본문 바로가기

보안정보/2020년 1월

2020년 1월 22일 보안정보 스크래핑

1월 22일 보안정보 스크래핑

=================================================

+ 주요 취약점 - Samba, 보안 업데이트 발표 외 1건

1. Samba, 보안 업데이트 발표
Samba 팀은 여러 버전의 Samba의 취약점을 해결하기위한 보안 업데이트를 발표
침입자는 이 취약점 중 하나를 악용하여 영향을받는 시스템을 제어 
https://www.us-cert.gov/ncas/current-activity/2020/01/21/samba-releases-security-updates

2. Microsoft Windows 취약점
Microsoft Windows Theme API File Parsing
https://packetstormsecurity.com/files/156027/Microsoft-Windows-Theme-API-File-Parsing.html\

Microsoft Windows Media Center .wmv Security Bypass / Code Execution
https://packetstormsecurity.com/files/156026/Microsoft-Windows-Media-Center-.wmv-Security-Bypass-Code-Execution.html

=================================================

+ 취약점 - AMD ATI Radeon 제품 취약점

1. AMD ATI Radeon 제품 취약점
AMD ATI Radeon ATIDXX64.DLL MAD shader functionality denial-of-service vulnerability
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0937

AMD ATI Radeon ATIDXX64.DLL shader functionality VTABLE remote code execution vulnerability
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0964

AMD ATI Radeon ATIDXX64.DLL MOVC shader functionality denial-of-service vulnerability
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0936

AMD ATI Radeon ATIDXX64.DLL shader functionality constant buffer denial-of-service vulnerability
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0913

=================================================

+ 보안정보 - 지난해 12월 가장 많이 탐지된 멀웨어는 ‘HTML/ScrInject’ 외 2건

1. 지난해 12월 가장 많이 탐지된 멀웨어는 ‘HTML/ScrInject’
ESET, 2019년 12월 Top 10 위협 발표
https://www.boannews.com/media/view.asp?idx=85919

2. MS의 인터넷 익스플로러에서 발견된 제로데이, 다크호텔이 활용 중
MS의 IE에서 제로데이 취약점 발견됨.
한국의 해킹 그룹이라고 생각되는 다크호텔이 이미 익스플로잇 하고 있음.
MS는 다음 달 정기 패치에나 업데이트를 발표할 모양.
https://www.boannews.com/media/view.asp?idx=85916

3. 미국, 최초의 정부 승인 해킹 작전 펼치며 ISIS와 싸웠었다
온라인에서도 극성을 부리던 ISIS, 왜 갑자기 사라졌나 했더니...
기밀이었던 미국 정부 문서 공개되며 최초의 해킹 공격 작전의 실체 드러남.
사이버 공격에 사이버 공격으로 대응한 경험 가진 미국, 선거도 이렇게 보호할까?
https://www.boannews.com/media/view.asp?idx=85939

=================================================