【上一次三重區資訊組長會議】【新北市資訊業務入口網】【新北市資訊教育論壇】
日期:110年6月15日(二)
會議室網址:https://meet.google.com/rhq- xtyr-una
公文:
工作報告:
相關網址:
- 智慧學習關懷支持計畫審核報告:https://eri.ntpc.edu.tw
- 停課不停學,學習送到家-線上學習資源
- 新北市資安宣導網站:https://isschool.test.ntpc.edu.tw
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
【上一次三重區資訊組長會議】【新北市資訊業務入口網】【新北市資訊教育論壇】 日期:110年6月15日(二)會議室網址:https://meet.google.com/rhq-
|
發布編號 | NCCST-ANA-2021-0000163 | 發布時間 | Fri May 14 10:26:09 CST 2021 |
事件類型 | 漏洞預警 | 發現時間 | Thu May 13 00:00:00 CST 2021 |
警訊名稱 | Adobe Acrobat與Reader應用程式存在多個安全漏洞, |
||
內容說明 | Adobe釋出的安全性公告中提出Adobe Acrobat與Reader存在下列多項漏洞, 1. 越界寫入(Out-of-Bounds Write)漏洞:CVE-2021-28564、CVE- 2. 越界讀取(Out-of-Bounds Read) 漏洞:CVE-2021-28555、CVE- 3. 使用釋放後記憶體(Use After Free) 漏洞:CVE-2021-28550、CVE- 4. 堆積型緩衝區溢位(Heap-based Buffer Overflow) 漏洞:CVE-2021- 5. 緩衝區溢位(Buffer Overflow) 漏洞:CVE-2021-28561。 6. 暴露私人資訊(Exposure of Private Information) 漏洞:CVE-2021- |
||
影響平台 | 以下所有程式之Windows與MacOS版本:
1.Continuous track versions: ‧Acrobat DC Continuous track Windows:versions 2021.001.20150(含)以前版本 MacOS:versions 2021.001.20149(含)以前的版本 ‧Acrobat Reader DC Continuous track Windows:versions 2021.001.20150(含)以前的版本 MacOS:versions 2021.001.20149(含)以前的版本 2.Classic 2017 versions: ‧Acrobat 2017 Classic 2017 versions 2017.011.30194(含)以前版本 ‧Acrobat Reader 2017 Classic 2017 versions 2017.011.30194(含)以前版本 3. Classic 2020 versions: ‧Acrobat 2020 Classic 2020 versions 2020.001.30020(含)以前版本 ‧Acrobat Reader 2020 Classic 2020 versions 2020.001.30020(含)以前版本 |
||
影響等級 | 高 | ||
建議措施 | 1.請確認電腦目前使用版本,若為上述影響版本, 2. Windows與MacOS版本亦可至下列網址進行更新: (1)Continuous track version更新至2021.001.20155以後版本: Acrobat DC:https://www.adobe.com/ Acrobat Reader DC:https://www.adobe.com/ (2)Classic 2017 versions更新至2017.011.30196? Acrobat 2017:https://www.adobe.com/ Acrobat Reader 2017:https://www.adobe.com/ (3) Classic 2020 versions更新至2020.001.30025以後版本: Acrobat 2020:https://www.adobe.com/ Acrobat Reader 2020:https://www.adobe.com/ |
||
參考資料 | 1. https://helpx.adobe.com/ 2. https://thehackernews.com/ |
||
此類通告發送對象為通報應變網站登記之資安人員。若貴 單位之資 如果您對此通告的內容有疑問或有關於此事件的建議, |
發布編號 | NCCST-ANA-2021-0000162 | 發布時間 | Thu May 13 18:01:26 CST 2021 |
事件類型 | 漏洞預警 | 發現時間 | Thu May 13 00:00:00 CST 2021 |
警訊名稱 | 微軟Hyper-V、HTTP通訊協定堆疊及Object Linking and Embedding(OLE)存在安全漏洞(CVE-2021- |
||
內容說明 | 微軟Hyper-V、HTTP通訊協定堆疊及Object Linking and Embedding(OLE)存在安全漏洞(CVE-2021- |
||
影響平台 | 受影響版本如下:
CVE-2021-28476: Windows 7 for x64-based Systems Service Pack 1 Windows 8.1 for x64-based systems Windows 10 for x64-based Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1803 for x64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for x64-based Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) CVE-2021-31166: Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server, version 2004 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) CVE-2021-31194: Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1803 for ARM64-based Systems Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for x64-based Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) |
||
影響等級 | 高 | ||
建議措施 | 目前微軟官方已針對此漏洞釋出更新程式, 1. https://msrc.microsoft.com/ 2. https://msrc.microsoft.com/ 3. https://msrc.microsoft.com/ |
||
參考資料 | 1. https://www.ithome.com.tw/ 2. https://msrc.microsoft.com/ 3. https://msrc.microsoft.com/ 4. https://msrc.microsoft.com/ |
||
此類通告發送對象為通報應變網站登記之資安人員。若貴 單位之資 如果您對此通告的內容有疑問或有關於此事件的建議, |