ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ49ÖÜ

°ä²¼¹¦·ò 2018-12-10
±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2018Äê12ÔÂ03ÈÕ09ÈÕ¹²ÊÕ¼°²È«·ì϶55¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash Player¿ªÊͺóÀûÓôúÂëÖ´Ðзì϶ £»FreeBSD bhyveËÁÒâ´úÂëÖ´Ðзì϶ £»NUUO NVRMini2 upgrade_handle.phpºÅÁî×¢Èë·ì϶ £»HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç¶Âí½Å £»Rockwell Automation Allen-Bradley PowerMonitor 1000 ½Ó¼û½ÚÔìÃýÎó·ì϶ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇQuoraÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ £»M2MºÍ̸±»ÆØ´æÔÚ·ì϶£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøÏµÍ³ £»ÍòºÀ¾ÆµêÒòÊý¾Ý¿âй¶Ô⼯ÌåËßËÏ£¬±»Ë÷Åâ125ÒÚÃÀÔª £»APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³Æ·ÐÐÒµ £»Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾³¬¹ý30ÍòÓû§ÐÅϢй¶ ¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ ¡£


³ÁÒª°²È«·ì϶Áбí


1. Adobe Flash Player¿ªÊͺóÀûÓôúÂëÖ´Ðзì϶


Adobe Flash Player´æÔÚ¿ªÊͺóÀûÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£

https://helpx.adobe.com/security/products/flash-player/apsb18-42.html



2. FreeBSD bhyveËÁÒâ´úÂëÖ´Ðзì϶


FreeBSD¶ÔbhyveÌṩµÄÉ豸Ä£¿éÖжÌȱÕýÈ·µÄÌìǵ²é³­£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬bhyve¹ý³Ì±ÀÀ £»òÒÔrootȨÏÞÔÚÖ÷»úÉÏÖ´ÐÐËÁÒâ´úÂë ¡£

https://www.freebsd.org/security/advisories/FreeBSD-SA-18:14.bhyve.asc


3. NUUO NVRMini2 upgrade_handle.phpºÅÁî×¢Èë·ì϶


NUUO NVRMini2 upgrade_handle.php´æÔÚÊäÈëÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔROOT¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£

https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716


4. HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç¶Âí½Å


HPE Intelligent Management Center PLAT´æÔÚ»º³åÇøÒç³ö£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬽øÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë ¡£

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us


5. Rockwell Automation Allen-Bradley PowerMonitor 1000 ½Ó¼û½ÚÔìÃýÎó·ì϶


Rockwell Automation Allen-Bradley PowerMonitor 1000 WEBÒ³Ãæ´æÔÚ½Ó¼û½ÚÔì·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Ôö³¤ÓµÓÐÖÎÀíԱȨÏÞµÄÐÂÕË»§ ¡£

http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html


³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢QuoraÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÆÄÊÜÓ­½ÓµÄÎÊ´ðÍøÕ¾Quora°ä·¢ÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§µÄÊý¾Ý±»ÇÔ-ÏÕЩÊÇÆä¿Í»§ÈºÌåµÄÒ»°ë ¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬Óû§µÄÕË»§ÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¹þÏ£ÃÜÂëÒÔ¼°´ÓFacebook¡¢TwitterµÈÉ罻ýÌåµ¼ÈëµÄÊý¾Ý £»Óû§µÄ¹«¿ªÄÚÈÝ£¬ÀýÈçÌáÎÊ¡¢»Ø¸²¡¢µãÔÞºÍÆÀÂÛ £»Óû§µÄ·Ç¹«¿ªÄÚÈÝ£¬ÀýÈç»Ø¸²Ô¼Çë¡¢¸öÈËÐÂÎŵÈ ¡£QuoraÓÚÖÜÒ»Íí¼äÅû¶ÁËÕâ´ÎÊÂÎñ£¬Ä¿Ç°¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄµ÷²éÖ®ÖÐ ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/quora-hack.html


2¡¢M2MºÍ̸±»ÆØ´æÔÚ·ì϶£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøÏµÍ³

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Ç÷Ïò¿Æ¼¼×êÑÐÍŶӷ¢ÏÖÖ÷Á÷µÄÁ½¸öM2M£¨»úе¶Ô»úе£©ºÍ̸´æÔÚ°²È«·ì϶£¬¿ÉÓÃÓÚ¹¥»÷IoTºÍIIoTÉ豸 ¡£Æ¾¾Ý¸Ã¡¶¹¤ÒµÎïÁªÍøÊý¾Ý¹Ç¸ÉÖеĴàÈõÐÔ¡·»ã±¨£¬ÕâÁ½¸öºÍ̸±ðÀëÊÇÐÂÎŶÓÁÐÒ£²â´«ÊäºÍ̸£¨MQTT£©ºÍÔ¼ÊøÀûÓúÍ̸£¨CoAP£© ¡£×êÑÐÈËÔ±·ÖÎöÁËÕâÁ½¸öºÍ̸µÄÉè¼ÆºÍʵÏÖÉÏ´æÔڵķì϶£¬²¢·¢ÏÖÁËÊýÊ®Íǫ̀ÅäÖò»µ±µÄ·þÎñÆ÷£¬ÕâЩ·þÎñÆ÷¶³öÁËÓйØÍ´´¦¡¢Ãô¸ÐÐÅÏ¢ÒÔ¼°¹¤ÒµÁ÷³ÌÓйصÄÊý¾Ý ¡£ÕâЩ·ì϶¿ÉÄܵ¼ÖÂDoS¡¢ËÁÒâ´úÂëÖ´ÐÐÒÔ¼°DDoS·Å´ó¹¥»÷µÈ ¡£


Ô­ÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/machine-to-machine-m2m-technology-design-issues-and-implementation-vulnerabilities/


3¡¢ÍòºÀ¾ÆµêÒòÊý¾Ý¿âй¶Ô⼯ÌåËßËÏ£¬±»Ë÷Åâ125ÒÚÃÀÔª

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ÍòºÀ¹ú¼Ê¾Æµê¼¯ÍÅ(Marriott International)½üÈÕÒò¿Í»§Êý¾Ý¿âй¶¶øÔâ·ê¼¯ÌåËßËÏ£¬Ë÷Åâ½ð¶î¸ß´ï125ÒÚÃÀÔª ¡£ÉÏÖÜÎåÍòºÀ°ä·¢ÆìÏÂϲ´ïÎݾƵê(Starwood Hotel)µÄÒ»¸ö¿Í»§Ô¤Ô¼Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬Ô¼5ÒÚ¿Í»§µÄÐÅÏ¢¿ÉÄÜй¶ ¡£¾ÝϤ£¬ºÚ¿ÍÈëÇÖÔçÔÚ2014Äê¾ÍÒѾ­ÆðÍ· ¡£Ëæºó£¬ÃÀ¹úGeragos&GeragosÂÉʦÊÂÎñËùµÄÂÉʦ±¾¡¤Ã·ÈûÀ­Ë¹(Ben Meiselas)ºÍUnderdog Law˾·¨ÕÕ·÷Âõ¿Ë¶û¡¤¸»ÀÕ(Michael Fuller)´ú±íÁ½ÃûÔ­¸æ´óÎÀ¡¤Ô¼º²Ñ·(David Johnson)ºÍ¿ËÀï˹¡¤¹þÀï˹(Chris Harris)¶ÔÍòºÀ¹ú¼Ê¾ÆµêÌáÆð¼¯ÌåËßËÏ£¬Ë÷Åâ125ÒÚÃÀÔª ¡£¹ÌÈ»ÕâÒ»½ð¶î¿´ÆðÀ´¼«¶È¾Þ´ó£¬µ«Ò²½öÏ൱ÓÚ5ÒÚDZÔÚÊܺ¦¿Í»§Ã¿È˵õ½25ÃÀÔªµÄÅâ³¥ ¡£


Ô­ÎÄÁ´½Ó£º
http://tech.sina.com.cn/i/2018-12-03/doc-ihprknvs8439051.shtml


4¡¢APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³Æ·ÐÐÒµ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Windows Defender ATPÍŶӷ¢ÏÖÒ»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³Æ·ºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬»ùÓڶԸûµÄÖ¸±êÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄ·ÖÎö£¬×êÑÐÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌáÒéµÄ ¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öÀûÓÃÁËOffice¹«Ê½±à×ëÆ÷·ì϶CVE-2018-0802µÄ¶ñÒâÎĵµ£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»ú¶¨ÃûµÄpayload ¡£×êÑÐÈËÔ±ÒÔΪÕâЩpayloadµÄÖØÒªÖ÷ÕÅÊÇÇÔÈ¡Êý¾Ý ¡£


Ô­ÎÄÁ´½Ó£º
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/


5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾³¬¹ý30ÍòÓû§ÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼Ö³¬¹ý30Íò¿Í»§ÐÅϢй¶ ¡£×êÑÐÈËÔ±Oliver Houghͨ¹ýShodan·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Ä¿Ç°¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬µ«²»ÖªÂ·¸ÃÊý¾Ý¿â¶³öÁ˶೤¹¦·ò ¡£¸ÃÊý¾Ý¿âÖÐÔ̺¬³¬¹ý30.9ÍòÓû§¼Í¼£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëµÈ ¡£´Ë±í£¬Êý¾Ý¿âÖл¹´æ´¢Á˳¬¹ý35.1Íò¸ö·þÎñÔ¤Ô¼¼Í¼£¬ÒÔ¼°³¬¹ý2000¸öÍÆÄÃʦµÄÓйØÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º
https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù