ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ15ÖÜ

°ä²¼¹¦·ò 2019-04-15

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê4ÔÂ08ÈÕÖÁ14ÈÕ±¾Öܹ²ÊÕ¼°²È«·ì϶84¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇJuniper Networks Junos OSÃÜÂëÅú¸Ä·ì϶£»Ubiquiti Networks EdgeSwitchËÁÒâºÅÁîÖ´Ðзì϶; Apache Tomcat CVE-2019-0232ËÁÒâ´úÂëÖ´Ðзì϶£»Microsoft Office Access Connectivity Engine CVE-2019-0825ËÁÒâ´úÂëÖ´Ðзì϶£»Adobe AcrobatºÍReader CVE-2019-7117ÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÅ·Ã˳ÉÔ±¹ú½øÐÐÍøÂ簲ȫÑÝϰ£¬¼ÓǿӦ¶ÔÑ¡¾ÙÆÚ¼äµÄÍøÂçÍþв£»×êÑÐÈËÔ±ÀûÓÃ3D´òÓ¡µÄÖ¸ÎÆÄ£Ðͳɹ¦½âËøGalaxy S10 +£»WPA3Ò²²»°²È«£¿Dragonblood·ì϶¿ÉÆÆ½âWi-FiÃÜÂ룻Apache TomcatÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-0232£©£»TP-Link WR940NºÍWR941ND·ÓÉÆ÷ÁãÈÕ·ì϶£¬¿Éµ¼ÖÂÉ豸±»ÊÕÊÜ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ ¡£



³ÁÒª°²È«·ì϶Áбí



1. Juniper Networks Junos OSÃÜÂëÅú¸Ä·ì϶


Juniper Networks Junos OSÆôÓá®set system ports console insecure¡¯´æÔÚ°²È«·ì϶£¬±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»¡®set system root-authentication plain-text-password¡¯Åú¸ÄrootÃÜÂë ¡£
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10924&actp=METADATA 

2. Ubiquiti Networks EdgeSwitchËÁÒâºÅÁîÖ´Ðзì϶


Ubiquiti Networks EdgeSwitch´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Ö´ÐÐËÁÒâosºÅÁî ¡£
https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeSwitch-X-software-release-v1-1-1/ba-p/2731137 

3. Apache Tomcat CVE-2019-0232ËÁÒâ´úÂëÖ´Ðзì϶


Apache Tomcat enableCmdLineArguments´¦ÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë ¡£
https://vigilance.fr/vulnerability/Apache-Tomcat-code-execution-via-Windows-enableCmdLineArguments-28999 

4. Microsoft Office Access Connectivity Engine CVE-2019-0825ËÁÒâ´úÂëÖ´Ðзì϶


Microsoft Office´¦ÖÃÌØÊâÎļþ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐËÁÒâ´úÂë ¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0825 

5. Adobe AcrobatºÍReader CVE-2019-7117ÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶


Adobe AcrobatºÍReader´¦ÖÃÎļþ´æÔÚÀàÐÍ»ìºÏ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐËÁÒâ´úÂë ¡£
https://helpx.adobe.com/security/products/acrobat/apsb19-17.html 


 ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢Å·Ã˳ÉÔ±¹ú½øÐÐÍøÂ簲ȫÑÝϰ£¬¼ÓǿӦ¶ÔÑ¡¾ÙÆÚ¼äµÄÍøÂçÍþв

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ΪÁËÓ­½Ó¼´½«ÔÚ2019Äê5ÔÂ23ÈÕÖÁ26ÈÕ½øÐеÄÅ·ÃËÒé»áÑ¡¾Ù£¬Å·ÃËÍøÂ簲ȫ¾Ö£¨ENISA£©¼°Å·Ã˳ÉÔ±¹ú½áºÏ½øÐÐÁËÒ»ÏîÃûΪEU ELEx19µÄÑÝϰ£¬ÒÔ¼ÓǿӦ¶ÔÑ¡¾ÙÆÚ¼äµÄÍøÂ簲ȫÍþв ¡£Æ¾¾ÝÅ·ÃËÒé»á£¬ÕâÏîÑÝϰµÄÖ¸±êÊÇÕÒµ½Ô¤·À¡¢¼ì²â¼°»º½âÓ°ÏìÅ·ÃËÑ¡¾ÙµÄÍøÂ簲ȫÊÂÎñµÄ²½Öè ¡£ÕâÏîÑÝϰÄܹ»Ê¹Å·Ã˳ÉÔ±¹ú²âÊÔÆäΣ»úÏìÓ¦¹æ»®£¬²¢Ìá¸ß¿ç¾³Ð­µ÷ÏìÓ¦µÄÄÜÁ¦ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/eu-states-test-and-strengthen-readiness-for-election-cyber-threats/

2¡¢×êÑÐÈËÔ±ÀûÓÃ3D´òÓ¡µÄÖ¸ÎÆÄ£Ðͳɹ¦½âËøGalaxy S10 +


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÈýÐǵij¬Éù²¨Ö¸ÎƼø±ð¿Éͨ¹ý3D´òÓ¡µÄÖ¸ÎÆÄ£ÐÍÀ´Èƹý ¡£Æ¾¾ÝImgurÓû§darkshark°ä²¼µÄÎÄÕ£¬ËûÓÃÖÇÄÜÊÖ»ú´Ó¾Æ±­µÄ²àÃæÅÄÏÂÁËËûµÄÖ¸ÎÆÕÕÆ¬£¬¶øºóʹÓÃ3DS MaxÈí¼þ´´½¨3DÖ¸ÎÆÄ£ÐÍ£¬²¢Ê¹ÓÃAnyCubic Photon LCD´òÓ¡»ú´òÓ¡³öÖ¸ÎÆÄ£ÐÍ£¬Õâ¿éÖ¸ÎÆÄ£Ðͼ´¿É½âËøGalaxy S10 + ¡£

Ô­ÎÄÁ´½Ó£º
https://mashable.com/article/samsung-fingerprint-scanner-fooled-3d-printing/#4pCm_5_D_PqO

3¡¢WPA3Ò²²»°²È«£¿Dragonblood·ì϶¿ÉÆÆ½âWi-FiÃÜÂë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚ4ÔÂ10ÈÕ°ä·¢µÄһƪÂÛÎÄÖУ¬°²È«×êÑÐÈËÔ±Mathy VanhoefºÍEyal Ronen·¢ÏÖWPA3-PersonalºÍ̸´æÔÚзì϶Dragonblood£¬ÕâЩ·ì϶¿ÉÔÊÐíDZÔÚ¹¥»÷ÕßÆÆ½âWi-FiÃÜÂë²¢ÇÔÈ¡¼ÓÃÜÁ÷Á¿ ¡£ÔÚÂÛÎÄÖÐ×êÑÐÈËÔ±¾ßÌå½éÉÜÁËWPA3µÄÁ½ÖÖÉè¼ÆÈ±µã£ºÒ»ÖÖÊǽµ¼¶¹¥»÷£¬Ò»ÖÖÊDzàÐÅ·й¶ ¡£Ê×ÏÈWPA3Ìṩ¹ý¶ÉģʽÒÔÖ§³Ö¾ÉÉ豸£¬µ«¹¥»÷ÕßÄܹ»ÀÄÓÃÕâЩÉèÖÃÀ´ÆÈʹWPA3É豸ʹÓò»°²È«µÄWPA2µÄ4´ÎÎÕÊÖ£¬²¢ÇÒÕâÖÖ½µ¼¶¹¥»÷Ö»±ØÒªÖªÂ·WPA3ÍøÂçµÄSSID ¡£Æä´Î×êÑÐÈËÔ±½éÉÜÁËÁ½ÖÖ²àÐÅ·¹¥»÷-»ùÓÚ»º´æ£¨CVE-2019-9494£©ºÍ»ùÓÚʱÐò£¨CVE-2019-9494£©£¬¿ÉÓÃÓÚ»ñÈ¡Wi-FiÃÜÂëºÍÇÔÈ¡¼ÓÃÜ´«ÊäµÄÃô¸ÐÐÅÏ¢ ¡£×êÑÐÈËÔ±½«ÔÚGitHubÉϰ䲼PoC²âÊÔ¹¤¾ß ¡£Wi-FiͬÃËÈ·ÈϳÆÔÚÓ빩¸øÉ̺Ï×÷½¨²¹ÏÖÓеÄWPA3ÈÏÖ¤É豸 ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/04/wpa3-hack-wifi-password.html

4¡¢Apache TomcatÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-0232£©


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


4ÔÂ10ÈÕApache¹Ù·½°ä²¼¹«¸æ³Æ½«ÔÚа汾Öн¨¸´Ô¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-0232£© ¡£ÓÉÓÚJREÔÚ½«²ÎÊý´«µÝµ½Windows»·¾³Ê±CGI ServletÖдæÔÚÊäÈëÑéÖ¤ÃýÎ󣬵¼ÖÂÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÒªÇóÒÔTomcatµÄȨÏÞÔÚϵͳÉÏ×¢ÈëºÍÖ´ÐÐËÁÒâOSºÅÁî ¡£ÊÜÓ°ÏìµÄTomcat°æ±¾Ô̺¬9.0.13¡¢9.0.14ºÍ9.0.16 ¡£Apache¹Ù·½ÉÐδ°ä²¼½¨¸´²¹¶¡£¬µ«Óû§¿Éͨ¹ý½ûÓÃenableCmdLineArgumentsÑ¡Ïîһʱ½øÐзÀ»¤ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.cybersecurity-help.cz/vdb/SB2019041101?affChecked=1

5¡¢TP-Link WR940NºÍWR941ND·ÓÉÆ÷ÁãÈÕ·ì϶£¬¿Éµ¼ÖÂÉ豸±»ÊÕÊÜ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IBM Security×êÑÐÍŶӷ¢ÏÖTP-Link TL-WR940NºÍTL-WR941NDÁ½¿î·ÓÉÆ÷´æÔÚ»º³åÇøÒç¶Âí½Å£¬¿Éµ¼Ö¶ñÒâµÚÈý·½Ô¶³Ì½ÚÔì¸ÃÉ豸 ¡£¸Ã·ì϶ÓëÉ豸µÄWeb½ÚÔìÃæ°åÓйØ£¬¹ÌȻƾ¾ÝTP-LinkµÄ·ÓÉÆ÷ÓйØÎĵµ£¬ÕâÁ½ÖÖÐͺŶ¼ÒÑÍ£²ú£¬µ«ËüÃÇÈÔÄܹ»´ÓTargetºÍWalmartµÈÁãÊÛÉÌ´¦²É°ì ¡£TP-LinkÓÚ3ÔÂ12ÈÕ°ä²¼Á˹̼þ¸üУ¬½¨ÒéÓû§¾¡¿ì½øÐиüР¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/tp-link-routers-vulnerable-to-zero-day-buffer-overflow-attack/143575/