ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ39ÖÜ
°ä²¼¹¦·ò 2018-10-03Ò»¡¢±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇFacebookÔâ0day·ì϶¹¥»÷£¬Ô¼5000ÍòÓû§µÄ½Ó¼ûÁîÅÆ±»ÇÔ£»°²È«×êÑÐÍŶӰ䲼¹ØÓÚUSBÍþв½ü¿öµÄ·ÖÎö»ã±¨£»¿¨°Í˹»ù°ä²¼¹ØÓÚICSϵͳÖеÄRAT·çÏյķÖÎö»ã±¨£»Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶£»ÔÆÍÆË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ó×ʱ£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
¶þ¡¢³ÁÒª°²È«·ì϶Áбí
1. Foxit Reader for Windows¶à¸ö¶ÔÏó¿ªÊͺóʹÓ÷ì϶
Foxit Reader for Windows CalculateÊÂÎñ´¦ÖôæÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
2. Wecon LeviStudioU CVE-2018-10610»º³åÇøÒç¶Âí½Å
Wecon LeviStudioU TIFFͼÏñµÄ½âÎö´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþ£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
3. Cisco Video Surveillance Manager ApplianceĬÈÏÃÜÂë·ì϶
Cisco Video Surveillance Manager Appliance ROOTÕË»§Ê¹ÓÃÓ²±àÂëÆ¾Ö¤£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔrootÓû§Éí·ÝÖ´ÐÐËÁÒâºÅÁî¡£
4. ISC BIND CVE-2018-5741°²È«ÏÞ¶ÈÈÆ¹ý·ì϶
ISC BINDʵÏÖ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Èƹý°²È«ÏÞ¶È£¬Ö´ÐÐδÊÚȨµÄ²Ù×÷¡£
5. DedeCMS XML×¢ÈëËÁÒâ´úÂë·ì϶
DedeCMS´¦ÖÃ<file type='file' name='../×Ö·û´®´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Ö´ÐÐËÁÒâ´úÂë¡£
Èý¡¢³ÁÒª°²È«ÊÂÎñ×ÛÊö
9ÔÂ28ÈÕFacebookÈ·ÈÏÆäÔâµ½ºÚ¿Í¹¥»÷£¬¹¥»÷ÕßÀûÓÃ0day·ì϶ÇÔÈ¡Á˳¬¹ý5000ÍòÓû§µÄ½Ó¼ûÁîÅÆ¡£¸Ã·ì϶´æÔÚÓÚFacebookµÄView AsÖ°ÄÜÖУ¬¿ÉÔÊÐí¹¥»÷ÕßÇÔÈ¡Óû§µÄ½Ó¼ûÁîÅÆ²¢½Ó¼ûÓû§µÄ¸öÈËÐÅÏ¢£¬¶øÎÞÐèÕË»§ÃÜÂë»òË«³É·ÖÑéÖ¤Âë¡£FacebookÒѲÉÈ¡´ëʩԮÊÖ½ü9000ÍòÓû§³ÁÖÃÁ˽ӼûÁîÅÆ£¬²¢½ûÓÃÁËView AsÖ°ÄÜ¡£ÓÉÓÚµ÷²éÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬FacebookÉÐδȷ¶¨ÊÇ·ñÓÐÈκÎÕË»§±»ÀÄÓûòÐÅÏ¢±»½Ó¼û¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/09/facebook-account-hack.html
2¡¢°²È«×êÑÐÍŶӰ䲼¹ØÓÚUSBÍþв½ü¿öµÄ·ÖÎö»ã±¨
ÔÎÄÁ´½Ó£º
https://securelist.com/usb-threats-from-malware-to-miners/87989/
3¡¢¿¨°Í˹»ù°ä²¼¹ØÓÚICSϵͳÖеÄRAT·çÏյķÖÎö»ã±¨
¿¨°Í˹»ù³¢ÊÔÊÒ°ä²¼¹ØÓÚICSÖеÄRAT·çÏյķÖÎö»ã±¨¡£Ô¶³ÌÖÎÀí¹¤¾ß£¨RAT£©±»¿í·ºÓÃÓÚ¹¤ÒµÍøÂçÖ®ÖУ¬ÓÃÓÚ½øÐÐICS¼à²â¡¢½ÚÔìºÍÊØ»¤¡£Ô¶³Ì²Ù×÷ICSµÄÄÜÁ¦Äܹ»´ó´ó½µµÍÊØ»¤³É±¾£¬µ«²»ÊܽÚÔìµÄÔ¶³Ì½Ó¼û¡¢ÎÞ·¨100%µØÌṩԶ³Ì¿Í»§¶ËµÄºÏ·¨ÐÔÑéÖ¤ÒÔ¼°RAT´úÂëºÍÅäÖÃÖеķì϶¶¼´ó´óÔö³¤Á˹¥»÷Ãæ¡£Óë´Ëͬʱ£¬¹¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃRATºÍÆäËüºÏ·¨¹¤¾ßÀ´¸²¸ÇÆä¶ñÒâ»î¶¯£¬Ê¹µÃ¶Ô¶ñÒâ»î¶¯½øÐйéÒòÔ½·¢ÄÑÌâ¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threats-posed-by-using-rats-in-ics/88011/
4¡¢Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶
ʱװÁãÊÛÉÌSHEINÉÏÖÜÎå°ä·¢ÆäÔâµ½ºÚ¿Í¹¥»÷£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶¡£¹¥»÷ÊÂÎñ²úÉúÔÚÏÄÌ죬¼´6ÔµÄij¸öʱ³½£¬¹¥»÷Õß½Ó¼ûÁËÓû§µÄµç×ÓÓʼþµØÖ·ºÍ¼ÓÃܵÄÃÜÂë¡£¸Ã¹«Ë¾ÓÚ8ÔÂ22ÈÕ·¢ÏÖÁËÕâÒ»ÊÂÎñ£¬²¢ÔÚÁªÏµÊÜÓ°ÏìµÄÓû§Åú¸ÄÆäÃÜÂ롣й¶µÄÊý¾ÝÖв»Ô̺¬ÈκÎÐÅÓþ¿¨ÐÅÏ¢¡£¸Ã¹«Ë¾ÔÚ½øÇ°½øÒ»²½µÄµ÷²é¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/shein-fashion-retailer-announces-breach-affecting-6-42-million-users/
5¡¢ÔÆÍÆË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ó×ʱ£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì
Ó¡¶È³ÛÃûÔÆÍÆËã¿Æ¼¼¹«Ë¾ZohoµÄÓòÃû£¨zoho.com£©±»ÆäÓòÃû×¢²áÉÌTierraNet½ûÓýüÁ½¸öÓ×ʱ£¬ÔÚ´ËÆÚ¼äÓû§±»³Á¶¨ÏòÖÁÒ»¸ö¿ÕÈ±Ò³Ãæ£¬Ô¼3000ÍòÓû§Êܵ½Ó°Ï졣ƾ¾ÝTierraNetµÄ˵·¨£¬ÆäÂÅ´ÎÊÕµ½¹ØÓÚÀûÓÃZohoÓʼþ·þÎñ·¢ËÍ´¹µöÓʼþµÄͶËߣ¬µ«ÔÚÊý´ÎÓëZoho¹µÍ¨ºó¸ÃÎÊÌâûÓеõ½½â¾ö£¬×îÖÕÒ»Ì××Ô¶¯»¯ÏµÍ³µ¼ÖÂÁË´ËÊÂÎñµÄ²úÉú¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/domain-registrar-oversteps-taking-down-zoho-domain-impacts-over-30mil-users/
ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ