ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ39ÖÜ
Ðû²¼Ê±¼ä 2018-10-03Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇFacebookÔâ0dayÎó²î¹¥»÷£¬£¬£¬Ô¼5000ÍòÓû§µÄ»á¼ûÁîÅÆ±»ÇÔ£»£»£»£»Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚUSBÍþвÏÖ×´µÄÆÊÎö±¨¸æ£»£»£»£»¿¨°Í˹»ùÐû²¼¹ØÓÚICSϵͳÖеÄRATΣº¦µÄÆÊÎö±¨¸æ£»£»£»£»Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶£»£»£»£»ÔÆÅÌË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ð¡Ê±£¬£¬£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1. Foxit Reader for Windows¶à¸ö¹¤¾ßÊͷźóʹÓÃÎó²î
Foxit Reader for Windows CalculateÊÂÎñ´¦Öóͷ£±£´æÊͷźóʹÓÃÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
2. Wecon LeviStudioU CVE-2018-10610»º³åÇøÒç³öÎó²î
Wecon LeviStudioU TIFFͼÏñµÄÆÊÎö±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
3. Cisco Video Surveillance Manager ApplianceĬÈÏÃÜÂëÎó²î
Cisco Video Surveillance Manager Appliance ROOTÕË»§Ê¹ÓÃÓ²±àÂëÆ¾Ö¤£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ÒÔrootÓû§Éí·ÝÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£
4. ISC BIND CVE-2018-5741Çå¾²ÏÞÖÆÈÆ¹ýÎó²î
ISC BINDʵÏÖ±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ÈƹýÇå¾²ÏÞÖÆ£¬£¬£¬Ö´ÐÐδÊÚȨµÄ²Ù×÷¡£¡£¡£¡£¡£¡£¡£
5. DedeCMS XML×¢Èëí§Òâ´úÂëÎó²î
DedeCMS´¦Öóͷ£<file type='file' name='../×Ö·û´®±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
9ÔÂ28ÈÕFacebookÈ·ÈÏÆäÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬¹¥»÷ÕßʹÓÃ0dayÎó²îÇÔÈ¡ÁËÁè¼Ý5000ÍòÓû§µÄ»á¼ûÁîÅÆ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚFacebookµÄView As¹¦Ð§ÖУ¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÇÔÈ¡Óû§µÄ»á¼ûÁîÅÆ²¢»á¼ûÓû§µÄ˽ÈËÐÅÏ¢£¬£¬£¬¶øÎÞÐèÕË»§ÃÜÂë»òË«ÒòËØÑéÖ¤Âë¡£¡£¡£¡£¡£¡£¡£FacebookÒѽÓÄɲ½·¥×ÊÖú½ü9000ÍòÓû§ÖØÖÃÁË»á¼ûÁîÅÆ£¬£¬£¬²¢½ûÓÃÁËView As¹¦Ð§¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÊÓ²ìÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬£¬£¬FacebookÉÐδȷ¶¨ÊÇ·ñÓÐÈκÎÕË»§±»ÀÄÓûòÐÅÏ¢±»»á¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/09/facebook-account-hack.html
2¡¢Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚUSBÍþвÏÖ×´µÄÆÊÎö±¨¸æ
ÔÎÄÁ´½Ó£º
https://securelist.com/usb-threats-from-malware-to-miners/87989/
3¡¢¿¨°Í˹»ùÐû²¼¹ØÓÚICSϵͳÖеÄRATΣº¦µÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚICSÖеÄRATΣº¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Ô¶³ÌÖÎÀí¹¤¾ß£¨RAT£©±»ÆÕ±éÓÃÓÚ¹¤ÒµÍøÂçÖ®ÖУ¬£¬£¬ÓÃÓÚ¾ÙÐÐICS¼à²â¡¢¿ØÖƺÍά»¤¡£¡£¡£¡£¡£¡£¡£Ô¶³Ì²Ù×÷ICSµÄÄÜÁ¦¿ÉÒÔ´ó´ó½µµÍά»¤±¾Ç®£¬£¬£¬µ«²»ÊÜ¿ØÖƵÄÔ¶³Ì»á¼û¡¢ÎÞ·¨100%µØÌṩԶ³Ì¿Í»§¶ËµÄÕýµ±ÐÔÑéÖ¤ÒÔ¼°RAT´úÂëºÍÉèÖÃÖеÄÎó²î¶¼´ó´óÔöÌíÁ˹¥»÷Ãæ¡£¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬¹¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃRATºÍÆäËüÕýµ±¹¤¾ßÀ´ÑÚÊÎÆä¶ñÒâ»î¶¯£¬£¬£¬Ê¹µÃ¶Ô¶ñÒâ»î¶¯¾ÙÐйéÒòÔ½·¢ÄÑÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threats-posed-by-using-rats-in-ics/88011/
4¡¢Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶
ʱװÁãÊÛÉÌSHEINÉÏÖÜÎåÐû²¼ÆäÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚÑ×Ì죬£¬£¬¼´6ÔµÄij¸öʱ¼ä£¬£¬£¬¹¥»÷Õß»á¼ûÁËÓû§µÄµç×ÓÓʼþµØµãºÍ¼ÓÃܵÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ8ÔÂ22ÈÕ·¢Ã÷ÁËÕâÒ»ÊÂÎñ£¬£¬£¬²¢ÕýÔÚÁªÏµÊÜÓ°ÏìµÄÓû§ÐÞ¸ÄÆäÃÜÂë¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖв»°üÀ¨ÈκÎÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚ¾ÙÐнøÒ»²½µÄÊӲ졣¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/shein-fashion-retailer-announces-breach-affecting-6-42-million-users/
5¡¢ÔÆÅÌË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ð¡Ê±£¬£¬£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì
Ó¡¶È×ÅÃûÔÆÅÌËã¿Æ¼¼¹«Ë¾ZohoµÄÓòÃû£¨zoho.com£©±»ÆäÓòÃû×¢²áÉÌTierraNet½ûÓýüÁ½¸öСʱ£¬£¬£¬ÔÚ´Ëʱ´úÓû§±»Öض¨ÏòÖÁÒ»¸ö¿ÕÈ±Ò³Ãæ£¬£¬£¬Ô¼3000ÍòÓû§Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤TierraNetµÄ˵·¨£¬£¬£¬Æä¶à´ÎÊÕµ½¹ØÓÚʹÓÃZohoÓʼþЧÀÍ·¢ËÍ´¹ÂÚÓʼþµÄͶËߣ¬£¬£¬µ«ÔÚÊý´ÎÓëZohoÏàͬºó¸ÃÎÊÌâûÓлñµÃ½â¾ö£¬£¬£¬×îÖÕÒ»Ì××Ô¶¯»¯ÏµÍ³µ¼ÖÂÁË´ËÊÂÎñµÄ±¬·¢¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/domain-registrar-oversteps-taking-down-zoho-domain-impacts-over-30mil-users/
ÉùÃ÷£º±¾×ÊѶÓÉMG±ùÇòÍ»ÆÆÊÔÍæÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ