ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ44ÖÜ
°ä²¼¹¦·ò 2018-11-05
Ò»¡¢±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÐÂÀ¶ÑÀ·ì϶BleedingBitµ¼ÖÂÊý°ÙÍòÉ豸´æÔÚ·çÏÕ£»¼ÓÃÜÇ®±ÒÂòÂôËùMapleChangeÔâºÚ¿Í¹¥»÷£¬Ëðʧ913¸ö±ÈÌØ±Ò£»±ÈÀûʱµçÐŹ«Ë¾BelgacomÔâ·ê¹¥»÷ÊÂÎñÒÉΪӢ¹úGCHQËùΪ£»¿¨°Í˹»ù°ä²¼2018Äê¹¤ÒµÍøÂ簲ȫÇé¿ö°×ƤÊ飻˼¿ÆÅû¶ASAºÍFTD²úÆ·ÖеÄÐÂ0day£¬¿Éµ¼Ö»ؾø·þÎñ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
¶þ¡¢³ÁÒª°²È«·ì϶Áбí
1. Qualcomm Snapdragon¶à¸ö»º³åÇøÒç¶Âí½Å
Qualcomm Snapdragon²úÆ·´¦ÖÃWMI_START_SCAN_CMDIDʱûÓÐÕýÈ·´¦ÖÃ'remaining_len'£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬽øÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë¡£
https://www.qualcomm.com/company/product-security/bulletins
2. Apache Tomcat JK (mod_jk) ConnectorĿ¼±éÀú·ì϶
Apache Tomcat JK£¨mod_jk£©Connector´æÔÚĿ¼±éÀú·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Î´ÊÚȨ¶ÁȡϵͳÃô¸ÐÐÅÏ¢¡£
https://lists.apache.org/thread.html/6d564bb0ab73d6b3efdd1d6b1c075d1a2c84ecd84a4159d6122529ad@%3Cannounce.tomcat.apache.org%3E
3. OpenSSL²àÐÅ·¹¥»÷ÐÅϢй¶·ì϶
OpenSSL DSAÊðÃûËã·¨´æÔÚ²àÐÅ··ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶ͨ¹ý»ñÈ¡ÊðÃûËã·¨ÀïµÄ±äÁ¿£¬¸´ÔÃØÔ¿ÐÅÏ¢¡£
https://www.openssl.org/news/secadv/20181030.txt
4. IBM WebSphere Commerce CVE-2018-1808´úÂë×¢Èë·ì϶
Èý¡¢³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢ÐÂÀ¶ÑÀ·ì϶BleedingBitµ¼ÖÂÊý°ÙÍòÉ豸´æÔÚ·çÏÕ
ÒÔÉ«Áа²È«¹«Ë¾ArmisµÄ×êÑÐÈËÔ±·¢ÏÖµÂÖÝÒÇÆ÷£¨TI£©³ö²úµÄµÍ¹¦ºÄÀ¶ÑÀоƬ£¨BLE£©´æÔÚÁ½¸ö°²È«·ì϶£¬Ë¼¿Æ¡¢MerakiºÍArubaµÈÔì×÷É̵Ķà¸ö²úÏß¶¼Êܵ½Ó°Ïì¡£ÕâÁ½¸ö·ì϶£¨CVE-2018-16986ºÍCVE-2018-7080£©±»³ÆÎªBleedingBit£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐËÁÒâ´úÂë²¢ÆëÈ«ÊÕÊÜÉ豸¡£±¾ÖÜËĵÂÖÝÒÇÆ÷°ä²¼ÁËÓйؽ¨¸´²¹¶¡£¬ÕâЩ²¹¶¡½«Í¨¹ý·ÖÆçµÄOEMÉÌÌṩ¸øÓû§¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/bluetooth-chip-hacking.html
2¡¢¼ÓÃÜÇ®±ÒÂòÂôËùMapleChangeÔâºÚ¿Í¹¥»÷£¬Ëðʧ913¸ö±ÈÌØ±Ò
¼ÓÃÜÇ®±ÒÂòÂôËùMapleChange³ÆÆäÔâµ½ºÚ¿Í¹¥»÷£¬¹²Ëðʧ913¸ö±ÈÌØ±Ò£¨¼ÛÖµÔ¼600ÍòÃÀÔª£©¡£¸Ãƽ̨¾Ý³ÆÊǼÓÄôóµÄÒ»¸öÓ×ÐÍÂòÂôËù¡£MapleChangeÔÚTwitterÉϳƾ¹ý¾ßÌåµÄµ÷²é£¬¸ÃÂòÂôËùÎÞÁ¦¶ÔÓû§½øÐÐÅ⸶£¬½«²»µÃ²»¹Ø¹Ø£¬Ô̺¬¹Ø¹ØÆäTwitterÕË»§ºÍÍøÕ¾¡£ÕâÒ»ÊÂÎñѸ¿ìÒý·¢Á˶àÈËÒÉ»ó£¬ÒÔΪ¸ÃÓ×ÐÍÂòÂôËù¿ÉÄÜÖ»ÊÇÒ»¸öȦÌ×£¬¸ÃÊÂÎñ¿ÉÄÜ»áÒý·¢ºóÐøµÄÐÌʵ÷²é¡£
ÔÎÄÁ´½Ó£º
https://ethereumworldnews.com/maplechange-crypto-exchange-hacked-for-913-bitcoin-btc-exit-scam-likely/
3¡¢±ÈÀûʱµçÐŹ«Ë¾BelgacomÔâ·ê¹¥»÷ÊÂÎñÒÉΪӢ¹úGCHQËùΪ
±ÈÀûʱ±¨Ö½De Standaard±¨Â·³Æ£¬µ÷²éÈËÔ±ÒѾ֤Ã÷Õë¶Ô±ÈÀûʱµçÐŹ«Ë¾Belgacom£¨ÏÖΪProximus¹«Ë¾£©µÄºÚ¿Í¹¥»÷ÊÇÓ¢¹úµý±¨»ú¹¹GCHQËùΪ¡£¸ÃÊÂÎñ²úÉúÔÚ2013Äê9Ô£¬BelgacomµÄIT»ù´¡ÉèÊ©Ôâµ½¶ñÒâÈí¼þ¹¥»÷¡£±¨Â·Ö¸³ö£¬Óë¹¥»÷BelgacomµÄ¼äµýÈí¼þ½øÐÐͨѶµÄIPµØÖ·ÖУ¬ÓÐÈý¸öIPÊôÓÚÒ»¼ÒÓ¢¹ú¹«Ë¾¡£¸Ã¹¥»÷ÊÇÓÉGCHQÌáÒéµÄ£¬´úºÅΪOperation Socialist£¨Éç»áÖ÷ÒåÐж¯£©¡£Ó¢¹úÄÚÕþ²¿»Ø¾øÓëµ÷²é×é½øÐкÏ×÷¡£ÈôÊDZ¨Â·Êôʵ£¬ÕâÒ»Çé¿öÓÈÆäÁîÈ˲»°²¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77430/intelligence/gchq-hacked-belgacom.html
4¡¢¿¨°Í˹»ù°ä²¼2018Äê¹¤ÒµÍøÂ簲ȫÇé¿ö°×ƤÊé
¿¨°Í˹»ù×î½ü°ä²¼µÄ2018Äê¹¤ÒµÍøÂ簲ȫÇé¿ö°×ƤÊéÖ¸³ö£¬Ëæ×ÅÓë±í²¿ÊÀ½çµÄÏνӲ»ÐÝÔö¶à£¬ÔÚ¹¤ÒµITºÍOTÍøÂçÖа²È«ÐÔÔÚ³ÉΪ×î³ÁÒªµÄÖ÷ÌâÖ®Ò»¡£77%µÄ¹¤Òµ°²È«ÈËÊ¿ÒÔΪËûÃÇµÄÆóÒµºÜ¿ÉÄܳÉÎªÍøÂ簲ȫÊÂÎñµÄÖ¸±ê£¬Í¬Ê±48%µÄÊÜ·ÃÕß°µÊ¾ËûÃÇûÓÐרÃŵÄOT/ICSÊÂÎñÏìÓ¦´òËã¡£´Óǰ12¸öÔÂÄÚ³¬¹ýÒ»°ëµÄÆóÒµ°µÊ¾ËûÃÇûÓоÀú¹ýÈκΰ²È«ÊÂÎñ£¬µ«ºÜ¶àÆóÒµÊÂʵÉϵ××ÓûÓмì²â»ò¸ú×Ù¹ýÈκι¥»÷¡£
ÔÎÄÁ´½Ó£º
https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf
5¡¢Ë¼¿ÆÅû¶ASAºÍFTD²úÆ·ÖеÄÐÂ0day£¬¿Éµ¼Ö»ؾø·þÎñ
˼¿Æ°²È«ÍŶÓÅû¶Æä×ÔÊÊÓ¦°²È«É豸£¨ASA£©ºÍFirepowerÍþв·ÀÓùÈí¼þ£¨FTD£©ÖеĻỰ³õʼ»¯ºÍ̸£¨SIP£©²é³ÒýÇæ´æÔÚÒ»¸ö¿Éµ¼Ö»ؾø·þÎñµÄÁãÈÕ·ì϶¡£Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâSIPÒªÇóÀ´´¥·¢¸Ã·ì϶£¬µ¼ÖÂDoS¡£¸Ã·ì϶£¨CVE-2018-15454£©Ó°ÏìÔËÐÐASA 9.4+ºÍFTD 6.0+µÄÉ豸£¬Ô̺¬¶à¸öÐͺŵĹ¤Òµ°²È«É豸ºÍ·À»ðǽµÈ²úÆ·¡£Ä¿Ç°»¹Ã»Óи÷ì϶µÄ½¨¸´²¹¶¡ºÍworkaround£¬µ«Äܹ»²ÉȡһЩ»º½â´ëÊ©×èÖ¹Ô¶³Ì¹¥»÷Õß·ÛËéÆäÉ豸¡£
ÔÎÄÁ´½Ó£º
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181031-asaftd-sip-dos
ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ