Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐŵÀ¹¥»÷£»£»£»£»£»£»£»Î¢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£»£»£»£»£»£»£»ÂÞ¿ËΤ¶û¼°½É×Ô¿ØÐÞ¸´¶à¸öÎó²î
Ðû²¼Ê±¼ä 2020-03-121.Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐŵÀ¹¥»÷
Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔIntel CPUµÄÐÂLVI£¨¸ºÔØÖµ×¢È룩¹¥»÷£¬£¬£¬£¬¸Ã¹¥»÷ÔÊÐí¹¥»÷Õ߸ü¸Ä³ÌÐòµÄÕý³£Ö´ÐкÍÇÔÈ¡SGXÇå¾²ÇøÓòÄÚµÄÃÜÂë¡¢Ö¤Êé˽ԿµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâ±»×·×ÙΪCVE-2020-0551£¬£¬£¬£¬ÓÉÒ»×éÑо¿ÍŶÓÔÚ2019Äê4ÔÂ4ÈÕ±¨¸æ¸øIntel£¬£¬£¬£¬BitdefenderÑо¿Ö°Ô±»¹×ÔÁ¦·¢Ã÷ÁËLVIÀ๥»÷µÄÒ»ÖÖ±äÌ壨LVI-LFB£©£¬£¬£¬£¬²¢ÓÚ2020Äê2Ô±¨¸æ¸øÁËIntel¡£¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¹¥»÷½ö±»ÊÓΪÀíÂÛÉϵÄÍþв£¬£¬£¬£¬µ«IntelÒÑÐû²¼ÁËÏìÓ¦µÄ¹Ì¼þ²¹¶¡ÒÔ¼õÇá¶ÔÄ¿½ñCPUµÄ¹¥»÷£¬£¬£¬£¬²¢½«ÔÚÏÂÒ»´ú£¨Ó²¼þÉè¼Æ£©Öа²ÅŸÃÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£´ÓÊÖÒÕÉϽ²£¬£¬£¬£¬LVIÊÇMeltdown¹¥»÷µÄ·´Ïò£¬£¬£¬£¬ËüÔÊÐí¹¥»÷Õß½«´úÂë×¢ÈëCPUÄÚ²¢Ê¹Æä×÷Ϊ¹ý¶ÉµÄ¡°ÔÝʱ¡±²Ù×÷Ö´ÐУ¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß»ñµÃ¸üºÃµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£ÔÚÏÖʵ²âÊÔÖÐÖ»ÓÐÓ¢ÌØ¶ûCPU±»È·ÈÏÊÜеÄLVI¹¥»÷Ó°Ï죬£¬£¬£¬µ«Ñо¿Ö°Ô±²¢²»É¨³ýAMDºÍARMÒ²¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-lvi-intel-cpu-data-theft-vulnerability-requires-hardware-fix/
2.΢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£¬£¬£¬£¬Ñ¬È¾È«Çò900Íǫ̀µçÄÔ
΢ÈíÐû²¼µ·»ÙÀ¬»øÓʼþ½©Ê¬ÍøÂçNecurs£¬£¬£¬£¬NecursÊÇÄ¿½ñÈ«Çò×î´óµÄ½©Ê¬ÍøÂçÖ®Ò»£¬£¬£¬£¬¾Ý³ÆËüÔÚÈ«ÇòѬȾÁËÁè¼Ý900Íǫ̀ÅÌËã»ú¡£¡£¡£¡£¡£¡£3ÔÂ5ÈÕÃÀ¹úŦԼ¶«ÇøµØÒªÁìÔºÐû²¼ÁËÒ»ÏîÏÂÁ£¬£¬£¬ÔÊÐí΢Èí½ÓÊÜNecursÔÚÃÀ¹úµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Î¢Èí̫ͨ¹ýÎöºÍÆÆ½âNecursʹÓõÄÓòÃûÌìÉúËã·¨£¨DGA£©£¬£¬£¬£¬Äܹ»×¼È·µØÕ¹ÍûÔÚδÀ´25¸öÔÂÄÚNecurs½«½¨Éè²¢ÓÃ×÷»ù´¡ÉèÊ©µÄÁè¼Ý600Íò¸öÓòÃû¡£¡£¡£¡£¡£¡£Î¢Èí½«ÕâЩÓòÃû±¨¸æ¸øÁËÌìϸ÷¹úµÄ×¢²áÖÎÀí»ú¹¹£¬£¬£¬£¬´Ó¶ø×èÖ¹ÕâЩÓòÃû±»×¢²áºÍ³ÉΪNecurs»ù´¡¼Ü¹¹µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£Í¨¹ý¿ØÖÆÆäÏÖÓлù´¡ÉèÊ©ºÍÒÖÖÆÆäδÀ´×¢²áÐÂÓòÃûµÄÄÜÁ¦£¬£¬£¬£¬Î¢ÈíÀֳɵ·»ÙNecurs¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-takes-control-of-necurs-us-based-infrastructure/
3.΢ÈíÐû²¼3ÔÂWindowsÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´115¸öÎó²î
΢ÈíÐû²¼µÄ3ÔÂWindowsÇå¾²¸üÐÂÐÞ¸´ÁË115¸öÎó²î£¬£¬£¬£¬ÕâÊǸù«Ë¾ÀúÊ·ÉÏ×î´óµÄÒ»¸öÖܶþ²¹¶¡¸üС£¡£¡£¡£¡£¡£ÆäÖÐWindows LNK¿ì½ÝÎļþÖеÄÎó²î£¨CVE-2020-0684£©ÐèÒª¹Ø×¢£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼Ö¹¥»÷ÕßÒÔÓû§È¨ÏÞÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔÏòÓû§Ìṩ°üÀ¨¶ñÒâ.LNKÎļþºÍÏà¹Ø¶ñÒâ¶þ½øÖÆÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷»òÔ¶³Ì¹²Ïí£¬£¬£¬£¬µ±Óû§ÔÚWindows×ÊÔ´ÖÎÀíÆ÷»òÈÎºÎÆäËûÆÊÎö.LNKÎļþµÄÓ¦ÓóÌÐòÖз¿ª´ËÇý¶¯Æ÷£¨»òÔ¶³Ì¹²Ïí£©Ê±£¬£¬£¬£¬¶ñÒâ¶þ½øÖÆÎļþ½«ÔÚÄ¿µÄϵͳÉÏÖ´Ðй¥»÷ÕߵĴúÂë¡£¡£¡£¡£¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities/
4.ÂÞ¿ËΤ¶û¼°½É×Ô¿ØÐÞ¸´ICS×°±¸ÖеĶà¸öÎó²î
ÂÞ¿ËΤ¶û×Ô¶¯»¯£¨Rockwell Automation£©ºÍ½É×Ô¿Ø£¨Johnson Controls£©ÐÞ¸´ÆäICS×°±¸ÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£ÂÞ¿ËΤ¶û×Ô¶¯»¯ÐÞ¸´µÄ¶à¸öÒªº¦Îó²îÓ°ÏìÁËMicroLogix 1400¿ØÖÆÆ÷¡¢MicroLogix 1100¿ØÖÆÆ÷ºÍRSLogix 500Èí¼þ£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨Ó²±àÂëµÄ¼ÓÃÜÃÜÔ¿£¨CVE-2020-6990£©¡¢ÈõÃÜÂë±£»£»£»£»£»£»£»¤Ëã·¨£¨CVE-2020-6984£©¡¢Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2020-6988£©ÒÔ¼°Ã÷ÎÄ´æ´¢Ãô¸ÐÐÅÏ¢£¨CVE-2020-6980£©¡£¡£¡£¡£¡£¡£½É×Ô¿ØÔòÐÞ¸´ÁËKantech EntraPass²úÆ·ÖеIJ»×¼È·ÊäÈëÑéÖ¤Îó²î£¨CVE-2019-7589£©¡£¡£¡£¡£¡£¡£ÕâЩÎó²îµÄCVSS v3ÆÀ·Ö¾ùΪ9.8·Ö£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÓ¦Óøüлò»º½â²½·¥¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-bugs-in-rockwell-johnson-controls-ics-gear/153602/
5.IntelÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄ27¸öÎó²î
Ó¢ÌØ¶û±¾ÖÜÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Í¼ÐÎÇý¶¯³ÌÐò¡¢FPGA¡¢´¦Öóͷ£Æ÷NUC¡¢BlueZµÈ²úÆ·ÖеÄ27¸öÎó²î¡£¡£¡£¡£¡£¡£IntelÔÚͼÐÎÇý¶¯³ÌÐòÖÐÐÞ¸´ÁË17¸öÎó²î£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇ»º³åÇøÒç³öÎó²î£¨CVE-2020-0504£©£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ8.4¡£¡£¡£¡£¡£¡£IntelÔÚFPGA PAC N3000ÖÐÐÞ¸´ÁËÁ½¸öÎó²î£¬£¬£¬£¬°üÀ¨ÌØÈ¨Éý¼¶Îó²î£¨CVE-2019-14626£©ºÍ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2019-14625£©£¬£¬£¬£¬ÕâÁ½¸öÎó²î¾ùΪÖÐΣÎó²î¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Intel»¹ÎªNUC¹Ì¼þÐÞ¸´Á˲»Êʵ±µÄ»º³åÇøÏÞÖÆºÍÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÕâÁ½¸öÎó²î»®·Ö±»¸ú×ÙΪCVE-2020-0530ºÍCVE-2020-0526£¬£¬£¬£¬ÆäCVSSÆÀ·Ö»®·ÖΪ7.8ºÍ7.7£¬£¬£¬£¬¶¼¿ÉÄܵ¼ÖÂÌØÈ¨Éý¼¶¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/intel-patches-27-vulnerabilities-across-product-portfolio
6.WhisperÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬Ð¹Â¶Ô¼9ÒÚÌõ¼Í¼
¾Ý¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨µÀ£¬£¬£¬£¬ÄäÃûÉñÃØ¹²ÏíÓ¦ÓÃWhisperÓÉÓÚÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬µ¼ÖÂÔ¼9ÒÚÌõ¼Í¼й¶¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Matthew PorterºÍDan Ehrlich·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬Êý¾Ý¿âÖд洢µÄÊý¾ÝÊÇ´Ó2012Äê¸ÃAPPÐû²¼Ò»Ö±µ½ÏÖÔÚµÄËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¡£Ö»¹Ü¼Í¼Öв»°üÀ¨Óû§Ãû£¬£¬£¬£¬µ«ÆäÖаüÀ¨êdzơ¢ÄêËê¡¢ÖÖ×å¡¢ÐԱ𡢼ÒÏç¡¢ÕûÌå³ÉÔ±¹ØÏµÒÔ¼°Óë·¢ÌûÏà¹ØµÄλÖÃÊý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩλÖÃÐÅÏ¢°üÀ¨À´×ÔÓû§×î½ü·¢ÌûµÄ×ø±ê£¬£¬£¬£¬ÀýÈçÌØ¶¨µÄѧУ¡¢ÊÂÇ鳡ºÏºÍסÃñÇø¡£¡£¡£¡£¡£¡£WhisperÔÚ½Óµ½Í¨Öªºó×÷·ÏÁ˸ÃÊý¾Ý¿âµÄ»á¼ûȨÏÞ£¬£¬£¬£¬²¢Í¨ÖªÁËÁª°îÖ´·¨»ú¹¹¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private/