Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐŵÀ¹¥»÷£»£»£»£»£»£»£»Î¢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£»£»£»£»£»£»£»ÂÞ¿ËΤ¶û¼°½É×Ô¿ØÐÞ¸´¶à¸öÎó²î
Ðû²¼Ê±¼ä 2020-03-121.Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÓ¢ÌØ¶ûCPUµÄÐÂLVI²àÐŵÀ¹¥»÷
Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔIntel CPUµÄÐÂLVI£¨¸ºÔØÖµ×¢È룩¹¥»÷£¬£¬£¬£¬£¬¸Ã¹¥»÷ÔÊÐí¹¥»÷Õ߸ü¸Ä³ÌÐòµÄÕý³£Ö´ÐкÍÇÔÈ¡SGXÇå¾²ÇøÓòÄÚµÄÃÜÂë¡¢Ö¤Êé˽ԿµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸ÃÎÊÌâ±»×·×ÙΪCVE-2020-0551£¬£¬£¬£¬£¬ÓÉÒ»×éÑо¿ÍŶÓÔÚ2019Äê4ÔÂ4ÈÕ±¨¸æ¸øIntel£¬£¬£¬£¬£¬BitdefenderÑо¿Ö°Ô±»¹×ÔÁ¦·¢Ã÷ÁËLVIÀ๥»÷µÄÒ»ÖÖ±äÌ壨LVI-LFB£©£¬£¬£¬£¬£¬²¢ÓÚ2020Äê2Ô±¨¸æ¸øÁËIntel¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¹¥»÷½ö±»ÊÓΪÀíÂÛÉϵÄÍþв£¬£¬£¬£¬£¬µ«IntelÒÑÐû²¼ÁËÏìÓ¦µÄ¹Ì¼þ²¹¶¡ÒÔ¼õÇá¶ÔÄ¿½ñCPUµÄ¹¥»÷£¬£¬£¬£¬£¬²¢½«ÔÚÏÂÒ»´ú£¨Ó²¼þÉè¼Æ£©Öа²ÅŸÃÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£´ÓÊÖÒÕÉϽ²£¬£¬£¬£¬£¬LVIÊÇMeltdown¹¥»÷µÄ·´Ïò£¬£¬£¬£¬£¬ËüÔÊÐí¹¥»÷Õß½«´úÂë×¢ÈëCPUÄÚ²¢Ê¹Æä×÷Ϊ¹ý¶ÉµÄ¡°ÔÝʱ¡±²Ù×÷Ö´ÐУ¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß»ñµÃ¸üºÃµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£ÔÚÏÖʵ²âÊÔÖÐÖ»ÓÐÓ¢ÌØ¶ûCPU±»È·ÈÏÊÜеÄLVI¹¥»÷Ó°Ï죬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±²¢²»É¨³ýAMDºÍARMÒ²¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-lvi-intel-cpu-data-theft-vulnerability-requires-hardware-fix/
2.΢Èíµ·»Ù½©Ê¬ÍøÂçNecurs£¬£¬£¬£¬£¬Ñ¬È¾È«Çò900Íǫ̀µçÄÔ
΢ÈíÐû²¼µ·»ÙÀ¬»øÓʼþ½©Ê¬ÍøÂçNecurs£¬£¬£¬£¬£¬NecursÊÇÄ¿½ñÈ«Çò×î´óµÄ½©Ê¬ÍøÂçÖ®Ò»£¬£¬£¬£¬£¬¾Ý³ÆËüÔÚÈ«ÇòѬȾÁËÁè¼Ý900Íǫ̀ÅÌËã»ú¡£¡£¡£¡£¡£3ÔÂ5ÈÕÃÀ¹úŦԼ¶«ÇøµØÒªÁìÔºÐû²¼ÁËÒ»ÏîÏÂÁ£¬£¬£¬£¬ÔÊÐí΢Èí½ÓÊÜNecursÔÚÃÀ¹úµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Î¢Èí̫ͨ¹ýÎöºÍÆÆ½âNecursʹÓõÄÓòÃûÌìÉúËã·¨£¨DGA£©£¬£¬£¬£¬£¬Äܹ»×¼È·µØÕ¹ÍûÔÚδÀ´25¸öÔÂÄÚNecurs½«½¨Éè²¢ÓÃ×÷»ù´¡ÉèÊ©µÄÁè¼Ý600Íò¸öÓòÃû¡£¡£¡£¡£¡£Î¢Èí½«ÕâЩÓòÃû±¨¸æ¸øÁËÌìϸ÷¹úµÄ×¢²áÖÎÀí»ú¹¹£¬£¬£¬£¬£¬´Ó¶ø×èÖ¹ÕâЩÓòÃû±»×¢²áºÍ³ÉΪNecurs»ù´¡¼Ü¹¹µÄÒ»²¿·Ö¡£¡£¡£¡£¡£Í¨¹ý¿ØÖÆÆäÏÖÓлù´¡ÉèÊ©ºÍÒÖÖÆÆäδÀ´×¢²áÐÂÓòÃûµÄÄÜÁ¦£¬£¬£¬£¬£¬Î¢ÈíÀֳɵ·»ÙNecurs¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-takes-control-of-necurs-us-based-infrastructure/
3.΢ÈíÐû²¼3ÔÂWindowsÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´115¸öÎó²î
΢ÈíÐû²¼µÄ3ÔÂWindowsÇå¾²¸üÐÂÐÞ¸´ÁË115¸öÎó²î£¬£¬£¬£¬£¬ÕâÊǸù«Ë¾ÀúÊ·ÉÏ×î´óµÄÒ»¸öÖܶþ²¹¶¡¸üС£¡£¡£¡£¡£ÆäÖÐWindows LNK¿ì½ÝÎļþÖеÄÎó²î£¨CVE-2020-0684£©ÐèÒª¹Ø×¢£¬£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼Ö¹¥»÷ÕßÒÔÓû§È¨ÏÞÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔÏòÓû§Ìṩ°üÀ¨¶ñÒâ.LNKÎļþºÍÏà¹Ø¶ñÒâ¶þ½øÖÆÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷»òÔ¶³Ì¹²Ïí£¬£¬£¬£¬£¬µ±Óû§ÔÚWindows×ÊÔ´ÖÎÀíÆ÷»òÈÎºÎÆäËûÆÊÎö.LNKÎļþµÄÓ¦ÓóÌÐòÖз¿ª´ËÇý¶¯Æ÷£¨»òÔ¶³Ì¹²Ïí£©Ê±£¬£¬£¬£¬£¬¶ñÒâ¶þ½øÖÆÎļþ½«ÔÚÄ¿µÄϵͳÉÏÖ´Ðй¥»÷ÕߵĴúÂë¡£¡£¡£¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities/
4.ÂÞ¿ËΤ¶û¼°½É×Ô¿ØÐÞ¸´ICS×°±¸ÖеĶà¸öÎó²î
ÂÞ¿ËΤ¶û×Ô¶¯»¯£¨Rockwell Automation£©ºÍ½É×Ô¿Ø£¨Johnson Controls£©ÐÞ¸´ÆäICS×°±¸ÖеĶà¸öÎó²î¡£¡£¡£¡£¡£ÂÞ¿ËΤ¶û×Ô¶¯»¯ÐÞ¸´µÄ¶à¸öÒªº¦Îó²îÓ°ÏìÁËMicroLogix 1400¿ØÖÆÆ÷¡¢MicroLogix 1100¿ØÖÆÆ÷ºÍRSLogix 500Èí¼þ£¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨Ó²±àÂëµÄ¼ÓÃÜÃÜÔ¿£¨CVE-2020-6990£©¡¢ÈõÃÜÂë±£»£»£»£»£»£»£»¤Ëã·¨£¨CVE-2020-6984£©¡¢Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2020-6988£©ÒÔ¼°Ã÷ÎÄ´æ´¢Ãô¸ÐÐÅÏ¢£¨CVE-2020-6980£©¡£¡£¡£¡£¡£½É×Ô¿ØÔòÐÞ¸´ÁËKantech EntraPass²úÆ·ÖеIJ»×¼È·ÊäÈëÑéÖ¤Îó²î£¨CVE-2019-7589£©¡£¡£¡£¡£¡£ÕâЩÎó²îµÄCVSS v3ÆÀ·Ö¾ùΪ9.8·Ö£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÓ¦Óøüлò»º½â²½·¥¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-bugs-in-rockwell-johnson-controls-ics-gear/153602/
5.IntelÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄ27¸öÎó²î
Ó¢ÌØ¶û±¾ÖÜÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Í¼ÐÎÇý¶¯³ÌÐò¡¢FPGA¡¢´¦Öóͷ£Æ÷NUC¡¢BlueZµÈ²úÆ·ÖеÄ27¸öÎó²î¡£¡£¡£¡£¡£IntelÔÚͼÐÎÇý¶¯³ÌÐòÖÐÐÞ¸´ÁË17¸öÎó²î£¬£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇ»º³åÇøÒç³öÎó²î£¨CVE-2020-0504£©£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ£¬£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ8.4¡£¡£¡£¡£¡£IntelÔÚFPGA PAC N3000ÖÐÐÞ¸´ÁËÁ½¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨ÌØÈ¨Éý¼¶Îó²î£¨CVE-2019-14626£©ºÍ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2019-14625£©£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î¾ùΪÖÐΣÎó²î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Intel»¹ÎªNUC¹Ì¼þÐÞ¸´Á˲»Êʵ±µÄ»º³åÇøÏÞÖÆºÍÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î»®·Ö±»¸ú×ÙΪCVE-2020-0530ºÍCVE-2020-0526£¬£¬£¬£¬£¬ÆäCVSSÆÀ·Ö»®·ÖΪ7.8ºÍ7.7£¬£¬£¬£¬£¬¶¼¿ÉÄܵ¼ÖÂÌØÈ¨Éý¼¶¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/intel-patches-27-vulnerabilities-across-product-portfolio
6.WhisperÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬Ð¹Â¶Ô¼9ÒÚÌõ¼Í¼
¾Ý¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨µÀ£¬£¬£¬£¬£¬ÄäÃûÉñÃØ¹²ÏíÓ¦ÓÃWhisperÓÉÓÚÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬µ¼ÖÂÔ¼9ÒÚÌõ¼Í¼й¶¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Matthew PorterºÍDan Ehrlich·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬Êý¾Ý¿âÖд洢µÄÊý¾ÝÊÇ´Ó2012Äê¸ÃAPPÐû²¼Ò»Ö±µ½ÏÖÔÚµÄËùÓÐÊý¾Ý¡£¡£¡£¡£¡£Ö»¹Ü¼Í¼Öв»°üÀ¨Óû§Ãû£¬£¬£¬£¬£¬µ«ÆäÖаüÀ¨êdzơ¢ÄêËê¡¢ÖÖ×å¡¢ÐԱ𡢼ÒÏç¡¢ÕûÌå³ÉÔ±¹ØÏµÒÔ¼°Óë·¢ÌûÏà¹ØµÄλÖÃÊý¾Ý¡£¡£¡£¡£¡£ÕâЩλÖÃÐÅÏ¢°üÀ¨À´×ÔÓû§×î½ü·¢ÌûµÄ×ø±ê£¬£¬£¬£¬£¬ÀýÈçÌØ¶¨µÄѧУ¡¢ÊÂÇ鳡ºÏºÍסÃñÇø¡£¡£¡£¡£¡£WhisperÔÚ½Óµ½Í¨Öªºó×÷·ÏÁ˸ÃÊý¾Ý¿âµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÁª°îÖ´·¨»ú¹¹¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private/


¾©¹«Íø°²±¸11010802024551ºÅ