ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ3ÖÜ
Ðû²¼Ê±¼ä 2019-01-21±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇ»úƱԤ¶©ÏµÍ³AmadeusÑÏÖØ©¶´£¬Ó°ÏìÈ«Çò141¼Òº½¿Õ¹«Ë¾;ÃÀOklahomaÖÝÕþ¸®·þÎñÆ÷ÒâÍâ̻¶3TBÃô¸ÐÊý¾Ý;Ó¢¹úBSIAÐû²¼»¥ÁªÄþ¾²ÏµÍ³×î¼Ñʵ¼ùÖ¸ÄÏ;VoIP·þÎñÉÌVOIPOÒâÍâй¶¹ýÈ¥ËÄÄêµÄ¿Í»§Êý¾Ý;ESÎļþä¯ÀÀÆ÷Á½¸ö©¶´Ê¹µÃÁè¼Ý1ÒÚAndroidÓû§ÃæÁÙ·çÏÕ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
ÖØÒªÄþ¾²Â©¶´Áбí
Brocade Network Advisor´æÔÚÓ²±àÂ멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɵǼµ½JBoss Administration½çÃæ²¢°²×°ÆäËûJEEÓ¦Ó÷¨Ê½¡£
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-743
2. systemd-journaldÕ»»º³åÇøÒç³ö©¶´
systemd-journaldʵÏÖ´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Ê¹systemd-journald±ÀÀ£»òÒÔjournaldȨÏÞÖ´ÐдúÂë¡£
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864
3. SAS Web Infrastructure Platform·´ÐòÁл¯´úÂëÖ´ÐЩ¶´
SAS Web Infrastructure PlatformµÄ·´ÐòÁл¯Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://support.sas.com/kb/63/391.html
4. IDenticard PremisysÊý¾Ý¿âĬÈÏƾ֤©¶´
IDenticard Premisys Identicard·þÎñÔÚ°²×°Ê±Ê¹ÓÃĬÈϵÄÊý¾Ý¿âÓû§ÃûºÍÃÜÂ룬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Î´ÊÚȨ·ÃÎÊÊý¾Ý¿âȨÏÞ¡£
http://www.securityfocus.com/bid/106552
5. LCDS LAquis SCADAδÊÚȨ·ÃÎÊ©¶´
LCDS LAquis SCADAʵÏÖ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÈƹýÉí·ÝÑéÖ¤£¬»ñÈ¡Ãô¸ÐÐÅÏ¢¡£
https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01
ÖØÒªÄþ¾²Ê¼þ×ÛÊö

ÒÔÉ«ÁÐÄþ¾²Ñо¿Ô±Noam Rotem·¢ÏÖ»úƱԤ¶©ÏµÍ³Amadeus´æÔÚÒ»¸öÑÏÖصÄÄþ¾²Â©¶´£¬¿Éµ¼ÖÂÓû§ÐÅϢй¶ºÍÕË»§¸ü¸Ä¡£RotemÔÚÒÔÉ«Áк½¿Õ¹«Ë¾ELALÔ¤¶©»úƱʱ·¢ÏÖÁËÕâÒ»ÎÊÌ⣬ÔÚÔ¤¶©º½°àºó£¬ÂÿͻáÊÕµ½PNRºÅÂëºÍÓÃÓÚ¼ì²ìÔ¤¶©ÐÅÏ¢µÄÁ´½Ó¡£Rotem·¢ÏÖͨ¹ý½«¸ÃÁ´½ÓÉϵÄRULE_SOURCE_1_ID²ÎÊýÐÞ¸ÄΪÆäËüÈ˵ÄPNRºÅÂë¼´¿É¼ì²ìËûÈ˵ÄÔ¤¶©ÐÅÏ¢£¬¹¥»÷Õß»¹¿ÉÀûÓÃÕâЩÐÅÏ¢·ÃÎÊELALÃÅ»§ÍøÕ¾²¢¸ü¸ÄÊܺ¦ÕßµÄÕË»§ÐÅÏ¢£¬°üÂÞ¶Ò»»Àï³Ì¡¢¸ü¸ÄÓʼþµØÖ·ºÍµç»°ºÅÂëµÈ¡£ÓÉÓÚAmadeus¿ª·¢µÄ»úƱԤ¶©ÏµÍ³±»È«ÇòÖÁÉÙ141¼Òº½¿Õ¹«Ë¾Ê¹Ó㨰üÂÞÃÀ¹úÁªºÏº½¿Õ¹«Ë¾¡¢µÂ¹úººÉ¯º½¿Õ¹«Ë¾ºÍ¼ÓÄô󺽿չ«Ë¾µÈ£©£¬Òò´Ë¸Ã©¶´¿ÉÄÜÓ°ÏìÁËÊýÒÚÂÿ͡£Ä¿Ç°AmadeusÒѾÐÞ¸´Á˸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/airlines-flight-hacking.html
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/oklahoma-fbi-data-leak.html
3¡¢Ó¢¹úBSIAÐû²¼»¥ÁªÄþ¾²ÏµÍ³×î¼Ñʵ¼ùÖ¸ÄÏ
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/bsia-guidelines-digital-sabotage/
4¡¢VoIP·þÎñÉÌVOIPOÒâÍâй¶¹ýÈ¥ËÄÄêµÄ¿Í»§Êý¾Ý
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/voip-service-database-hacking.html
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/es-file-explorer-flaws-put-100-million-users-data-at-risk-fix-promised/
ÉùÃ÷£º±¾×ÊѶÓɶ«Éƽ̨άËûÃüÄþ¾²Ð¡×é·ÒëºÍÕûÀí