ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ42ÖÜ

°ä²¼¹¦·ò 2019-10-28

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê10ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼°²È«·ì϶43¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇRittal Chiller SK 3232-SeriesδÊÚȨ½Ó¼û·ì϶; Xiaomi Mi WiFi R3GºÅÁî×¢Èë·ì϶£»Google Chrome Blink CVE-2019-13700»º³åÇøÒç¶Âí½Å£»PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´Ðзì϶£»Fortinet FortiMail web console²»ÕýÈ·½Ó¼û½ÚÔì·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÈËÔ±Åû¶´æÔÚ4ÄêµÄLinux Wi-Fi»º³åÇøÒç¶Âí½Å£»AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Ç÷Ïò¿Æ¼¼ATTK¹¤¾ß°ü´æÔÚËÁÒâ´úÂëÖ´Ðзì϶£»CyberX°ä²¼È«ÇòÎïÁªÍø/ICS·çÏջ㱨£¨2020°æ£©£»Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ´æÔÚDLL½Ù³Ö·ì϶¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí



1. Rittal Chiller SK 3232-SeriesδÊÚȨ½Ó¼û·ì϶
Rittal Chiller SK 3232-Series WEB½Ó¿Ú´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Î´ÊÚȨ¸ü¸ÄÅäÖ㬴ò¿ª»ò¹Ø¹ØÔìÀäÉ豸¡£
https://www.us-cert.gov/ics/advisories/icsa-19-297-01

2. Xiaomi Mi WiFi R3GºÅÁî×¢Èë·ì϶
Xiaomi Mi WiFi R3G±¸·ÝÎļþÉÏ´«´¦ÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâOSºÅÁî¡£
https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py

3. Google Chrome Blink CVE-2019-13700»º³åÇøÒç¶Âí½Å
Google Chrome Blink´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐËÁÒâ´úÂë¡£
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html

4. PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´Ðзì϶
ÔÚʹÓÃNginx + php-fpm·þÎñÆ÷ʱ£¬fastcgi_split_path_info´¦ÖÃ%0aʱÓöµ½»»Ðзû \n µ¼ÖÂPATH_INFOΪ¿Õ¡£¶øphp-fpmÔÚ´¦Öà PATH_INFOΪ¿ÕµÄÇé¿öÏ£¬´æÔÚÂß¼­È±µã£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://lab.wallarm.com/php-remote-code-execution-0-day-discovered-in-real-world-ctf-exercise/

5. Fortinet FortiMail web console²»ÕýÈ·½Ó¼û½ÚÔì·ì϶
Fortinet FortiMail web console´æÔÚ²»ÕýÈ·½Ó¼û½ÚÔì·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÌáÉýȨÏÞ¡£
https://fortiguard.com/psirt/FG-IR-19-237


>³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢×êÑÐÈËÔ±Åû¶´æÔÚ4ÄêµÄLinux Wi-Fi»º³åÇøÒç¶Âí½Å


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GithubÊ×ϯ°²È«¹¤³ÌʦNico Waisman·¢ÏÖLinux rtlwifiÇý¶¯·¨Ê½ÖдæÔÚÒ»¸öÓµÓÐ4Ä꺹ÇàµÄÑϳÁ·ì϶£¨CVE-2019-17666£©£¬¹¥»÷Õß¿ÉÀûÓø÷ì϶ÈëÇÖÒ×Êܹ¥»÷µÄϵͳ¡£rtlwifiÇý¶¯·¨Ê½ÓÃÓÚÔÊÐíRealtek Wi-FiÄ£¿éÓëLinuxϵͳ½øÐÐͨѶ£¬¹¥»÷Õß¿ÉÄÜÀûÓó¤¶È²»ÕýÈ·µÄÊý¾Ý°ü´¥·¢»º³åÇøÒç³ö£¬Ê¹µÃLinux±ÀÀ£»òÊÇÔ¶³ÌÖ´ÐдúÂë¡£¾Ý³Æ¸Ã·ì϶ӰÏìÁËLinux°æ±¾5.3.6£¬¸ÃÎÊÌâ×Ô´Ó2015ÄêÒÔÀ´¾ÍÒ»Ïò´æÔÚ¡£LinuxÄÚºËÍŶÓÒѾ­¿ª·¢ÁËÒ»¸öÔÚ¶©ÕýµÄ½¨¸´²¹¶¡£¬µ«¸Ã²¹¶¡ÉÐδÔ̺¬ÔÚLinuxÄÚºËÖС£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/critical-linux-wi-fi-bug-system-compromise/149325/

2¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßµÄÖ÷ÕÅËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢ÏÖÁËÕâÒ»¹¥»÷ÊÂÎñ£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öһʱVPNÕË»§½Ó¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬µ«ºÚ¿Í³É¹¦½øÐÐÁËÌáȨ¡£¶Ô¹¥»÷ÕßʹÓÃµÄ±í²¿IPµÄ·ÖÎöÏÔʾ£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»ÏòÊÔͼͨ¹ýVPNÀ´½Ó¼ûÄÚÍø¡£Avast¶Ô¹¥»÷»î¶¯½øÐÐÁË¼à¿Ø£¬Ö±µ½10ÔÂ15ÈղŹعظÃһʱVPNÕË»§¡£Ä¿Ç°ÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Äê²úÉúµÄ¹¥»÷´æÔÚ¹ØÁª¡£AvastÔÚ¶ÔCCleaner½øÐÐÉó²éÖ®ºó³Áа䲼Á˸üС£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

3¡¢Ç÷Ïò¿Æ¼¼ATTK¹¤¾ß°ü´æÔÚËÁÒâ´úÂëÖ´Ðзì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÇ÷Ïò¿Æ¼¼·ÀÍþв¹¤¾ß°ü£¨ATTK£©´æÔÚÒ»¸öËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2019-9491£©£¬¹¥»÷Õß¿ÉÀûÓô˷ì϶ÔÚÖ¸±êWindowsϵͳÉÏÔËÐжñÒâÈí¼þ¡£Æ¾¾ÝÇ÷Ïò¿Æ¼¼°ä²¼µÄ°²È«²¼¸æ£¬ÈôÊǶñÒâÈí¼þ×÷Õß´ÕÇɽ«¶ñÒâÈí¼þ¶¨ÃûΪcmd.exe»òregedit.exe£¬ÄÇôATTK½«»á¼ÓÔØ²¢ÔËÐиÃexeÎļþ¡£ÓÉÓÚATTKÊÇÓɾ­¹ýÑéÖ¤µÄ¿¯Ðз½ÊðÃûµÄ£¬Òò¶ø¿ÉÈÆ¹ýÈκÎMOTW°²È«ÖҸ棬¹¥»÷ÕßÉõÖÁÄܹ»½«ATTK×÷ΪһÖÖÓÆ¾ÃÐÔ»úÔì¡£Ç÷Ïò¿Æ¼¼ÏÖÒѽ«ËùÓÐATTK ¸üÐÂÖÁ1.62.0.1223°æ±¾£¬µ«ÉÐδ°ä²¼¼¼Êõϸ½Ú¡£ 


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92818/hacking/trend-micro-anti-threat-toolkit-flaw.html

4¡¢CyberX°ä²¼È«ÇòÎïÁªÍø/ICS·çÏջ㱨£¨2020°æ£©


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝCyberXµÄ¡¶È«ÇòÎïÁªÍø/ICS·çÏջ㱨¡·2020°æ£¬ºÜ¶à¹¤ÒµÆóÒµÖÐÒÀÈ»´æÔÚ¹ýÆÚµÄ²Ù×÷ϵͳ£¬Õâ´øÀ´ÁËÑϳÁµÄ·çÏÕ¡£¸Ã»ã±¨ÊÇ»ùÓÚÈ«Çò1800¶à¸ö¹¤ÒµÆóÒµ»·¾³ÖдÓ2018Äê10ÔÂÖÁ2019Äê10ÔÂÖ®¼äÍøÂçµÄÊý¾Ý¡£µ÷²é¶ÔÏóÖÐÓÐ62%µÄÉ豸ÔËÐеÄÊǹýÆÚÇÒ²»ÊÜÖ§³ÖµÄWindows°æ±¾£¨ÀýÈçWindows XPºÍ2000£©£¬ÈôÊǰѼ´½«ÔÚ2020Äê1ÔÂÖÕ³¡Ö§³ÖµÄWindows 7ÍÆËãÔÚÄÚ£¬ÔòÕâÒ»Êý×ÖÉÏÉýÖÁ71£¥¡£CyberX»¹·¢ÏÖ£¬ÔÚ64£¥µÄÇé¿öÏÂÆóÒµÔÚÍøÂç´«ÊäÖÐδ¶ÔÃÜÂë½øÐмÓÃÜ£¬ÕâʹµÃ¹¥»÷Õ߸üÈÝÒ׽ػñÃÜÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/outdated-oss-still-present-many-industrial-organizations-report

5¡¢Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ´æÔÚDLL½Ù³Ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SafeBreach Labs°²È«×êÑÐÈËÔ±·¢ÏÖAvast¡¢AVGºÍAviraɱ¶¾Èí¼þ´æÔÚDLL½Ù³Ö·ì϶£¬¿ÉÔÊÐí¹¥»÷Õß¼ÓÔØ¶ñÒâDLLÎļþÒÔÈÆ¹ý¼ì²âºÍÌáȨ¡£¸Ã·ì϶£¨CVE-2019-17093£©Ó°ÏìÁ˰汾19.8ÒÔϵÄËùÓÐAvastºÍAVGɱ¶¾Èí¼þ£¬·ì϶ԭÒòÊÇAVGSvc.exeÊÔͼÔÚÆô¶¯Ê±¼ÓÔØDLL£¬µ«ËüÔÚÃýÎóµÄÎļþ¼ÐÖÐËÑË÷Îļþ£¨ÀýÈçC£º\Program Files\System32\£©£¬Ê¹µÃ¹¥»÷ÕßÄܹ»½«Í¬ÃûDLL·ÅÈë¸ÃÎļþ¼ÐÖдӶøµ¼Ö¸ÃDLL±»ÒÔSYSTEMÌØÈ¨¼ÓÔØ¡£×êÑÐÈËÔ±ÔÚAvira Antivirus 2019Öз¢ÏÖÁËÀàËÆµÄÎÊÌ⣨CVE-2019-17449£©¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/avast-avira-products-vulnerable-dll-hijacking