ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ13ÖÜ

°ä²¼¹¦·ò 2019-04-01

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê3ÔÂ25ÈÕÖÁ31ÈÕ¹²ÊÕ¼°²È«·ì϶53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Tomcat HTTP/2»Ø¾ø·þÎñ·ì϶£»DedeCMSËÁÒâÓû§ÃÜÂë³ÁÖ÷ì϶; Forcepoint Email SecurityÃÜÂë³ÁÖ÷ì϶£»Green Hills INTEGRITY RTOS IPWEBSÕ»Òç¶Âí½Å£»Dell EMC NetWorker CVE-2017-8023ËÁÒâºÅÁîÖ´Ðзì϶ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇUCä¯ÀÀÆ÷Ò×ÔâÖÐÑëÈ˹¥»÷£¬²¨¼°5ÒÚÓû§£»Õë¶Ô»ªË¶Live UpdateµÄ¹©¸øÁ´¹¥»÷£¬»òÓ°Ï쳬¹ý100ÍòÓû§£»TP-Link SR20·ÓÉÆ÷0day£¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐУ»Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬°ä²¼30¶à¸öÐéα¾¯±¨ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ ¡£



³ÁÒª°²È«·ì϶Áбí


1. Apache Tomcat HTTP/2»Ø¾ø·þÎñ·ì϶


Apache Tomcat HTTP/2ʵÏÖ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷ ¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199


2. DedeCMSËÁÒâÓû§ÃÜÂë³ÁÖ÷ì϶
DedeCMS member/resetpassword.phpÎļþûÓÐÕýÈ·µØÑéÖ¤key²ÎÊý£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɳÁÖÃËÁÒâÓû§µÄÃÜÂë ¡£
https://blog.csdn.net/yalecaltech/article/details/88594388


3. Forcepoint Email SecurityÃÜÂë³ÁÖ÷ì϶


Forcepoint Email SecurityÃÜÂë³ÁÖÃÖ°ÄÜ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬳ÁÖÃÃÜÂë ¡£
https://support.forcepoint.com/KBArticle?id=000016655


4. Green Hills INTEGRITY RTOS IPWEBSÕ»Òç¶Âí½Å


Green Hills INTEGRITY RTOS IPWEBS½âÎöhttpÑé֤ͷ´æÔÚÕ»Òç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë ¡£
https://github.com/bl4ckic3/GHS-Bugs


5. Dell EMC NetWorker CVE-2017-8023ËÁÒâºÅÁîÖ´Ðзì϶


Dell EMC NetWorker RPC·þÎñ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»nsrexecd·þÎñȨÏÞÖ´ÐÐËÁÒâºÅÁî ¡£
https://packetstormsecurity.com/files/152245/EMC-Networker-Remote-Code-Execution.html



 ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢UCä¯ÀÀÆ÷Ò×ÔâÖÐÑëÈ˹¥»÷£¬²¨¼°5ÒÚÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý°²È«³§ÉÌDr. Web°ä²¼µÄÒ»·Ýл㱨£¬UCä¯ÀÀÆ÷ÖÁÉÙ´Ó2016ÄêÆðÍ·¾ÍÓµÓÐÒ»¸ö°µ²ØµÄÖ°ÄÜ£¬¿É´Ó¹«Ë¾µÄ·þÎñÆ÷ÏòÓû§µÄAndroidÉ豸ÏÂÔØ²¢×°ÖÃеĿâºÍÄ£¿é ¡£ÓÉÓÚ´ËÖ°ÄÜÊÇ»ùÓÚHTTPºÍ̸£¬Ê¹µÃ¹¥»÷Õß¿ÉÖ´ÐÐMiTM¹¥»÷²¢ÏòÓû§ÍÆËͶñÒâÄ£¿é ¡£UCä¯ÀÀÆ÷²¢Î´²é³­²å¼þµÄÊðÃû£¬ÕâÒâζ×ŶñÒâÄ£¿é½«»áÎÞÐèÑéÖ¤¶øÖ±½ÓÆô¶¯ ¡£´Ë±í£¬ÕâÒ»Ö°ÄÜҲΥ·´ÁËGoogle PlayµÄ°²È«Õþ²ß ¡£ËùÓа汾µÄUCä¯ÀÀÆ÷ºÍUC Miniä¯ÀÀÆ÷¾ùÊÜÓ°Ï죬¾Ý³Æ¸Ãä¯ÀÀÆ÷ÔÚÖйúºÍÓ¡¶Å×µÓг¬¹ý5ÒÚÓû§ ¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/03/uc-browser-android-hacking.html


2¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©¸øÁ´¹¥»÷£¬»òÓ°Ï쳬¹ý100ÍòÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


2019Äê1Ô¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÒ»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄ¸´ÔÓ¹©¸øÁ´¹¥»÷£¬Õâ´Î¹¥»÷²úÉúÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬¿ÉÄÜÓ°ÏìÁËÈ«Çò³¬¹ý100ÍòÓû§ ¡£»ªË¶Live UpdateÊÇԤװÔÚ´óÎÞÊý»ªË¶µçÄÔÉϵÄʵÓ÷¨Ê½£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯·¨Ê½µÈ×é¼þ ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÖ¸±êMACµØÖ·µÄÁÐ±í£¨ÊýÁ¿Îª600¸öÒÔÉÏ£©£¬µ«Ö¸±êȺÌåµÄÉí·ÝÉв»Ã÷È· ¡£ÓÉÓÚÑù±¾ÊÇÓúϷ¨Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬µ¼Ö¸ù¥»÷³Ö¾Ãδ±»·¢ÏÖ ¡£Ä¿Ç°µÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ ¡£


Ô­ÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/


3¡¢TP-Link SR20·ÓÉÆ÷0day£¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐÐ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹È¸è¿ª·¢ÈËÔ±GarretÅû¶ÁËTP-Link SR20ÖÇÄܼҾÓ·ÓÉÆ÷ÖеÄ0day£¬¸Ã·ì϶ÔÊÐíÍ³Ò»ÍøÂçÖеÄDZÔÚ¹¥»÷ÕßÖ´ÐÐËÁÒâ´úÂë ¡£GarretÏòTP-Link»ã±¨Á˸÷ì϶£¬µ«ÔÚ90ÌìÄÚ²¢Î´µÃµ½TP-LinkµÄ»Ø¸´£¬Òò¶øËû°ä²¼ÁËÕâÒ»·ì϶ ¡£¸Ã·ì϶ÔÊÐí¹¥»÷ÕßÒÔrootÉí·ÝÖ´ÐÐËÁÒâºÅÁGarret»¹°ä²¼ÁËÓйØPoC ¡£½ØÖÁĿǰTP-LinkÉÐδ½øÐлØÓ¦ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zero-day-tp-link-sr20-router-vulnerability-disclosed-by-google-dev/


4¡¢Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚÉÏÖÜÔâµ½ÀÕË÷Èí¼þLockerGoga¹¥»÷Ö®ºó£¬Å²ÍþÂÁ³ö²úÉÌNorsk HydroÈÔÔÚ¸´Ô­ÆäITϵͳ ¡£¸Ã¹«Ë¾³Æ»ùÓڸ߲ãÆÀ¹À£¬³õ²½¹À¼ÆÍøÂç¹¥»÷Ôì³ÉµÄËðʧԼΪ3-3.5ÒÚŲÍþ¿ËÀÊ£¨ºÏ3500-4100ÍòÃÀÔª£©£¬ÖØÒªËðʧÆðÔ´ÓÚÀûÈóºÍÂÁ²Ä¼·Ñ¹ÒµÎñµÄËðʧ ¡£¸Ã¹«Ë¾³ÆÂÁ²Ä¼·Ñ¹½â¾ö¹æ»®ÒѾ­¸´Ô­ÁË70-80%£¬µ«¹¹ÖþϵͳҵÎñÈÔδ¸´Ô­ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/norsk-hydro-ransomware-costs-hit-1-1/


5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬°ä²¼30¶à¸öÐéα¾¯±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


3ÔÂ12ÈÕÁ賿2:30×óÓÒ£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©°ä²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬ÒýÆðÁ˱¾µØ¾ÓÃñµÄ·¢¼± ¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancaster°ä²¼µÄ£¬ÆäÓàµÄÔòÊÇÔÚDeSoto ¡£Ö®ºóÕâЩϵͳһÏò´¦ÓÚÍÑ»ú״̬£¬Ö±ÖÁ3ÔÂ17ÈղŸ´Ô­Õý³£·þÎñ ¡£¾¯·½ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ½øÐе÷²é ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html