÜÂë¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖв»°üÀ¨ÈκÎÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚ¾ÙÐнøÒ»²½µÄÊӲ졣¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/shein-fashion-retailer-announces-breach-affecting-6-42-million-users/
5¡¢ÔÆÅÌË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ð¡Ê±£¬£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì
Ó¡¶È×ÅÃûÔÆÅÌËã¿Æ¼¼¹«Ë¾ZohoµÄÓòÃû£¨zoho.com£©±»ÆäÓòÃû×¢²áÉÌTierraNet½ûÓýüÁ½¸öСʱ£¬£¬ÔÚ´Ëʱ´úÓû§±»Öض¨ÏòÖÁÒ»¸ö¿ÕÈ±Ò³Ãæ£¬£¬Ô¼3000ÍòÓû§Êܵ½Ó°Ïì¡£¡£¡£¡£Æ¾Ö¤TierraNetµÄ˵·¨£¬£¬Æä¶à´ÎÊÕµ½¹ØÓÚʹÓÃZohoÓʼþЧÀÍ·¢ËÍ´¹ÂÚÓʼþµÄͶËߣ¬£¬µ«ÔÚÊý´ÎÓëZohoÏàͬºó¸ÃÎÊÌâûÓлñµÃ½â¾ö£¬£¬×îÖÕÒ»Ì××Ô¶¯»¯ÏµÍ³µ¼ÖÂÁË´ËÊÂÎñµÄ±¬·¢¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/domain-registrar-oversteps-taking-down-zoho-domain-impacts-over-30mil-users/
ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ