ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ05ÖÜ
°ä²¼¹¦·ò 2020-02-05
> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê01ÔÂ27ÈÕÖÁ2ÔÂ02ÈÕ¹²ÊÕ¼°²È«·ì϶47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇDrayTek VigorϵÁÐËÁÒâºÅÁîÖ´Ðзì϶; Adobe Illustrator CC CVE-2020-3710ÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶£»OpenSMTPD smtp_mailaddrËÁÒâºÅÁîÖ´Ðзì϶£»Adobe Acrobat/ReaderÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶£»IBM Security Access Manager Appliance XXE×¢Èë·ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇOpenSMTPD¿âRCE·ì϶ӰÏì¶à¸öBSDºÍLinux¿¯Ðа棻2019Äê½©Ê¬ÍøÂçC2·þÎñÆ÷ÊýÁ¿Í¬±ÈÔö³¤71%£»ÃÀ¹ú¹ú¶È°²È«¾Ö°ä²¼Óйػº½âÔÆ·ì϶µÄ°²È«Ö¸ÄÏ£»Î¢Èí°ä²¼Azure°²È«»ù×¼£¬Ìṩ90¶àÖÖ°²È«Êµ¼Ê½¨Ò飻ŦԼз¨°¸ÌáÒé²»ÈÝÊÐÕþµ±¾ÖÖ§¸¶ÀÕË÷Èí¼þÊê½ð¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
>³ÁÒª°²È«·ì϶Áбí
1. DrayTek VigorϵÁÐËÁÒâºÅÁîÖ´Ðзì϶
DrayTek Vigor300B cgi-bin/mainfunction.cgi URI²»ÕýÈ·´¦ÖÃSHELL×Ö·û£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ROOTȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£
https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html
2. Adobe Illustrator CC CVE-2020-3710ÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶
Adobe Illustrator CC´¦ÖÃÎļþ´æÔÚÄÚ´æ·ÛËé·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://helpx.adobe.com/security/products/illustrator/apsb20-03.html
3. OpenSMTPD smtp_mailaddrËÁÒâºÅÁîÖ´Ðзì϶
OpenSMTPD smtp_session.c smtp_mailaddr´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄMAIL FROM×Ö¶ÎÒªÇ󣬿ÉÖ´ÐÐËÁÒâºÅÁî¡£
http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
4. Adobe Acrobat/ReaderÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶
Adobe Acrobat and Reader´¦ÖÃÎļþ´æÔÚÀàÐÍ»ìºÏ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb19-02.html
5. IBM Security Access Manager Appliance XXE×¢Èë·ì϶
IBM Security Access Manager Appliance´¦ÖÃXMLÊý¾Ý´æÔÚXXE¹¥»÷·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄXMLÒªÇ󣬿ɻñÈ¡Ãô¸ÐÐÅÏ¢»ò½øÐлؾø·þÎñ¹¥»÷¡£
https://exchange.xforce.ibmcloud.com/vulnerabilities/172018
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢OpenSMTPD¿âRCE·ì϶ӰÏì¶à¸öBSDºÍLinux¿¯Ðаæ
°²È«×êÑÐÈËÔ±ÒѾÔںܶàBSDºÍLinux¿¯ÐаæËùʹÓõÄÓëµç×ÓÓʼþÓйصÄÖ÷Ìâ¿âÖз¢ÏÖÁËÒ»¸ö·ì϶£¬·ì϶¸ú×ÙΪCVE-2020-7247£¬Ó°Ïì·þÎñÆ÷¶ËSMTPºÍ̸µÄ¿ªÔ´ÊµÏÖOpenSMTPD¡£¸Ã¿¯ÐаæÖÐͨ³£Ô̺¬¸Ã¿â£¬ÕâЩ¿¯ÐаæÖ¼ÔÚÔÚ·þÎñÆ÷ÉÏÔËÐУ¬´Ó¶øÊ¹·þÎñÆ÷Äܹ»´¦ÖÃÓëSMTPÓйصĵç×ÓÓʼþºÍÁ÷Á¿¡£OpenSMTPD¿â×î³õÊÇΪOpenBSD²Ù×÷ϵͳ¿ª·¢µÄ£¬µ«¸Ã¿âÊÇ¿ªÔ´µÄ£¬Æä¡°±ãЯʽ°æ±¾¡±Ò²Òѹ鲢µ½ÆäËûOSÖУ¬ÀýÈçFreeBSD£¬NetBSDºÍһЩLinux¿¯Ðа棬ÀýÈçDebian£¬Fedora £¬Alpine LinuxµÈ¡£OpenSMTPD¿ª·¢ÈËÔ±ÒÑÈ·ÈÏ´Ë·ì϶£¬²¢ÓÚ½ñÌìÔçЩʱ³½°ä²¼Á˲¹¶¡-OpenSMTPD°æ±¾6.6.2p1¡£½¨ÒéÒѽ«ÆäBSDºÍLinux·þÎñÆ÷ÅäÖÃΪʹÓÃOpenSMTPD¿Í»§¶ËµÄϵͳÖÎÀíÔ±¾¡¿ìÀûÓô˽¨²¹·¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/rce-in-opensmtpd-library-impacts-bsd-and-linux-distros/
2¡¢2019Äê½©Ê¬ÍøÂçC2·þÎñÆ÷ÊýÁ¿Í¬±ÈÔö³¤71%
Spamhaus³ÆÓë2018ÄêÏà±ÈÈ«ÇòÓÃÓÚ½ÚÔìÊܶñÒâÈí¼þϰȾµÄϵͳµÄ·þÎñÆ÷Ô¾ÉýÁË71£¥ÒÔÉÏ¡£Â½ÐøÁ½ÄêÈ«Çò¹¥»÷ÕßÓÃÀ´½ÚÔìÊܶñÒâÈí¼þϰȾµÄϵͳµÄ·þÎñÆ÷ÊýÁ¿¼±¾çÔö³¤¡£SpamhausÏîÄ¿¸ú×ÙÍþв²Î¼ÓÕßÓÃÓÚÍйܽ©Ê¬ÍøÂçºÅÁîºÍ½ÚÔì·þÎñÆ÷£¨C2£©µÄÓòÃûºÍIPµØÖ·£¬¸ÃÏîĿȷ¶¨ÁË2019ÄêÈ«Çò¹²ÓÐ1210¸ö·ÖÆçÍøÂçÍйܵÄ17602¸ö´ËÀà·þÎñÆ÷¡£Õâ¸öÊý×Ö±ÈSpamhausÔÚ2018Äê¼ì²âµ½µÄ10263̨½©Ê¬ÍøÂçC2·þÎñÆ÷Ôö³¤ÁË71.5£¥£¬±È2018ÄêµÄ9500̨½©Ê¬ÍøÂçÊýÁ¿Ôö³¤Á˽üÒ»±¶¡£ÏÖʵÉÏ£¬½©Ê¬ÍøÂçC2Õ¼ËùÓÐÁбíÖеÄ41£¥¡£SpamhausÔÚ2019ÄêµÄºÚÃûµ¥ÖУ¬¶ø2017Äê½öΪ15£¥£¬È¥ÄêΪ25£¥¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/number-of-botnet-command-and-control-servers-soared-in-2019/d/d-id/1336914
3¡¢ÃÀ¹ú¹ú¶È°²È«¾Ö°ä²¼Óйػº½âÔÆ·ì϶µÄ°²È«Ö¸ÄÏ
¹ú¶È°²È«¾Ö£¨NSA£©°ä²¼ÁËÒ»·ÝÐÅÏ¢±í£¬ÆäÖÐÔ̺¬Óйػº½âÔÆ·ì϶µÄÖ¸ÄÏ¡£NSA»áÈ·¶¨Ôư²È«×é¼þ£¬²¢»áÉÌÍþв³É·Ö£¬ÔÆ·ì϶ºÍDZÔڵĻº½â´ëÊ©¡£¸ÃÎĵµ½«ÔÆ·ì϶·ÖΪËÄÀࣨÅäÖÃÃýÎ󣬽Ӽû½ÚÔì²î£¬¹²Ïí×â»§·ì϶ºÍ¹©¸øÁ´·ì϶£©£¬ÕâЩ·ì϶º¸ÇÁË´óÎÞÊýÒÑÖª·ì϶¡£ÌṩÿÖÖ·ì϶Àà´ËÍâÃèÊöÒÔ¼°×îÓÐЧµÄ»º½â´ëÊ©¡£¸ÃÖ¸ÄÏÖ¸³ö£¬¸ÃÖ¸ÄϽö¹©×éÖ¯¸¨µ¼ºÍ¼¼ÊõÈËԱʹÓᣡ°×éÖ¯¸¨µ¼Äܹ»²Î¿¼¡°ÔÆ×é¼þ¡±²¿ÃÅ£¬¡°ÔÆÍþв²Î¼ÓÕß¡±²¿ÃÅÒÔ¼°¡°ÔÆ·ì϶»ººÍ½â´ëÊ©¡±¸ÅÊö£¬ÒÔ»ñÈ¡¶ÔÔÆ°²È«×¼ÔòµÄ¼û½â¡£¼¼ÊõºÍ°²È«×¨ÒµÈËÔ±Ó¦·¢ÏÖ¸ÃÎĵµÓÐÖúÓÚ½â¾öÔÆ·þÎñÆÚ¼äºÍÖ®ºóµÄÔÆ°²È«µ±¿àÖÔÏî²É¹º¡±¡£
ÔÎÄÁ´½Ó£º
https://www.securitymagazine.com/articles/91618-national-security-agency-releases-guide-on-mitigating-cloud-vulnerabilities
4¡¢Î¢Èí°ä²¼Azure°²È«»ù×¼£¬Ìṩ90¶àÖÖ°²È«Êµ¼Ê½¨Òé
΢Èí±¾Öܰ䷢ÁËAzure°²È«»ù×¼v1£¨ASB£©µÄ¿ÉÓÃÐÔ£¬ÕâÊÇÕë¶ÔAzure¿Í»§µÄ90¶àÖÖ°²È«×î¼Ñʵ¼Ê½¨ÒéµÄ¼¯ÖС£Î¢Èí°µÊ¾£¬ASBÖ¼ÔÚͨ¹ý´´½¨Ô̺¬Ò»ÑùÌåʽµÄAzure·þÎñËùÓн¨ÒéµÄ¿ò¼ÜÀ´Ìá¸ßAzure·þÎñ°²È«ÎĵµµÄÒ»ÖÂÐÔ¡£ASBÖ¼ÔÚÔ®ÊÖ×éÖ¯Ìá¸ßAzureÖй¤×÷¸ºÔصÄÕûÌ尲ȫÐԺͺϹæÐÔ£¬ÆäÖÐÔ̺¬11¸öÊÜInternet°²È«ÖÐÐÄ£¨CIS£©7.1½ÚÔì¿ò¼ÜÆô·¢²¢Ó³Éäµ½ÆäÖеݲȫ½ÚÔì¡£ASBÖÐÔ̺¬µÄ¿Ø¼þÕë¶ÔÍøÂ簲ȫ£¬ÈÕÖ¾¼Í¼ºÍ¼à¶½£¬Éí·ÝºÍ½Ó¼û½ÚÔ죬Êý¾Ý±£»¤£¬·ì϶ÖÎÀí£¬¿â´æºÍ×ʲúÖÎÀí£¬°²È«ÅäÖ㬶ñÒâÈí¼þ·ÀÓù£¬Êý¾Ý¸´Ô£¬ÊÂÎñÏìÓ¦ÒÔ¼°ÉøÈë²âÊԺͺìÉ«ÍŶӲÙÁ·¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/microsoft-releases-azure-security-benchmark
5¡¢Å¦Ô¼Ð·¨°¸ÌáÒé²»ÈÝÊÐÕþµ±¾ÖÖ§¸¶ÀÕË÷Èí¼þÊê½ð
¹ú¶È²ÎÒéÔ±Phil Boyle£¬George M. BorrelloºÍSue Serino ÓÚ±¾Ô³õÌá³öÁ˲ÎÒéÔº·¨°¸S7246£¬ÒÔÓ¦¶ÔÕë¶ÔÈ«¹ú¸÷µØµ±¾Ö»ú¹¹ºÍÊÐÕþʵÌåµÄÍøÂç¹¥»÷º£³±¡£ÔÚijЩ²¹¾È´ëÊ©ÖУ¬ÆäÖÐһЩ£¨ÀýÈçÀïά°£Àº£Ì²ºÍ·ðÂÞÀï´ïÖݵĺþ³Ç£©ÒÑÖ§¸¶ÁËÊê½ð¡£ÆäËûµÄ£¬ÀýÈçÂíÈøÖîÈûÖݵÄб´µÂ¸£µÂºÍÑÇÌØÀ¼´óÊУ¬ÔòûÓÐÖ§¸¶ÈκÎÊê½ð¡£ÔÚºóÒ»ÖÖÇé¿öÏ£¬¸ÃÊÐ×îÖÕÆÆ·ÑÁË260ÍòÃÀÔª ͨ¹ýÊÂÎñÏìÓ¦ºÍÊý×Öȡ֤µÄÖ§³ö£¬¶î±íµÄÈËÔ±½¨ÉèºÍMicrosoft Cloud»ù´¡¼Ü¹¹×¨ÒµÖªÊ¶À´¸´Ô¡£Ö»¹ÜÍøÂ簲ȫר¼ÒÖ¸³ö£¬¸¶·Ñ»¹ÊDz»¸¶·ÑµÄ¾ö¶¨ÊÇÒ»¸ö¸´Ôӵľö¶¨£¬È¡¾öÓÚÓ×ÎÒÇé¿ö£¬Ô¤ËãºÍÊý¾Ý·çÏÕ¡£SB S7246ºÅ·¨°¸ÔÚŦԼÖÝÌá³öÁËÒ»Ïî×ÜÀ¨ÐÔÕþ²ß¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/new-york-ban-cities-paying-ransomware/152233/


¾©¹«Íø°²±¸11010802024551ºÅ