ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ07ÖÜ

°ä²¼¹¦·ò 2020-02-17

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2020Äê02ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼°²È«·ì϶94¸ö  £¬ÖµµÃ¹Ø×¢µÄÊÇApache Dubbo·´ÐòÁл¯´úÂëÖ´Ðзì϶; OpenVPN Access Server LDAPÑéÖ¤ÈÆ¹ý·ì϶£»IstioÑéÖ¤Õ½Êõexact-pathÂß¼­Æ¥Åä°²È«ÈÆ¹ý·ì϶£»Adobe Framemaker CVE-2020-3731ÄÚ´æÒýÓôúÂëÖ´Ðзì϶£»Microsoft Exchange Server CVE-2020-0692ȨÏÞÌáÉý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ˼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCE·ì϶£»ÃÀµÂµý±¨²¿ÃŽÚÔìÈðÊ¿¹«Ë¾ÊýÊ®Äê  £¬ÇÔÈ¡120¹ú»úÃܵý±¨£»Malwarebytes°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨£»ÑÅÊ«À¼÷ìÔÆÊý¾Ý¿â¶³ö4.4ÒÚÌõÄÚ²¿¼Í¼£»Palo Alto Networks°ä²¼2020Äê´º¼¾ÔÆÍþв»ã±¨¡£


ƾ¾ÝÒÔÉÏ×ÛÊö  £¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí



1. Apache Dubbo·´ÐòÁл¯´úÂëÖ´Ðзì϶


Apache DubboÆôÓÃHTTPºÍ̸½øÐÐͨѶʱ´æÔÚ·´ÐòÁл¯·ì϶  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄPOSTÒªÇó  £¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://github.com/apache/dubbo/releases/tag/dubbo-2.7.5



2. OpenVPN Access Server LDAPÑéÖ¤ÈÆ¹ý·ì϶


OpenVPN Access Server ʹÓÃLDAPÑé֤ϵͳµÇ¼´¦ÖôæÔÚ°²È«·ì϶  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇóÈÆ¹ýÑéÖ¤  £¬Î´ÊÚȨ½Ó¼û¡£


https://openvpn.net/security-advisories/



3. IstioÑéÖ¤Õ½Êõexact-pathÂß¼­Æ¥Åä°²È«ÈÆ¹ý·ì϶


IstioÑéÖ¤Õ½Êõexact-pathÂß¼­´¦ÖôæÔÚ°²È«·ì϶  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÔ̺¬?»ò#×Ö·ûµÄÒªÇó  £¬¿ÉÈÆ¹ýÑéÖ¤¡£


https://istio.io/news/security/istio-security-2020-001/



4. Adobe Framemaker CVE-2020-3731ÄÚ´æÒýÓôúÂëÖ´Ðзì϶


Adobe Framemaker´æÔÚÄÚ´æ·ÛËé·ì϶  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâÎļþ  £¬ÓÕʹÓû§ÒªÇó  £¬Äܹ»Ö¸±êÓû§¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://helpx.adobe.com/security/products/framemaker/apsb20-04.html



5. Microsoft Exchange Server CVE-2020-0692ȨÏÞÌáÉý·ì϶


Microsoft Exchange Server´æÔÚ°²È«·ì϶  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó  £¬Äܹ»»ñµÃÓë Exchange Server µÄÆäËûÈκÎÓû§Ò»ÑùµÄȨÏÞ¡£


https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-0692


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢Ë¼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCE·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÍŶÓÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶(CVE-2020-3868)  £¬µ±Óû§ÔÚSafariÖдò¿ª¶ñÒâÍøÒ³Ê±  £¬¿ÉÄܻᴥ·¢ÀàÐÍ»ìºÏ  £¬´Ó¶øµ¼ÖÂÄÚ´æ°Ü»µºÍÖ´ÐÐËÁÒâ´úÂë¡£¹¥»÷Õß±ØÒªÍ¨¹ýijÖÖ·½Ê½ÓÕʹÓû§½Ó¼û¶ñÒâÍøÒ³À´´¥·¢´Ë·ì϶¡£¸Ã·ì϶´æÔÚÓÚSafariµÄ¡°×ÖÌ塱ְÄÜÖÐ  £¬Talos²âÊÔ²¢È·ÈÏ´Ë·ì϶ӰÏìSafari°æ±¾13.0.3£¨15608.3.10.1.4£©¡¢Safari¼¼ÊõÔ¤ÀÀ°æ96£¨Safari 13.1  £¬WebKit 15609.1.9.7£©ºÍWebkit GIT e4cd3b4fab6166d1288984ded40c588439dab925  £¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îа汾¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/02/vuln-spotlight-apple-safari-code-execution-feb-2020.html


2¡¢ÃÀµÂµý±¨²¿ÃŽÚÔìÈðÊ¿¹«Ë¾ÊýÊ®Äê  £¬ÇÔÈ¡120¹ú»úÃܵý±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÝÃÀ¹ú¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨Â·  £¬ÃÀµÂµý±¨²¿ÃÅÊýÊ®Äê¼äͨ¹ý½ÚÔìÈðÊ¿¼ÓÃܹ«Ë¾Crypto AG  £¬ÇÔÈ¡ÁËÈ«ÇòÔ¼120¹úµ±¾ÖµÄ×î¸ß»úÃÜͨѶµý±¨¡£¾ÝϤ  £¬µÚ¶þ´ÎÊÀ½ç´óÕ½Õ½ºóµ½±¾ÊÀ¼Í³õ  £¬Crypto AG¹«Ë¾ÎªÔ¼120¸ö¹ú¶ÈÈ·µ±¾ÖÌṩ¼ÓÃÜͨѶװÖà  £¬ÒÁÀÊ¡¢ÄÏÃÀ¶à¹úµ±¾Ö¡¢Ó¡¶Å×ë°Í»ù˹̹½ÔΪ·þÎñ¶ÔÏó¡£µ«Crypto AGÄ»ºóÀϰåÆäʵÊÇÃÀ¹úÖÐÑëµý±¨¾Ö£¨CIA£©ÒÔ¼°µÂ¹úÁª¹úµý±¨¾Ö£¨BND£©¡£ÕâÁ½¸öµý±¨²¿ÃŶÔCrypto×°Öö¯ÊֽŠ £¬ÈÃ×°ÖÿɵÈÏб»ÆÆ½â  £¬½ø¶ø½â¶ÁÊý¾Ý¡£±¨Â·³Æ  £¬ÖÐÇé¾ÖÄÚ²¿ÓйØÓÚÕâ¸ö×î¸ß»úÃÜ´òËãµÄº¹Çà»úÃܵµ°¸  £¬µµ°¸Ö¸³öCrypto AG¿¿×ÅÈÃÎ÷·½µý±¨»ú¹Ø»ñµÃ¿Í»§»úÃÜ  £¬×¬½øÊýÒÔ°ÙÍò¼ÆÃÀÔª¡£Í¬Ê±  £¬µµ°¸Ò²Ö¸³ö  £¬Ö»¹ÜʹÓÃCrypto AG²úÆ·µÄ¹ú¶È²»ÉÙ  £¬µ«ËÕÁª/¶íÂÞ˹ºÍÖйú  £¬È´´ÓÀ´¶¼²»ÊǸù«Ë¾µÄ¿Í»§¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/us-german-spies-plundered-global-secrets-swiss-encryption-firm-report


3¡¢Malwarebytes°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Malwarebytes Labs°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨  £¬»ã±¨Ö¸³öÓëÕë¶ÔWindows PCµÄÍþвÏà±È  £¬MacÍþв³ÊÖ¸Êý¼¶Ôö³¤¡£MacÍþвµÄ×ÜÊýÁ¿Í¬±ÈÔö³¤ÁË400£¥ÒÔÉÏ  £¬µ«ÕâÒ»Êý×ֿ϶¨Ë®Æ½ÉÏ¿ÉÄÜÊܵ½2019ÄêMalwarebytes MacÓû§ÈºÔö³¤µÄÓ°Ïì¡£¶Ôµ¥¸öÖն˶øÑÔ  £¬MacÍþвÒÀÈ»±ÈWindows¸ß  £¬ÏÕЩΪ2£º1¡£»ã±¨»¹Ö¸³ö¹¥»÷ÐÔ¸æ°×Èí¼þ¡¢Ä¾ÂíºÍHackToolsÖ÷µ¼ÁËÕë¶ÔÒµÎñ¶ËµãµÄÈ«ÇòÍþв  £¬±ÈÈ¥ÄêͬÆÚÔö³¤ÁË13£¥¡£¹¥»÷ÆóÒµµÄÀÕË÷Èí¼þ»î¶¯´ïµ½º¹Çà×î¸ßˮƽ  £¬RyukºÍSodinokibiµÈ¼Ò×å±ðÀëÔö³¤ÁË543£¥ºÍ820£¥¡£EmotetºÍTrickBotÒÀÈ»ÊÇÕë¶ÔÆóÒµµÄÖØÒªÍþв֮һ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/reports/2020/02/malwarebytes-labs-releases-2020-state-of-malware-report/


4¡¢ÑÅÊ«À¼÷ìÔÆÊý¾Ý¿â¶³ö4.4ÒÚÌõÄÚ²¿¼Í¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÔ±Jeremiah Fowler·¢ÏÖÑÅÊ«À¼÷ìµÄÒ»¸öÔÆÊý¾Ý¿âδÉèÃÜÂë  £¬µ¼ÖÂ4.4ÒÚÌõÄÚ²¿¼Í¼й¶  £¬ÆäÖÐÔ̺¬´¿Îı¾µç×ÓÓʼþµØÖ·£¨Ô̺¬À´×Ô@estee.comÓòµÄÄÚ²¿µç×ÓÓʼþµØÖ·£©ºÍCMS¡¢ÖÐÑë¼þµÄ»î¶¯ÈÕÖ¾µÈÄÚÈÝ¡£µ«¼Í¼ÖÐûÓÐÔ̺¬¿Í»§µÄ¸¶¿îÊý¾Ý»òÃô¸ÐµÄÔ±¹¤ÐÅÏ¢¡£FowlerÖ¸³öÕâЩÈÕÖ¾Êý¾ÝÄܹ»ÓÃ×÷¸ü´óµÄÍøÂç¹¥»÷µÄ¿úËÅ  £¬ÀýÈçÈÕÖ¾ÖÐÔ̺¬IPµØÖ·¡¢¶Ë¿Ú¡¢õè¾¶ºÍ´æ´¢ÐÅÏ¢  £¬¿ÉÓÃÓÚÓ³É乫˾µÄÄÚ²¿ÍøÂç¡£ÑÅÊ«À¼÷ìÔÚ½Óµ½»ã±¨ºóµ±Ìì¹Ø¹ØÁ˶ÔÊý¾Ý¿âµÄ½Ó¼û  £¬µ«Ä¿Ç°Éв»Ã÷ÏÔ¸ÃÊý¾Ý¿âÔÚÍøÂçÉ϶³öÁ˶೤¹¦·òÒÔ¼°ÊÇ·ñÒÑÔâµ½ºÚ¿Í½Ó¼û¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/estee-lauder-440m-records-email-network-info/152789/


5¡¢Palo Alto Networks°ä²¼2020Äê´º¼¾ÔÆÍþв»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Palo Alto NetworksµÄUnit 42½üÈÕ°ä²¼Á˰ëÄêÒ»´ÎµÄ¡¶ÔÆÍþв»ã±¨¡·2020Äê´º¼¾°æ¡£ÎªÁËÔÚÔÆÖÐÔ½À´Ô½¶àµØ×Ô¶¯»¯¹¹½¨Á÷³Ì  £¬ºÜ¶à×éÖ¯¶¼ÔÚѡȡ»ù´¡¼Ü¹¹¼´´úÂ루IaC£©À´Ô®ÊÖ¼ò»¯ÆäÔËÓª¡£Unit 42·ÖÎöÁ˳ÉǧÉÏÍò¸öIaCÄ£°å  £¬ËûÃǵķ¢ÏÖÅú×¢IaCÄ£°åÖÐÓÐ199000¶à¸öDZÔÚ·ì϶  £¬×î³ÁÒªµÄÊÇĿǰÓг¬¹ý43£¥µÄÔÆÊý¾Ý¿âδ¼ÓÃÜ  £¬²¢ÇÒÖ»ÓÐ60£¥µÄÔÆ´æ´¢·þÎñÒÑÆôÓÃÈÕÖ¾¼Í¼¡£


Ô­ÎÄÁ´½Ó£º

https://start.paloaltonetworks.com/unit-42-cloud-threat-report