Autodesk¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶£»Î¢ÈíOAuthÑéÖ¤¹ý³Ì´æÔÚ·ì϶ £¬¿Éµ¼ÖÂAzureÕÊ»§±»ÊÕÊÜ

°ä²¼¹¦·ò 2019-12-04

1.Autodesk¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SafeBreach Labs×êÑÐÈËÔ±Åû¶Autodesk¡¢Ç÷Ïò¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLL½Ù³Ö·ì϶¡£Ç÷Ïò¿Æ¼¼°²È«Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ïì £¬¸Ã·ì϶´æÔÚÓÚcoreServiceShell.exe×é¼þÖС£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû½øÐÐÑéÖ¤ £¬Òò¶ø¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐËÁÒâDLL £¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃÓÆ¾ÃÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÀûÓÃÒ²±ðÀëÊܵ½ÀàËÆµÄ·ì϶CVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/


2.΢ÈíOAuthÑéÖ¤¹ý³Ì´æÔÚ·ì϶ £¬¿Éµ¼ÖÂAzureÕÊ»§±»ÊÕÊÜ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


CyberArk°²È«×êÑÐÔ±Omer Tsarfati·¢ÏÖ΢ÈíµÄÀûÓ÷¨Ê½Ê¹ÓÃOAuth½øÐеÚÈý·½Éí·ÝÑéÖ¤µÄ·½Ê½ÖдæÔÚ°²È«·ì϶ £¬¿ÉÄÜʹ¹¥»÷ÕßÊÕÊÜÓû§µÄAzureÔÆÕÊ»§¡£OAuthÊÇÒ»ÖÖÉí·ÝÑéÖ¤ºÍ̸ £¬ÔÊÐíÀûÓ÷¨Ê½ÓëµÚÈý·½ÍøÕ¾»òÈí¼þ¹²ÏíÊÜ»§ÕË»§Êý¾Ý¡£ÔÚ΢ÈíµÄOAuthÊÚȨÁ÷³ÌÖÐ £¬µÚÈý·½½«ÊǾ­¹ý΢ÈíºË×¼µÄ°×Ãûµ¥URL¡£×êÑÐÈËÔ±·¢ÏÖÕâЩ±»ÐÅÀµµÄ°×Ãûµ¥URLÖÐÔ̺¬Ò»Ð©Î´ÔÚAzureÃÅ»§ÖÐ×¢²áµÄURL £¬ÀýÈç.cloudapp.net¡¢.azurewebsites.netºÍ.{vm_region}.cloudapp.azure.com¡£×êÑÐÈËÔ±·¢ÏÖÖÁÉÙÓÐ54¸öÀàËÆµÄ×ÓÓòδÔÚδÔÚAzureÃÅ»§ÖÐ×¢²á £¬¹¥»÷ÕßÄܹ»Í¨¹ý×¢²áÕâЩÓòÀ´½Ó¼û΢ÈíÓû§µÄÊý¾Ý¡£Î¢ÈíÔÚ11ÔÂ19ÈÕ½¨¸´Á˸ÃÎÊÌâ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/


3.¹È¸è°ä²¼12ÔÂAndroid°²È«¸üР£¬ ½¨¸´¶à¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹È¸èµÄ12ÔÂAndroid°²È«¸üÐÂÓÉ2019-12-01ºÍ2019-12-05Á½¸ö°²È«²¹¶¡·¨Ê½¼¶±ð×é³É £¬ÆäÖÐ2019-12-01²¹¶¡°üÖн¨¸´ÁË15¸ö·ì϶¡£×îÑϳÁµÄ·ì϶ÊÇFramework×é¼þÖеÄDoS·ì϶CVE-2019-2232 £¬¸Ã·ì϶ӰÏìÁËAndroid°æ±¾8.0¡¢8.1¡¢9ºÍ10 £¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÐÂÎŵ¼ÖÂÓÀÔ¶»Ø¾ø·þÎñ¡£ÆäËüÑϳÁµÄ·ì϶»¹Ô̺¬Media¿ò¼ÜÖеĹؼü·ì϶CVE-2019-2222ºÍCVE-2019-2223 £¬Ô¶³Ì¹¥»÷Õß¿ÉÀûÓø÷ì϶ÔÚÌØÈ¨¹ý³ÌµÄ¸ßµÍÎÄÖÐÖ´ÐдúÂë¡£±¾´Î°²È«¸üÐÂÖиßͨ¹ØÔ´×é¼þ½¨¸´ÁË22¸ö·ì϶ £¬ÊÜÓ°ÏìµÄ×é¼þÔ̺¬¶àģʽºô½Ð´¦ÖÃÆ÷¡¢¿í´øÂë·Ö¶àÖ·ºÍµ÷Ôì½âµ÷Æ÷µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://source.android.com/security/bulletin/2019-12-01


4.ÃÀ¹úǹ֧Ôì×÷ÉÌSmith£¦WessonÔâMageCart¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹úǹ֧Ôì×÷ÉÌSmith£¦WessonµÄÔÚÏßÉ̵êÔâµ½Magecart¹¥»÷ £¬¿Í»§Ö§¸¶ÐÅÏ¢¿ÉÄܱ»ÇÔ¡£Æ¾¾ÝSanguine SecurityµÄ×êÑÐÈËÔ±Willem de GrootµÄ˵·¨ £¬Smith£¦WessonµÄÍøÕ¾ÔÚÐþÉ«ÐÇÆÚÎå֮ǰÒѾ­±»ÈëÇÖ £¬²¢ÇÒÖ»Õë¶ÔÃÀ¹úIPµØÖ·µÄ¿Í»§¡£Í¨³£¿Í»§ÔÚ½Ó¼û¸ÃÍøÕ¾Ê±Ö»»áÏÂÔØÒ»¸ö11KBµÄÕý³£JavaScript¾ç±¾ £¬µ«ÃÀ¹úIPµÄ¿Í»§ÔÚ½Ó¼ûʱÔò»áÏÂÔØÒ»¸ö20KBµÄ¶ñÒâ¾ç±¾ £¬²¢ÏÔʾαÔìµÄÖ§¸¶Ò³Ãæ¡£¸Ã¹«Ë¾ÉÐδ¶Ô´ËÊÂÎñ½øÐлØÓ¦¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/smith-and-wesson-web-site-hacked-to-steal-customer-payment-info/


5.°Ä´óÀûÑÇMonash IVFÔ±¹¤ÓÊÏä±»ºÚ¿ÍÈëÇÖ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°Ä´óÀûÑÇ×î´óµÄÊÔ¹ÜÓ¤¶ù·þÎñÉÌMonash IVFÖҸ滼Õ߯ä¶àÃûÔ±¹¤µÄµç×ÓÓÊÏäÔâµ½´¹µö¹¥»÷ £¬¿Í»§µÄÓ×ÎÒÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡£¸Ã¹«Ë¾µÄÊ×ϯִÐйÙMichael KnaapÓÚ11ÔÂ6ÈÕÈ·ÈÏ £¬ºÚ¿Í½Ó¼ûÁ˶àÃûÔ±¹¤µÄµç×ÓÓʼþ¡¢ÓÊÏ䵨ַºÍͨѶ¼ £¬ÆäÖÐһЩÓʼþÖпÉÄÜÔ̺¬»¼ÕßµÄÓ×ÎÒÐÅÏ¢ £¬ÀýÈçÐÕÃûºÍÁªÏµ·½Ê½¡¢ÅäżÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢¹ú¼®¡¢Ö°Òµ¡¢²ÆÕþÊý¾Ý¡¢Ò½ÁƱ£ÏÕÐÅÏ¢¡¢¼à¿ØÐÅÏ¢¡¢¼ÝÕÕ»ò»¤ÕÕID¼°²¡ÀúµÈ¡£¸Ã¹«Ë¾ÒѾ­Í¨ÖªÁ˰ĴóÀûÑÇÐÅϢרԱ°ì¹«ÊҺͰĴóÀûÑÇÍøÂ簲ȫÖÐÐÄ£¨ACSC£© £¬²¢¶Ô´ËÊÂÎñ·¢Õ¹µ÷²é¡£


Ô­ÎÄÁ´½Ó£º

https://www.smh.com.au/national/fears-over-patient-data-breach-after-cyber-attack-on-monash-ivf-20191203-p53gj0.html


6.Tuft£¦NeedleÒâ±íй¶23.6Íò¸ö¿Í»§¿ìµÝ±êÇ©


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


´²ÉÏÓÃÆ·¹«Ë¾Tuft£¦NeedleÒâ±í½«236400¸ö¿Í»§µÄ¿ìµÝ±êÇ©ÒÅÁôÔڿɹ«¿ª½Ó¼ûµÄAWS´æ´¢Í°ÖÐ £¬Ê¹µÃÈκÎÈ˶¼¿É½Ó¼û¿Í»§µÄÐÕÃû¡¢µØÖ·ºÍµç»°ºÅÂëµÈÐÅÏ¢¡£ÕâЩ±êÇ©ÊÇÔڸù«Ë¾ÓÚ2014ÄêÖÁ2017ÄêÖ®¼ä´´½¨µÄ¡£×ܲ¿Î»ÓÚÓ¢¹úµÄ°²È«³§ÉÌFidus Information Security·¢ÏÖÁ˶³öµÄÊý¾Ý²¢½øÐÐÁËÑéÖ¤¡£Tuft£¦NeedleÔÚ½Óµ½»ã±¨ºóѸ¿ì¹Ø¹ØÁ˸ô洢ͰµÄ½Ó¼ûȨÏÞ¡£


Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/12/02/tuft-and-needle-exposed-shipping-labels/