¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬Ó°ÏìËùÓÐϵͳ°æ±¾£»À¶ÑÀÎó²îKNOB£¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý

Ðû²¼Ê±¼ä 2019-08-15
1¡¢Î¢ÈíÐÞ¸´RDP·þÎñÖеÄÐÂÈ䳿¼¶Îó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

΢ÈíÔÚ8Ô·ݵÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË94¸öÎó²î£¬ÆäÖаüÀ¨4¸öеÄRDPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1181¡¢CVE-2019-1182¡¢CVE-2019-1222¡¢CVE-2019-1226£©¡£ÆäÖÐCVE-2019-1181ºÍCVE-2019-1182Óë5ÔÂ·ÝÆØ³öµÄBlueKeepÎó²î£¨CVE-2019-0708£©ÀàËÆ£¬¿ÉʵÏÖÈ䳿»¯¹¥»÷£¬ÊÜÓ°ÏìµÄϵͳ°æ±¾°üÀ¨win 7 SP1¡¢win 8.1¡¢win 10ÒÔ¼°windows server 2008 R2 SP1¡¢2012¡¢2012 R2¡¢2016¼°2019µÈ¡£XP¡¢windows server 2003¼°2008²»ÊÜÓ°Ïì¡£ÏÖÔÚÉÐδ·¢Ã÷ÕâЩÎó²îÔÚÒ°ÍⱻʹÓ㬵«Î¢ÈíÇ¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üÐÂÐÞ¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-fixes-critical-windows-10-wormable-remote-desktop-flaws/


2¡¢IntelÐû²¼NUC¹Ì¼þ¸üУ¬ÐÞ¸´¶à¸öÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


IntelÐû²¼NUC KitµÄ¹Ì¼þ¸üУ¬ÐÞ¸´¿Éµ¼ÖÂÌáȨ¡¢¾Ü¾ø·þÎñÒÔ¼°ÐÅϢй¶µÄÎó²î¡£¸ÃÎó²î£¨CVE-2019-11140£¬CVSSÆÀ·ÖΪ7.5£©ÊÇÓÉÓÚ²»³ä·ÖµÄÑéÖ¤µ¼ÖµÄ£¬¿É±»¾ßÓÐÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßËùʹÓã¬ÊÜÓ°ÏìµÄ²úÆ·ÐͺŰüÀ¨Intel NUC Kit NUC7i7DNx¡¢NUC7i5DNx¡¢NUC7i3DNxÒÔ¼°Compute Stick STK2MV64CCºÍCompute Card CD1IV128MK¡£±ðµÄ£¬Intel»¹ÐÞ¸´ÁË´¦Öóͷ£Æ÷ʶ±ð¹¤¾ßÖеÄÎó²î£¨CVE-2019-11163£¬CVSSÆÀ·ÖΪ8.2£©ÒÔ¼°RAIDÖÎÀíÈí¼þÖеÄÎó²î£¨CVE-2019-0173£¬CVSSÆÀ·Ö6.8£©¡£¸ü¶àÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-updates-nuc-firmware-to-patch-high-severity-bug/


3¡¢HTTP/2ÆØ³ö8¸öÐÂÎó²î£¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

Ñо¿Ö°Ô±Åû¶HTTP/2ЭÒéʵÏÖÖеÄ8¸öÐÂÎó²î£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏòδÐÞ²¹µÄ·þÎñÆ÷Ìᳫ¾Ü¾ø·þÎñ¹¥»÷¡£ÕâЩÎó²î£¨CVE-2019-9511~CVE-2019-9518£©ÊÇÓÉNetflixÑо¿Ô±Jonathan LooneyÒÔ¼°GoogleÑо¿Ô±Piotr Sikora·¢Ã÷µÄ£¬¿ÉÓÃÓÚ´¥·¢·þÎñÆ÷µÄ×ÊÔ´ºÄ¾¡£¬µ«²»¿ÉÓÃÓÚÈëÇÖ·þÎñÆ÷¡£Æ¾Ö¤CERTÐû²¼µÄͨ¸æ£¬ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨NGINX¡¢Apache¡¢H2O¡¢Nghttp2¡¢Microsoft(IIS)¡¢Cloudflare¡¢Akamai¡¢Apple(SwiftNIO)¡¢Amazon¡¢Facebook(Proxygen)¡¢Node.jsÒÔ¼°Envoy proxy£¬´ó´ó¶¼³§É̶¼ÒѾ­Ðû²¼ÁËÐÞ¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/http2-dos-vulnerability.html


4¡¢ÐÂÀ¶ÑÀÎó²îKNOB£¬¿ÉÆÆ½âÃÜÔ¿ºÍ¸Ä¶¯Êý¾Ý


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±Åû¶À¶ÑÀÖеÄÐÂÎó²î£¨CVE-2019-9506£©£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß±©Á¦ÆÆ½âÅä¶Ô×°±¸ÔÚ´«ÊäÊý¾ÝʱʹÓõÄÃÜÔ¿²¢¸Ä¶¯Êý¾Ý¡£¸ÃÎó²îÓ°ÏìÁ˰汾ÔÚ1.0ÖÁ5.1Ö®¼äµÄBluetooth BR/EDR×°±¸¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬¹¥»÷Õß¿É×ÌÈÅÁ½Ì¨Åä¶Ô×°±¸ÉèÖüÓÃÜÅþÁ¬µÄÀú³Ì£¬ïÔ̭ʹÓõÄÃÜÔ¿µÄ³¤¶È£¬Ê¹µÃÃÜÔ¿µÄÇå¾²ÐÔÖè¼õ¡£¼«¶ËÇéÐÎÏ£¬ÃÜÔ¿³¤¶È¿ÉÄܱ»ïÔ̭Ϊ1¸ö×Ö½Ú¡£ÎªÁË»º½â¸ÃÎó²î£¬À¶ÑÀÊÖÒÕͬÃ˸üÐÂÁËÀ¶ÑÀ½¹µã¹æ·¶£¬½¨Òé×îСÃÜÔ¿³¤¶ÈΪ7¸ö×Ö½Ú¡£Î¢ÈíÒ²ÔÚÎó²î£¨CVE-2019-9506£©µÄ²¹¶¡Öн«Ä¬ÈÏ×îСÃÜÔ¿³¤¶ÈÉèÖÃΪ7¸ö×Ö½Ú¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/

5¡¢¹È¸èÅû¶WindowsÖб£´æ20ÄêµÄÎó²î£¬Ó°ÏìËùÓÐϵͳ°æ±¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¹È¸èÑо¿Ö°Ô±Tavis OrmandyÅû¶WindowsϵͳÖб£´æ³¤´ï20ÄêµÄÒ»¸öδÐÞ¸´Îó²î¡£¸ÃÎó²îÓ°ÏìÁËWindows XPÒÔÀ´µÄËùÓÐWindows°æ±¾£¬°üÀ¨Win 10¡£¸ÃÎó²î±£´æÓÚ΢ÈíµÄÎı¾·þÎñ¿ò¼Ü£¨MSCTF£©ÖУ¬ÓëMSCTF¿Í»§¶ËºÍ·þÎñÆ÷Ö®¼äµÄͨѶȱÉÙ»á¼û¿ØÖÆ/Éí·ÝÑéÖ¤»úÖÆÓйØ£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÅþÁ¬µ½CTF»á»°¡¢¶ÁдÆäËü´°¿Ú/»á»°µÄÄÚÈÝ¡¢Î±ÔìÏß³ÌID/Àú³ÌID/HWND¡¢Î±×°³ÉCTF·þÎñÆ÷¡¢¾ÙÐÐɳÏäÌÓÒÝÒÔ¼°ÌáȨ¡£¹¥»÷Õß»¹¿ÉÒÔÈÆ¹ýÓû§½Ó¿ÚȨÏÞ¸ôÀ루UIPI£©£¬»ñÈ¡SYSTEMȨÏÞÒÔ¼°¿ØÖÆUAC¶Ô»°¿òµÈ¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËÔÚWin 10ÖлñÈ¡SYSTEMµÄPoCÊÓÆµ¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/ctfmon-windows-vulnerabilities.html

6¡¢BioStar 2ÉúÎïʶ±ðÊý¾Ý¿âй¶£¬²¨¼°Êý°ÙÍòÓû§

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


vpnMentorÑо¿Ö°Ô±·¢Ã÷BioStar 2µÄÒ»¸öElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬µ¼ÖÂÊý°ÙÍòÈ˵ÄÉúÎïʶ±ðÊý¾Ýй¶¡£¸ÃÊý¾Ý¿â°üÀ¨23GBÊý¾Ý£¨Áè¼Ý2780ÍòÌõ¼Í¼£©£¬ÕâЩÊý¾Ý°üÀ¨Ö¸ÎÆ/Ãæ²¿Ê¶±ðÊý¾Ý¡¢Î´¼ÓÃܵÄÓû§ÃûºÍÃÜÂëÒÔ¼°Ô±¹¤µÄÒþ˽ÐÅÏ¢¡£Biostar 2±»¼¯³Éµ½µÚÈý·½ÏµÍ³ÖУ¬ÀýÈçNedapµÄAEOS»á¼û¿ØÖÆÏµÍ³£¬¸ÃϵͳÒѱ»83¸ö¹ú¼ÒµÄ5700¶à¸ö×é֯ʹÓ㬰üÀ¨Ó¢¹ú´ó¶¼»á¾¯Ô±¾Ö¡£ÊÜÓ°ÏìµÄ¹«Ë¾»¹°üÀ¨Ó¢¹ú¼Ò¾Ó×°ÊÎÉÌTile MountainÒÔ¼°Ó¡¶ÈºÍ˹ÀïÀ¼¿¨µÄ½¡Éí·¿Power World GymsµÈ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/millions-of-records-exposed/