Autodesk¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶£»Î¢ÈíOAuthÑéÖ¤¹ý³Ì´æÔÚ·ì϶£¬¿Éµ¼ÖÂAzureÕÊ»§±»ÊÕÊÜ
°ä²¼¹¦·ò 2019-12-041.Autodesk¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶
SafeBreach Labs×êÑÐÈËÔ±Åû¶Autodesk¡¢Ç÷Ïò¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLL½Ù³Ö·ì϶¡£Ç÷Ïò¿Æ¼¼°²È«Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬¸Ã·ì϶´æÔÚÓÚcoreServiceShell.exe×é¼þÖС£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû½øÐÐÑéÖ¤£¬Òò¶ø¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐËÁÒâDLL£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃÓÆ¾ÃÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÀûÓÃÒ²±ðÀëÊܵ½ÀàËÆµÄ·ì϶CVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/
2.΢ÈíOAuthÑéÖ¤¹ý³Ì´æÔÚ·ì϶£¬¿Éµ¼ÖÂAzureÕÊ»§±»ÊÕÊÜ
CyberArk°²È«×êÑÐÔ±Omer Tsarfati·¢ÏÖ΢ÈíµÄÀûÓ÷¨Ê½Ê¹ÓÃOAuth½øÐеÚÈý·½Éí·ÝÑéÖ¤µÄ·½Ê½ÖдæÔÚ°²È«·ì϶£¬¿ÉÄÜʹ¹¥»÷ÕßÊÕÊÜÓû§µÄAzureÔÆÕÊ»§¡£OAuthÊÇÒ»ÖÖÉí·ÝÑéÖ¤ºÍ̸£¬ÔÊÐíÀûÓ÷¨Ê½ÓëµÚÈý·½ÍøÕ¾»òÈí¼þ¹²ÏíÊÜ»§ÕË»§Êý¾Ý¡£ÔÚ΢ÈíµÄOAuthÊÚȨÁ÷³ÌÖУ¬µÚÈý·½½«ÊǾ¹ý΢ÈíºË×¼µÄ°×Ãûµ¥URL¡£×êÑÐÈËÔ±·¢ÏÖÕâЩ±»ÐÅÀµµÄ°×Ãûµ¥URLÖÐÔ̺¬Ò»Ð©Î´ÔÚAzureÃÅ»§ÖÐ×¢²áµÄURL£¬ÀýÈç.cloudapp.net¡¢.azurewebsites.netºÍ.{vm_region}.cloudapp.azure.com¡£×êÑÐÈËÔ±·¢ÏÖÖÁÉÙÓÐ54¸öÀàËÆµÄ×ÓÓòδÔÚδÔÚAzureÃÅ»§ÖÐ×¢²á£¬¹¥»÷ÕßÄܹ»Í¨¹ý×¢²áÕâЩÓòÀ´½Ó¼û΢ÈíÓû§µÄÊý¾Ý¡£Î¢ÈíÔÚ11ÔÂ19ÈÕ½¨¸´Á˸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/
3.¹È¸è°ä²¼12ÔÂAndroid°²È«¸üУ¬ ½¨¸´¶à¸ö·ì϶
¹È¸èµÄ12ÔÂAndroid°²È«¸üÐÂÓÉ2019-12-01ºÍ2019-12-05Á½¸ö°²È«²¹¶¡·¨Ê½¼¶±ð×é³É£¬ÆäÖÐ2019-12-01²¹¶¡°üÖн¨¸´ÁË15¸ö·ì϶¡£×îÑϳÁµÄ·ì϶ÊÇFramework×é¼þÖеÄDoS·ì϶CVE-2019-2232£¬¸Ã·ì϶ӰÏìÁËAndroid°æ±¾8.0¡¢8.1¡¢9ºÍ10£¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÐÂÎŵ¼ÖÂÓÀÔ¶»Ø¾ø·þÎñ¡£ÆäËüÑϳÁµÄ·ì϶»¹Ô̺¬Media¿ò¼ÜÖеĹؼü·ì϶CVE-2019-2222ºÍCVE-2019-2223£¬Ô¶³Ì¹¥»÷Õß¿ÉÀûÓø÷ì϶ÔÚÌØÈ¨¹ý³ÌµÄ¸ßµÍÎÄÖÐÖ´ÐдúÂë¡£±¾´Î°²È«¸üÐÂÖиßͨ¹ØÔ´×é¼þ½¨¸´ÁË22¸ö·ì϶£¬ÊÜÓ°ÏìµÄ×é¼þÔ̺¬¶àģʽºô½Ð´¦ÖÃÆ÷¡¢¿í´øÂë·Ö¶àÖ·ºÍµ÷Ôì½âµ÷Æ÷µÈ¡£
ÔÎÄÁ´½Ó£º
https://source.android.com/security/bulletin/2019-12-01
4.ÃÀ¹úǹ֧Ôì×÷ÉÌSmith£¦WessonÔâMageCart¹¥»÷
ÃÀ¹úǹ֧Ôì×÷ÉÌSmith£¦WessonµÄÔÚÏßÉ̵êÔâµ½Magecart¹¥»÷£¬¿Í»§Ö§¸¶ÐÅÏ¢¿ÉÄܱ»ÇÔ¡£Æ¾¾ÝSanguine SecurityµÄ×êÑÐÈËÔ±Willem de GrootµÄ˵·¨£¬Smith£¦WessonµÄÍøÕ¾ÔÚÐþÉ«ÐÇÆÚÎå֮ǰÒѾ±»ÈëÇÖ£¬²¢ÇÒÖ»Õë¶ÔÃÀ¹úIPµØÖ·µÄ¿Í»§¡£Í¨³£¿Í»§ÔÚ½Ó¼û¸ÃÍøÕ¾Ê±Ö»»áÏÂÔØÒ»¸ö11KBµÄÕý³£JavaScript¾ç±¾£¬µ«ÃÀ¹úIPµÄ¿Í»§ÔÚ½Ó¼ûʱÔò»áÏÂÔØÒ»¸ö20KBµÄ¶ñÒâ¾ç±¾£¬²¢ÏÔʾαÔìµÄÖ§¸¶Ò³Ãæ¡£¸Ã¹«Ë¾ÉÐδ¶Ô´ËÊÂÎñ½øÐлØÓ¦¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/smith-and-wesson-web-site-hacked-to-steal-customer-payment-info/
5.°Ä´óÀûÑÇMonash IVFÔ±¹¤ÓÊÏä±»ºÚ¿ÍÈëÇÖ
°Ä´óÀûÑÇ×î´óµÄÊÔ¹ÜÓ¤¶ù·þÎñÉÌMonash IVFÖҸ滼Õ߯ä¶àÃûÔ±¹¤µÄµç×ÓÓÊÏäÔâµ½´¹µö¹¥»÷£¬¿Í»§µÄÓ×ÎÒÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡£¸Ã¹«Ë¾µÄÊ×ϯִÐйÙMichael KnaapÓÚ11ÔÂ6ÈÕÈ·ÈÏ£¬ºÚ¿Í½Ó¼ûÁ˶àÃûÔ±¹¤µÄµç×ÓÓʼþ¡¢ÓÊÏ䵨ַºÍͨѶ¼£¬ÆäÖÐһЩÓʼþÖпÉÄÜÔ̺¬»¼ÕßµÄÓ×ÎÒÐÅÏ¢£¬ÀýÈçÐÕÃûºÍÁªÏµ·½Ê½¡¢ÅäżÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢¹ú¼®¡¢Ö°Òµ¡¢²ÆÕþÊý¾Ý¡¢Ò½ÁƱ£ÏÕÐÅÏ¢¡¢¼à¿ØÐÅÏ¢¡¢¼ÝÕÕ»ò»¤ÕÕID¼°²¡ÀúµÈ¡£¸Ã¹«Ë¾ÒѾ֪ͨÁ˰ĴóÀûÑÇÐÅϢרԱ°ì¹«ÊҺͰĴóÀûÑÇÍøÂ簲ȫÖÐÐÄ£¨ACSC£©£¬²¢¶Ô´ËÊÂÎñ·¢Õ¹µ÷²é¡£
ÔÎÄÁ´½Ó£º
https://www.smh.com.au/national/fears-over-patient-data-breach-after-cyber-attack-on-monash-ivf-20191203-p53gj0.html
6.Tuft£¦NeedleÒâ±íй¶23.6Íò¸ö¿Í»§¿ìµÝ±êÇ©
´²ÉÏÓÃÆ·¹«Ë¾Tuft£¦NeedleÒâ±í½«236400¸ö¿Í»§µÄ¿ìµÝ±êÇ©ÒÅÁôÔڿɹ«¿ª½Ó¼ûµÄAWS´æ´¢Í°ÖУ¬Ê¹µÃÈκÎÈ˶¼¿É½Ó¼û¿Í»§µÄÐÕÃû¡¢µØÖ·ºÍµç»°ºÅÂëµÈÐÅÏ¢¡£ÕâЩ±êÇ©ÊÇÔڸù«Ë¾ÓÚ2014ÄêÖÁ2017ÄêÖ®¼ä´´½¨µÄ¡£×ܲ¿Î»ÓÚÓ¢¹úµÄ°²È«³§ÉÌFidus Information Security·¢ÏÖÁ˶³öµÄÊý¾Ý²¢½øÐÐÁËÑéÖ¤¡£Tuft£¦NeedleÔÚ½Óµ½»ã±¨ºóѸ¿ì¹Ø¹ØÁ˸ô洢ͰµÄ½Ó¼ûȨÏÞ¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2019/12/02/tuft-and-needle-exposed-shipping-labels/


¾©¹«Íø°²±¸11010802024551ºÅ