Ï£À°¶¥¼¶ÓòÃû×¢²áÉÌICS-ForthÔâºÚ¿Í¹¥»÷£»£»£»£»£»£»¹ã¸æÈí¼þAgent SmithѬȾԼ2500Íǫ̀Android×°±¸

Ðû²¼Ê±¼ä 2019-07-11
1¡¢Î¢ÈíÐû²¼Windows7ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´77¸öÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
΢ÈíÔÚWindows7ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´ÁË77¸öÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨15¸öÑÏÖØÎó²î¡£¡£¡£¡£¡£¡£Î¢ÈíÐÞ¸´ÁËÁ½¸öÌáȨ0day£¬£¬£¬£¬£¬£¬£¬µÚÒ»¸öÊÇWin32kÌáȨÎó²î£¨CVE-2019-1132£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓÉESETÑо¿Ö°Ô±Anton Cherepanov·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÒÔÄÚºËģʽÔËÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÊÇMicrosoft splwow64ÌáȨÎó²î£¨CVE-2019-0880£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓÉReSecurityÑо¿Ö°Ô±Gene Yoo·¢Ã÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Î¢Èí»¹ÐÞ¸´ÁË5¸öÒѱ»¹ûÕæÅû¶µÄÎó²î£¬£¬£¬£¬£¬£¬£¬µ«Î¢ÈíÌåÏÖÕâЩÎó²î¶¼Ã»ÓÐÔÚÒ°ÍⱻʹÓᣡ£¡£¡£¡£¡£Î¢Èí»¹ÐÞ¸´ÁËSandboxEscaperÅû¶µÄÌáȨÎó²î£¨CVE-2019-1130£©¡£¡£¡£¡£¡£¡£ÍêÕûÐÞ¸´ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/microsoft/microsofts-july-2019-patch-tuesday-fixes-2-zero-day-vulnerabilities/

2¡¢Ó¢ÌضûÐÞ¸´ÆóÒµ¼¶SSD¼°CPUÕï¶Ï¹¤¾ßÖеÄÌáȨÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Ó¢ÌØ¶ûÐÞ¸´ÆóÒµ¼¶SSDÖеÄÌáȨÎó²î£¨CVE-2018-18095£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËSSD DC S4500ϵÁкÍSSD DC S4600ϵÁУ¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾ÊÇSCV10150֮ǰµÄ°æ±¾¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓɲ»×¼È·µÄÉí·ÝÑéÖ¤ÒýÆðµÄ£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÎïÆÊÎö¼ûÀ´Ê¹Ó㬣¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ5.3¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ó¢Ìضû»¹ÐÞ¸´CPUÕï¶Ï¹¤¾ßÖеÄÑÏÖØÎó²î£¨CVE-2019-11133£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß¾ÙÐÐÌáȨ¡¢´¥·¢¾Ü¾øÐ§ÀÍ»ò»ñÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖÊÇ8.2·Ö£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁË4.1.2.24֮ǰµÄ°æ±¾¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-fixes-priv-escalation-vulnerability-in-enterprise-ssd/

3¡¢ÂÞ¼¼Unifying USBÎüÊÕÆ÷4¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼Ö»÷¼ü×¢Èë¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Çå¾²Ñо¿Ô±Marcus Mengs·¢Ã÷ÂÞ¼¼Unifying USBÎüÊÕÆ÷±£´æ4¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÊÇÓÉÂÞ¼¼¼ÓÃܹ·µÄ¹ýʱ¹Ì¼þÔì³ÉµÄ£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÌᳫ»÷¼ü×¢Èë¹¥»÷¡¢¼üÅ̼ͼÒÔ¼°¿ØÖÆÄ¿µÄϵͳ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâËĸöÎó²î¾ùÒÑÉϱ¨¸øÂÞ¼¼¹«Ë¾£¬£¬£¬£¬£¬£¬£¬µ«ÂÞ¼¼È·ÈÏËûÃÇÖ»»áÐÞ¸´ÆäÖеÄÁ½¸öÎó²î£ºCVE-2019-13054ºÍCVE-2019-13055½«ÔÚ2019Äê8ÔÂÐû²¼µÄ¸üÐÂÖÐÐÞ¸´£¬£¬£¬£¬£¬£¬£¬CVE-2019013052ºÍCVE-2019-13053½«²»»áÐÞ¸´¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/logitech-unifying-receivers-vulnerable-to-key-injection-attacks/

4¡¢GEÂé×í»úÉí·ÝÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬Ò×ÔâÔ¶³Ì¸Ä¶¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
CyberMDXÑо¿Ö°Ô±Elad Luz·¢Ã÷GEÒ½ÁƵÄÁ½¿îÂé×í»ú±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜ»áÔâµ½¶ñÒâ¸Ä¶¯¡£¡£¡£¡£¡£¡£GEÒ½ÁÆÊôÓÚͨÓÃµçÆø¹«Ë¾£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Ñо¿Ö°Ô±µÄ˵·¨£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»áÆÈʹÒ×Êܹ¥»÷µÄ×°±¸Ê¹ÓÃÆäʹÓõÄÇ徲ЭÒé°æ±¾¡£¡£¡£¡£¡£¡£ÕâÖÖ½µ¼¶¹¥»÷²»µ«¿ÉÒÔÔ¶³Ìµ÷ÀíÂé×íÆøÌå»ìÏýÎïµÄÒòËØ£¬£¬£¬£¬£¬£¬£¬»¹¿ÉÒÔÒÖÖÆ¾¯±¨¡¢¸Ä±äϵͳµÄʱ¼äºÍÈÕÆÚ¡¢ÒÔ¼°¸Ä±äÆøÑ¹¡£¡£¡£¡£¡£¡£ÃÀ¹úÁìÍÁÇå¾²²¿ÔÚÖܶþÐû²¼µÄÒ»·Ý±¨¸æÖгÆÕâЩÎó²îÊôÓÚ²»×¼È·µÄÉí·ÝÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÖ»ÐèÒªµÍˮƽµÄÊÖÒÕ¾ÍÄÜÔ⵽ʹÓᣡ£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bug-in-anesthesia-machines-allows-changing-gas-mix-levels/

5¡¢Ï£À°¶¥¼¶ÓòÃû×¢²áÉÌICS-ForthÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬DNS¼Í¼±»¸Ä¶¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Ï£À°¶¥¼¶ÓòÃû×¢²áÉÌICS-ForthÔâºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£¡£ICS-ForthÈÏÕæÖÎÀíÏ£À°µÄ¶¥¼¶ÓòÃû.grºÍ.el£¬£¬£¬£¬£¬£¬£¬¸Ã×é֯ȷÈÏÔâµ½ºÚ¿ÍÈëÇÖ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓë˼¿ÆTalos4Ô·ݵı¨¸æÖÐÐÎòµÄ×éÖ¯Ïàͬ£¬£¬£¬£¬£¬£¬£¬¼´·¸·¨ÍÅ»ïSea Turtle¡£¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃÒ»ÖÖÏà¶Ô½ÏеÄÒªÁì¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬ËûÃDz»»áÖ±½ÓÕë¶ÔÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬¶øÊÇÈëÇÖÓòÃû×¢²áÉÌ»òDNSÍйÜЧÀÍÉ̵ÄÕË»§£¬£¬£¬£¬£¬£¬£¬ÐÞ¸ÄÄ¿µÄ¹«Ë¾µÄDNSÉèÖ㬣¬£¬£¬£¬£¬£¬´Ó¶ø½«Ä¿µÄ¹«Ë¾µÄÓ¦ÓóÌÐò»òµç×ÓÓʼþµÄÁ÷Á¿Öض¨ÏòÖÁ¹¥»÷ÕßµÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐÖÐÐÄÈ˹¥»÷²¢×èµ²µÇ¼ƾ֤¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷Ò»Á¬Ê±¼ä½Ï¶Ì£¬£¬£¬£¬£¬£¬£¬ÔÚÊýСʱÖÁÊýÌìÖ®¼ä£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ´ó´ó¶¼¹«Ë¾Ã»ÓйØ×¢DNSÉèÖõĸü¸Ä£¬£¬£¬£¬£¬£¬£¬Òò´ËÕâÖÖ¹¥»÷ÄÑÒÔ±»²ì¾õ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/hackers-breached-greeces-top-level-domain-registrar/

6¡¢¹ã¸æÈí¼þAgent SmithѬȾԼ2500Íǫ̀Android×°±¸

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Check PointÑо¿Ö°Ô±·¢Ã÷ԼĪÓÐ2500Íǫ̀Android×°±¸Òѱ»ÐÂ¹ã¸æÈí¼þAgent SmithѬȾ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÃÓÚÏòÓû§µÄÊÖ»úÍÆËÍ¹ã¸æ£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÒ²¿ÉÄܽ«ÆäÓÃÓÚ¸ü¶ñÒâµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ÀýÈçÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£¡£¡£¡£¡£¡£ÎªÁËÍê³É¸üÐÂ×°ÖÃÀú³Ì£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÁËJanusÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ýÓ¦ÓóÌÐòµÄÊðÃû²¢ÏòÆäÌí¼Óí§Òâ´úÂë¡£¡£¡£¡£¡£¡£ÊÜѬȾװ±¸ÊýÄ¿×î¶àµÄ¹ú¼ÒÊÇÓ¡¶È£¨Áè¼Ý1500Íǫ̀£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÃϼÓÀ­¹ú£¨Áè¼Ý250Íǫ̀£©ºÍ°Í»ù˹̹£¨½ü170Íǫ̀£©¡£¡£¡£¡£¡£¡£Æ¾Ö¤Check PointµÄÊÓ²ìЧ¹û£¬£¬£¬£¬£¬£¬£¬Agent Smith×îÔçÓÚ2016ÄêÍ·×îÏȻ£¬£¬£¬£¬£¬£¬£¬Á½ÄêÀ´ËüÖ÷Ҫͨ¹ýµÚÈý·½Ó¦ÓÃÊÐËÁ9apps.comÈö²¥¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/25-million-android-devices-infected-by-agent-smith-malware/