ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ51ÖÜ
°ä²¼¹¦·ò 2019-12-30>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê12ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼°²È«·ì϶43¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇPalo Alto Networks PA-7080 ROOTȨÏÞ»ñÈ¡·ì϶; Mozilla Network Security Services»º³åÇøÒç¶Âí½Å£»Docker docker-credential-secretserviceÄÚ´æÃýÎóÀûÓÃȨÏÞÌáÉý·ì϶£»TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´Ðзì϶£»D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´Ðзì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢£»CitrixËùÓвúÆ·´æÔÚ´úÂëÖ´Ðзì϶£¨CVE-2019-19781£©£»¶íÂÞ˹µ±¾Ö°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ£»P2P½©Ê¬ÍøÂçMoziÖØÒªÕë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷£»°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬¹È¸èÆ»¹û´¹Î£Ï¼ܡ£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
>³ÁÒª°²È«·ì϶Áбí
1. Palo Alto Networks PA-7080 ROOTȨÏÞ»ñÈ¡·ì϶
Palo Alto Networks PA-7080ûÓÐÕýÈ·Ï޶ȶÔLog Forwarding CardͨѶµÄÏÞ¶È£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡rootȨÏÞ¡£
https://nvd.nist.gov/vuln/detail/CVE-2019-17440
2. Mozilla Network Security Services»º³åÇøÒç¶Âí½Å
Mozilla Network Security Services cryptographic primitives³¤¶È´¦ÖôæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâWEBÒ³£¬ÓÕʹҪÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://access.redhat.com/security/cve/cve-2019-17006
3. Docker docker-credential-secretserviceÄÚ´æÃýÎóÀûÓÃȨÏÞÌáÉý·ì϶
Docker docker-credential-secretservice´æÔÚÁ½´Î¿ªÊÍ·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÌáÉýȨÏÞ²¢Ö´ÐдúÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-1030/
4. TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´Ðзì϶
TigerVNC ZlibInStream´æÔÚÄÚ´æ·ÛËé·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄ·þÎñÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐËÁÒâ´úÂë¡£
https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40
5. D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´Ðзì϶
D-Link DCS-960L HNAP SOAPAction´æÔÚÕ»Òç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-1031/
>³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢ÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢
ÓÎÏ·¿ª·¢ÉÌZyngaÔÚ9Ô·ÝÔâµ½ºÚ¿ÍÈëÇÖ£¬½ü1.73ÒÚ¸öÓû§ÃûºÍÃÜÂëй¶¡£¹ÌÈ»ZyngaÓÚ9Ôµ×ÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬µ«Êý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾HaveIBeenPwned´Ë¿ÌÍøÂçµ½ÁËÓйØÊÜÓ°ÏìÕË»§ÊýÁ¿µÄ¹Ù·½Êý×Ö¡£Æ¾¾Ý¸ÃÍøÕ¾µÄ¸üУ¬¹²ÓÐ1.729ÒÚ¸ö·ÖÆçµÄµç×ÓÓʼþµØÖ·ÒÔ¼°Óû§ÃûºÍÃÜÂëÔÚÕâ´Î¹¥»÷ÖÐй¶£¬ºÃÐÂÎÅÊÇÕâЩÃÜÂëÒÔ¼ÓÑεÄSHA-1É¢Áдó¾Ö´æ´¢£¬Ê¹ÆäÄÑÒÔ±»ÆÆ½â¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/zynga-breach-hit-173-million/
2¡¢CitrixËùÓвúÆ·´æÔÚ´úÂëÖ´Ðзì϶£¨CVE-2019-19781£©
°²È«×¨¼ÒMikhail KlyuchnikovÔÚCitrix Application Delivery ControllerºÍCitrix Gateway²úÆ·Öз¢ÏÖÒ»¸öÑϳÁµÄ´úÂëÖ´Ðзì϶£¬¸Ã·ì϶£¨CVE-2019-19781£©Ê¹158¸ö¹ú¶ÈµÄ³¬¹ý8Íò¼Ò¹«Ë¾Ãæ¶Ô·çÏÕ¡£ÓÉÓÚÀûÓø÷ì϶µÄ¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿É½Ó¼û¹«Ë¾µÄÄÚ²¿ÍøÂ磬Òò¶ø¸Ã·ì϶ÓÈÆäΣÏÕ¡£³É¹¦ÀûÓø÷ì϶¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐС£Æ¾¾ÝCitrix£¬¸Ã·ì϶ӰÏìÁËËùÓÐÊÜÖ§³ÖµÄ²úÆ·°æ±¾ºÍƽ̨£¬Ö»¹ÜCitrixÉÐδ°ä²¼Ð¹̼þÀ´½â¾ö¸ÃÎÊÌ⣬µ«¸Ã¹«Ë¾ÒѰ䲼ÁËÒ»Ì×Õë¶Ô¶ÀÁ¢ÏµÍ³ºÍ¼¯ÈºµÄ»º½â´ëÊ©£¬²¢Ç¿ÁÒ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§Ñ¡È¡ËüÃÇ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-citrix-flaw-may-expose-thousands-of-firms-to-attacks/
3¡¢¶íÂÞ˹µ±¾Ö°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ
¶íÂÞ˹µ±¾ÖÖÜÒ»°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ¡£¸ÃÏî²âÊÔ´ÓÉÏÖÜÆðÍ·½øÐУ¬³ÖÐøÁ˶àÌì£¬Éæ¼°¶íÂÞ˹µ±¾Ö»ú¹¹¡¢±¾µØ»¥ÁªÍø·þÎñÌṩÉ̺ͶíÂÞ˹±¾µØ»¥ÁªÍø¹«Ë¾¡£³¢ÊÔµÄÖ÷ÕÅÊDzâÊԸùú¶ÈµÄ»¥ÁªÍø»ù´¡ÉèÊ©£¨ÔÚ¶íÂÞ˹ÄÚ²¿³ÆÎªRuNet£©ÊÇ·ñÄܹ»ÔÚ²»½Ó¼ûÈ«ÇòDNSϵͳºÍ±í²¿»¥ÁªÍøµÄÇé¿öÏÂÔËÐС£»¥ÁªÍøÁ÷Á¿ÔÚ¶íÂÞ˹ÄÚ²¿½øÐÐÁ˳ÁзÓÉ£¬ÓÐЧµØÊ¹¶íÂÞ˹µÄRuNet³ÉΪÊÀ½çÉÏ×î´óµÄÄÚÁªÍø¡£µ±¾ÖûÓÐй©ÓйزâÊÔ¼°Æä×é¼þµÄÈκμ¼Êõϸ½Ú£¬Ö»ÊÇÅú×¢µ±¾Ö²âÊÔÁ˼¸ÖÖ¶Ï¿ªÏνӵij¡¾°£¬Ô̺¬·ÂÕÕ¹ú±íÍøÂç¹¥»÷µÄ³¡¾°¡£µ±¾ÖÔÚ°ä²¼»áÉϰµÊ¾¸Ã³¢ÊÔ»ñµÃÁ˳ɹ¦¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/russia-successfully-disconnected-from-the-internet/
4¡¢P2P½©Ê¬ÍøÂçMoziÖØÒªÕë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷
×êÑÐÈËÔ±·¢ÏÖÐÂP2P½©Ê¬ÍøÂçMoziÔÚ»ý¼«Õë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªµÄ·ÓÉÆ÷¡£¸Ã½©Ê¬ÍøÂçÓë¶ñÒâÈí¼þGafgytÓйأ¬ÓÉÓÚËü³ÁÓÃÁ˺óÕߵIJ¿ÃÅ´úÂë¡£MoziµÄÖØÒªÖ÷ÕÅÊÇÓÃÓÚDDoS¹¥»÷¡£×êÑÐÈËÔ±·¢Ïָý©Ê¬ÍøÂçʹÓÃÒ»ÖÖ¶¨ÔìµÄÀ©´óÉ¢²¼Ê½¹þÏ£±í£¨DHT£©ºÍ̸À´ÊµÏÖ£¬¸ÃºÍ̸ͨ³£±»torrent¿Í»§¶ËºÍÆäËûP2Pƽ̨ÓÃÓÚ´æ´¢½ÚµãÁªÏµÐÅÏ¢¡£Mozi»¹Ê¹ÓÃECDSA384ºÍXORËã·¨À´È·±£½©Ê¬ÍøÂç×é¼þºÍP2PÍøÂçµÄÆëÈ«ÐԺͰ²È«ÐÔ¡£MoziÖØÒªÍ¨¹ýtelnetÀûÓÃÈõÃÜÂë½Ó¼ûÒ×Êܹ¥»÷µÄÉ豸£¬²¢ÔÚ¼ÓÔØ¶ñÒâÈí¼þºóËÑË÷ºÍϰȾÆäËüÒ×Êܹ¥»÷µÄÉ豸¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-mozi-p2p-botnet-takes-over-netgear-d-link-huawei-routers/
5¡¢°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬¹È¸èÆ»¹û´¹Î£Ï¼Ü
ƾ¾Ý¡¶Å¦Ô¼Ê±±¨¡·±¨Â·£¬°¢ÁªÇõµÐÔÖʹÓÃÊ¢ÐеÄͨѶÀûÓÃToTok×÷Ϊ¼à¶½¹¤¾ß£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¸ÃAPPĿǰÒѱ»AppleºÍGoogleÔÚÏßÉ̵êϼܡ£ToTokµÄÓû§Ô̺¬°¢ÁªÇõºÍÖж«ÆäËû¹ú¶ÈµÄÊý°ÙÍòÃñ¶à¡£¸Ã»ã±¨³Æ£¬ÃÀ¹úµý±¨¹ÙÔ±ºÍ°²È«×êÑÐÈËԱȷ¶¨°¢ÁªÇõµ±¾ÖÔÚʹÓøÃAPP½øÐмල»î¶¯¡£ToTok·ñ¶¨ÁËÓëµ±¾ÐÄà¿Ø´òËãÓйأ¬²¢°µÊ¾¸ÃÀûÓñ»Ï¼ÜÊÇÓÉÓÚ¡°¼¼ÊõÎÊÌ⡱¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html


¾©¹«Íø°²±¸11010802024551ºÅ