ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ4ÖÜ

°ä²¼¹¦·ò 2019-01-28

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê1ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼°²È«·ì϶46¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇSchneider Electric IIoT MonitorÓ²±àÂëÃØÔ¿ÐÅϢй¶·ì϶£»Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å£»Advantech WebAccess/SCADA SQL×¢Èë·ì϶£»Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶£»PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÆ¾¾ÝGDPRÌõÀý £¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle·£¿î5000ÍòÅ·Ôª;Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶;ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢ £¬Ô̺¬Óû§Ö§¸¶Êý¾Ý;Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯ £¬ÒÑϰȾԼ100ÍòÓû§;PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ £¬×°ÖÃÎļþ±»´«È¾¡£

ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£

³ÁÒª°²È«·ì϶Áбí


1. Schneider Electric IIoT MonitorÓ²±àÂëÃØÔ¿ÐÅϢй¶·ì϶
Schneider Electric IIoT MonitorʹÓÃÁËÓ²±àÂëÃÜÔ¿ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û¡£
http://www.schneider-electric.com/sites/corporate/en/support/

2. Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å
Adobe AcrobatºÍReader´¦ÖÃÄÚ´æ¶ÔÏó´æÔÚÔ½½ç¶Á·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó £¬¿É½øÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb18-30.html

3. Advantech WebAccess/SCADA SQL×¢Èë·ì϶
Advantech WebAccess/SCADA´æÔÚSQL×¢Èë·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇó £¬²Ù×÷Êý¾Ý¿â £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£
https://support.advantech.com/support/DownloadSRDetail_New.aspx?SR_ID=1-MS9MJV&Doc_Source=Download

4. Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶
Cisco Small Business RV320ºÍRV325´¦ÖÃHTTP POSTÒªÇó·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject

5. PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶
PLC Wireless Router GPN2.4P21-C-CN cgi-bin/webproc?getpage=html/index.html subpage=wlsecurity URI´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¸ü¸ÄÎÞÏß°²È«ÃÜÂë¡£
https://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html

 ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Æ¾¾ÝGDPRÌõÀý £¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle·£¿î5000ÍòÅ·Ôª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝÅ·ÃËÓÚ2018Äê5ÔÂÉúЧµÄGDPRÌõÀý £¬·¨¹úÊý¾Ý±£»¤¼à¹Ü»ú¹¹CNIL¶ÔGoogle·¢³öÁË5000ÍòÅ·Ôª£¨Ô¼ºÏ5700ÍòÃÀÔª£©µÄ·£µ¥¡£CNIL³ÆÕâ±Ê·£¿îµÄÔ­ÒòÊÇGoogle¹«Ë¾¡°²»×ãͨÃ÷¶È¡¢ÐÅÏ¢²»ºÏ³ÆÒÔ¼°ÔÚ¸öÐÔ»¯¸æ°×·½ÃæÃ»ÓлñµÃÓû§µÄÓÐЧÔ޳ɡ±¡£ÕâÊÇCNILƾ¾ÝGDPR¿ª³öµÄÊ×ÕÅ·£µ¥¡£Google»ØÓ¦³Æ¡°ÎÒÃǼ«¶ÈÖÂÁ¦ÓÚÂú×ãÈËÃǶÔÊý¾ÝͨÃ÷¶ÈµÄ½øÕ¹ºÍGDPRµÄÒªÇó £¬ÎÒÃÇÔÚ×êÑоö¶¨ÎÒÃǽÓÏÂÀ´µÄ²½Ö衱¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/google-privacy-gdpr-fine.html

2¡¢Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±Max Justicz·¢ÏÖLinux°üÖÎÀíÆ÷apt/apt-get´æÔÚÔ¶³Ì´úÂëÖ´Ðзì϶ £¬¸Ã·ì϶£¨CVE-2019-3462£©ÔÊÐí¹¥»÷Õß½øÐÐÖÐÑëÈ˹¥»÷²¢»ñÈ¡rootȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£¸Ã·ì϶µÄÆðÒòÊÇaptĬÈÏʹÓÃHTTPͨѶ £¬¶øÆätransport²½ÖèÖд¦ÖÃHTTP³Á¶¨ÏòµÄ´úÂëûÓÐÕýÈ·²é³­Ä³Ð©²ÎÊý £¬¹¥»÷Õß¿Éͨ¹ýÖÐÑëÈ˹¥»÷ʹÓÃαÔìÊðÃûÆ­¹ý¸Ã²é³­ £¬½ø¶øÔÚÓû§Ö÷»úÉÏ×°ÖÃËÁÒⷨʽ¡£ÓÉÓÚapt×ÔÉíÒѾ­»ñÈ¡ÁËrootȨÏÞ £¬¸Ã¶ñÒⷨʽ¿ÉÔÚrootȨÏÞÏÂÖ´ÐС£¸Ã·ì϶ӰÏìÁìÓò¼«Îª¿í·º £¬ËùÓÐʹÓÃÀϰ汾aptµÄÖ÷»ú¶¼Êܵ½Ó°Ïì¡£apt¿ª·¢ÈËÔ±ÒÑÔÚ°æ±¾1.4.9Öн¨¸´Á˸÷ì϶¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/linux-apt-http-hacking.html

3¡¢ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢ £¬Ô̺¬Óû§Ö§¸¶Êý¾Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÝZDNet±¨Â· £¬°²È«×êÑÐÈËÔ±Justin Paine·¢ÏÖÒ»¸öÍøÂç´ò¶Ä¼¯ÍŵÄElasticSearch·þÎñÆ÷δÉèÃÜÂë £¬µ¼Ö³¬¹ý1.08ÒÚ´ò¶ÄÐÅϢй¶¡£¸Ã·þÎñÆ÷ÉÏй¶µÄÓû§ÐÅÏ¢Ô̺¬¿Í»§µÄÕæÊµÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢µ®ÉúÈÕÆÚ¡¢ÍøÕ¾Óû§Ãû¡¢ÕÊ»§Óà¶î¡¢IPµØÖ·¡¢ä¯ÀÀÆ÷ºÍ²Ù×÷ϵͳÐÅÏ¢ÒÔ¼°ÉϴεǼÐÅÏ¢µÈ¡£´Ë±í £¬Paine»¹·¢ÏÖ1.08ÒÚÌõ´ò¶ÄÐÅÏ¢ £¬ÆäÖÐÔ̺¬¿Í»§µÄ´æ¿î¡¢È¡¿îÒÔ¼°Ö§¸¶ÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/online-casino-group-leaks-information-on-108-million-bets-including-user-details/

4¡¢Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯ £¬ÒÑϰȾԼ100ÍòÓû§

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ConfiantºÍMalwarebytesµÄ×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯ £¬¸Ã¹¥»÷»î¶¯×Ô1ÔÂ11ÈÕÒÔÀ´Ò»Ïò»îÔ¾ £¬ÀûÓÃÒþдÊõÀ´·Ö·¢ShlayerľÂí¡£×êÑÐÈËÔ±¹²¼ì²âµ½Á˳¬¹ý19Íò¸ö¶ñÒâ¸æ°× £¬Ô¤¼ÆÔ¼ÓÐ100ÍòÓû§Êܵ½Ó°Ïì¡£ÕâЩ¸æ°×ͼƬÖаµ²ØÁ˶ñÒâµÄJavaScript´úÂë £¬²¢¼Ù×°³ÉFlashÉý¼¶À´ÓÕʹÓû§µã»÷×°Öá£×êÑÐÈËԱƾ¾ÝÆäÓòÃû½«¹¥»÷Õß³ÆÎªVeryMal £¬µ«²¢Î´»ñµÃ¹¥»÷Õߵĸü¶àÓйØÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/malware-in-ad-based-images-targets-mac-users/141115/

5¡¢PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ £¬×°ÖÃÎļþ±»´«È¾

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


PHP°üÖÎÀíÆ÷PEAR£¨go-pear.phar£©µÄ¹ÙÍø£¨pear-php.net£©ÔâºÚ¿ÍÈëÇÖ £¬Æä×°ÖÃÎļþ±»´«È¾¡£Æ¾¾ÝPEAR°ä²¼µÄ°²È«²¼¸æ £¬Ô̺¬¶ñÒâ´úÂëµÄ×°ÖÃÎļþÖÁÉÙÔÚÆä¹ÙÍøÉÏ´æÔÚÁ˰ëÄêµÄ¹¦·ò¡£PEARÍŶӰµÊ¾ÔÚ½øÐе÷²é £¬ÒÔÈ·ÈϹ¥»÷µÄˮƽºÍÈëÇÖÊÇÈôºÎ²úÉúµÄ¡£Ö»ÓÐPEAR¹ÙÍøÉϵÄ×°ÖðüÊܵ½Ó°Ïì £¬GitHubÉÏÃæµÄ×°ÖÃÎļþδÊÜÇÖº¦¡£Óû§´Ë¿ÌÄܹ»´ÓGithub¸ßµÍÔØÐµĸɾ»°æ±¾1.10.10¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/php-pear-hacked.html

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù