¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180814

Ðû²¼Ê±¼ä 2018-08-14

¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿Ö°Ô±·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷±£´æºóÃÅ»úÖÆ


Çå¾²Ñо¿Ö°Ô±Christopher Domas·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷Öб£´æºóÃÅ»úÖÆ£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß´ÓÓû§Ä£Ê½ÌáȨµ½OSÄÚºËģʽ¡£ ¡£¡£¡£¡£¡£¡£¸Ã´¦Öóͷ£Æ÷ÊÇÓĘ́ÍåVIA Technologies IncÓÚ2001ÄêÖÁ2003Äê¼äÉú²úºÍÏúÊÛµÄCPUϵÁУ¬£¬£¬£¬£¬³£°²ÅÅÔÚPOS»ú¡¢ÖÇÄܵ绰ͤ¡¢ATM¡¢ÓÎÏ·×°±¸¡¢Ò½ÁÆ×°±¸ÒÔ¼°¹¤Òµ×Ô¶¯»¯×°±¸ÉÏ¡£ ¡£¡£¡£¡£¡£¡£Domas½«¸ÃºóÃÅ»úÖÆ³ÆÎªRosenbridge£¬£¬£¬£¬£¬µ«Ò²ÓÐÑо¿Ö°Ô±ÒÔΪ¸Ã»úÖÆ²¢²»ÊÇÒ»¸öÕæÕýµÄºóÃÅ£¬£¬£¬£¬£¬ÓÉÓÚVIA¹Ù·½ÎĵµÔøÌáµ½¸Ã»úÖÆ¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoor-mechanism-discovered-in-via-c3-x86-processors/


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÌá³öÕë¶ÔAndroid appµÄÐÂÐÍMan-in-the-Disk¹¥»÷


Check PointÑо¿ÍŶӷ¢Ã÷Android appµÄй¥»÷Ãæ£¬£¬£¬£¬£¬ÕâÖÖÃûΪMan-in-the-DiskµÄ¹¥»÷³¡¾°ÔÊÐí¹¥»÷Õß»á¼ûºÍ¸Ä¶¯Íⲿ´æ´¢ÉϵÄÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£Man-in-the-Disk¹¥»÷»ùÓÚÁ½¸öÊÂʵ£¬£¬£¬£¬£¬Ê×ÏÈ£¬£¬£¬£¬£¬ÈκÎÓ¦Óö¼¿ÉÒԸ͝ÆäËüÓ¦ÓõÄÍⲿ´æ´¢Êý¾Ý£¬£¬£¬£¬£¬Æä´Î£¬£¬£¬£¬£¬ÓÉÓÚÏÕЩËùÓÐapp¶¼ÒªÇó´ËȨÏÞ£¬£¬£¬£¬£¬Óû§Í¨³£»£»£»£» £»£»£»á²»¼ÓÏÓÒɵظøÓè´ËȨÏÞ¡£ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖËûÃÇ¿ÉÒÔÖ´ÐÐÁ½ÖÖÀàÐ͵Ĺ¥»÷£¬£¬£¬£¬£¬Ê¹ÆäËüappÍ߽⻣»£»£» £»£»£»ò½«ÆäËüapp¸üÐÂΪ¶ñÒâ°æ±¾¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/08/12/man-in-the-disk-a-new-attack-surface-for-android-apps/


¡¾Îó²î²¹¶¡¡¿Oracle¿ª·¢ÍŶÓÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´¸ßΣÎó²î£¨CVE-2018-3110£©


OracleÐÞ¸´ÆäÊý¾Ý¿â²úÆ·ÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2018-3110£©£¬£¬£¬£¬£¬¾­ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î½ÓÊÜÊý¾Ý¿â²¢½¨Éè¶Ôµ×²ãЧÀÍÆ÷µÄshell»á¼û¡£ ¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚOracle Database ServerµÄJava VM×é¼þÖУ¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨WindowsÉϵÄ11.2.0.4¡¢12.2.0.1ºÍ12.1.0.2ÒÔ¼°Unix»òLinuxÉϵÄ12.1.0.2¡£ ¡£¡£¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75310/hacking/cve-2018-3110-oracle-database.html


¡¾Îó²î²¹¶¡¡¿Ñо¿Ö°Ô±Åû¶macOSÖеÄÐÂ0 day£¬£¬£¬£¬£¬¿Éͨ¹ýÄ£ÄâÊó±êµã»÷¼ÓÔØÄÚºËÀ©Õ¹


Digita SecurityÑо¿Ö°Ô±Patrick Wardle·¢Ã÷macOSÖеÄÒ»¸öÁãÈÕÎó²î£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÄ£ÄâÊó±êµã»÷ÈÆ¹ýϵͳµÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬¼ÓÔØÏµÍ³ÄÚºËÀ©Õ¹¡£ ¡£¡£¡£¡£¡£¡£Æ»¹ûÔÚHigh SierraÖÐÍÆ³ö¡°Óû§Åú×¼ÄÚºËÀ©Õ¹¼ÓÔØ¡±µÄÈ«ÐÂÇå¾²¹¦Ð§À´ÔöÇ¿macOSµÄÇå¾²ÐÔ£¬£¬£¬£¬£¬¸Ã¹¦Ð§ÒªÇóÓû§ÔÚÇå¾²ÉèÖýçÃæÊÖ¶¯µã»÷¡°ÔÊÐí¡±°´Å¥À´Åú×¼¼ÓÔØÈκÎÄÚºËÀ©Õ¹¡£ ¡£¡£¡£¡£¡£¡£µ«Patrick·¢Ã÷Á½´Î¡°°´Ï¡±Êó±ê°´Å¥µÄÊÂÎñ»á±»ÏµÍ³Îóʶ±ðΪ¡°°´Ï¡±ºÍ¡°ËÉ¿ª¡±ÕâÒ»ÍêÕûµÄµã»÷²Ù×÷£¬£¬£¬£¬£¬´Ó¶øÍ»ÆÆÆäÇå¾²»úÖÆ¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75293/hacking/synthetic-mouse-click-attack.html


¡¾Îó²î²¹¶¡¡¿Ë¼¿ÆÐû²¼IOSºÍIOS XEµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Õë¶ÔIKEЭÒéµÄÎó²î


˼¿ÆÐÞ¸´ÁËÆäIOSºÍIOS XEÖеÄÇå¾²Îó²î£¨CVE-2018-0131£©£¬£¬£¬£¬£¬¸ÃÎó²îÊÇÕë¶ÔIKE£¨InternetÃÜÔ¿½»Á÷£©Ð­ÒéµÄÐÂBleichenbacher oracle¼ÓÃܹ¥»÷µÄËĸöÎó²îÖ®Ò»£¬£¬£¬£¬£¬ÆäÓàÈý¸öÎó²îÊÇ»ªÎª£¨CVE-2017-17305£©¡¢Clavister£¨CVE-2018-8753£©ºÍZyXEL£¨CVE-2018-9129£©¡£ ¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ë¼¿ÆµÄ˵·¨£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñÈ¡IKEv1»á»°µÄ¼ÓÃÜËæ»úÊý£¬£¬£¬£¬£¬½ø¶ø»Ö¸´Í¨¹ýIPsec·¢Ë͵ÄÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cisco-patches-its-operating-systems-against-new-ike-crypto-attack/


¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚ8ÔÂ·ÝÆð¾¢¾ÙÐÐÈö²¥¡£ ¡£¡£¡£¡£¡£¡£¸ÃÑù±¾Ê¹ÓÃC++±àд£¬£¬£¬£¬£¬²¢Í¨¹ýMS Visual Studio¾ÙÐбàÒ룬£¬£¬£¬£¬ÆäʹÓÃÁËÀà¿âMFC¡¢BoostºÍCrypto ++£¬£¬£¬£¬£¬Ñù±¾µÄPEÍ·ÖаüÀ¨ÁË×î½üµÄ±àÒëÈÕÆÚ¡£ ¡£¡£¡£¡£¡£¡£Ã¿Ò»¸ö¼ÓÃܵÄÎļþ¶¼»á±»Ìí¼Ó.KEYPASSÀ©Õ¹Ãû¡£ ¡£¡£¡£¡£¡£¡£Æä¼ÓÃÜËã·¨ÊÇAES-256£¬£¬£¬£¬£¬Ê¹ÓÃCFBģʽ²¢ÇÒIVΪ0£¬£¬£¬£¬£¬ËùÓÐÎļþµÄ¼ÓÃÜÃÜÔ¿¶¼ÎªÏàͬµÄ32×Ö½ÚÃÜÔ¿¡£ ¡£¡£¡£¡£¡£¡£ÆäÓëC£¦CЧÀÍÆ÷µÄͨѶÊÇͨ¹ýHTTPÒÔJSONµÄÐÎʽ´«ÊäµÄ¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/keypass-ransomware/87412/