ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ45ÖÜ
Ðû²¼Ê±¼ä 2019-11-18>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê11ÔÂ11ÈÕÖÁ17ÈÕ¹²ÊÕ¼Çå¾²Îó²î48¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows OpenType×ÖÌåÆÊÎöCVE-2019-1456Ô¶³ÌÖ´ÐдúÂëÎó²î; eQ-3 Homematic CCU3 testtcl.cgi´úÂëÖ´ÐÐÎó²î£»£»£»SAP Diagnostics Agentí§ÒâOSÏÂÁî×¢ÈëÎó²î£»£»£»Istio¾Ü¾øÐ§ÀÍÎó²î£»£»£»Adobe Illustrator CVE-2019-8248ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍйÜЧÀÍÉÌSmarterASP.NETÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»¶íÂÞ˹з¨°¸Ç¿ÖÆÊÖ»úºÍPCԤװÖñ¾¹úÈí¼þ£»£»£»5GÐÂÎó²î¿É¸ú×ٵ绰λÖü°¹ã²¥Ðéα¾¯±¨£»£»£»McAfeeɱ¶¾Èí¼þ´úÂëÖ´ÐÐÎó²î(CVE-2019-3648)£»£»£»¸ßͨоƬ×éQSEEÎó²î¿ÉÖÂAndroid×°±¸Êý¾Ýй¶¡£¡£¡£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
Microsoft Windows OpenType×ÖÌåÆÊÎö´¦Öóͷ£Opentype×ÖÌå±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1456
2. eQ-3 Homematic CCU3 testtcl.cgi´úÂëÖ´ÐÐÎó²î
eQ-3 Homematic CCU3 save.cgi¾ç±¾¿ÉÓÃÀ´ÉÏ´«¾ç±¾²¢±»testtcl.cgi¾ç±¾Ö´ÐУ¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://psytester.github.io/CVE-2019-18938/
3. SAP Diagnostics Agentí§ÒâOSÏÂÁî×¢ÈëÎó²î
SAP Diagnostic Agent±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528880390
4. Istio¾Ü¾øÐ§ÀÍÎó²î
Istio±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⡣¡£¡£¡£
https://github.com/istio/istio/issues/18229
5. Adobe Illustrator CVE-2019-8248ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Illustrator´¦Öóͷ£Îļþ±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë»òÕß¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£
https://helpx.adobe.com/security/products/illustrator/apsb19-36.html
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
SmarterASP.NETÊÇÒ»¼ÒÓµÓÐÁè¼Ý44Íò¸ö¿Í»§µÄASP.NETÍйÜЧÀÍÉÌ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚÖÜÄ©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£Ä¿½ñSmarterASP.NETÌåÏÖÕýÔÚÆð¾¢»Ö¸´¿Í»§µÄЧÀÍÆ÷£¬£¬£¬£¬£¬µ«²»ÇåÎú¸Ã¹«Ë¾ÊÇÖ§¸¶ÁËÊê½ðÕÕ¾ÉÔÚ´Ó±¸·ÝÖлָ´¡£¡£¡£¡£´Ë´Î¹¥»÷Öв»µ«¿Í»§Êý¾ÝÊܵ½Ó°Ï죬£¬£¬£¬£¬²¢ÇÒSmarterASP.NET×Ô¼ºÒàÊÜÓ°Ïì¡£¡£¡£¡£¸Ã¹«Ë¾µÄÍøÕ¾ÔÚÐÇÆÚÁùÈ«Ìì¶¼ÏÂÏߣ¬£¬£¬£¬£¬Ö±µ½ÐÇÆÚÌìÔçÉϲÅÖØÐÂÉÏÏß¡£¡£¡£¡£Ð§ÀÍÆ÷»Ö¸´ÊÂÇéÏ£Íû»ºÂý£¬£¬£¬£¬£¬Ðí¶à¿Í»§ÈÔÈ»ÎÞ·¨»á¼ûÆäÕË»§ºÍÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÍøÕ¾ÎļþºÍºó¶ËÊý¾Ý¿â¡£¡£¡£¡£Æ¾Ö¤ÔÚTwitterÉÏÐû²¼µÄ½ØÍ¼£¬£¬£¬£¬£¬±»¼ÓÃܵĿͻ§Îļþºó¸½¼ÓÁË¡°.kjhbx¡±À©Õ¹Ãû£¬£¬£¬£¬£¬ÏÖÔÚÑо¿Ö°Ô±ÈÔÔÚÊÔͼȷÈÏÀÕË÷Èí¼þµÄÖÖÀà¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-asp-net-hosting-provider-infected-by-ransomware/
2¡¢¶íÂÞ˹з¨°¸Ç¿ÖÆÊÖ»úºÍPCԤװÖñ¾¹úÈí¼þ
¶íÂÞ˹Òé»áÕýÔÚÍÆ¶¯Ò»ÏîÁ¢·¨£¬£¬£¬£¬£¬¸Ã·¨°¸½«Ç¿ÖÆÒªÇóËùÓÐÔÚ¶íÂÞ˹ÏúÊ۵ĵç×Ó×°±¸£¨°üÀ¨ÖÇÄÜÊÖ»ú¡¢PCºÍÖÇÄܵçÊӵȣ©Ô¤×°Öñ¾¹ú¿Æ¼¼¹«Ë¾µÄÓ¦Óᣡ£¡£¡£Õâ¿ÉÄÜ»á´øÀ´Çå¾²Òþ»¼¡£¡£¡£¡£Á¢·¨ÕßÌåÏָ÷¨°¸ÊÇΪÁ˱£»£»£»¤ÍâµØµÄÊÖÒÕÊг¡ÃâÊÜÍâ¹ú£¨¿ÉÄÜÊÇÖ¸ÃÀ¹ú£©µÄ¾ºÕù¡£¡£¡£¡£Õþ¸®½«Õë¶ÔÿÖÖ×°±¸ÀàÐÍÐû²¼Ò»·ÝÈí¼þÁÐ±í£¬£¬£¬£¬£¬×°±¸¹©Ó¦ÉÌÐèÒªÔÚ¶íÂÞ˹ÏúÊÛµÄ×°±¸ÉÏԤװÖÃÕâЩÈí¼þ¡£¡£¡£¡£ÈôÊǹ©Ó¦É̲»×ñÊØ»®¶¨£¬£¬£¬£¬£¬½«±»´¦ÒÔ×î¸ß20Íò¬²¼£¨Ô¼ºÏ3100ÃÀÔª£©µÄ·£¿£¿£¿£¿£¿£¿î¡£¡£¡£¡£¸Ã·¨°¸»ñµÃÁËËùÓÐÖ÷ÒªÕþµ³µÄÖ§³Ö£¬£¬£¬£¬£¬ÕâÒâζ×ÅËüºÜÓпÉÄܽ«ÔÚ2020Äê7ÔÂ1ÈÕÉúЧ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/phones-and-pcs-sold-in-russia-will-have-to-come-pre-installed-with-russian-apps/
3¡¢5GÐÂÎó²î¿É¸ú×ٵ绰λÖü°¹ã²¥Ðéα¾¯±¨
ÆÕ¶É´óѧ£¨Purdue University£©ºÍ°®ºÉ»ª´óѧ£¨University of Iowa£©µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷¿ìÒª12¸ö5GÇå¾²Îó²î£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖÕâЩÎó²î¿ÉÔÊÐí¹¥»÷Õß»ñȡĿµÄÓû§µç»°µÄÐÂ/¾ÉÔÝÊ±ÍøÂç±êʶ·û£¬£¬£¬£¬£¬´Ó¶ø¸ú×ٵ绰µÄλÖ㬣¬£¬£¬£¬ÉõÖÁÐ®ÖÆÑ°ºôÐŵÀ¾ÙÐÐÐéαµÄ½ôÆÈ¾¯±¨¹ã²¥¡£¡£¡£¡£ÔÚijЩÇéÐÎÏ£¬£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ÓÃÀ´½«·äÎÑÅþÁ¬½µ¼¶Îª²»Ì«Çå¾²µÄ±ê×¼¡£¡£¡£¡£Ò»Ð©ÐµĹ¥»÷Ò²¿ÉÄÜÔÚÏÖÓеÄ4GÍøÂçÉϱ»Ê¹Óᣡ£¡£¡£¼øÓÚÎó²îµÄÐÔ×Ó£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖËûÃDz»ÍýÏë¹ûÕæÆäPoC´úÂ룬£¬£¬£¬£¬µ«ËûÃǽ«ÕâЩ·¢Ã÷֪ͨÁËÈ«Çò·äÎÑÍøÂçGSMлᣨGSMA£©¡£¡£¡£¡£GSMAûÓÐ͸¶ÊÇ·ñ¿ÉÒÔÐÞ¸´Îó²î£¬£¬£¬£¬£¬Ò²Ã»ÓÐ͸¶ÐÞ¸´Ê±¼ä¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://finance.yahoo.com/news/5g-flaws-track-phone-locations-163014364.html4¡¢McAfeeɱ¶¾Èí¼þ´úÂëÖ´ÐÐÎó²î(CVE-2019-3648)
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/mcafee-antivirus-software-impacted-by-code-execution-vulnerability/5¡¢¸ßͨоƬ×éQSEEÎó²î¿ÉÖÂAndroid×°±¸Êý¾Ýй¶
ƾ֤Çå¾²³§ÉÌCheckPointµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬¸ßͨоƬ×éÖеÄÇå¾²Ö´ÐÐÇéÐΣ¨QSEE£©Öб£´æÎó²î£¨CVE-2019-10574£©£¬£¬£¬£¬£¬¿Éµ¼ÖÂAndroid×°±¸ÖеÄСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£¡£QSEEÊÇ»ùÓÚARM TrustZoneÊÖÒÕµÄÊÜÐÅÈÎÖ´ÐÐÇéÐΣ¨TEE£©µÄʵÏÖ£¬£¬£¬£¬£¬ÊÇÖ÷´¦Öóͷ£Æ÷ÉϵÄÒ»¸öÓ²¼þ¸ôÀëµÄÇå¾²ÇøÓò£¬£¬£¬£¬£¬ÆäÖÐͨ³£°üÀ¨×¨ÓüÓÃÜÃÜÔ¿¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍ½è¼Ç¿¨Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Check PointÑо¿Ö°Ô±ÄæÏòÁ˸Ãϵͳ£¬£¬£¬£¬£¬²¢Ê¹ÓÃÄ£ºý²âÊÔ¶ÔÈýÐÇ¡¢LGºÍĦÍÐÂÞÀ×°±¸¾ÙÐÐÁ˲âÊÔ¡£¡£¡£¡£×ÜÌå¶øÑÔ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÈýÐǵÄÊÜÐÅÈδúÂë°üÀ¨ËĸöÎó²î£¬£¬£¬£¬£¬Ä¦ÍÐÂÞÀºÍLG»®·Ö°üÀ¨Ò»¸öÎó²î£¬£¬£¬£¬£¬µ«ËùÓдúÂë¾ùÀ´×Ô¸ßͨ¹«Ë¾¡£¡£¡£¡£ÈýÐÇ¡¢¸ßͨºÍLGÒÑÕë¶ÔÕâЩQSEEÎó²îÐû²¼Á˲¹¶¡¸üС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/11/qualcomm-android-hacking.html


¾©¹«Íø°²±¸11010802024551ºÅ