¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180823
Ðû²¼Ê±¼ä 2018-08-23¡¾Îó²î²¹¶¡¡¿Struts2¹ÙÍøÅû¶×îÐÂRCEÎó²îS2-057£¨CVE-2018-11776£©
2018Äê8ÔÂ22ÈÕ£¬Apache StrutsÐû²¼×îÐÂÇ徲ͨ¸æ£¬Åû¶¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÇå¾²Îó²î£¨S2-057/CVE-2018-11776£©¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨Apache Struts 2.3 - Struts 2.3.34ÒÔ¼°Apache Struts 2.5 - Struts 2.5.16£¬½¨ÒéÓû§Éý¼¶ÖÁ×îа汾Apache Struts 2.3.35»òStruts 2.5.17¡£
ÔÎÄÁ´½Ó£ºhttps://cwiki.apache.org/confluence/display/WW/S2-057
¡¾Îó²î²¹¶¡¡¿AdobeÐû²¼½ôÆÈÇå¾²¸üУ¬ÐÞ¸´PSÖеÄÁ½¸öRCEÎó²î
AdobeÐû²¼½ôÆÈÇå¾²¸üУ¬ÐÞ¸´WindowsºÍmacOSƽ̨ÉϵÄAdobe Photoshop CCÖеÄÁ½¸ö¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĸßΣÎó²î¡£ÕâÁ½¸öÎó²î£¨CVE-2018-12810ºÍCVE-2018-12811£©Ó°ÏìÁË19.1.5¼°¸üÔçµÄ19.x°æ±¾ÒÔ¼°18.1.5¼°¸üÔçµÄ18.x°æ±¾¡£½¨ÒéÓû§¸üÐÂÖÁ°æ±¾19.1.6ºÍ18.1.6¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/adobe-photoshop-update.html
¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±·¢Ã÷Ghostscript±£´æ¶à¸ö-dSAFERɳÏäÈÆ¹ýÎó²î
Google Project ZeroÇå¾²Ñо¿Ö°Ô±Tavis OrmandyÅû¶ÁËGhostscriptÖеĶà¸ö-dSAFERɳÏäÈÆ¹ýÎó²î¡£GhostscriptÊÇAdobe PostScriptºÍPDFµÄÚ¹ÊÍÓïÑÔ£¬ÆÕ±éÓ¦ÓÃÔÚImageMagick¡¢Evince¡¢GIMP¡¢PDFÔĶÁÆ÷µÈÈí¼þÖС£¹¥»÷Õß¿Éͨ¹ý¶ñÒâµÄPostScript¡¢PDF¡¢EPS»òXPSÎļþ´¥·¢Îó²î¡£ÏÖÔÚÕâЩÎó²î»¹Ã»Óб»·ÖÅÉCVE±àºÅ£¬Ò²Ã»Óйٷ½ÐÞ¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/ghostscript-postscript-vulnerability.html
¡¾Õþ²ß¹æÔò¡¿Å·ÖÞµçÐűê׼лáETSIÐû²¼Çå¾²»á¼û¿ØÖƵļÓÃܱê×¼
Å·ÖÞµçÐűê׼лáETSIÐû²¼Á½¸ö»ùÓÚÊôÐÔ¼ÓÃÜ£¨ABE£©µÄ¹æ·¶£¬ÐÎòÁËÔõÑùͨÏ꾡Á£¶ÈµÄ»á¼û¿ØÖÆÀ´±£»¤Ð¡ÎÒ˽¼ÒÊý¾ÝµÄÇå¾²¡£ÕâÁ½¸ö¹æ·¶ÊÇETSI TS 103 458ºÍETSI TS 103 532£¬»®·ÖÐÎòÁËABEµÄ¸ß¹æ¸ñÒªÇóºÍʹÓÃABE»á¼û¿ØÖÆÊ±µÄÐÅÍÐÄ£×Ó¡¢¹¦Ð§ÒÔ¼°ÐÒé¡£ÕâÁ½¸ö¹æ·¶¶¼×ñÕÕ2018Äê5ÔÂÆðʵÑéµÄGDPR¡£
ÔÎÄÁ´½Ó£ºhttps://www.etsi.org/news-events/news/1328-2018-08-press-etsi-releases-cryptographic-standards-for-secure-access-control
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷ÐÂÀÕË÷Èí¼þRyukÓëHermes±£´æ¹ØÁª
Check PointÑо¿ÍŶӷ¢Ã÷ÒѾϮ»÷ÁËÈ«Çò¶à¸ö×éÖ¯µÄÐÂÀÕË÷Èí¼þRyuk£¬¹¥»÷ÕßÒѾ»ñµÃÁËÁè¼Ý64ÍòÃÀÔªµÄÊê½ð¡£Ñо¿Ö°Ô±»¹²»¿ÉÈ·¶¨RyukµÄÈö²¥·½·¨£¬RyukÐèÒªÖÎÀíԱȨÏÞÀ´Ö´ÐУ¬µ«Æä×Ô¼ºÃ»ÓлñµÃÖÎÀíԱȨÏ޵Ĺ¦Ð§£¬Ò²Ã»Óз¢Ã÷ÓÃÓÚʵÏÖÕâһĿµÄµÄÓʼþ¡¢ÎĵµºÍ¾ç±¾µÈ¡£Òò´ËRyukºÜÓпÉÄÜÊÇÊÖ¶¯ÈëÇÖµÄЧ¹û¡£Ñо¿Ö°Ô±·¢Ã÷RyukºÍÀÕË÷Èí¼þHermes¹²ÏíÁË´ó×ڵĴúÂ룬ÕâÒâζ×ÅÆä±³ºóµÄ¹¥»÷Õß±£´æ¹ØÁª¡£HermesÏÖÔÚÈÔÈ»»îÔ¾£¬Hermes 2.1ͨ¹ý´ó¹æÄ£À¬»øÓʼþ¾ÙÐзַ¢£¬¶øRyukÖ÷ÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
¡¾Êý¾Ýй¶¡¿±£Ä··þÎñSitterÒòMongoDBÉèÖùýʧµ¼ÖÂÁè¼Ý9.3ÍòÓû§µÄÐÅϢй¶
8ÔÂ14ÈÕÇå¾²Ñо¿Ö°Ô±Bob Diachenko·¢Ã÷±£Ä··þÎñSitterµÄÒ»¸öMongoDB¿Éͨ¹ý»¥ÁªÍø¹ûÕæ»á¼û£¨ÎÞÐèµÇ¼ƾ֤£©£¬Áè¼Ý9.3ÍòÃûÓû§µÄÃô¸ÐÊý¾Ýй¶¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨ÕË»§µÄÃÜÂë¹þÏ£¡¢Ã¿¸ö¼ÒÍ¥µÄº¢×ÓÊý¡¢¼ÒÍ¥µØµã¡¢µç»°ºÅÂë¡¢ÁªÏµÈËÁÐ±í¡¢Ö§¸¶¿¨ºÅÒÔ¼°appÄÚµÄ̸ÌìÐÅÏ¢µÈ¡£Êý¾Ý×ÜÁ¿Áè¼Ý2GB¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/mongodb-server-exposes-babysitting-apps-database/


¾©¹«Íø°²±¸11010802024551ºÅ