ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ21ÖÜ
Ðû²¼Ê±¼ä 2019-06-03±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê5ÔÂ27ÈÕÖÁ6ÔÂ02ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache HadoopÔ¶³ÌȨÏÞÌáÉý©¶´£»ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñ©¶´£» Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐЩ¶´£»HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐЩ¶´£»Serv-U FTP ServerȨÏÞÌáÉý©¶´¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
ÖØÒªÄþ¾²Â©¶´Áбí
Apache Hadoop´æÔÚÒ»¸öÄþ¾²Â©¶´£¬ÔÊÐíÓµÓÐYAMȨÏÞµÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔrootÓû§Éí·ÝÔËÐÐÈÎÒâÃüÁî¡£
https://seclists.org/oss-sec/2019/q2/132
2. ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñ©¶´
ISC BINDµÝ¹é½âÎöÆ÷µÄEDNS¿Í»§¶Ë×ÓÍø´æÔÚÒ»¸öÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬴¦ÖðüÂÞRRSIGµÄÏìÓ¦µÄ±¨ÎÄʱ¿Ìʹ·þÎñÆ÷Í߽⡣
https://kb.isc.org/docs/cve-2019-6469
3. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐЩ¶´
Adobe Flash Player´æÔÚÊͷźóÀûÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://helpx.adobe.com/security/products/flash-player/apsb19-26.html
4. HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐЩ¶´
HPE Intelligent Management Center ByteMessageResource transformEntityÒªÁì´æÔÚ·´ÐòÁл¯Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-528/
5. Serv-U FTP ServerȨÏÞÌáÉý©¶´
WindowsϵÄServ-U FTP ServerÑéÖ¤´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíµ±µØ¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£
https://packetstormsecurity.com/files/153128/Serv-U-FTP-Server-15.1.6.25-Local-Privilege-Escalation.html
ÖØÒªÄþ¾²Ê¼þ×ÛÊö

¾ÝŦԼʱ±¨±¨µÀ£¬ÃÀ¹ú½ðÈÚ¹«Ë¾First American Financial Corporation¹ÙÍøÉϵÄÒ»¸ö©¶´Ð¹Â¶ÁË16ÄêÀ´ÓëµÖѺ´û¿îÓйصÄ8.85ÒÚÌõ¼Ç¼¡£¸Ã©¶´ÔÊÐíÈκÎÈË·ÃÎÊFirst American´æ´¢µÄÉç»áÄþ¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢¡¢¼ÝÕÕÒÔ¼°µÖѺ´û¿îºÍË°ÎñÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖÕýÔÚÆÀ¹À´Ëʼþ¶Ô¿Í»§ÐÅÏ¢Äþ¾²ÐÔµÄÓ°Ï죬ÔÚÄÚ²¿ÉóºËÍê³É֮ǰ£¬½«²»»á·¢±íÈκÎÆÀÂÛ¡£
ÔÎÄÁ´½Ó£º
https://www.nytimes.com/2019/05/24/technology/data-leak-first-american.html
2¡¢ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500Íò´î¿ÍÐÅÏ¢
ÔÎÄÁ´½Ó£º
https://www.calcalistech.com/ctech/articles/0,7340,L-3762693,00.html
3¡¢Î÷ÃÅ×Ó¶à¿îÒ½ÁÆÉ豸Ò×ÊÜWindows BlueKeep©¶´Ó°Ïì
ƾ¾ÝÎ÷ÃÅ×ÓÐû²¼µÄÄþ¾²Í¨¸æ£¬¶à¿îÎ÷ÃÅ×ÓÒ½ÁÆÉ豸Ò×ÊÜWindows RDP·þÎñBlueKeep©¶´µÄÓ°Ï죬°üÂÞMagicLinkA¡¢MagicViewµÈÈí¼þ²úÎSystem ACOM¡¢SensisµÈ¸ß¼¶ÖÎÁƲúÎAxiom¡¢MobilettµÈXÉäÏßÉ豸ÒÔ¼°Atellica¡¢AptioµÈʵÑéÊÒÕï¶Ï²úÎï¡£¸Ã¹«Ë¾ÒÑÒªÇó¿Í»§°²×°Î¢ÈíµÄÐÞ¸´²¹¶¡£¬µ«²»Äܱ£Ö¤²¹¶¡µÄ¼æÈÝÐÔ£¬¸Ã¹«Ë¾½¨ÒéÓû§½ÓÄɽûÓÃRDP¡¢×èÖ¹TCP¶Ë¿Ú3389µÈ»º½â´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86222/security/siemens-healthineers-bluekeep.html
4¡¢DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þ©¶´£¬Ó°ÏìËùÓÐDocker°æ±¾
Ñо¿ÈËÔ±Åû¶DockerÖÐδÐÞ¸´µÄ¾ºÕùÌõ¼þ©¶´£¬¸Ã©¶´Ó°ÏìÁËËùÓеÄDocker°æ±¾¡£¸Ã©¶´ÀàËÆÓÚCVE-2018-15664£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÖ¸¶¨µÄ·¨Ê½¶Ô×ÊÔ´½øÐвÙ×÷֮ǰÐÞ¸Ä×ÊԴ·¾¶£¬´Ó¶ø¿ÉÄÜ»ñµÃÈÎÒâÎļþµÄ¶Áд·ÃÎÊȨÏÞ£¬Õâ±»³ÆΪTOCTOUÀàÐ͵Äbug¡£¸Ã©¶´µÄºËÐÄÔ´ÓÚFollowSymlinkInScope¹¦Ð§Ò×ÊÜTOCTOU¹¥»÷¡£Ñо¿ÈËÔ±ÒѾÐû²¼ÁËPoC´úÂë¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/unpatched-flaw-affects-all-docker-versions-exploits-ready/
5¡¢¹È¸èÑо¿ÈËÔ±ÔÚWindows¼Çʱ¾Öз¢ÏÖ´úÂëÖ´ÐЩ¶´
Google Project ZeroÑо¿Ô±Tavis OrmandyÔÚ΢ÈíµÄWindows¼Çʱ¾Öз¢ÏÖÒ»¸ö´úÂëÖ´ÐЩ¶´£¬OrmandyÒÑÏò΢Èí³ÂËßÁ˸ÃÎÊÌ⡣©¶´µÄϸ½ÚÉÐδÅû¶£¬µ«OrmandyÔ¤¼Æ¸Ã©¶´ÊÇÒ»¸öÄÚ´æËð»µÂ©¶´£¬ËûÔÚTwitterÉÏ·ÖÏíµÄͼƬÑÝʾÁËÈçºÎÔÚ¼Çʱ¾Öе¯³öshell¡£Æ¾¾Ý¹È¸èµÄ©¶´Åû¶Õþ²ß£¬Ormandy½«ÔÚ90Ììºó»ò΢ÈíÐû²¼ÐÞ¸´²¹¶¡ºóÅû¶¸ü¶à©¶´Ï¸½Ú¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html