¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180823
Ðû²¼Ê±¼ä 2018-08-23¡¾Îó²î²¹¶¡¡¿Struts2¹ÙÍøÅû¶×îÐÂRCEÎó²îS2-057£¨CVE-2018-11776£©
2018Äê8ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬Apache StrutsÐû²¼×îÐÂÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬Åû¶¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÇå¾²Îó²î£¨S2-057/CVE-2018-11776£©¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨Apache Struts 2.3 - Struts 2.3.34ÒÔ¼°Apache Struts 2.5 - Struts 2.5.16£¬£¬£¬£¬£¬£¬½¨ÒéÓû§Éý¼¶ÖÁ×îа汾Apache Struts 2.3.35»òStruts 2.5.17¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cwiki.apache.org/confluence/display/WW/S2-057
¡¾Îó²î²¹¶¡¡¿AdobeÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´PSÖеÄÁ½¸öRCEÎó²î
AdobeÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´WindowsºÍmacOSƽ̨ÉϵÄAdobe Photoshop CCÖеÄÁ½¸ö¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĸßΣÎó²î¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î£¨CVE-2018-12810ºÍCVE-2018-12811£©Ó°ÏìÁË19.1.5¼°¸üÔçµÄ19.x°æ±¾ÒÔ¼°18.1.5¼°¸üÔçµÄ18.x°æ±¾¡£¡£¡£¡£¡£¡£½¨ÒéÓû§¸üÐÂÖÁ°æ±¾19.1.6ºÍ18.1.6¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/adobe-photoshop-update.html
¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±·¢Ã÷Ghostscript±£´æ¶à¸ö-dSAFERɳÏäÈÆ¹ýÎó²î
Google Project ZeroÇå¾²Ñо¿Ö°Ô±Tavis OrmandyÅû¶ÁËGhostscriptÖеĶà¸ö-dSAFERɳÏäÈÆ¹ýÎó²î¡£¡£¡£¡£¡£¡£GhostscriptÊÇAdobe PostScriptºÍPDFµÄÚ¹ÊÍÓïÑÔ£¬£¬£¬£¬£¬£¬ÆÕ±éÓ¦ÓÃÔÚImageMagick¡¢Evince¡¢GIMP¡¢PDFÔĶÁÆ÷µÈÈí¼þÖС£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý¶ñÒâµÄPostScript¡¢PDF¡¢EPS»òXPSÎļþ´¥·¢Îó²î¡£¡£¡£¡£¡£¡£ÏÖÔÚÕâЩÎó²î»¹Ã»Óб»·ÖÅÉCVE±àºÅ£¬£¬£¬£¬£¬£¬Ò²Ã»Óйٷ½ÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/ghostscript-postscript-vulnerability.html
¡¾Õþ²ß¹æÔò¡¿Å·ÖÞµçÐűê׼лáETSIÐû²¼Çå¾²»á¼û¿ØÖƵļÓÃܱê×¼
Å·ÖÞµçÐűê׼лáETSIÐû²¼Á½¸ö»ùÓÚÊôÐÔ¼ÓÃÜ£¨ABE£©µÄ¹æ·¶£¬£¬£¬£¬£¬£¬ÐÎòÁËÔõÑùͨÏ꾡Á£¶ÈµÄ»á¼û¿ØÖÆÀ´±£»£»£»£»£»£»£»¤Ð¡ÎÒ˽¼ÒÊý¾ÝµÄÇå¾²¡£¡£¡£¡£¡£¡£ÕâÁ½¸ö¹æ·¶ÊÇETSI TS 103 458ºÍETSI TS 103 532£¬£¬£¬£¬£¬£¬»®·ÖÐÎòÁËABEµÄ¸ß¹æ¸ñÒªÇóºÍʹÓÃABE»á¼û¿ØÖÆÊ±µÄÐÅÈÎÄ£×Ó¡¢¹¦Ð§ÒÔ¼°ÐÒé¡£¡£¡£¡£¡£¡£ÕâÁ½¸ö¹æ·¶¶¼×ñÕÕ2018Äê5ÔÂÆðʵÑéµÄGDPR¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.etsi.org/news-events/news/1328-2018-08-press-etsi-releases-cryptographic-standards-for-secure-access-control
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷ÐÂÀÕË÷Èí¼þRyukÓëHermes±£´æ¹ØÁª
Check PointÑо¿ÍŶӷ¢Ã÷ÒѾϮ»÷ÁËÈ«Çò¶à¸ö×éÖ¯µÄÐÂÀÕË÷Èí¼þRyuk£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒѾ»ñµÃÁËÁè¼Ý64ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹²»¿ÉÈ·¶¨RyukµÄÈö²¥·½·¨£¬£¬£¬£¬£¬£¬RyukÐèÒªÖÎÀíԱȨÏÞÀ´Ö´ÐУ¬£¬£¬£¬£¬£¬µ«Æä×Ô¼ºÃ»ÓлñµÃÖÎÀíԱȨÏ޵Ĺ¦Ð§£¬£¬£¬£¬£¬£¬Ò²Ã»Óз¢Ã÷ÓÃÓÚʵÏÖÕâһĿµÄµÄÓʼþ¡¢ÎĵµºÍ¾ç±¾µÈ¡£¡£¡£¡£¡£¡£Òò´ËRyukºÜÓпÉÄÜÊÇÊÖ¶¯ÈëÇÖµÄЧ¹û¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷RyukºÍÀÕË÷Èí¼þHermes¹²ÏíÁË´ó×ڵĴúÂ룬£¬£¬£¬£¬£¬ÕâÒâζ×ÅÆä±³ºóµÄ¹¥»÷Õß±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£HermesÏÖÔÚÈÔÈ»»îÔ¾£¬£¬£¬£¬£¬£¬Hermes 2.1ͨ¹ý´ó¹æÄ£À¬»øÓʼþ¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬¶øRyukÖ÷ÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
¡¾Êý¾Ýй¶¡¿±£Ä·Ð§ÀÍSitterÒòMongoDBÉèÖùýʧµ¼ÖÂÁè¼Ý9.3ÍòÓû§µÄÐÅϢй¶
8ÔÂ14ÈÕÇå¾²Ñо¿Ö°Ô±Bob Diachenko·¢Ã÷±£Ä·Ð§ÀÍSitterµÄÒ»¸öMongoDB¿Éͨ¹ý»¥ÁªÍø¹ûÕæ»á¼û£¨ÎÞÐèµÇ¼ƾ֤£©£¬£¬£¬£¬£¬£¬Áè¼Ý9.3ÍòÃûÓû§µÄÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨ÕË»§µÄÃÜÂë¹þÏ£¡¢Ã¿¸ö¼ÒÍ¥µÄº¢×ÓÊý¡¢¼ÒÍ¥µØµã¡¢µç»°ºÅÂë¡¢ÁªÏµÈËÁÐ±í¡¢Ö§¸¶¿¨ºÅÒÔ¼°appÄÚµÄ̸ÌìÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£Êý¾Ý×ÜÁ¿Áè¼Ý2GB¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/mongodb-server-exposes-babysitting-apps-database/