ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ25ÖÜ
°ä²¼¹¦·ò 2019-07-01±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê6ÔÂ24ÈÕÖÁ30ÈÕ¹²ÊÕ¼°²È«·ì϶47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇActiontec WEB6000Q rootȨÏÞ½Ó¼û·ì϶£»ÖÂÔ¶OAÎļþÉÏ´«´úÂëÖ´Ðзì϶£»Couchbase Sync GatewayËÁÒâ´úÂëÖ´Ðзì϶£»Cesanta Mongoose ¡®parse_mqtt()¡¯º¯Êý»º³åÇøÒç¶Âí½Å£»ABB PB610 IDAL HTTP server°²È«Èƹý´úÂëÖ´Ðзì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇmacOSË«³Á¿ªÊÍ·ì϶£¬¿Éµ¼ÖÂÌáȨ¼°´úÂëÖ´ÐУ»ÃÀý֤ʵÃÀ¶ÔÒÁÀʵ¼µ¯½ÚÔìϵͳÌáÒéÍøÂç¹¥»÷£»IBM WebSphereÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-4279£©£»BGP·ÓÉй©µ¼ÖÂCloudflareºÍAmazon AWSÍøÂçÖжϣ»FireEye°ä²¼Q1 µç×ÓÓʼþÍþв»ã±¨£¬´¹µö¹¥»÷Ôö³¤17%¡£
³ÁÒª°²È«·ì϶Áбí
Actiontec WEB6000Q Quantenna WiFi Controller´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄtelnetÒªÇó£¬Äܹ»ROOTȨÏÞ½Ó¼û¡£
http://seclists.org/fulldisclosure/2019/Jun/2
2. ÖÂÔ¶OAÎļþÉÏ´«´úÂëÖ´Ðзì϶
ÖÂÔ¶OAÉÏ´«ÎļþÖ°ÄÜ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÌá·´Ä¿ÒâÎļþ²¢Ö´ÐÐËÁÒâ´úÂë¡£
http://www.seeyon.com/
3. Couchbase Sync GatewayËÁÒâ´úÂëÖ´Ðзì϶
Couchbase Sync Gateway REST API´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿É×¢ÈëÆäËûN1QLÓï¾ä¡£
https://docs.couchbase.com/sync-gateway/2.5/release-notes.html
4. Cesanta Mongoose ¡®parse_mqtt()¡¯º¯Êý»º³åÇøÒç¶Âí½Å
Cesanta Mongoose mg_mqtt.c ¡®parse_mqtt()¡¯º¯Êý´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://github.com/cesanta/mongoose/releases/tag/6.15
5. ABB PB610 IDAL HTTP server°²È«Èƹý´úÂëÖ´Ðзì϶
ABB PB610 IDAL HTTP server´æÔÚÄÚ´æ·ÛËé·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ý°²È«ÏÞ¶ÈÖ´ÐÐËÁÒâ´úÂë¡£
https://library.e.abb.com/public/b0021d2ab9ba4e3ab14d7c2796f5908e/ABB-Advisory_3ADR010377_2.pdf
³ÁÒª°²È«ÊÂÎñ×ÛÊö
Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±ÔÚmacOSÖз¢ÏÖÒ»¸öË«³Á¿ªÊÍ·ì϶£¨CVE-2019-8635£©¡£¸Ã·ì϶ÊÇÓÉAMD×é¼þÖеÄÄÚ´æ°Ü»µÎÊÌâÒýÆðµÄ£¬ÈôÊdzɹ¦ÀûÓ㬹¥»÷Õß¿ÉÌáȨÖÁrootȨÏÞ²¢ÔÚϵͳÉÏÖ´ÐжñÒâ´úÂë¡£¸ÃCVE IDº¸ÇÁ½¸öË«³Á¿ªÊÍ·ì϶£¬µÚÒ»¸ö´æÔÚÓÚAMDRadeonX4000_AMDSIGLContextÀàµÄdiscard_StretchTex2Tex²½ÖèÖУ¬µÚ¶þ¸öÊǸÃÀàµÄprocess_StretchTex2Tex²½Öè¡£AppleÔÚmacOS Mojave 10.14.4¸üÐÂÖн¨¸´Á˸÷ì϶¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-8635-double-free-vulnerability-in-apple-macos-lets-attackers-escalate-system-privileges-and-execute-arbitrary-code/
2¡¢ÃÀý֤ʵÃÀ¶ÔÒÁÀʵ¼µ¯½ÚÔìϵͳÌáÒéÍøÂç¹¥»÷
ƾ¾ÝÖÜÈÕÃÀÁªÉçµÄ±¨Â·£¬ÃÀ¹úÍøÂç˾ÁÔÚ×ÜÍ³ÌØÀÊÆÕµÄÖ±½ÓºË׼϶ÔÒÁÀʵľüÊÂITϵͳ·¢ÆðÁËÍøÂç¹¥»÷¡£ÃÀÁªÉçÔ®ÒýÁËÁ½ÃûÄÚ²¿ÐÂÎÅÆðÔ´²¢Í¨¹ýµÚÈýλÎå½Ç´óÂ¥¹ÙÔ±¶ÔÕâÒ»ÐÂÎŽøÐÐÁËÈ·ÈÏ¡£ÃÀ¹úÍøÂç˾ÁÕë¶ÔµÄÊÇÒÁÀʾü·½ÓÃÀ´½ÚÔìµ¼µ¯·¢ÉäÆ÷µÄÍÆËã»úϵͳ¡£¡¶Å¦Ô¼Ê±±¨¡·µÄ±¨Â·ÏÔʾ£¬ÕâЩ¹¥»÷ÔçÔÚ¼¸ÖÜǰ¾ÍÓÐÁË´òË㣬ÒâÔÚ»ØÓ¦Õë¶ÔÓÍÂֵĹ¥»÷ÒÔ¼°×î½üÒ»¼ÜÃÀ¹úÎÞÈË»ú±»»÷ÂäµÄÊÂÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-launches-cyber-attack-aimed-at-iranian-rocket-and-missile-systems/
3¡¢IBM WebSphereÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-4279£©
IBM½¨¸´WebSphere Application ServerÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-4279£©£¬¹¥»÷Õß¿Éͨ¹ý·¢Ë;«ÐÄ»ú¹ØµÄÐòÁл¯¶ÔÏó´¥·¢¸Ã·ì϶£¬×îÖÕµ¼ÖÂÔÚ·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬WebSphere Application Server ND°æ±¾9.0ºÍ°æ±¾8.5¡¢WebSphere Virtual Enterprise V7.0¡£ÓÉÓÚ½üÈո÷ì϶µÄ¹¥»÷·½Ê½ÒÑÔÚÒ°±í´«²¼£¬½¨ÒéÓû§ÊµÊ±½øÐзÀ»¤¡£
ÔÎÄÁ´½Ó£º
https://www-01.ibm.com/support/docview.wss?uid=ibm10883628
4¡¢BGP·ÓÉй©µ¼ÖÂCloudflareºÍAmazon AWSÍøÂçÖжÏ
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/technology/bgp-route-leak-causes-cloudflare-and-amazon-aws-problems/
5¡¢FireEye°ä²¼Q1 µç×ÓÓʼþÍþв»ã±¨£¬´¹µö¹¥»÷Ôö³¤17%
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/offers/rpt-email-threat.html


¾©¹«Íø°²±¸11010802024551ºÅ