ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ48ÖÜ

Ðû²¼Ê±¼ä 2018-12-03
 ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³ö©¶´£»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý©¶´£»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÃüÁîÖ´ÐЩ¶´£»Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä©¶´£»FreeBSD CVE-2018-17156»º³åÇøÒç³ö©¶´ ¡£



±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§£»UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú· £¿î120ÍòÃÀÔª£»Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶£»ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý£»»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


ÖØÒªÄþ¾²Â©¶´Áбí


1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³ö©¶´

VMWare WorkstationºÍFusion´æÔÚÕûÊýÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë ¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983


2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý©¶´
Apache Hadoop´æÔÚÄþ¾²Â©¶´£¬ÔÊÐí¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔrootȨÏÞÖ´ÐÐÈÎÒâÃüÁî ¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E


3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÃüÁîÖ´ÐЩ¶´
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»ÕýÈ·´¦ÖÃÓû§ÊäÈ멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâSHELLÃüÁî ¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE


4. Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä©¶´
Schneider Electric Modicon M340 WEB·þÎñÆ÷´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɷÃÎÊ¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë ¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/


5. FreeBSD CVE-2018-17156»º³åÇøÒç³ö©¶´
FreeBSDÔÚICMPʵÏÖÖдæÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɽøÐоܾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc


 ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢ÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍòºÀ¹ú¼Ê¾Æµê¼¯ÍÅ(Marriott International)½ñÈÕÐû²¼£¬ÆìÏÂϲ´ïÎݾƵê(Starwood Hotel)µÄÒ»¸öÖ÷¹ËÔ¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬¿ÉÄÜÓÐÔ¼5ÒÚÖ÷¹ËµÄÐÅϢй¶ ¡£¸ÃÏûÏ¢Ðû²¼ºó£¬ÍòºÀ¹ú¼Ê¾Æµê¹É¼ÛÔÚ½ñÈÕÅÌÇ°½»Ò×ÖÐÒ»¶ÈϵøÓâ5% ¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ£¬ÊÓ²ì½á¹ûÏÔʾ£¬ÓÐһδÊÚȨ·½¸´ÖƲ¢¼ÓÃÜÁËÕâЩÊý¾Ý ¡£¶øÇÒ£¬×Ô2014Äê¾Í¿ªÊ¼Á˶Ôϲ´ïÎݾƵêÍøÂç½øÐÐδÊÚȨ·ÃÎÊ ¡£Ä¿Ç°£¬ÍòºÀ¹ú¼Ê¾ÆµêÒѽÓÄÉÁ˵÷Í£´ëÊ©£¬µ«²¢Î´Ðû²¼½øÒ»²½µÄÐÅÏ¢ ¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ£¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢°üÂÞÖ÷¹ËµÄÐÕÃû¡¢Í¨ÐŵØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩ¸öÈËÐÅÏ¢ ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html


2¡¢UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú· £¿î120ÍòÃÀÔª

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý±£»¤»ú¹¹Autoriteit Persoonsgegevens·Ö±ðÒò2016Äê10ÔµÄÊý¾Ýй¶Ê¼þ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ· £¿î ¡£ICOÌåÏÖ¸ÃʼþÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú ¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì ¡£· £¿îµÄÖ÷ÒªÔ­ÒòÊÇUberÑÓ³ÙÁ˽üÒ»Äê²Å³ÂËß´Ë´Îй¶Ê¼þ£¬ÕâÑÏÖØÎ¥·´ÁËÏà¹ØÖ´·¨ÌõÀý£¬¶øÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæÁÙ¸ü¸ßµÄÆÛÕ©·çÏÕ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/


3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇÓªÀûÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶ ¡£¸Ã¹¥»÷ʼþ·¢ÉúÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕÆڼ䣬鶵ÄÐÅÏ¢°üÂÞÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢±£ÏÕÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼǼ±àºÅºÍÕË»§Óà¶îµÈ ¡£´ËÍ⣬»¹Óн«½ü70Íò¸öÉç±£ºÅÂëй¶£¬µ«Ã»ÓвÆÕþÐÅϢй¶ ¡£¸Ã×éÖ¯Òѽ«Ïà¹Øʼþ֪ͨFBI£¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓüà¿Ø·þÎñ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/


4¡¢ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Äþ¾²³§ÉÌHackenµÄÑо¿ÈËÔ±Bob Diachenkoͨ¹ýShodan·¢ÏÖÁËÒ»¸ö¿É¹ûÈ»·ÃÎʵÄElasticSearch·þÎñÆ÷£¬ÆäÊý¾Ý¿â̻¶ÁËÁè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý ¡£ÕâЩÊý¾Ý°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØÖ·µÈÐÅÏ¢ ¡£Ñо¿ÈËÔ±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕߣ¬µ«ËûÈÏΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®ÓйØ ¡£Ä¿Ç°¸Ã·þÎñÆ÷Òѱ»½øÐÐÄþ¾²¼Ó¹Ì ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/


5¡¢»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Äþ¾²³§ÉÌForcepoint·¢ÏÖÒ»¸öÀûÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤Òµ¼äµý»î¶¯£¬¸Ã»î¶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Æä2018Äê»î¶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ ¡£ForcepointÌåÏָû±³ºóµÄÍŶӿÉÄÜÊ®·ÖÅӴ󣬹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²îÒì¹ú¼Ò/µØÓòµÄ¶à¸ö¹«Ë¾£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ£¬ÁíÒ»¸ö¹¥»÷»î¶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ ¡£¹¥»÷ÕßÖ÷ҪʹÓðüÂÞ¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æʽµöÓãÓʼþʵʩ¹¥»÷£¬ÕâЩAutoCADÎļþÖаüÂÞÒþ²ØµÄ.fasÄ £¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬ÓÃÓÚÁ¬½ÓÔ¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/


ÉùÃ÷£º±¾×ÊѶÓɶ«É­Æ½Ì¨Î¬ËûÃüÄþ¾²Ð¡×é·­ÒëºÍÕûÀí