ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ45ÖÜ

°ä²¼¹¦·ò 2018-11-12

Ò»¡¢±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼°²È«·ì϶52¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Unity Express JAVA·´ÐòÁл¯´¦ÖÃËÁÒâºÅÁîÖ´Ðзì϶£»AVEVA InduSoft Web Studio/InTouch Edge HMIÔ¶³Ì´úÂëÖ´Ðзì϶£»HPE Integrated Lights-Out 5¹Ì¼þ¸üа²È«ÏÞ¶ÈÈÆ¹ý·ì϶£»QEMU 'NBD_OPT_LIST'»º³åÇøÒç¶Âí½Å£»Brocade Fabric OS ROOTȨÏÞÌáÈ¡·ì϶£»Apache Hive HiveServer2°²È«Èƹý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÈËÔ±Åû¶VirtualBoxÖеÄÐé¹¹»úÌÓÒÝ0day£»Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§£»¼íÆÒÕ¯¶à¼ÒISPÔâµ½¸Ã¹úº¹ÇàÉÏ×î´ó¹æÄ£µÄDDoS¹¥»÷£»ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄÓ×ÎÒÐÅÏ¢±»ÇÔ£»»ôÄáΤ¶û°ä²¼¹ØÓÚ¹¤ÒµÉèÊ©ÖеÄUSBÍþвµÄ·ÖÎö»ã±¨¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£




¶þ¡¢³ÁÒª°²È«·ì϶Áбí


1. Cisco Unity Express JAVA·´ÐòÁл¯´¦ÖÃËÁÒâºÅÁîÖ´Ðзì϶


Cisco Unity Express¶ÔÓû§ÌṩµÄÄÚÈݽøÐз´ÐòÁл¯²Ù×÷ÊÇûÓнøÐÐ×ã¹»µÄ¹ýÂË£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄjavaÐòÁл¯¶ÔÏóÒªÇó£¬Äܹ»ROOTȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue


2. AVEVA InduSoft Web Studio/InTouch Edge HMIÔ¶³Ì´úÂëÖ´Ðзì϶


Schneider Electric InduSoft Web StudioºÍInTouch Edge HMI´æÔÚÅäÖÃÎļþ¿ÕÃÜÂëÎÊÌ⣬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐдúÂë¡£

https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec130.pdf



3. HPE Integrated Lights-Out 5¹Ì¼þ¸üа²È«ÏÞ¶ÈÈÆ¹ý·ì϶


HPE Integrated Lights-Out 5´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Èƹý°²È«ÏÞ¶È£¬¸üй̼þ¡£

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03894en_us



4. QEMU 'NBD_OPT_LIST'»º³åÇøÒç¶Âí½Å


QEMU´¦ÖÃ'NBD_OPT_LIST'ÒªÇóµÄ·þÎñÆ÷ÏìÓ¦´æÔÚÕ»Òç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄNBD·þÎñÆ÷ÒªÇó£¬Äܹ»QEMU¹ý³ÌȨÏÞÖ´ÐÐËÁÒâ´úÂë»òʹÀûÓ÷¨Ê½±ÀÀ£¡£

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630



5. Brocade Fabric OS ROOTȨÏÞÌáÈ¡·ì϶


Brocade Fabric OS ¡®supportsave¡¯ºÅÁî´æÔÚ°²È«·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡ROOTȨÏÞ¡£
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731




Èý¡¢³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢×êÑÐÈËÔ±Åû¶VirtualBoxÖеÄÐé¹¹»úÌÓÒÝ0day

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¶íÂÞ˹·ì϶×êÑÐÈËÔ±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐé¹¹»úÌÓÒÝ0day£¬¸Ã·ì϶ӰÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¸Ã·ì϶ºÏÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐé¹¹»ú£¬¹¥»÷Õß¿ÉÀûÓø÷ì϶ÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬²¢ÀûÓÃÆäËü¼¼ÊõÌáȨÖÁring0¡£×êÑÐÈËÔ±ÔÚGithubÉϾßÌåÃèÊöÁ˸÷ì϶±³ºóµÄ»úÔ죬²¢°ä²¼ÁËÓйØPoCÊÓÆµ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/


2¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿Æ°ä²¼Á˶à¿î²úÆ·µÄ15¸ö°²È«¸üУ¬ÆäÖÐÔ̺¬É¾³ýÁËÓ×ÐÍÆóÒµ»¥»»»úÖеÄÒ»¸öºóÃÅÕË»§¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£ÕâЩºóÃÅÕË»§·ì϶Ô̺¬3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/


3¡¢¼íÆÒÕ¯¶à¼ÒISPÔâµ½¸Ã¹úº¹ÇàÉÏ×î´ó¹æÄ£µÄDDoS¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±¾ÖܼíÆÒÕ¯×î´óµÄ¼¸¼Ò»¥ÁªÍø·þÎñÌṩÉÌ£¨ISP£©Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷£¬Ô̺¬EZECOM¡¢SINET¡¢TelcotechºÍDigi¡£¾Ý±¾µØÃ½Ì屨·£¬Õâ´ÎDDoS¹¥»÷ÊǸùúº¹ÇàÉÏ×î´ó¹æÄ£µÄ¹¥»÷Ö®Ò»£¬±¾ÖÜÒ»µÄDDoS¹¥»÷Á÷Á¿´ï½ü150Gbps¡£¹ØÓÚÕâ´Î¹¥»÷µÄÔ­ÒòºÍ¶¯»úÉв»Ã÷ÏÔ£¬Ò²Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÕÆ¹Ü¡£Ò»ÖÖ¿ÉÄܵÄÇé¿öÊÇISP¾ºÕùµÐÊÖÖ®¼äµÄÏ໥¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/cambodias-isps-hit-by-some-of-the-biggest-ddos-attacks-in-the-countrys-history/


4¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄÓ×ÎÒÐÅÏ¢±»ÇÔ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÖ¥¼Ó¸çÌ«Ñô±¨µÄ±¨Â·£¬Ö¥¼Ó¸ç¹«Á¢Ñ§ÌõÄÒ»Ãûǰ¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢×ÔÔ¸Õߺ͹©¸øÉ̵ÄÓ×ÎÒÐÅÏ¢£¬ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢·¸×ﺹÇàºÍDCFSµ÷²éÁ˾ֵÈ£¬²»Ô̺¬ÈκÎÉç±£ºÅÂë¡£KrimsĿǰÒѱ»Ö¥¼Ó¸ç¾¯·½¿ÛÁôºÍ¿ÛÁô£¬²¢½«Ãæ¶Ô¶àÏî×ïÃûµÄÖ¸¿Ø¡£


Ô­ÎÄÁ´½Ó£º
https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml


5¡¢»ôÄáΤ¶û°ä²¼¹ØÓÚ¹¤ÒµÉèÊ©ÖеÄUSBÍþвµÄ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý»ôÄáΤ¶û°ä²¼µÄÒ»·Ýл㱨£¬USBÉ豸ÊÇÕë¶Ô¹¤ÒµÉèÊ©µÄ¶ñÒâÈí¼þ¹¥»÷µÄÖØÒªÃ½½é¡£¸Ã»ã±¨ÊÇ»ùÓÚ»ôÄáΤ¶ûµÄ°²È«Ã½Ì廥»»£¨SMX£©¼¼ÊõÍøÂçµÄÊý¾Ý£¬º­¸ÇÁËÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢»¯Ñ§¡¢Ö½ÕÅÔì×÷µÈÐÐÒµ¡£Êý¾ÝÅú×¢£¬26%µÄÍþв¿ÉÄܵ¼Ö¹¤ÒµÆóҵʧȥICS»·¾³µÄ¿É¼ûÐÔ»ò½ÚÔìȨ£¬´Ó¶øÔì³É³Á´óÖжÏ¡£16%µÄÍþвרÃÅÕë¶ÔICSºÍIoTϵͳ£¬ÆäÖÐÔ̺¬¶ñÒâÈí¼þMirai£¨6£¥£©¡¢Stuxnet£¨2£¥£©¡¢Triton£¨2£¥£©ºÍWannaCry£¨1£¥£©¡£


Ô­ÎÄÁ´½Ó£º
https://honeywellprocess.blob.core.windows.net/public/Support/Customer/Honeywell-USB-Threat-Report.pdf


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù