ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ49ÖÜ

Ðû²¼Ê±¼ä 2018-12-10
±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2018Äê12ÔÂ03ÈÕ09ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´55¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash PlayerÊͷźóÀûÓôúÂëÖ´ÐЩ¶´£»FreeBSD bhyveÈÎÒâ´úÂëÖ´ÐЩ¶´£»NUUO NVRMini2 upgrade_handle.phpÃüÁî×¢È멶´£»HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç³ö©¶´£»Rockwell Automation Allen-Bradley PowerMonitor 1000 ·ÃÎÊ¿ØÖÆ´íÎ󩶴¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇQuoraÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ£»M2MЭÒé±»ÆØ´æÔÚ©¶´£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøϵͳ£»ÍòºÀ¾ÆµêÒòÊý¾Ý¿âй¶Ô⼯ÌåËßËÏ£¬±»Ë÷Åâ125ÒÚÃÀÔª£»APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³Æ·ÐÐÒµ£»Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


ÖØÒªÄþ¾²Â©¶´Áбí


1. Adobe Flash PlayerÊͷźóÀûÓôúÂëÖ´ÐЩ¶´


Adobe Flash Player´æÔÚÊͷźóÀûÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://helpx.adobe.com/security/products/flash-player/apsb18-42.html



2. FreeBSD bhyveÈÎÒâ´úÂëÖ´ÐЩ¶´


FreeBSD¶ÔbhyveÌṩµÄÉ豸Ä£¿éÖÐȱÉÙÕýÈ·µÄ½çÏÞ¼ì²é£¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬bhyve½ø³Ì±ÀÀ£»òÒÔrootȨÏÞÔÚÖ÷»úÉÏÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.freebsd.org/security/advisories/FreeBSD-SA-18:14.bhyve.asc


3. NUUO NVRMini2 upgrade_handle.phpÃüÁî×¢È멶´


NUUO NVRMini2 upgrade_handle.php´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔROOTÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716


4. HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç³ö©¶´


HPE Intelligent Management Center PLAT´æÔÚ»º³åÇøÒç³ö£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬽øÐоܾø·þÎñ¹¥»÷»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us


5. Rockwell Automation Allen-Bradley PowerMonitor 1000 ·ÃÎÊ¿ØÖÆ´íÎ󩶴


Rockwell Automation Allen-Bradley PowerMonitor 1000 WEBÒ³Ãæ´æÔÚ·ÃÎÊ¿ØÖÆ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Ìí¼Ó¾ßÓйÜÀíԱȨÏÞµÄÐÂÕË»§¡£

http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html


ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢QuoraÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÆÄÊÜ»¶Ó­µÄÎÊ´ðÍøÕ¾QuoraÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§µÄÊý¾Ý±»ÇÔ-¼¸ºõÊÇÆä¿Í»§ÈºÌåµÄÒ»°ë¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞÓû§µÄÕË»§ÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¹þÏ£ÃÜÂëÒÔ¼°´ÓFacebook¡¢TwitterµÈÉ罻ýÌåµ¼ÈëµÄÊý¾Ý£»Óû§µÄ¹ûÈ»ÄÚÈÝ£¬ÀýÈçÌáÎÊ¡¢»Ø´ð¡¢µãÔÞºÍÆÀÂÛ£»Óû§µÄ·Ç¹ûÈ»ÄÚÈÝ£¬ÀýÈç»Ø´ðÑûÇ롢˽ÈËÏûÏ¢µÈ¡£QuoraÓÚÖÜÒ»Íí¼äÅû¶ÁË´Ë´Îʼþ£¬Ä¿Ç°¸Ãʼþ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖС£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/quora-hack.html


2¡¢M2MЭÒé±»ÆØ´æÔÚ©¶´£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøϵͳ

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Ç÷ÊƿƼ¼Ñо¿ÍŶӷ¢ÏÖÖ÷Á÷µÄÁ½¸öM2M£¨»úÆ÷¶Ô»úÆ÷£©Ð­Òé´æÔÚÄþ¾²Â©¶´£¬¿ÉÓÃÓÚ¹¥»÷IoTºÍIIoTÉ豸¡£Æ¾¾Ý¸Ã¡¶¹¤ÒµÎïÁªÍøÊý¾ÝÖ÷¸ÉÖеĴàÈõÐÔ¡·³ÂËߣ¬ÕâÁ½¸öЭÒé·Ö±ðÊÇÏûÏ¢ÐÐÁÐÒ£²â´«ÊäЭÒ飨MQTT£©ºÍÔ¼ÊøÓ¦ÓÃЭÒ飨CoAP£©¡£Ñо¿ÈËÔ±·ÖÎöÁËÕâÁ½¸öЭÒéµÄÉè¼ÆºÍʵÏÖÉÏ´æÔڵĩ¶´£¬²¢·¢ÏÖÁËÊýÊ®Íǫ̀ÅäÖò»Í׵ķþÎñÆ÷£¬ÕâЩ·þÎñÆ÷̻¶ÁËÏà¹Øƾ¾Ý¡¢Ãô¸ÐÐÅÏ¢ÒÔ¼°¹¤ÒµÁ÷³ÌÏà¹ØµÄÊý¾Ý¡£ÕâЩ©¶´¿ÉÄܵ¼ÖÂDoS¡¢ÈÎÒâ´úÂëÖ´ÐÐÒÔ¼°DDoS·Å´ó¹¥»÷µÈ¡£


Ô­ÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/machine-to-machine-m2m-technology-design-issues-and-implementation-vulnerabilities/


3¡¢ÍòºÀ¾ÆµêÒòÊý¾Ý¿âй¶Ô⼯ÌåËßËÏ£¬±»Ë÷Åâ125ÒÚÃÀÔª

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ÍòºÀ¹ú¼Ê¾Æµê¼¯ÍÅ(Marriott International)½üÈÕÒò¿Í»§Êý¾Ý¿â鶶øÔâÓö¼¯ÌåËßËÏ£¬Ë÷Åâ½ð¶î¸ß´ï125ÒÚÃÀÔª¡£ÉÏÖÜÎåÍòºÀÐû²¼ÆìÏÂϲ´ïÎݾƵê(Starwood Hotel)µÄÒ»¸ö¿Í»§Ô¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬Ô¼5ÒÚ¿Í»§µÄÐÅÏ¢¿ÉÄÜй¶¡£¾ÝϤ£¬ºÚ¿ÍÈëÇÖÔçÔÚ2014Äê¾ÍÒѾ­¿ªÊ¼¡£Ëæºó£¬ÃÀ¹úGeragos&GeragosÂÉʦÊÂÎñËùµÄÂÉʦ±¾¡¤Ã·ÈûÀ­Ë¹(Ben Meiselas)ºÍUnderdog LawÖ´·¨ÕÕÁÏÂõ¿Ë¶û¡¤¸»ÀÕ(Michael Fuller)´ú±íÁ½ÃûÔ­¸æ´óÎÀ¡¤Ô¼º²Ñ·(David Johnson)ºÍ¿ËÀï˹¡¤¹þÀï˹(Chris Harris)¶ÔÍòºÀ¹ú¼Ê¾ÆµêÌáÆð¼¯ÌåËßËÏ£¬Ë÷Åâ125ÒÚÃÀÔª¡£ËäÈ»ÕâÒ»½ð¶î¿´ÆðÀ´Ê®·Ö¾Þ´ó£¬µ«Ò²½öÏ൱ÓÚ5ÒÚDZÔÚÊܺ¦¿Í»§Ã¿È˵õ½25ÃÀÔªµÄÅâ³¥¡£


Ô­ÎÄÁ´½Ó£º
http://tech.sina.com.cn/i/2018-12-03/doc-ihprknvs8439051.shtml


4¡¢APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³Æ·ÐÐÒµ

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Windows Defender ATPÍŶӷ¢ÏÖÒ»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³Æ·ºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬»ùÓڶԸûµÄÄ¿±êÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄ·ÖÎö£¬Ñо¿ÍŶÓÈÏΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌᳫµÄ¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öÀûÓÃÁËOffice¹«Ê½±à¼­Æ÷©¶´CVE-2018-0802µÄ¶ñÒâÎĵµ£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔز¢Ö´ÐÐËæ»úÃüÃûµÄpayload¡£Ñо¿ÈËÔ±ÈÏΪÕâЩpayloadµÄÖ÷ҪĿµÄÊÇÇÔÈ¡Êý¾Ý¡£


Ô­ÎÄÁ´½Ó£º
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/


5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼ÖÂÁè¼Ý30Íò¿Í»§ÐÅϢй¶¡£Ñо¿ÈËÔ±Oliver Houghͨ¹ýShodan·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Ä¿Ç°¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬µ«²»ÖªµÀ¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼ä¡£¸ÃÊý¾Ý¿âÖаüÂÞÁè¼Ý30.9ÍòÓû§¼Ç¼£¬°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëµÈ¡£´ËÍ⣬Êý¾Ý¿âÖл¹´æ´¢ÁËÁè¼Ý35.1Íò¸ö·þÎñÔ¤¶¨¼Ç¼£¬ÒÔ¼°Áè¼Ý2000¸öÍÆÄÃʦµÄÏà¹ØÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º
https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/


ÉùÃ÷£º±¾×ÊѶÓɶ«É­Æ½Ì¨Î¬ËûÃüÄþ¾²Ð¡×é·­ÒëºÍÕûÀí