ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ40ÖÜ

°ä²¼¹¦·ò 2019-10-14

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê10ÔÂ07ÈÕÖÁ13ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCobham plc EXPLORER 710ĬÈÏÑé֤ʹ´¦·ì϶; ·ºÎ¢OAϵͳ SQL×¢Èë·ì϶£»iTerm2Ô¶³Ì´úÂëÖ´Ðзì϶£»Microsoft Windows Secure Boot°²È«Èƹý·ì϶£»QEMU ahci_commit_buf()¿ÕÖ¸Õë¼ä½ÓÒýÓ÷ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǶíÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶£»Ponemon Institute°ä²¼¡¶2019ÄêÈ«ÇòSMBÍøÂ簲ȫÇé¿ö»ã±¨¡·£»VolusionÔâºÚ¿ÍÈëÇÖ£¬³¬¹ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°£»Ë¼¿ÆTalosÍŶӷ¢ÏÖNitroPDF´æÔÚ¶à¸öRCE·ì϶£»Imperva³ÆÆäÊý¾Ýй¶µÄÔ­ÒòÊÇAWS APIÃÜÔ¿±»µÁ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


> ³ÁÒª°²È«·ì϶Áбí


1. Cobham plc EXPLORER 710ĬÈÏÑé֤ʹ´¦·ì϶


Cobham plc EXPLORER 710´æÔÚÓë֮ǰÉ豸һÑùµÄROOTÃÜÂ룬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Î´ÊÚȨ½Ó¼û¡£

https://kb.cert.org/vuls/id/719689/


2. ·ºÎ¢OAϵͳ SQL×¢Èë·ì϶


·ºÎ¢E-cologyOA´æÔÚSQL×¢È밲ȫ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£

https://www.weaver.com.cn/cs/securityDownload.asp


3. iTerm2Ô¶³Ì´úÂëÖ´Ðзì϶


iTerm2 tmux¼¯³É¹¦ÄÜ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâºÅÁî¡£

https://kb.cert.org/vuls/id/763073/


4. Microsoft Windows Secure Boot°²È«Èƹý·ì϶


Microsoft Windows Secure BootûÓÐÕýÈ·µØÏ޶ȶԻ»ÊÔÖ°ÄܵĽӼû£¬ÔÊÐí±¾µØ¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡±»±£»¤µÄÄÚºËÄÚ´æ¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1368


5. QEMU ahci_commit_buf()¿ÕÖ¸Õë¼ä½ÓÒýÓ÷ì϶


QEMU ahci_commit_buf()´æÔÚ¿ÕÖ¸Õë¼ä½ÓÒýÓ÷ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬽øÐлؾø·þÎñ¹¥»÷¡£

https://access.redhat.com/security/cve/cve-2019-12067



> ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢¶íÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¶íÂÞ˹ýÌåµÄ±¨Â·£¬À´×Ô¶íÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌBeelineµÄ870ÍòÃû¿Í»§Êý¾ÝÔÚÍøÉÏÏúÊۺ͹²Ïí¡£ÕâЩÊý¾ÝÔ̺¬¾ßÌåµÄÓ×ÎÒÐÅÏ¢£¬ÈçÐÕÃû¡¢µØÖ·¡¢ÊÖ»úºÅÂëºÍ¼ÒÍ¥µç»°ºÅÂëµÈ¡£BeelineÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬²¢°µÊ¾Êý¾Ýй¶²úÉúÔÚ2017Ä꣬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2016Äê11ÔÂ֮ǰע²á¼ÒÍ¥¿í´øµÄ¶íÂÞ˹Óû§¡£ÆäʱBeelineÕÒµ½ÁËÊý¾Ýй¶µÄÔðÈÎÈË£¬µ«Î´¹«¿ª´ËÊÂÎñ¡£ÕâЩÊý¾ÝÒѾ­±»ÔÚÍøÉϹ²Ïí£¬Ô̺¬ÔÚTelegramƵ·ÉϹ²Ïí¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/data-breach-at-russian-isp-impacts-8-7-million-customers/


2¡¢Ponemon Institute°ä²¼¡¶2019ÄêÈ«ÇòSMBÍøÂ簲ȫÇé¿ö»ã±¨¡·


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÖܶþPonemon Institute°ä²¼µÄ¡¶2019ÄêÈ«ÇòSMBÍøÂ簲ȫÇé¿ö»ã±¨¡·£¬È«Çò66%µÄÖÐÓ×ÐÍÆóÒµ£¨SMB£©ÔÚ´Óǰ12¸öÔÂÄڻ㱨ÁËÍøÂç¹¥»÷ÊÂÎñ - ÆäÖÐ76%µÄÆóÒµ×ܲ¿Î»ÓÚÃÀ¹ú¡£Ponemon°µÊ¾ÕâÊÇÂ½ÐøµÚÈýÄêSMB»ã±¨µÄÍøÂ簲ȫÊÂÎñ³öÏÖ¡°ÏÔÖøÔö³¤¡±¡£µ±Ç°SMBÃæ¶ÔµÄ×î³£¼ûÍøÂç¹¥»÷´ó¾ÖÊÇÍøÂç´¹µö¡¢É豸ÈëÇÖ»ò±»µÁ¡¢Í´´¦ÇÔÈ¡¡£Ëæ×Å×Ô´øÉ豸°ì¹«£¨BYOD£©Ä£Ê½µÄÁ÷ÐУ¬É豸µÄ±»µÁÓÈÆä³ÉΪһ¸öÎÊÌâ¡£ÔÚ´Óǰ12¸öÔÂÖУ¬¹²ÓÐ63%µÄÆóÒµ»ã±¨ÁËÃô¸Ð¹«Ë¾Êý¾Ý»ò¿Í»§ÐÅÏ¢¶ª³öÊÂÎñ£¬¶øÔÚÃÀ¹úÕâÒ»±ÈÀýÉÏÉýÖÁ69%£¬ÏÔÖø¸ßÓÚËÄÄêǰµÄ50%¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/76-percent-of-us-businesses-have-experienced-a-cyberattack-in-the-past-year/


3¡¢VolusionÔâºÚ¿ÍÈëÇÖ£¬³¬¹ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝzdnetµÄÐÂÎÅ£¬ºÚ¿ÍÈëÇÖVolusionµÄ»ù´¡ÉèÊ©²¢´«²¼¶ñÒâ´úÂ룬µ¼Ö³¬¹ý6500¼Òµç×ÓÉ̵êÍøÕ¾ÊÜÓ°Ïì¡£¸ÃÊÂÎñÊÇÒ»¸öµäÐ͵ÄMAGECART¹©¸øÁ´¹¥»÷£¬¹¥»÷Õß»ñµÃÁËVolusionµÄGoogle Cloud»ù´¡ÉèÊ©½Ó¼ûȨÏÞ£¬²¢ÔÚÆäÖÐÅú¸ÄÁËJSÎļþ£¬Ôö³¤ÓÃÓڼͼÓû§ÐÅÓþ¿¨ÐÅÏ¢µÄ¶ñÒâ´úÂë¡£ÕâЩ¶ñÒâ´úÂë±»¼ÓÔØµ½»ùÓÚVolusionµÄÔÚÏßÉ̵êÖС£½ØÖÁĿǰ¶ñÒâ´úÂëÈÔÔÚVolusionµÄ·þÎñÆ÷ÉÏ£¬VolusionÉÐδ¶Ô´ËÊÂÎñ½øÐлØÓ¦¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-breach-volusion-and-start-collecting-card-details-from-thousands-of-sites/


4¡¢Ë¼¿ÆTalosÍŶӷ¢ÏÖNitroPDF´æÔÚ¶à¸öRCE·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÅû¶NitroPDFÖеĶà¸öÔ¶³Ì´úÂëÖ´Ðзì϶¡£Nitro PDFÔÊÐíÓû§ÔÚÆäÍÆËã»úÉϱ£Áô¡¢ÔĶÁºÍ±à×ëPDFÎļþ£¬¸Ã²úÆ··ÖΪÃâ·Ñ°æºÍÊշѰæ¡£Õâ´Î·¢Ïֵķì϶¶¼´æÔÚÓÚÊշѵÄPro°æÖС£·ì϶Ô̺¬jpeg2000 ssizDepthÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5045£©¡¢Page KidsÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5050£©¡¢ICCBasedÉ«²Ê¿Õ¼äÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5048£©¡¢CharProcsÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5047£©¡¢ jpeg2000 yTsizÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5046£©¼°Á÷³¤¶È½âÎöÖ°ÄÜÄÚ´æ°Ü»µ·ì϶£¨CVE-2019-5053£©¡£ÊÜÓ°ÏìµÄ°æ±¾ÎªNitroPDF 12.12.1.522¡£NitroPDFÉÐδ°ä²¼Óйؽ¨¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2019/10/vuln-spotlight-Nitro-PDF-RCE-bugs-sept-19.html


5¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔ­ÒòÊÇAWS APIÃÜÔ¿±»µÁ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬²¢ÔÚ½ñÌì°ä²¼ÁËÒ»·Ý¾ßÌåµÄ¹ýºó»ã±¨¡£¸Ã¹«Ë¾³ÆÕâ´ÎÊý¾Ýй¶µÄÔ­ÒòÊÇAWS APIÃÜÔ¿µÄ±»µÁ£¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâ±íÏνӵ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿½Ó¼ûImpervaµÄÔÆ»ù´¡ÉèÊ©£¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDS·þÎñ¡£Imperva²¢Î´Åû¶ÉÏÊöÊÂÎñ¼òÖ±ÇÐÈÕÆÚ£¬Òò¶øÉÐÎÞ·¨È·ÈϺڿͽӼûÁ˸ù«Ë¾µÄ·þÎñÆ÷¶à³¤¹¦·ò¡£ImpervaÊ×ϯִÐйٴÖÂÔ¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÁ¿£¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó£¬¿Í»§¸ü»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Ê飬²¢³ÁÐÂÌìÉúÁË1400¶à¸öImperva APIÃÜÔ¿¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/