ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ11ÖÜ
°ä²¼¹¦·ò 2020-03-16> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê03ÔÂ09ÈÕÖÁ15ÈÕ¹²ÊÕ¼°²È«·ì϶67¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Server Message BlockѹËõËã·¨´úÂëÖ´Ðзì϶; Apache ShardingSphere unmarshalÊý¾Ý´¦ÖôúÂëÖ´Ðзì϶£»SAP Solution ManagerÑéÖ¤ÈÆ¹ý·ì϶£»Johnson Controls Kantech EntraPass SmartService API·þÎñÑ¡Ïî´úÂëÖ´Ðзì϶£»Barracuda Load Balancer ADC LDAP·þÎñÅäÖ÷ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ΢Èí°ä²¼Õë¶ÔSMBv3·ì϶µÄKB4551762°²È«¸üУ»WhisperÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬Ð¹Â¶Ô¼9Òڱʼͼ£»Å·ÖÞµçÁ¦ÔËÓªÉÌͬÃËENTSO-E°ì¹«ÍøÂçÔâºÚ¿ÍÈëÇÖ£»ÎÒ¹ú8ÏîÍøÂ簲ȫ¹ú¶È³ß¶È»ñÅú°ä²¼£»Á½ÖÖеÄAMD²àÐÅ·¹¥»÷£¬Ó°ÏìZen¼Ü¹¹¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
>³ÁÒª°²È«·ì϶Áбí
1. Microsoft Server Message BlockѹËõËã·¨´úÂëÖ´Ðзì϶
Microsoft Server Message Block SMBv3ºÍ̸ÔÚ´¦ÖöñÒâѹËõÊý¾Ý°ü´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÏµÍ³¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/CVE-2020-0796
2. Apache ShardingSphere unmarshalÊý¾Ý´¦ÖôúÂëÖ´Ðзì϶
Apache ShardingSphere WEB½ÚÔį̀SnakeYAML½âÎöÊý¾Ý´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E
3. SAP Solution ManagerÑéÖ¤ÈÆ¹ý·ì϶
SAP Solution ManagerÑéÖ¤²é³´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Í¨¹ýSMDAgentsδÊÚȨ½Ó¼û¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
4. Johnson Controls Kantech EntraPass SmartService API·þÎñÑ¡Ïî´úÂëÖ´Ðзì϶
Johnson Controls Kantech EntraPass SmartService API·þÎñÑ¡Ïî´æÔÚ´úÂëÉÏ´«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÉÏ´«ÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.us-cert.gov/ics/advisories/icsa-20-070-04
5. Barracuda Load Balancer ADC LDAP·þÎñÅäÖ÷ì϶
Barracuda Load Balancer ADC LDAP·þÎñÅäÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨ½Ó¼ûLDAP·þÎñ¡£
https://blog.rapid7.com/2020/03/05/r7-2019-39-cve-2019-5648-ldap-credential-exposure-in-barracuda-load-balancer-adc-fixed/
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢Î¢Èí°ä²¼Õë¶ÔSMBv3·ì϶µÄKB4551762°²È«¸üÐÂ
΢Èí½ñÌìÔçЩʱ³½°ä²¼ÁËÕë¶ÔSMBv3 RCE·ì϶£¨CVE-2020-0796£©µÄ²¹¶¡¸üУ¨KB4551762£©£¬Óû§Äܹ»Í¨¹ýWindows Update²é³¸üлò´Ó΢Èí²¹¶¡Ä¿Â¼£¨https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762£©ÉÏÊÖ¶¯ÏÂÔØÊʺÏ×Ô¼ºWindows°æ±¾µÄKB4551762¡£Î¢Èí°µÊ¾¹ÌȻûÓз¢ÏÖÀûÓô˷ì϶µÄ¹¥»÷£¬µ«½¨ÒéÓû§ÓÅÏÈ×°Öô˸üС£´Ë·ì϶Ҳ±»³ÆÎªSMBGhost»òEternalDarkness£¬½öÓ°ÏìÔËÐÐWindows 10°æ±¾1903ºÍ1909ÒÔ¼°Windows Server Server Core×°Öð汾1903ºÍ1909µÄÉ豸¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-releases-kb4551762-security-update-for-smbv3-vulnerability/
2¡¢WhisperÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬Ð¹Â¶Ô¼9Òڱʼͼ
¾Ý¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨Â·£¬ÄäÃû°ÂÃØ¹²ÏíÀûÓÃWhisperÓÉÓÚÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬µ¼ÖÂÔ¼9ÒڱʼÍ¼й¶¡£×êÑÐÈËÔ±Matthew PorterºÍDan Ehrlich·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖд洢µÄÊý¾ÝÊÇ´Ó2012Äê¸ÃAPP°ä²¼Ò»Ïòµ½´Ë¿ÌµÄËùº±¼û¾Ý¡£Ö»¹Ü¼Í¼Öв»Ô̺¬Óû§Ãû£¬µ«ÆäÖÐÔ̺¬êdzơ¢´ºÇï¡¢ÖÖ×å¡¢ÐԱ𡢼ÒÏç¡¢¼¯Ìå³ÉÔ±¹ØÏµÒÔ¼°Óë·¢ÌûÓйصĵØÎ»Êý¾Ý¡£ÕâЩλÏàÐÅÏ¢Ô̺¬À´×ÔÓû§×î½ü·¢ÌûµÄ×ø±ê£¬ÀýÈçÌØ¶¨µÄѧÌᢹ¤×÷³¡ËùºÍ¾ÓÃñÇø¡£WhisperÔÚ½Óµ½Í¨Öªºó³·ÏúÁ˸ÃÊý¾Ý¿âµÄ½Ó¼ûȨÏÞ£¬²¢Í¨ÖªÁËÁª¹ú·¨ÂÉ»ú¹¹¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private/
3¡¢Å·ÖÞµçÁ¦ÔËÓªÉÌͬÃËENTSO-E°ì¹«ÍøÂçÔâºÚ¿ÍÈëÇÖ
Å·ÖÞµçÁ¦ÔËÓªÉÌͬÃË£¨ENTSO-E£©ÔÚÒ»·Ý¼ò¶ÌµÄÉêÃ÷ÖаµÊ¾£¬½üÆÚÆä°ì¹«ÍøÂçÔâµ½ºÚ¿ÍÈëÇÖ¡£ÓÉÓÚ¸Ã°ì¹«ÍøÂ粢δÏνӵ½ÈκÎÔËÓªÖеĵçÁ¦´«Êäϵͳ£¬ÕâÒâζ׏¥»÷½öÏÞÓÚITϵͳ£¬Ã»ÓÐÓ°Ïì¹Ø¼ü½ÚÔìϵͳ¡£ENTSO-E×ܲ¿Î»ÓÚ²¼Â³Èû¶û£¬ÓÉ35¸öÅ·ÖÞ¹ú¶ÈµÄ42¼ÒµçÍøÔËÓªÉÌ×é³É¡£ENTSO-E°µÊ¾ÒѾ½øÐÐÁË·çÏÕÆÀ¹ÀºÍÔì¶©ÁËÓ¦¼±´òË㣬ÒÔÏ÷¼õ½øÒ»²½¹¥»÷µÄ·çÏÕºÍÓ°Ï죬µ«Ã»ÓÐй©ÓëÈëÇÖºÎʱÆðÍ·ÒÔ¼°Ë¿ÉÄܶԹ¥»÷ÕÆ¹ÜÓйصľßÌåÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/european-entso-breach-fingrid/
4¡¢ÎÒ¹ú8ÏîÍøÂ簲ȫ¹ú¶È³ß¶È»ñÅú°ä²¼
ƾ¾Ý2020Äê3ÔÂ6ÈÕ¹ú¶ÈÊг¡¼à¶½ÖÎÀí×ܾ֡¢¹ú¶È³ß¶È»¯ÖÎÀíίԱ»á°ä²¼µÄÖлªÈËÃñ¹²ºÍ¹ú¹ú¶È³ß¶È²¼¸æ£¨2020ÄêµÚ1ºÅ£©£¬È«¹úÐÅÏ¢°²È«³ß¶È»¯¼¼ÊõίԱ»á¹é¿ÚµÄGB/T 35273-2020¡¶ÐÅÏ¢°²È«¼¼Êõ Ó×ÎÒÐÅÏ¢°²È«¹æ·¶¡·µÈ8Ïî¹ú¶È³ß¶ÈÕýʽ°ä²¼¡£¾ßÌåÇåµ¥Ô̺¬GB/T 17901.1-2020¡¶ÐÅÏ¢¼¼Êõ °²È«¼¼Êõ ÃØÔ¿ÖÎÀí µÚ1²¿ÃÅ£º¿ò¼Ü¡·¡¢GB/T 38540-2020¡¶ÐÅÏ¢°²È«¼¼Êõ °²È«µç×ÓÇ©ÕÂÃÜÂë¼¼Êõ¹æ·¶¡·¡¢GB/T 38541-2020¡¶ÐÅÏ¢°²È«¼¼Êõ µç×ÓÎļþÃÜÂëÀûÓÃÖ¸ÄÏ¡·¡¢GB/T 38543-2020¡¶ÐÅÏ¢°²È«¼¼Êõ »ùÓÚÉúÎïÌØµãʶ´ËÍâÒÆ¶¯ÖÇÄÜÖÕ¶ËÉí·ÝÕç±ð¼¼Êõ¿ò¼Ü¡·¡¢GB/T 38556-2020¡¶ÐÅÏ¢°²È«¼¼Êõ ¶¯Ì¬¿ÚÁîÃÜÂëÀûÓü¼Êõ¹æ·¶¡·¡¢GB/T 338558-2020¡¶ÐÅÏ¢°²È«¼¼Êõ °ì¹«É豸°²È«²âÊÔ²½Öè¡·ÒÔ¼°GB/T 38561-2020¡¶ÐÅÏ¢°²È«¼¼Êõ ÍøÂ簲ȫÖÎÀíÖ§³Öϵͳ¼¼ÊõÒªÇó¡·¡£ËùÓÐ8Ïî³ß¶ÈµÄÖ´ÐÐÈÕÆÚ¶¼ÊÇ2020-10-01¡£
ÔÎÄÁ´½Ó£º
https://www.tc260.org.cn/front/postDetail.html?id=20200307152229
5¡¢Á½ÖÖеÄAMD²àÐÅ·¹¥»÷£¬Ó°ÏìZen¼Ü¹¹
¸ñÀ´Ä¼¼Êõ´óѧ°ä²¼µÄһƪÐÂÂÛÎľßÌå½éÉÜÁËÁ½ÖÖеÄAMD CPU²àÐÅ·¹¥»÷£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬¹¥»÷Õß¿Éͨ¹ý°Ñ³ÖL1D»º´æÔ¤²â±äÁ¿À´Ð¹Â©AMD´¦ÖÃÆ÷µÄ»úÃÜÊý¾Ý¡£×êÑÐÈËÔ±³Æ¸Ã·ì϶ӰÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦ÖÃÆ÷£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò²Êܵ½Ó°Ïì¡£¸Ã´óѧ°µÊ¾ËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩ·ì϶£¬µ«AMDÉÐδ°ä²¼Î¢´úÂë¸üУ¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚ´§Ä¦µÄ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ