ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ45ÖÜ

Ðû²¼Ê±¼ä 2018-11-12

Ò»¡¢±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´52¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Unity Express JAVA·´ÐòÁл¯´¦ÖÃÈÎÒâÃüÁîÖ´ÐЩ¶´£»AVEVA InduSoft Web Studio/InTouch Edge HMIÔ¶³Ì´úÂëÖ´ÐЩ¶´£»HPE Integrated Lights-Out 5¹Ì¼þ¸üÐÂÄþ¾²ÏÞÖÆÈƹý©¶´£»QEMU 'NBD_OPT_LIST'»º³åÇøÒç³ö©¶´£»Brocade Fabric OS ROOTȨÏÞÌáȡ©¶´£»Apache Hive HiveServer2Äþ¾²Èƹý©¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÈËÔ±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day£»Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÎïÖеĺóÃÅÕË»§£»¼íÆÒÕ¯¶à¼ÒISPÔâµ½¸Ã¹úÀúÊ·ÉÏ×î´ó¹æÄ£µÄDDoS¹¥»÷£»ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄ¸öÈËÐÅÏ¢±»ÇÔ£»»ôÄáΤ¶ûÐû²¼¹ØÓÚ¹¤ÒµÉèÊ©ÖеÄUSBÍþвµÄ·ÖÎö³ÂËß ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£




¶þ¡¢ÖØÒªÄþ¾²Â©¶´Áбí


1. Cisco Unity Express JAVA·´ÐòÁл¯´¦ÖÃÈÎÒâÃüÁîÖ´ÐЩ¶´


Cisco Unity Express¶ÔÓû§ÌṩµÄÄÚÈݽøÐз´ÐòÁл¯²Ù×÷ÊÇûÓнøÐÐ×ã¹»µÄ¹ýÂË£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄjavaÐòÁл¯¹¤¾ßÇëÇ󣬿ÉÒÔROOTȨÏÞÖ´ÐÐÈÎÒâÃüÁî ¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue


2. AVEVA InduSoft Web Studio/InTouch Edge HMIÔ¶³Ì´úÂëÖ´ÐЩ¶´


Schneider Electric InduSoft Web StudioºÍInTouch Edge HMI´æÔÚÅäÖÃÎļþ¿ÕÃÜÂëÎÊÌ⣬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐдúÂë ¡£

https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec130.pdf



3. HPE Integrated Lights-Out 5¹Ì¼þ¸üÐÂÄþ¾²ÏÞÖÆÈƹý©¶´


HPE Integrated Lights-Out 5´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÈƹýÄþ¾²ÏÞÖÆ£¬¸üй̼þ ¡£

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03894en_us



4. QEMU 'NBD_OPT_LIST'»º³åÇøÒç³ö©¶´


QEMU´¦ÖÃ'NBD_OPT_LIST'ÇëÇóµÄ·þÎñÆ÷ÏìÓ¦´æÔÚÕ»Òç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄNBD·þÎñÆ÷ÇëÇ󣬿ÉÒÔQEMU½ø³ÌȨÏÞÖ´ÐÐÈÎÒâ´úÂë»òʹӦÓ÷¨Ê½Í߽⠡£

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630



5. Brocade Fabric OS ROOTȨÏÞÌáȡ©¶´


Brocade Fabric OS ¡®supportsave¡¯ÃüÁî´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɻñÈ¡ROOTȨÏÞ ¡£
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731




Èý¡¢ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Ñо¿ÈËÔ±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¶íÂÞ˹©¶´Ñо¿ÈËÔ±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬¸Ã©¶´Ó°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾ ¡£¸Ã©¶´ÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬¹¥»÷Õß¿ÉÀûÓø鶴ÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬²¢ÀûÓÃÆäËü¼¼ÊõÌáȨÖÁring0 ¡£Ñо¿ÈËÔ±ÔÚGithubÉÏÏêϸÃèÊöÁ˸鶴±³ºóµÄ»úÖÆ£¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓƵ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/


2¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÎïÖеĺóÃÅÕË»§


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆÐû²¼Á˶à¿î²úÎïµÄ15¸öÄþ¾²¸üУ¬ÆäÖаüÂÞɾ³ýÁËСÐÍÆóÒµ½»»»»úÖеÄÒ»¸öºóÃÅÕË»§ ¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÎïÖеĺóÃÅÕË»§ ¡£ÕâЩºóÃÅÕË»§Â©¶´°üÂÞ3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439 ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/


3¡¢¼íÆÒÕ¯¶à¼ÒISPÔâµ½¸Ã¹úÀúÊ·ÉÏ×î´ó¹æÄ£µÄDDoS¹¥»÷


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±¾ÖܼíÆÒÕ¯×î´óµÄ¼¸¼Ò»¥ÁªÍø·þÎñÌṩÉÌ£¨ISP£©Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷£¬°üÂÞEZECOM¡¢SINET¡¢TelcotechºÍDigi ¡£¾Ýµ±µØýÌ屨µÀ£¬´Ë´ÎDDoS¹¥»÷ÊǸùúÀúÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷Ö®Ò»£¬±¾ÖÜÒ»µÄDDoS¹¥»÷Á÷Á¿´ï½ü150Gbps ¡£¹ØÓڴ˴ι¥»÷µÄÔ­ÒòºÍ¶¯»úÉв»Çå³þ£¬Ò²Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÂôÁ¦ ¡£Ò»ÖÖ¿ÉÄܵÄÇé¿öÊÇISP¾ºÕù¶ÔÊÖÖ®¼äµÄÏ໥¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/cambodias-isps-hit-by-some-of-the-biggest-ddos-attacks-in-the-countrys-history/


4¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄ¸öÈËÐÅÏ¢±»ÇÔ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÖ¥¼Ó¸çÌ«Ñô±¨µÄ±¨µÀ£¬Ö¥¼Ó¸ç¹«Á¢Ñ§Ð£µÄÒ»ÃûÇ°¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢Ö¾Ô¸Õߺ͹©Ó¦É̵ĸöÈËÐÅÏ¢£¬ÕâЩÐÅÏ¢°üÂÞÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢·¸×ïÀúÊ·ºÍDCFSÊÓ²ì½á¹ûµÈ£¬²»°üÂÞÈκÎÉç±£ºÅÂë ¡£KrimsÄ¿Ç°Òѱ»Ö¥¼Ó¸ç¾¯·½´þ²¶ºÍ¾ÐÁô£¬²¢½«ÃæÁÙ¶àÏî×ïÃûµÄÖ¸¿Ø ¡£


Ô­ÎÄÁ´½Ó£º
https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml


5¡¢»ôÄáΤ¶ûÐû²¼¹ØÓÚ¹¤ÒµÉèÊ©ÖеÄUSBÍþвµÄ·ÖÎö³ÂËß


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý»ôÄáΤ¶ûÐû²¼µÄÒ»·ÝгÂËߣ¬USBÉ豸ÊÇÕë¶Ô¹¤ÒµÉèÊ©µÄ¶ñÒâÈí¼þ¹¥»÷µÄÖ÷Ҫý½é ¡£¸Ã³ÂËßÊÇ»ùÓÚ»ôÄáΤ¶ûµÄÄþ¾²Ã½Ìå½»»»£¨SMX£©¼¼ÊõÊÕ¼¯µÄÊý¾Ý£¬º­¸ÇÁËÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢»¯Ñ§¡¢Ö½ÕÅÖÆÔìµÈÐÐÒµ ¡£Êý¾Ý±íÃ÷£¬26%µÄÍþв¿ÉÄܵ¼Ö¹¤ÒµÆóҵʧȥICS»·¾³µÄ¿É¼ûÐÔ»ò¿ØÖÆȨ£¬´Ó¶øÔì³ÉÖØ´óÖжÏ ¡£16%µÄÍþвרÃÅÕë¶ÔICSºÍIoTϵͳ£¬ÆäÖаüÂÞ¶ñÒâÈí¼þMirai£¨6£¥£©¡¢Stuxnet£¨2£¥£©¡¢Triton£¨2£¥£©ºÍWannaCry£¨1£¥£© ¡£


Ô­ÎÄÁ´½Ó£º
https://honeywellprocess.blob.core.windows.net/public/Support/Customer/Honeywell-USB-Threat-Report.pdf


ÉùÃ÷£º±¾×ÊѶÓɶ«É­Æ½Ì¨Î¬ËûÃüÄþ¾²Ð¡×é·­ÒëºÍÕûÀí