ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ15ÖÜ

Ðû²¼Ê±¼ä 2019-04-15

±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö



2019Äê4ÔÂ08ÈÕÖÁ14ÈÕ±¾Öܹ²ÊÕ¼Äþ¾²Â©¶´84¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇJuniper Networks Junos OSÃÜÂëÐ޸ĩ¶´£»Ubiquiti Networks EdgeSwitchÈÎÒâÃüÁîÖ´ÐЩ¶´; Apache Tomcat CVE-2019-0232ÈÎÒâ´úÂëÖ´ÐЩ¶´£»Microsoft Office Access Connectivity Engine CVE-2019-0825ÈÎÒâ´úÂëÖ´ÐЩ¶´£»Adobe AcrobatºÍReader CVE-2019-7117ÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÅ·Ã˳ÉÔ±¹ú¾Ù°ìÍøÂçÄþ¾²ÑÝÏ°£¬¼ÓÇ¿Ó¦¶ÔÑ¡¾ÙÆÚ¼äµÄÍøÂçÍþв£»Ñо¿ÈËÔ±ÀûÓÃ3D´òÓ¡µÄÖ¸ÎÆÄ£ÐÍÀֳɽâËøGalaxy S10 +£»WPA3Ò²²»Äþ¾²£¿Dragonblood©¶´¿ÉÆƽâWi-FiÃÜÂ룻Apache TomcatÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-0232£©£»TP-Link WR940NºÍWR941ND·ÓÉÆ÷ÁãÈÕ©¶´£¬¿Éµ¼ÖÂÉ豸±»½Ó¹Ü ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£



ÖØÒªÄþ¾²Â©¶´Áбí



1. Juniper Networks Junos OSÃÜÂëÐ޸ĩ¶´


Juniper Networks Junos OSÆôÓá®set system ports console insecure¡¯´æÔÚÄþ¾²Â©¶´£¬µ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»¡®set system root-authentication plain-text-password¡¯ÐÞ¸ÄrootÃÜÂë ¡£
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10924&actp=METADATA 

2. Ubiquiti Networks EdgeSwitchÈÎÒâÃüÁîÖ´ÐЩ¶´


Ubiquiti Networks EdgeSwitch´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Ö´ÐÐÈÎÒâosÃüÁî ¡£
https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeSwitch-X-software-release-v1-1-1/ba-p/2731137 

3. Apache Tomcat CVE-2019-0232ÈÎÒâ´úÂëÖ´ÐЩ¶´


Apache Tomcat enableCmdLineArguments´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë ¡£
https://vigilance.fr/vulnerability/Apache-Tomcat-code-execution-via-Windows-enableCmdLineArguments-28999 

4. Microsoft Office Access Connectivity Engine CVE-2019-0825ÈÎÒâ´úÂëÖ´ÐЩ¶´


Microsoft Office´¦ÖÃÌØÊâÎļþ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐÈÎÒâ´úÂë ¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0825 

5. Adobe AcrobatºÍReader CVE-2019-7117ÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´


Adobe AcrobatºÍReader´¦ÖÃÎļþ´æÔÚÀàÐÍ»ìÏý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐÈÎÒâ´úÂë ¡£
https://helpx.adobe.com/security/products/acrobat/apsb19-17.html 


 ÖØÒªÄþ¾²Ê¼þ×ÛÊö



1¡¢Å·Ã˳ÉÔ±¹ú¾Ù°ìÍøÂçÄþ¾²ÑÝÏ°£¬¼ÓÇ¿Ó¦¶ÔÑ¡¾ÙÆÚ¼äµÄÍøÂçÍþв

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ΪÁËÓ­½Ó¼´½«ÔÚ2019Äê5ÔÂ23ÈÕÖÁ26ÈÕ¾Ù°ìµÄÅ·ÃËÒé»áÑ¡¾Ù£¬Å·ÃËÍøÂçÄþ¾²¾Ö£¨ENISA£©¼°Å·Ã˳ÉÔ±¹úÁªºÏ¾Ù°ìÁËÒ»ÏîÃûΪEU ELEx19µÄÑÝÏ°£¬ÒÔ¼ÓÇ¿Ó¦¶ÔÑ¡¾ÙÆÚ¼äµÄÍøÂçÄþ¾²Íþв ¡£Æ¾¾ÝÅ·ÃËÒé»á£¬ÕâÏîÑÝÏ°µÄÄ¿±êÊÇÕÒµ½Ô¤·À¡¢¼ì²â¼°»º½âÓ°ÏìÅ·ÃËÑ¡¾ÙµÄÍøÂçÄþ¾²Ê¼þµÄÒªÁì ¡£ÕâÏîÑÝÏ°¿ÉÒÔʹŷÃ˳ÉÔ±¹ú²âÊÔÆäΣ»úÏìÓ¦·½°¸£¬²¢Ìá¸ß¿ç¾³Ð­µ÷ÏìÓ¦µÄÄÜÁ¦ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/eu-states-test-and-strengthen-readiness-for-election-cyber-threats/

2¡¢Ñо¿ÈËÔ±ÀûÓÃ3D´òÓ¡µÄÖ¸ÎÆÄ£ÐÍÀֳɽâËøGalaxy S10 +


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ñо¿ÈËÔ±·¢ÏÖÈýÐǵij¬Éù²¨Ö¸ÎÆʶ±ð¿Éͨ¹ý3D´òÓ¡µÄÖ¸ÎÆÄ£ÐÍÀ´Èƹý ¡£Æ¾¾ÝImgurÓû§darksharkÐû²¼µÄÎÄÕ£¬ËûÓÃÖÇÄÜÊÖ»ú´Ó¾Æ±­µÄ²àÃæÅÄÏÂÁËËûµÄÖ¸ÎÆÕÕƬ£¬È»ºóʹÓÃ3DS MaxÈí¼þ´´½¨3DÖ¸ÎÆÄ£ÐÍ£¬²¢Ê¹ÓÃAnyCubic Photon LCD´òÓ¡»ú´òÓ¡³öÖ¸ÎÆÄ£ÐÍ£¬Õâ¿éÖ¸ÎÆÄ£Ðͼ´¿É½âËøGalaxy S10 + ¡£

Ô­ÎÄÁ´½Ó£º
https://mashable.com/article/samsung-fingerprint-scanner-fooled-3d-printing/#4pCm_5_D_PqO

3¡¢WPA3Ò²²»Äþ¾²£¿Dragonblood©¶´¿ÉÆƽâWi-FiÃÜÂë


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚ4ÔÂ10ÈÕ·¢±íµÄһƪÂÛÎÄÖУ¬Äþ¾²Ñо¿ÈËÔ±Mathy VanhoefºÍEyal Ronen·¢ÏÖWPA3-PersonalЭÒé´æÔÚЩ¶´Dragonblood£¬ÕâЩ©¶´¿ÉÔÊÐíDZÔÚ¹¥»÷ÕßÆƽâWi-FiÃÜÂë²¢ÇÔÈ¡¼ÓÃÜÁ÷Á¿ ¡£ÔÚÂÛÎÄÖÐÑо¿ÈËÔ±Ïêϸ½éÉÜÁËWPA3µÄÁ½ÖÖÉè¼ÆȱÏÝ£ºÒ»ÖÖÊǽµ¼¶¹¥»÷£¬Ò»ÖÖÊDzàÐŵÀй¶ ¡£Ê×ÏÈWPA3Ìṩ¹ý¶ÉģʽÒÔÖ§³Ö¾ÉÉ豸£¬µ«¹¥»÷Õß¿ÉÒÔÀÄÓÃÕâЩÉèÖÃÀ´ÆÈʹWPA3É豸ʹÓò»Äþ¾²µÄWPA2µÄ4´ÎÎÕÊÖ£¬¶øÇÒÕâÖÖ½µ¼¶¹¥»÷Ö»ÐèÒªÖªµÀWPA3ÍøÂçµÄSSID ¡£Æä´ÎÑо¿ÈËÔ±½éÉÜÁËÁ½ÖÖ²àÐŵÀ¹¥»÷-»ùÓÚ»º´æ£¨CVE-2019-9494£©ºÍ»ùÓÚʱÐò£¨CVE-2019-9494£©£¬¿ÉÓÃÓÚ»ñÈ¡Wi-FiÃÜÂëºÍÇÔÈ¡¼ÓÃÜ´«ÊäµÄÃô¸ÐÐÅÏ¢ ¡£Ñо¿ÈËÔ±½«ÔÚGitHubÉÏÐû²¼PoC²âÊÔ¹¤¾ß ¡£Wi-FiÁªÃËÈ·ÈϳÆÕýÔÚÓ빩ӦÉ̺Ï×÷ÐÞ²¹ÏÖÓеÄWPA3ÈÏÖ¤É豸 ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/04/wpa3-hack-wifi-password.html

4¡¢Apache TomcatÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-0232£©


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


4ÔÂ10ÈÕApache¹Ù·½Ðû²¼Í¨¸æ³Æ½«ÔÚа汾ÖÐÐÞ¸´Ô¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-0232£© ¡£ÓÉÓÚJREÔÚ½«²ÎÊýͨ±¨µ½Windows»·¾³Ê±CGI ServletÖдæÔÚÊäÈëÑéÖ¤´íÎ󣬵¼ÖÂÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÇëÇóÒÔTomcatµÄȨÏÞÔÚϵͳÉÏ×¢ÈëºÍÖ´ÐÐÈÎÒâOSÃüÁî ¡£ÊÜÓ°ÏìµÄTomcat°æ±¾°üÂÞ9.0.13¡¢9.0.14ºÍ9.0.16 ¡£Apache¹Ù·½ÉÐδÐû²¼ÐÞ¸´²¹¶¡£¬µ«Óû§¿Éͨ¹ý½ûÓÃenableCmdLineArgumentsÑ¡ÏîÁÙʱ½øÐзÀ»¤ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.cybersecurity-help.cz/vdb/SB2019041101?affChecked=1

5¡¢TP-Link WR940NºÍWR941ND·ÓÉÆ÷ÁãÈÕ©¶´£¬¿Éµ¼ÖÂÉ豸±»½Ó¹Ü

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IBM SecurityÑо¿ÍŶӷ¢ÏÖTP-Link TL-WR940NºÍTL-WR941NDÁ½¿î·ÓÉÆ÷´æÔÚ»º³åÇøÒç³ö©¶´£¬¿Éµ¼Ö¶ñÒâµÚÈý·½Ô¶³Ì¿ØÖƸÃÉ豸 ¡£¸Ã©¶´ÓëÉ豸µÄWeb¿ØÖÆÃæ°åÓйØ£¬ËäȻƾ¾ÝTP-LinkµÄ·ÓÉÆ÷Ïà¹ØÎĵµ£¬ÕâÁ½ÖÖÐͺŶ¼ÒÑÍ£²ú£¬µ«ËüÃÇÈÔ¿ÉÒÔ´ÓTargetºÍWalmartµÈÁãÊÛÉÌ´¦¹ºÖà ¡£TP-LinkÓÚ3ÔÂ12ÈÕÐû²¼Á˹̼þ¸üУ¬½¨ÒéÓû§¾¡¿ì½øÐиüР¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/tp-link-routers-vulnerable-to-zero-day-buffer-overflow-attack/143575/