FBIÐû²¼2019Ä껥ÁªÍø·¸·¨±¨¸æ£»£»£»2019ÄêÊý¾Ý×ß©±¨¸æ£»£»£»Ó¢ÌضûÐÞ¸´CSMEÇå¾²ÒýÇæÖеÄÌáȨÎó²î

Ðû²¼Ê±¼ä 2020-02-13

1.FBIÐû²¼2019Ä껥ÁªÍø·¸·¨±¨¸æ£¬£¬ £¬£¬£¬£¬£¬Ôì³ÉËðʧ´ï35ÒÚÃÀÔª


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤±¾ÖܶþFBIÐû²¼µÄ2019Äê¡¶»¥ÁªÍø·¸·¨±¨¸æ¡·£¬£¬ £¬£¬£¬£¬£¬2019ÄêÆóÒµºÍСÎÒ˽¼ÒÒòÍøÂç·¸·¨Ôì³ÉµÄËðʧ´ï35ÒÚÃÀÔª£¬£¬ £¬£¬£¬£¬£¬ÆäÖнöBECÕ©Æ­£¨ÓÖ³ÆEAC£¬£¬ £¬£¬£¬£¬£¬µç×ÓÓʼþÕË»§ÈëÇÖ£©¾Í¸øÈËÃÇÔì³ÉÁË17ÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£¸Ã±¨¸æ³Æ£¬£¬ £¬£¬£¬£¬£¬2019ÄêÈËÃÇÏòFBI±¨¸æÁË467361ÆðÍøÂç·¸·¨Í¶Ëߣ¬£¬ £¬£¬£¬£¬£¬Æ½¾ùÌìÌì½ü1300Æð£¬£¬ £¬£¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁËÁè¼Ý10ÍòÆð¡£¡£¡£¡£×î³£±¨¸æµÄͶËßÊÇÍøÂç´¹ÂÚºÍÀàËÆµÄȦÌס¢Î´¸¶¿î/δËÍ»õÕ©Æ­ÒÔ¼°Ú²Æ­ÀÕË÷¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×Ó¼ÌÐøÊ¹ÓÃÀÕË÷Èí¼þ¹¥»÷¹«Ë¾ºÍÕþ¸®»ú¹¹£¬£¬ £¬£¬£¬£¬£¬¸Ã±¨¸æÏÔʾֻ¹ÜÈ¥ÄêÀÕË÷Èí¼þ¹¥»÷µÄÊýÄ¿ÓÐËùïÔÌ­£¬£¬ £¬£¬£¬£¬£¬µ«ËðʧµÄ×ܶîÈ´ÓÐËùÔöÌí£¬£¬ £¬£¬£¬£¬£¬ÀÕË÷Èí¼þµÄÊýÄ¿ÕýÔÚÔöÌí¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/fbi-3-5b-lost-in-2019-to-known-cyberscams-ransomware/152815/


2.Risk Based SecurityÐû²¼2019ÄêÊý¾Ý×ß©±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Risk Based SecurityÐû²¼2019ÄêµÄÊý¾Ý×ß©±¨¸æ£¬£¬ £¬£¬£¬£¬£¬±¨¸æÏÔʾ2019ÄêÓÐÁè¼Ý151ÒÚÌõ¼Í¼й¶£¬£¬ £¬£¬£¬£¬£¬ÓëÉÏÒ»Äê¶È£¨Ð¹Â¶¼Í¼Ϊ53ÒÚÌõ£©Ïà±È´ó·ùÔöÌí284£¥¡£¡£¡£¡£ÆäÖÐ135ÒÚÌõ¼Í¼ÊÇͨ¹ýÍøÂçй¶µÄ£¨°üÀ¨ÎÞÒâÖÐÔÚÍøÉÏ̻¶£©£¬£¬ £¬£¬£¬£¬£¬ÁíÍâÓÐ15ÒÚÌõ¼Í¼ÊÇÓÉÓںڿ͹¥»÷й¶µÄ£¬£¬ £¬£¬£¬£¬£¬ÆäËüÀàÐ͵ÄÊÂÎñºÏÆðÀ´Ð¹Â¶ÁË1.2ÒÚÌõ¼Í¼¡£¡£¡£¡£2019Äê¹ûÕæ±¨¸æµÄÊý¾Ýй¶ÊÂÎñÊýĿΪ7098´Î£¬£¬ £¬£¬£¬£¬£¬Óë2018Ä걨¸æµÄ7035´ÎÏà±È½öÔöÌíÁË1£¥¡£¡£¡£¡£ºÚ¿ÍÈëÇÖÕ¼¹ûÕæ±¨¸æµÄÊý¾Ýй¶ÊÂÎñµÄ5184Æð£¬£¬ £¬£¬£¬£¬£¬¶ø±¨¸æµÄÍøÂçÊÂÎñÖ»ÓÐ343Æð¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/over-151-billion-records-exposed-data-breaches-2019


3.ºÚ¿Í¿ÉʹÓÃÁè¼Ý1.2Íò¸öJenkinsЧÀÍÆ÷ÌᳫDDoS·Å´ó¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


RadwareÑо¿Ö°Ô±·¢Ã÷ºÚ¿Í¿ÉʹÓÃ1.2Íò¶ą̻̀¶ÔÚ»¥ÁªÍøÉϵÄJenkinsЧÀÍÆ÷ÌᳫDDoS·Å´ó¹¥»÷£¬£¬ £¬£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇÕâЩЧÀÍÆ÷ÉÐδװÖÃÎó²î£¨CVE-2020-2100£©µÄÐÞ¸´²¹¶¡¡£¡£¡£¡£¸ÃÎó²îÓɽ£ÇÅ´óѧµÄAdam Thorn·¢Ã÷²¢Åû¶£¬£¬ £¬£¬£¬£¬£¬ËüÊÇÓÉĬÈÏÇéÐÎÏÂÆôÓò¢ÔÚÃæÏò¹«ÖÚµÄЧÀÍÆ÷ÖйûÕæµÄÍøÂç·¢Ã÷ЧÀÍ£¨UDP¶à²¥/¹ã²¥£©ÒýÆðµÄ¡£¡£¡£¡£¸ÃÎó²îʹ¹¥»÷Õß¿ÉÒÔͨ¹ýÔÚ¶Ë¿ÚUDP/33848ÉÏ·´ÉäUDPÇëÇóÀ´ÀÄÓÃJenkinsЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬´Ó¶øµ¼Ö°üÀ¨JenkinsÔªÊý¾ÝµÄDDoS·Å´ó¹¥»÷¡£¡£¡£¡£Á½ÖÜǰ£¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔÚJenkins 2.219ºÍLTS 2.204.2ÖÐÐÞ¸´£¬£¬ £¬£¬£¬£¬£¬ÒªÁìÊÇĬÈϽûÓÃJenkinsµÄÁ½¸öÍøÂç·¢Ã÷ЧÀÍ£¨UDP¶à²¥/¹ã²¥ºÍDNS¶à²¥£©¡£¡£¡£¡£µ«ÈÔÓÐ1.2Íò¶ą̀ЧÀÍÆ÷δװÖÃÐÞ¸´²¹¶¡£¬£¬ £¬£¬£¬£¬£¬ÕâЩЧÀÍÆ÷Ö÷ÒªÂþÑÜÔÚÑÇÖÞ£¬£¬ £¬£¬£¬£¬£¬Å·Ö޺ͱ±ÃÀ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/11/cve-2020-2100/


4.Ó¢ÌØ¶ûÐÞ¸´CSMEÇå¾²ÒýÇæÖеÄÌáȨÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ó¢ÌØ¶ûÐÞ¸´CSMEÇå¾²ÒýÇæÖеÄÒ»¸öÑÏÖØÎó²î£¨CVE-2019-14598£©£¬£¬ £¬£¬£¬£¬£¬²¢±Þ²ßÓû§¾¡¿ì¸üС£¡£¡£¡£Æ¾Ö¤Ó¢Ìضû±¾ÖܶþÐû²¼µÄÇ徲ͨ¸æ£¬£¬ £¬£¬£¬£¬£¬CSME¹Ì¼þÖб£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬ÍâµØ¹¥»÷Õß¿ÉʹÓøÃÎó²îÌá³«ÌØÈ¨Éý¼¶¡¢¾Ü¾øÐ§ÀͺÍÐÅϢй¶¹¥»÷¡£¡£¡£¡£¸ÃÎó²îµÄCVSS»ù±¾µÃ·ÖΪ8.2£¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÁË12.0.49£¨½ö°üÀ¨IOT£º12.0.56£©¡¢13.0.21ºÍ14.0.11֮ǰµÄCSME°æ±¾¡£¡£¡£¡£Ó¢Ìضû½¨ÒéÓû§½«ÏµÍ³ÖÆÔìÉÌÌṩµÄCSME°æ±¾¸üÐÂΪ12.0.49¡¢13.0.21ºÍ14.0.11»ò¸ü¸ß°æ±¾ÒÔ½â¾ö´ËÎÊÌâ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/intel-warns-of-critical-security-flaw-in-csme-engine/


5.AdobeÐû²¼2ÔÂÇå¾²¸üУ¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´35¸öÑÏÖØÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AdobeÔÚ2ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´ÁË40¶à¸öÎó²î£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐ35¸öΪÑÏÖØ¼¶±ð¡£¡£¡£¡£Æ¾Ö¤AdobeÐû²¼µÄÇ徲ͨ¸æ£¬£¬ £¬£¬£¬£¬£¬´ó´ó¶¼Îó²î¶¼ÓëÎĵµ´¦Öóͷ£³ÌÐòAdobe FramemakerÓйء£¡£¡£¡£WindowsϵͳÉϵÄAdobe Framemaker°æ±¾2019.0.4¼°¸üµÍ°æ±¾×ܹ²Êܵ½21¸öÎó²îµÄÓ°Ï죬£¬ £¬£¬£¬£¬£¬ËùÓÐÕâЩÎó²î¾ù±»ÊÓΪÑÏÖØ¼¶±ð¡£¡£¡£¡£Îó²î¹æÄ£º­¸Ç»º³åÇøÒç³ö¡¢¶ÑÒç³ö¡¢Ô½½çдºÍÄÚ´æË𻵵È£¬£¬ £¬£¬£¬£¬£¬ÈκÎÒ»¸öÎÊÌâ¶¼¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£³ý´ËÖ®Í⣬£¬ £¬£¬£¬£¬£¬WindowsºÍmacOSÉϵÄAdobe Acrobat DC¡¢Reader DC¡¢Acrobat/Reader 2017ºÍAcrobat/Reader 2015ÖÐ×ܹ²ÐÞ¸´ÁË12¸öÑÏÖØÎó²î£¬£¬ £¬£¬£¬£¬£¬ÕâЩÎó²î¿Éµ¼ÖÂí§Òâ´úÂëÖ´Ðлòí§ÒâÎļþдÈë¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/adobe-addresses-over-40-vulnerabilities-many-critical-in-patch-update/


6.ÑÅÊ«À¼÷ìÔÆÊý¾Ý¿â̻¶4.4ÒÚÌõÄÚ²¿¼Í¼


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷ÑÅÊ«À¼÷ìµÄÒ»¸öÔÆÊý¾Ý¿âδÉèÃÜÂ룬£¬ £¬£¬£¬£¬£¬µ¼ÖÂ4.4ÒÚÌõÄÚ²¿¼Í¼й¶£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨´¿Îı¾µç×ÓÓʼþµØµã£¨°üÀ¨À´×Ô@estee.comÓòµÄÄÚ²¿µç×ÓÓʼþµØµã£©ºÍCMS¡¢ÖÐÐļþµÄ»î¶¯ÈÕÖ¾µÈÄÚÈÝ¡£¡£¡£¡£µ«¼Í¼ÖÐûÓаüÀ¨¿Í»§µÄ¸¶¿îÊý¾Ý»òÃô¸ÐµÄÔ±¹¤ÐÅÏ¢¡£¡£¡£¡£FowlerÖ¸³öÕâЩÈÕÖ¾Êý¾Ý¿ÉÒÔÓÃ×÷¸ü´óµÄÍøÂç¹¥»÷µÄÕì̽£¬£¬ £¬£¬£¬£¬£¬ÀýÈçÈÕÖ¾ÖаüÀ¨IPµØµã¡¢¶Ë¿Ú¡¢Â·¾¶ºÍ´æ´¢ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬¿ÉÓÃÓÚÓ³É乫˾µÄÄÚ²¿ÍøÂç¡£¡£¡£¡£ÑÅÊ«À¼÷ìÔÚ½Óµ½±¨¸æºóµ±Ìì¹Ø±ÕÁ˶ÔÊý¾Ý¿âµÄ»á¼û£¬£¬ £¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âÔÚÍøÂçÉÏ̻¶Á˶೤ʱ¼äÒÔ¼°ÊÇ·ñÒÑÔâµ½ºÚ¿Í»á¼û¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/estee-lauder-440m-records-email-network-info/152789/