ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ47ÖÜ
Ðû²¼Ê±¼ä 2019-12-03>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê11ÔÂ25ÈÕÖÁ12ÔÂ01ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´48¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇF5 SSL Orchestrator SSL±àÅžܾø·þÎñ©¶´; Dell EMC Storage Monitoring and Reporting·´ÐòÁл¯´úÂëÖ´ÐЩ¶´£»TP-Link TL-WR841N http_parser_main»º³åÇøÒç³ö©¶´£»Symantec Critical System ProtectionÄþ¾²ÈƹýδÊÚȨ·ÃÎÊ©¶´£»Linux kernel Marvell WiFi chip driver lbs_ibss_join_existing»º³åÇøÒç³ö©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇTrickBotбäÖÖ¿ÉÇÔÈ¡OpenSSHºÍOpenVPNÃÜÔ¿£»FortinetÄþ¾²²úÎïÓ²±àÂë¼ÓÃÜÃÜԿ©¶´£¨CVE-2018-9195£©£»Á½¸öAndroid SDK·Ç·¨ÊÕ¼¯Facebook¼°TwitterÓû§Êý¾Ý£»»ÝÆÕ¾¯¸æ²¿ÃÅSSD½«ÔÚͨµç32768Сʱºó·¢Éú¹ÊÕÏ£»Î÷°àÑÀÄþ¾²³§ÉÌProsegurÔâµ½ÀÕË÷Èí¼þRyuk¹¥»÷¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
>ÖØÒªÄþ¾²Â©¶´Áбí
1. F5 SSL Orchestrator SSL±àÅžܾø·þÎñ©¶´
F5 SSL Orchestrator SSL±àÅÅ´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɽøÐоܾø·þÎñ¹¥»÷£¬Ê¹TMMÍ߽⡣
https://support.f5.com/csp/article/K21135478
2. Dell EMC Storage Monitoring and Reporting·´ÐòÁл¯´úÂëÖ´ÐЩ¶´
Dell EMC Storage Monitoring and Reporting Java RMI·þÎñ´æÔÚ·´ÐòÁл¯Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-996/
3. TP-Link TL-WR841N http_parser_main»º³åÇøÒç³ö©¶´
TP-Link TL-WR841N http_parser_main´¦ÖÃHost request´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-992/
4. Symantec Critical System ProtectionÄþ¾²ÈƹýδÊÚȨ·ÃÎÊ©¶´
Symantec Critical System ProtectionʵÏÖ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÄþ¾²ÏÞÖÆδÊÚȨ·ÃÎÊ¡£
https://support.symantec.com/us/en/article.SYMSA1498.html
5. Linux kernel Marvell WiFi chip driver lbs_ibss_join_existing»º³åÇøÒç³ö©¶´
Linux kernel Marvell WiFi chip driverÖеÄdrivers/net/wireless/marvell/libertas/cfg.c lbs_ibss_join_existing´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://access.redhat.com/security/cve/cve-2019-14896
>ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢TrickBotбäÖÖ¿ÉÇÔÈ¡OpenSSHºÍOpenVPNÃÜÔ¿
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӷ¢ÏÖTrickBotµÄбäÖÖ¸üÐÂÁËÃÜÂëÇÔÈ¡Ä£¿é£¬¿ÉÓÃÓÚÇÔÈ¡OpenSSH˽ԿÒÔ¼°OpenVPNÃÜÂëºÍÅäÖÃÎļþ¡£¸ÃÄ£¿é²¢²»ÊÇÐÂÔö¼ÓµÄ£¬ÔçÔÚ2018Äê11ÔÂÑо¿ÈËÔ±¾Í·¢ÏÖÁË¿É´Ó¶à¸öä¯ÀÀÆ÷ºÍÓ¦Ó÷¨Ê½ÖÐÇÔÈ¡ÃÜÂëµÄÄ£¿é¡£¸ÃÄ£¿éÔÚ2Ô·ݽøÐÐÁËÉý¼¶£¬¿ÉÒÔÇÔÈ¡VNC¡¢PuTTY¼°RDP·þÎñÖеÄÉí·ÝÑé֤ƾ¾Ý¡£ÏÖÔÚ11Ô·ÝÑо¿ÈËÔ±·¢ÏÖ¸ÃÄ£¿éÕýÔÚͨ¹ýHTTP POSTÇëÇó½«OpenSSH˽ԿÒÔ¼°OpenVPNÃÜÂëºÍÅäÖÃÎļþ·¢Ë͵½C2·þÎñÆ÷¡£Õâ±íÃ÷×Ô2016Äê10Ô±»·¢ÏÖÒÔÀ´£¬TrickBotÒ»Ö±ÔÚ¸üÐÂÆ书ЧºÍÄ£¿é¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/trickbot-trojan-getting-ready-to-steal-openssh-and-openvpn-keys/
2¡¢FortinetÄþ¾²²úÎïÓ²±àÂë¼ÓÃÜÃÜԿ©¶´£¨CVE-2018-9195£©
SEC ConsultÄþ¾²Ñо¿Ô±StefanViehb?ckÔÚFortinetµÄFortiOSÖз¢ÏÖÓ²±àÂëµÄ¼ÓÃÜÃÜÔ¿£¨CVE-2018-9195£©£¬ÊÜÓ°ÏìµÄ²úÎï°üÂÞFortiGate·À»ðǽÒÔ¼°MacºÍWindows°æ±¾µÄFortiClientÖն˱£»¤Èí¼þ¡£ÕâÈýÖÖ²úÎïʹÓÃÈõ¼ÓÃÜ£¨XOR£©¶øÇÒÊÇÓ²±àÂëµÄ¼ÓÃÜÃÜÔ¿ÓëÖÖÖÖFortiGateÔÆ·þÎñ½øÐÐͨÐÅ¡£¸ÃÃÜÔ¿ÓÃÓÚ¼ÓÃÜFortiGuard Web¹ýÂ˹¦Ð§¡¢FortiGuard·´À¬»øÓʼþ¹¦Ð§ºÍFortiGuard AntiVirus¹¦Ð§µÄÓû§Á÷Á¿¡£¹¥»÷Õß¿ÉÀûÓôË©¶´Ðá̽Óû§µÄÁ÷Á¿£¬¸ú×ÙËûÃǵÄä¯ÀÀ¼Ç¼»òµç×ÓÓʼþÊý¾Ý¡£Ñо¿ÈËÔ±ÓÚ2018Äê5Ô·¢ÏÖ²¢³ÂËßÁËÕâЩÎÊÌ⣬µ«Fortinet»¨ÁË10µ½18¸öÔµÄʱ¼ä²Åɾ³ýÁËÓ²±àÂëµÄÃÜÔ¿¡£½¨ÒéÓû§¸üÐÂÖÁFortiOS 6.0.7»ò6.2.0¡¢FortiClient Windows 6.2.0¼°FortiClient Mac 6.2.2¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/some-fortinet-products-shipped-with-hardcoded-encryption-keys/
3¡¢Á½¸öAndroid SDK·Ç·¨ÊÕ¼¯Facebook¼°TwitterÓû§Êý¾Ý
Ñо¿ÈËÔ±·¢ÏÖÁ½¸öµÚÈý·½SDK£¨OneAudienceºÍMobiburn£©¿ÉÃØÃÜÊÕ¼¯TwitterºÍFacebookÓû§Êý¾Ý£¬TwitterºÍFacebookÕýÔÚ½øÐÐÊӲ졣ÕâÁ½¸öSDK¶¼ÊÇÊý¾Ý»õ±Ò»¯·þÎñ£¬Í¨¹ýÏò¿ª·¢ÈËÔ±¸¶·ÑÒÔ½«ÆäSDK¼¯³Éµ½Ó¦ÓÃÖУ¬È»ºóÊÕ¼¯Óû§µÄÐÐΪÊý¾ÝÓÃÓÚ¹ã¸æÓªÏú¡£Í¨³£´ËÀàÌ×¼þ²»»á·ÃÎÊÓû§µÇ¼Facebook»òTwitterºóÉú³ÉµÄ¸öÈËÐÅÏ¢¡¢ÕË»§ÃÜÂëµÈÊý¾Ý¡£TwitterÔÚһƪ²©¿ÍÖÐÈ·ÈÏOneAudience SDK¿Éδ¾ÊÚȨ´ÓTwitterÕÊ»§ÖÐÊÕ¼¯Óû§µÄ¸öÈËÐÅÏ¢¡£TwitterûÓÐ͸¶ÊÜÓ°ÏìµÄÓû§ÊýÁ¿£¬µ«ÌåÏÖÖ»ÓÐAndroidÓû§Êܵ½Ó°Ïì¡£FacebookÌåÏÖÒ²Êܵ½¸ÃÎÊÌâÓ°Ï죬°üÂÞOneAudience SDKºÍMobiBurn SDK¡£Á½¼ÒSDK¿ª·¢Õß»ØÓ¦³ÆËûÃǽöÌṩ¹¤¾ß£¬µ«²»ÒÔÈκη½Ê½¼ÓÈëÊý¾ÝÊÕ¼¯£¬½«ÔðÈιé¾ÌÓÚÀÄÓÃÆäSDKµÄapp¿ª·¢ÈËÔ±¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/11/sdk-twitter-facebook-android.html
4¡¢»ÝÆÕ¾¯¸æ²¿ÃÅSSD½«ÔÚͨµç32768Сʱºó·¢Éú¹ÊÕÏ
HPE¾¯¸æ¶à¿îSSD½«ÔÚͨµçʱ¼äÀۼƴï32768Сʱºó·¢Éú¹ÊÕÏ£¬µ¼ÖÂÓ²ÅÌÉϵÄÊý¾Ý¶ªÊ§ÇÒÎÞ·¨»Ö¸´¡£Ò쳣ʱ¼ä¿Éת»»Îª3Äê270Ìì8Сʱ£¬Ô¶Ð¡ÓÚ²úÎïµÄÕý³£Ê¹ÓÃÊÙÃü£¬ÉõÖÁ²¿ÃÅÐͺŵı£ÐÞÆÚÒ²¿ÉÀ©Õ¹ÖÁ5Äê¡£ÊÜÓ°ÏìµÄ²úÎïÐͺŶà´ï20ÖÖ£¬¶à¿î²úÎïÖ÷ÒªÃæÏòÆóÒµ·þÎñÆ÷£¬°üÂÞHPE ProLiant¡¢Synergy¡¢Apollo¡¢JBOD D3xxx¡¢D6xxx¡¢D8xxx¡¢MSA¡¢StoreVirtual 4335ºÍStoreVirtual 3200µÈ¡£¸Ã¹«Ë¾ÔÚ11ÔÂ22ÈÕÐû²¼ÁË8¿î²úÎïµÄÐÞ¸´·¨Ê½£¬²¢¼Æ»®ÔÚ12ÔµĵڶþÖÜÐû²¼Ê£Óà²úÎïµÄ¹Ì¼þ¸üС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/hardware/hp-warns-that-some-ssd-drives-will-fail-at-32-768-hours-of-use/
5¡¢Î÷°àÑÀÄþ¾²³§ÉÌProsegurÔâµ½ÀÕË÷Èí¼þRyuk¹¥»÷
Î÷°àÑÀÄþ¾²³§ÉÌProsegurÔÚÒ»·ÝÉùÃ÷ÖÐÐû²¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬Õû¸ö¹«Ë¾µÄÍøÂ綼Òѹرա£¾¡¹ÜûÓеõ½¹Ù·½È·ÈÏ£¬µ«BleepingComputerÁ˽⵽¸Ã¹¥»÷Ó°ÏìÁËProsegurÔÚÅ·ÖÞµÄËùÓÐËùÔÚ¡£ÔÚTwitterÉϵĸüÐÂÖУ¬ProsegurÈ·Èϵ¼ÖÂÆä·þÎñÖжϵĶñÒâÈí¼þÊÇRyuk£¬²¢½«Ê¼þ±ê־Ϊ¡°Ò»°ãÐÔ¹¥»÷¡±¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄÉ×îºéÁ÷ƽµÄÄþ¾²´ëÊ©×èÖ¹¸Ã¶ñÒâÈí¼þÔÚÆäÄÚ²¿¼°¿Í»§¶ËÍøÂçÖÐÁ÷´«¡£×÷ΪԤ·À´ëÊ©£¬¸Ã¹«Ë¾½«¼ÌÐøÏÞÖÆͨÐÅ£¬Ö±µ½È·ÈÏÆäϵͳÒѽྻ£¬²¢ÕýÔÚŬÁ¦ÒÔ×î¿ìµÄËٶȻָ´ÊÜÓ°ÏìµÄ·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-forces-prosegur-security-firm-to-shut-down-network/