ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ42ÖÜ

Ðû²¼Ê±¼ä 2019-10-28

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö



2019Äê10ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´43¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇRittal Chiller SK 3232-SeriesδÊÚȨ·ÃÎÊ©¶´; Xiaomi Mi WiFi R3GÃüÁî×¢È멶´£»Google Chrome Blink CVE-2019-13700»º³åÇøÒç³ö©¶´£»PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Fortinet FortiMail web console²»ÕýÈ··ÃÎÊ¿ØÖÆ©¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÈËÔ±Åû¶´æÔÚ4ÄêµÄLinux Wi-Fi»º³åÇøÒç³ö©¶´£»AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Ç÷ÊƿƼ¼ATTK¹¤¾ß°ü´æÔÚÈÎÒâ´úÂëÖ´ÐЩ¶´£»CyberXÐû²¼È«ÇòÎïÁªÍø/ICS·çÏÕ³ÂËߣ¨2020°æ£©£»Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ´æÔÚDLL½Ù³Ö©¶´ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


>ÖØÒªÄþ¾²Â©¶´Áбí



1. Rittal Chiller SK 3232-SeriesδÊÚȨ·ÃÎÊ©¶´
Rittal Chiller SK 3232-Series WEB½Ó¿Ú´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Î´ÊÚȨ¸ü¸ÄÅäÖ㬴ò¿ª»ò¹Ø±ÕÖÆÀäÉ豸 ¡£
https://www.us-cert.gov/ics/advisories/icsa-19-297-01

2. Xiaomi Mi WiFi R3GÃüÁî×¢È멶´
Xiaomi Mi WiFi R3G±¸·ÝÎļþÉÏ´«´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâOSÃüÁî ¡£
https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py

3. Google Chrome Blink CVE-2019-13700»º³åÇøÒç³ö©¶´
Google Chrome Blink´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐÈÎÒâ´úÂë ¡£
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html

4. PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´ÐЩ¶´
ÔÚʹÓÃNginx + php-fpm·þÎñÆ÷ʱ£¬fastcgi_split_path_info´¦ÖÃ%0aʱÓöµ½»»Ðзû \n µ¼ÖÂPATH_INFOΪ¿Õ ¡£¶øphp-fpmÔÚ´¦Öà PATH_INFOΪ¿ÕµÄÇé¿öÏ£¬´æÔÚÂß¼­È±ÏÝ£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë ¡£
https://lab.wallarm.com/php-remote-code-execution-0-day-discovered-in-real-world-ctf-exercise/

5. Fortinet FortiMail web console²»ÕýÈ··ÃÎÊ¿ØÖÆ©¶´
Fortinet FortiMail web console´æÔÚ²»ÕýÈ··ÃÎÊ¿ØÖÆ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÌáÉýȨÏÞ ¡£
https://fortiguard.com/psirt/FG-IR-19-237


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö



1¡¢Ñо¿ÈËÔ±Åû¶´æÔÚ4ÄêµÄLinux Wi-Fi»º³åÇøÒç³ö©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GithubÊ×ϯÄþ¾²¹¤³ÌʦNico Waisman·¢ÏÖLinux rtlwifiÇý¶¯·¨Ê½ÖдæÔÚÒ»¸ö¾ßÓÐ4ÄêÀúÊ·µÄÑÏÖØ©¶´£¨CVE-2019-17666£©£¬¹¥»÷Õß¿ÉÀûÓø鶴ÈëÇÖÒ×Êܹ¥»÷µÄϵͳ ¡£rtlwifiÇý¶¯·¨Ê½ÓÃÓÚÔÊÐíRealtek Wi-FiÄ £¿éÓëLinuxϵͳ½øÐÐͨÐÅ£¬¹¥»÷Õß¿ÉÄÜÀûÓó¤¶È²»ÕýÈ·µÄÊý¾Ý°ü´¥·¢»º³åÇøÒç³ö£¬Ê¹µÃLinux±ÀÀ£»òÊÇÔ¶³ÌÖ´ÐдúÂë ¡£¾Ý³Æ¸Ã©¶´Ó°ÏìÁËLinux°æ±¾5.3.6£¬¸ÃÎÊÌâ×Ô´Ó2015ÄêÒÔÀ´¾ÍÒ»Ö±´æÔÚ ¡£LinuxÄÚºËÍŶÓÒѾ­¿ª·¢ÁËÒ»¸öÕýÔÚÐÞ¶©µÄÐÞ¸´²¹¶¡£¬µ«¸Ã²¹¶¡ÉÐδ°üÂÞÔÚLinuxÄÚºËÖÐ ¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/critical-linux-wi-fi-bug-system-compromise/149325/

2¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßµÄÄ¿µÄËƺõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£© ¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢ÏÖÁËÕâÒ»¹¥»÷ʼþ£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÁÙʱVPNÕË»§·ÃÎÊÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬¸ÃÕË»§Ã»ÓÐÓò¹ÜÀíԱȨÏÞ£¬µ«ºÚ¿ÍÀֳɽøÐÐÁËÌáȨ ¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄ·ÖÎöÏÔʾ£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´·ÃÎÊÄÚÍø ¡£Avast¶Ô¹¥»÷»î¶¯½øÐÐÁ˼à¿Ø£¬Ö±µ½10ÔÂ15ÈղŹرոÃÁÙʱVPNÕË»§ ¡£Ä¿Ç°ÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Äê·¢ÉúµÄ¹¥»÷´æÔÚ¹ØÁª ¡£AvastÔÚ¶ÔCCleaner½øÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üР¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

3¡¢Ç÷ÊƿƼ¼ATTK¹¤¾ß°ü´æÔÚÈÎÒâ´úÂëÖ´ÐЩ¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ñо¿ÈËÔ±·¢ÏÖÇ÷ÊƿƼ¼·ÀÍþв¹¤¾ß°ü£¨ATTK£©´æÔÚÒ»¸öÈÎÒâ´úÂëÖ´ÐЩ¶´£¨CVE-2019-9491£©£¬¹¥»÷Õß¿ÉÀûÓôË©¶´ÔÚÄ¿±êWindowsϵͳÉÏÔËÐжñÒâÈí¼þ ¡£Æ¾¾ÝÇ÷ÊƿƼ¼Ðû²¼µÄÄþ¾²Í¨¸æ£¬Èç¹û¶ñÒâÈí¼þ×÷Õß´ÕÇɽ«¶ñÒâÈí¼þÃüÃûΪcmd.exe»òregedit.exe£¬ÄÇôATTK½«»á¼ÓÔز¢ÔËÐиÃexeÎļþ ¡£ÓÉÓÚATTKÊÇÓɾ­¹ýÑéÖ¤µÄ¿¯Ðз½Ç©ÃûµÄ£¬Òò´Ë¿ÉÈƹýÈκÎMOTWÄþ¾²¾¯¸æ£¬¹¥»÷ÕßÉõÖÁ¿ÉÒÔ½«ATTK×÷ΪһÖÖ³Ö¾ÃÐÔ»úÖÆ ¡£Ç÷ÊƿƼ¼ÏÖÒѽ«ËùÓÐATTK ¸üÐÂÖÁ1.62.0.1223°æ±¾£¬µ«ÉÐδÐû²¼¼¼Êõϸ½Ú ¡£ 


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92818/hacking/trend-micro-anti-threat-toolkit-flaw.html

4¡¢CyberXÐû²¼È«ÇòÎïÁªÍø/ICS·çÏÕ³ÂËߣ¨2020°æ£©


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝCyberXµÄ¡¶È«ÇòÎïÁªÍø/ICS·çÏÕ³ÂËß¡·2020°æ£¬Ðí¶à¹¤ÒµÆóÒµÖÐÈÔÈ»´æÔÚ¹ýʱµÄ²Ù×÷ϵͳ£¬Õâ´øÀ´ÁËÑÏÖصķçÏÕ ¡£¸Ã³ÂËßÊÇ»ùÓÚÈ«Çò1800¶à¸ö¹¤ÒµÆóÒµ»·¾³ÖдÓ2018Äê10ÔÂÖÁ2019Äê10ÔÂÖ®¼äÊÕ¼¯µÄÊý¾Ý ¡£ÊӲ칤¾ßÖÐÓÐ62%µÄÉ豸ÔËÐеÄÊǹýʱÇÒ²»ÊÜÖ§³ÖµÄWindows°æ±¾£¨ÀýÈçWindows XPºÍ2000£©£¬Èç¹û°Ñ¼´½«ÔÚ2020Äê1ÔÂÍ£Ö¹Ö§³ÖµÄWindows 7¼ÆËãÔÚÄÚ£¬ÔòÕâÒ»Êý×ÖÉÏÉýÖÁ71£¥ ¡£CyberX»¹·¢ÏÖ£¬ÔÚ64£¥µÄÇé¿öÏÂÆóÒµÔÚÍøÂç´«ÊäÖÐδ¶ÔÃÜÂë½øÐмÓÃÜ£¬ÕâʹµÃ¹¥»÷Õ߸üÈÝÒ׽ػñÃÜÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/outdated-oss-still-present-many-industrial-organizations-report

5¡¢Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ´æÔÚDLL½Ù³Ö©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SafeBreach LabsÄþ¾²Ñо¿ÈËÔ±·¢ÏÖAvast¡¢AVGºÍAviraɱ¶¾Èí¼þ´æÔÚDLL½Ù³Ö©¶´£¬¿ÉÔÊÐí¹¥»÷Õß¼ÓÔضñÒâDLLÎļþÒÔÈƹý¼ì²âºÍÌáȨ ¡£¸Ã©¶´£¨CVE-2019-17093£©Ó°ÏìÁË°æ±¾19.8ÒÔϵÄËùÓÐAvastºÍAVGɱ¶¾Èí¼þ£¬Â©¶´Ô­ÒòÊÇAVGSvc.exeÊÔͼÔÚÆô¶¯Ê±¼ÓÔØDLL£¬µ«ËüÔÚ´íÎóµÄÎļþ¼ÐÖÐËÑË÷Îļþ£¨ÀýÈçC£º\Program Files\System32\£©£¬Ê¹µÃ¹¥»÷Õß¿ÉÒÔ½«Í¬ÃûDLL·ÅÈë¸ÃÎļþ¼ÐÖдӶøµ¼Ö¸ÃDLL±»ÒÔSYSTEMÌØȨ¼ÓÔØ ¡£Ñо¿ÈËÔ±ÔÚAvira Antivirus 2019Öз¢ÏÖÁËÀàËƵÄÎÊÌ⣨CVE-2019-17449£© ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/avast-avira-products-vulnerable-dll-hijacking