Å·Ã˳ÉÔ±¹úÐû²¼ÓйØ5GÍøÂçÇå¾²µÄÁªºÏ±¨¸æ£»£»£»£»£»£»Ó¡¶ÈËÑË÷ÒýÇæJustdial APIÎó²î£»£»£»£»£»£»NitroPDF¶à¸öRCEÎó²î
Ðû²¼Ê±¼ä 2019-10-11
Å·ÃË£¨EU£©³ÉÔ±¹úÐû²¼ÁËÒ»·ÝÓйØ5GÍøÂçÇå¾²µÄΣº¦ÆÀ¹ÀÁªºÏ±¨¸æ£¬£¬£¬£¬È·¶¨ÁË5GÍøÂçµÄÖ÷ÒªÍþв¼°Íþв¹¥»÷Õß¡¢×îÃô¸ÐµÄ×ʲúÒÔ¼°Æä±³ºóµÄÖ÷ÒªÎó²î¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÇ¿µ÷ÁËÒÀÀµÓÚ¼òµ¥×°±¸¹©Ó¦É̵ÄÒþ»¼ÒÔ¼°×°±¸Ç·È±ºÍ5G½â¾ö¼Æ»®¶àÑùÐÔµÄÎÊÌâ¡£¡£¡£¡£¡£¡£ÕâЩÎÊÌ⼫´óµØÀ©Õ¹ÁËEU¼°¹ú¼Ò²ãÃæµÄ5G»ù´¡ÉèÊ©µÄÕûÌåųÈõÐÔ¡£¡£¡£¡£¡£¡£Ì«¹ýÒÀÀµ¼òµ¥×°±¸¹©Ó¦É̵ÄÅ·ÃËÔËÓªÉÌÃæÁÙןù©Ó¦ÉÌ´øÀ´µÄÒ»Á¬ÉÌҵѹÁ¦£¬£¬£¬£¬ÎÞÂÛÊÇÉÌҵʧ°Ü¡¢ºÏ²¢ÕÕ¾ÉÊÕ¹º¡¢»òÊDZ»ÖƲᣡ£¡£¡£¡£¡£Å·Ã˵ı¨¸æÌåÏÖ£¬£¬£¬£¬5GÍøÂç±³ºóµÄÇå¾²ÌôÕ½»¹ÓëÍøÂçÓëµÚÈý·½ÏµÍ³Ö®¼äµÄÅþÁ¬ÒÔ¼°µÚÈý·½¹©Ó¦É̶ÔÅ·ÃË5GÍøÂçµÄ»á¼ûȨÏÞµÄÔöÌíÓйء£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/eu-member-states-publish-joint-report-on-5g-networks-security/2¡¢Ó¡¶ÈËÑË÷ÒýÇæJustdial APIÎó²îµ¼ÖÂ1.56ÒÚÓû§ÕÊ»§Ì»Â¶
ÔÎÄÁ´½Ó£º
https://thenextweb.com/security/2019/10/10/a-bug-in-indian-local-search-app-exposed-over-156-million-accounts/3¡¢Ó¡µÚ°²ÄÉÖÝijҽԺÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬»¼ÕßÐÅÏ¢¿ÉÄÜй¶

Ó¡µÚ°²ÄÉÖÝÎÀÀí¹«»áÒ½ÔºÌåÏÖÆäÁ½ÃûÔ±¹¤Ôâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬6.8Íò»¼ÕßµÄСÎÒ˽¼ÒºÍÒ½ÁÆÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÊӲ죬£¬£¬£¬µÚÒ»ÃûÔ±¹¤µÄÕË»§ÔÚ6ÔÂ12ÈÕ¼°7ÔÂ1ÈÕÖÁ7ÔÂ8ÈÕÔâµÚÈý·½Î´ÊÚȨ»á¼û£¬£¬£¬£¬µÚ¶þÃûÔ±¹¤µÄÕË»§ÔòÓÚ3ÔÂ13ÈÕÖÁ6ÔÂ12ÈÕÖ®¼ä̻¶¡£¡£¡£¡£¡£¡£ÎÀÀí¹«»áÒ½ÔºÌåÏÖËäȻûÓÐÖ¤¾ÝÅú×¢ÏÖʵ»òÊÔͼÀÄÓÃÔ±¹¤ÓÊÏäÕË»§Öб£´æµÄÈκÎÐÅÏ¢£¬£¬£¬£¬µ«ÊӲ첻¿Éɨ³ý»á¼ûÕÊ»§Öб£´æµÄÊý¾ÝµÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÓÊÏäÕË»§ÖаüÀ¨»¼ÕßµÄÒÔÏÂÐÅÏ¢£ºÐÕÃû¡¢µØµã¡¢Éç»á°ü¹ÜºÅ¡¢¼ÝʻִÕÕ/ÖݱêʶºÅ¡¢»¤Õպš¢½ðÈÚÕʺš¢ÒøÐп¨ÐÅÏ¢¡¢µç×ÓÊðÃû¡¢Óû§ÃûºÍÃÜÂë¡¢³öÉúÈÕÆÚ¡¢Ò½ÁƼ°Õï¶ÏÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-incident-exposes-medical-personal-info-of-60k-patients/4¡¢¹¥»÷ÕßʹÓÃWindows°æiTunesÖеÄÎó²î·Ö·¢BitPaymer
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-gang-uses-itunes-zero-day/
5¡¢Ë¼¿ÆTalosÍŶӷ¢Ã÷NitroPDF±£´æ¶à¸öRCEÎó²î
˼¿ÆTalosÅû¶NitroPDFÖеĶà¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£Nitro PDFÔÊÐíÓû§ÔÚÆäÅÌËã»úÉÏÉúÑÄ¡¢ÔĶÁºÍ±à¼PDFÎļþ£¬£¬£¬£¬¸Ã²úÆ··ÖΪÃâ·Ñ°æºÍÊշѰ档¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄÎó²î¶¼±£´æÓÚÊշѵÄPro°æÖС£¡£¡£¡£¡£¡£Îó²î°üÀ¨jpeg2000 ssizDepthÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5045£©¡¢Page KidsÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5050£©¡¢ICCBasedÉ«²Ê¿Õ¼äÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5048£©¡¢CharProcsÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5047£©¡¢ jpeg2000 yTsizÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5046£©¼°Á÷³¤¶ÈÆÊÎö¹¦Ð§ÄÚ´æËð»µÎó²î£¨CVE-2019-5053£©¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾ÎªNitroPDF 12.12.1.522¡£¡£¡£¡£¡£¡£NitroPDFÉÐδÐû²¼Ïà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/10/vuln-spotlight-Nitro-PDF-RCE-bugs-sept-19.html
6¡¢HPÐÞ¸´Touchpoint AnalyticsÈí¼þÖеÄLPEÎó²î
SafeBreach LabsÇå¾²Ñо¿Ô±Peleg Hadar·¢Ã÷HPµÄTouchPoint Analytics±£´æLPEÎó²î£¨CVE-2019-6333£¬£¬£¬£¬CVSS 3ÆÀ·ÖΪ6.7·Ö£©¡£¡£¡£¡£¡£¡£HP TouchPoint AnalyticsÒÔWindowsЧÀ͵ÄÐÎʽԤװÔÚ´ó´ó¶¼HPÅÌËã»úÉÏ£¬£¬£¬£¬Ö¼ÔÚÄäÃûÍøÂçÓ²¼þÐÔÄÜÕï¶ÏÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃWindowsЧÀ;ßÓÐ×î¸ß¼¶±ðµÄNT AUTHORITY\SYSTEMȨÏÞ¡£¡£¡£¡£¡£¡£HadarÌåÏÖ¸ÃÎó²îÊÇÓɲ»Çå¾²µÄDLL¼ÓÔØËùÒýÆðµÄ£¬£¬£¬£¬Touchpoint Analytics Client°æ±¾4.1.4.2827ÒÔÏÂÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£HPÔÚTouchpoint Analytics Client 4.1.4.2827ÖÐÐÞ¸´ÁË´ËÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hp-touchpoint-analytics-lpe-vulnerability-affects-most-hp-pcs