ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ40ÖÜ

Ðû²¼Ê±¼ä 2019-10-14

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê10ÔÂ07ÈÕÖÁ13ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´50¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇCobham plc EXPLORER 710ĬÈÏÑé֤ƾ¾Ý©¶´; ·ºÎ¢OAϵͳ SQL×¢È멶´£»iTerm2Ô¶³Ì´úÂëÖ´ÐЩ¶´£»Microsoft Windows Secure BootÄþ¾²Èƹý©¶´£»QEMU ahci_commit_buf()¿ÕÖ¸Õë¼ä½ÓÒýÓ鶴¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǶíÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶£»Ponemon InstituteÐû²¼¡¶2019ÄêÈ«ÇòSMBÍøÂçÄþ¾²×´¿ö³ÂËß¡·£»VolusionÔâºÚ¿ÍÈëÇÖ £¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°£»Ë¼¿ÆTalosÍŶӷ¢ÏÖNitroPDF´æÔÚ¶à¸öRCE©¶´£»Imperva³ÆÆäÊý¾Ý鶵ÄÔ­ÒòÊÇAWS APIÃÜÔ¿±»µÁ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


> ÖØÒªÄþ¾²Â©¶´Áбí


1. Cobham plc EXPLORER 710ĬÈÏÑé֤ƾ¾Ý©¶´


Cobham plc EXPLORER 710´æÔÚÓë֮ǰÉ豸ÏàͬµÄROOTÃÜÂë £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬Î´ÊÚȨ·ÃÎÊ¡£

https://kb.cert.org/vuls/id/719689/


2. ·ºÎ¢OAϵͳ SQL×¢È멶´


·ºÎ¢E-cologyOA´æÔÚSQL×¢ÈëÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄSQLÇëÇó £¬²Ù×÷Êý¾Ý¿â £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.weaver.com.cn/cs/securityDownload.asp


3. iTerm2Ô¶³Ì´úÂëÖ´ÐЩ¶´


iTerm2 tmux¼¯ÀÖ³ÉÄÜ´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐÈÎÒâÃüÁî¡£

https://kb.cert.org/vuls/id/763073/


4. Microsoft Windows Secure BootÄþ¾²Èƹý©¶´


Microsoft Windows Secure BootûÓÐÕýÈ·µØÏÞÖƶԻ»ÊÔ¹¦Ð§µÄ·ÃÎÊ £¬ÔÊÐíµ±µØ¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿É»ñÈ¡±»±£»¤µÄÄÚºËÄÚ´æ¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1368


5. QEMU ahci_commit_buf()¿ÕÖ¸Õë¼ä½ÓÒýÓ鶴


QEMU ahci_commit_buf()´æÔÚ¿ÕÖ¸Õë¼ä½ÓÒýÓ鶴 £¬ÔÊÐíµ±µØ¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬½øÐоܾø·þÎñ¹¥»÷¡£

https://access.redhat.com/security/cve/cve-2019-12067



> ÖØÒªÄþ¾²Ê¼þ×ÛÊö



1¡¢¶íÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¶íÂÞ˹ýÌåµÄ±¨µÀ £¬À´×Ô¶íÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌBeelineµÄ870ÍòÃû¿Í»§Êý¾ÝÕýÔÚÍøÉϳöÊۺ͹²Ïí¡£ÕâЩÊý¾Ý°üÂÞÏêϸµÄ¸öÈËÐÅÏ¢ £¬ÈçÐÕÃû¡¢µØÖ·¡¢ÊÖ»úºÅÂëºÍ¼ÒÍ¥µç»°ºÅÂëµÈ¡£BeelineÈ·ÈÏÁËÕâһʼþ £¬²¢ÌåÏÖÊý¾Ýй¶·¢ÉúÔÚ2017Äê £¬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2016Äê11ÔÂ֮ǰע²á¼ÒÍ¥¿í´øµÄ¶íÂÞ˹Óû§¡£ÆäʱBeelineÕÒµ½ÁËÊý¾Ý鶵ÄÔðÈÎÈË £¬µ«Î´¹ûÈ»´Ëʼþ¡£ÕâЩÊý¾ÝÒѾ­±»ÔÚÍøÉϹ²Ïí £¬°üÂÞÔÚTelegramƵµÀÉϹ²Ïí¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/data-breach-at-russian-isp-impacts-8-7-million-customers/


2¡¢Ponemon InstituteÐû²¼¡¶2019ÄêÈ«ÇòSMBÍøÂçÄþ¾²×´¿ö³ÂËß¡·


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÖܶþPonemon InstituteÐû²¼µÄ¡¶2019ÄêÈ«ÇòSMBÍøÂçÄþ¾²×´¿ö³ÂËß¡· £¬È«Çò66%µÄÖÐСÐÍÆóÒµ£¨SMB£©ÔÚ¹ýÈ¥12¸öÔÂÄÚ³ÂËßÁËÍøÂç¹¥»÷ʼþ - ÆäÖÐ76%µÄÆóÒµ×ܲ¿Î»ÓÚÃÀ¹ú¡£PonemonÌåÏÖÕâÊÇÁ¬ÐøµÚÈýÄêSMB³ÂËßµÄÍøÂçÄþ¾²Ê¼þ·ºÆð¡°ÏÔÖøÔö³¤¡±¡£µ±Ç°SMBÃæÁÙµÄ×î³£¼ûÍøÂç¹¥»÷ÐÎʽÊÇÍøÂçµöÓã¡¢É豸ÈëÇÖ»ò±»µÁ¡¢Æ¾¾ÝÇÔÈ¡¡£Ëæ×Å×Ô´øÉ豸°ì¹«£¨BYOD£©Ä£Ê½µÄÊ¢ÐÐ £¬É豸µÄ±»µÁÓÈÆä³ÉΪһ¸öÎÊÌâ¡£ÔÚ¹ýÈ¥12¸öÔÂÖÐ £¬¹²ÓÐ63%µÄÆóÒµ³ÂËßÁËÃô¸Ð¹«Ë¾Êý¾Ý»ò¿Í»§ÐÅÏ¢¶ªÊ§Ê¼þ £¬¶øÔÚÃÀ¹úÕâÒ»±ÈÀýÉÏÉýÖÁ69% £¬ÏÔÖø¸ßÓÚËÄÄêÇ°µÄ50%¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/76-percent-of-us-businesses-have-experienced-a-cyberattack-in-the-past-year/


3¡¢VolusionÔâºÚ¿ÍÈëÇÖ £¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝzdnetµÄÏûÏ¢ £¬ºÚ¿ÍÈëÇÖVolusionµÄ»ù´¡ÉèÊ©²¢Á÷´«¶ñÒâ´úÂë £¬µ¼ÖÂÁè¼Ý6500¼Òµç×ÓÉ̵êÍøÕ¾ÊÜÓ°Ïì¡£¸ÃʼþÊÇÒ»¸öµäÐ͵ÄMAGECART¹©Ó¦Á´¹¥»÷ £¬¹¥»÷Õß»ñµÃÁËVolusionµÄGoogle Cloud»ù´¡ÉèÊ©·ÃÎÊȨÏÞ £¬²¢ÔÚÆäÖÐÐÞ¸ÄÁËJSÎļþ £¬Ìí¼ÓÓÃÓڼǼÓû§ÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâ´úÂë¡£ÕâЩ¶ñÒâ´úÂë±»¼ÓÔص½»ùÓÚVolusionµÄÔÚÏßÉ̵êÖС£½ØÖÁÄ¿Ç°¶ñÒâ´úÂëÈÔÔÚVolusionµÄ·þÎñÆ÷ÉÏ £¬VolusionÉÐδ¶Ô´Ëʼþ½øÐлØÓ¦¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-breach-volusion-and-start-collecting-card-details-from-thousands-of-sites/


4¡¢Ë¼¿ÆTalosÍŶӷ¢ÏÖNitroPDF´æÔÚ¶à¸öRCE©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÅû¶NitroPDFÖеĶà¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´¡£Nitro PDFÔÊÐíÓû§ÔÚÆä¼ÆËã»úÉÏÉú´æ¡¢ÔĶÁºÍ±à¼­PDFÎļþ £¬¸Ã²úÎï·ÖΪÃâ·Ñ°æºÍÊÕ·Ñ°æ¡£´Ë´Î·¢Ïֵĩ¶´¶¼´æÔÚÓÚÊշѵÄPro°æÖС£Â©¶´°üÂÞjpeg2000 ssizDepthÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5045£©¡¢Page KidsÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5050£©¡¢ICCBasedÉ«²Ê¿Õ¼äÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5048£©¡¢CharProcsÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5047£©¡¢ jpeg2000 yTsizÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5046£©¼°Á÷³¤¶È½âÎö¹¦Ð§ÄÚ´æËð»µÂ©¶´£¨CVE-2019-5053£©¡£ÊÜÓ°ÏìµÄ°æ±¾ÎªNitroPDF 12.12.1.522¡£NitroPDFÉÐδÐû²¼Ïà¹ØÐÞ¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2019/10/vuln-spotlight-Nitro-PDF-RCE-bugs-sept-19.html


5¡¢Imperva³ÆÆäÊý¾Ý鶵ÄÔ­ÒòÊÇAWS APIÃÜÔ¿±»µÁ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶Ê¼þ £¬²¢ÔÚ½ñÌìÐû²¼ÁËÒ»·ÝÏêϸµÄʺó³ÂËß¡£¸Ã¹«Ë¾³Æ´Ë´ÎÊý¾Ý鶵ÄÔ­ÒòÊÇAWS APIÃÜÔ¿µÄ±»µÁ £¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâÍâÁ¬½Óµ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿·ÃÎÊImpervaµÄÔÆ»ù´¡ÉèÊ© £¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDS·þÎñ¡£Imperva²¢Î´Åû¶ÉÏÊöʼþ¼òÖ±ÇÐÈÕÆÚ £¬Òò´ËÉÐÎÞ·¨È·ÈϺڿͷÃÎÊÁ˸ù«Ë¾µÄ·þÎñÆ÷¶à³¤Ê±¼ä¡£ImpervaÊ×ϯִÐйٴóÂÔ¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÁ¿ £¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó £¬¿Í»§¸ü»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Êé £¬²¢ÖØÐÂÉú³ÉÁË1400¶à¸öImperva APIÃÜÔ¿¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/