ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ13ÖÜ

Ðû²¼Ê±¼ä 2019-04-01

±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê3ÔÂ25ÈÕÖÁ31ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´53¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇApache Tomcat HTTP/2¾Ü¾ø·þÎñ©¶´£»DedeCMSÈÎÒâÓû§ÃÜÂëÖØÖ鶴; Forcepoint Email SecurityÃÜÂëÖØÖ鶴£»Green Hills INTEGRITY RTOS IPWEBSÕ»Òç³ö©¶´£»Dell EMC NetWorker CVE-2017-8023ÈÎÒâÃüÁîÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇUCä¯ÀÀÆ÷Ò×ÔâÖмäÈ˹¥»÷ £¬²¨¼°5ÒÚÓû§£»Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷ £¬»òÓ°ÏìÁè¼Ý100ÍòÓû§£»TP-Link SR20·ÓÉÆ÷0day £¬¿Éµ¼ÖÂÈÎÒâ´úÂëÖ´ÐУ»Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³ £¬Ðû²¼30¶à¸öÐé¼Ù¾¯±¨¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£



ÖØÒªÄþ¾²Â©¶´Áбí


1. Apache Tomcat HTTP/2¾Ü¾ø·þÎñ©¶´


Apache Tomcat HTTP/2ʵÏÖ´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿É½øÐоܾø·þÎñ¹¥»÷¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199


2. DedeCMSÈÎÒâÓû§ÃÜÂëÖØÖ鶴
DedeCMS member/resetpassword.phpÎļþûÓÐÕýÈ·µØÑéÖ¤key²ÎÊý £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖØÖÃÈÎÒâÓû§µÄÃÜÂë¡£
https://blog.csdn.net/yalecaltech/article/details/88594388


3. Forcepoint Email SecurityÃÜÂëÖØÖ鶴


Forcepoint Email SecurityÃÜÂëÖØÖù¦Ð§´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬ÖØÖÃÃÜÂë¡£
https://support.forcepoint.com/KBArticle?id=000016655


4. Green Hills INTEGRITY RTOS IPWEBSÕ»Òç³ö©¶´


Green Hills INTEGRITY RTOS IPWEBS½âÎöhttpÑé֤ͷ´æÔÚÕ»Òç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://github.com/bl4ckic3/GHS-Bugs


5. Dell EMC NetWorker CVE-2017-8023ÈÎÒâÃüÁîÖ´ÐЩ¶´


Dell EMC NetWorker RPC·þÎñ´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔnsrexecd·þÎñȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://packetstormsecurity.com/files/152245/EMC-Networker-Remote-Code-Execution.html



 ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢UCä¯ÀÀÆ÷Ò×ÔâÖмäÈ˹¥»÷ £¬²¨¼°5ÒÚÓû§


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÄþ¾²³§ÉÌDr. WebÐû²¼µÄÒ»·ÝгÂËß £¬UCä¯ÀÀÆ÷ÖÁÉÙ´Ó2016Ä꿪ʼ¾Í¾ßÓÐÒ»¸öÒþ²ØµÄ¹¦Ð§ £¬¿É´Ó¹«Ë¾µÄ·þÎñÆ÷ÏòÓû§µÄAndroidÉ豸ÏÂÔز¢°²×°ÐµĿâºÍÄ£¿é¡£ÓÉÓڴ˹¦Ð§ÊÇ»ùÓÚHTTPЭÒé £¬Ê¹µÃ¹¥»÷Õß¿ÉÖ´ÐÐMiTM¹¥»÷²¢ÏòÓû§ÍÆËͶñÒâÄ£¿é¡£UCä¯ÀÀÆ÷²¢Î´¼ì²é²å¼þµÄÇ©Ãû £¬ÕâÒâζ×ŶñÒâÄ£¿é½«»áÎÞÐèÑéÖ¤¶øÖ±½ÓÆô¶¯¡£´ËÍâ £¬ÕâÒ»¹¦Ð§Ò²Î¥·´ÁËGoogle PlayµÄÄþ¾²Õþ²ß¡£ËùÓа汾µÄUCä¯ÀÀÆ÷ºÍUC Miniä¯ÀÀÆ÷¾ùÊÜÓ°Ïì £¬¾Ý³Æ¸Ãä¯ÀÀÆ÷ÔÚÖйúºÍÓ¡¶ÈÓµÓÐÁè¼Ý5ÒÚÓû§¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/03/uc-browser-android-hacking.html


2¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷ £¬»òÓ°ÏìÁè¼Ý100ÍòÓû§


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢ÏÖÒ»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÅÓ´ó¹©Ó¦Á´¹¥»÷ £¬´Ë´Î¹¥»÷·¢ÉúÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä £¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£»ªË¶Live UpdateÊÇԤװÔÚ´ó¶àÊý»ªË¶µçÄÔÉϵÄʵÓ÷¨Ê½ £¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯·¨Ê½µÈ×é¼þ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿±êMACµØÖ·µÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£© £¬µ«Ä¿±êȺÌåµÄÉí·ÝÉв»Ã÷È·¡£ÓÉÓÚÑù±¾ÊÇÓúϷ¨Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£© £¬¶øÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ £¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢ÏÖ¡£Ä¿Ç°µÄÖ¤¾Ý±íÃ÷¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ¡£


Ô­ÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/


3¡¢TP-Link SR20·ÓÉÆ÷0day £¬¿Éµ¼ÖÂÈÎÒâ´úÂëÖ´ÐÐ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹È¸è¿ª·¢ÈËÔ±GarretÅû¶ÁËTP-Link SR20ÖÇÄܼҾÓ·ÓÉÆ÷ÖеÄ0day £¬¸Ã©¶´ÔÊÐíͬһÍøÂçÖеÄDZÔÚ¹¥»÷ÕßÖ´ÐÐÈÎÒâ´úÂë¡£GarretÏòTP-Link³ÂËßÁ˸鶴 £¬µ«ÔÚ90ÌìÄÚ²¢Î´µÃµ½TP-LinkµÄ»Ø¸´ £¬Òò´ËËûÐû²¼ÁËÕâһ©¶´¡£¸Ã©¶´ÔÊÐí¹¥»÷ÕßÒÔrootÉí·ÝÖ´ÐÐÈÎÒâÃüÁî £¬Garret»¹Ðû²¼ÁËÏà¹ØPoC¡£½ØÖÁÄ¿Ç°TP-LinkÉÐδ½øÐлØÓ¦¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zero-day-tp-link-sr20-router-vulnerability-disclosed-by-google-dev/


4¡¢Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚÉÏÖÜÔâµ½ÀÕË÷Èí¼þLockerGoga¹¥»÷Ö®ºó £¬Å²ÍþÂÁÉú²úÉÌNorsk HydroÈÔÔÚ»Ö¸´ÆäITϵͳ¡£¸Ã¹«Ë¾³Æ»ùÓڸ߲ãÆÀ¹À £¬¿ª¶ËÔ¤¼ÆÍøÂç¹¥»÷Ôì³ÉµÄËðʧԼΪ3-3.5ÒÚŲÍþ¿ËÀÊ£¨ºÏ3500-4100ÍòÃÀÔª£© £¬Ö÷ÒªËðʧÀ´Ô´ÓÚÀûÈóºÍÂÁ²Ä¼·Ñ¹ÒµÎñµÄËðʧ¡£¸Ã¹«Ë¾³ÆÂÁ²Ä¼·Ñ¹½â¾ö·½°¸ÒѾ­»Ö¸´ÁË70-80% £¬µ«½¨ÖþϵͳҵÎñÈÔδ»Ö¸´¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/norsk-hydro-ransomware-costs-hit-1-1/


5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³ £¬Ðû²¼30¶à¸öÐé¼Ù¾¯±¨


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


3ÔÂ12ÈÕÁ賿2:30×óÓÒ £¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈø˹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³ £¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐé¼ÙÁú¾í·ç¾¯±¨ £¬ÒýÆðÁ˵±µØ¾ÓÃñµÄ¿Ö»Å¡£ÆäÖÐ20¸öÐé¼Ù¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ £¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬ £¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£·þÎñ¡£¾¯·½ÕýÔÚ¶ÔÕâЩÈëÇÖÐÐΪ½øÐÐÊӲ졣


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html