ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ48ÖÜ
Ðû²¼Ê±¼ä 2019-12-09>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê12ÔÂ02ÈÕÖÁ08ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´48¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Kubernetes APIÖض¨Ïò©¶´; D-Link DAP-1860ÃüÁî×¢Èë´úÂëÖ´ÐЩ¶´£»OpenBSDÑéÖ¤Èƹý©¶´£»Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐЩ¶´£»Mozilla Firefox ESR worker destructionÄÚ´æ´íÎóÒýÓ鶴¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÅ·ÖÞÍøÂçÄþ¾²¾ÖÐû²¼º£Ê²¿ÃÅÍøÂçÄþ¾²Ö¸ÄÏ£»Android©¶´StrandHogg¿Éαװ³ÉÈÎÒâÓ¦Óã»GoAhead Web·þÎñÆ÷RCE©¶´Ó°Ïì´óÁ¿IoTÉ豸£»Autodesk¡¢Ç÷ÊƿƼ¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö©¶´£»PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÄþ¾²³ß¶È¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
>ÖØÒªÄþ¾²Â©¶´Áбí
1. Google Kubernetes APIÖض¨Ïò©¶´
Google Kubernetes API serverûÓÐÕýÈ·ÑéÖ¤URLµÄÖض¨Ïò£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬽«API·þÎñÆ÷ÇëÇóÖض¨Ïòµ½ÈÎÒâÖ÷»ú¡£
https://github.com/kubernetes/kubernetes/issues/85867
2. D-Link DAP-1860ÃüÁî×¢Èë´úÂëÖ´ÐЩ¶´
D-Link DAP-1860 HNAP_TIMEºÍSOAPAction´æÔÚÃüÁî×¢È멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/
3. OpenBSDÑéÖ¤Èƹý©¶´
OpenBSDÑé֤ϵͳ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇóÓû§Ãû£¬Èç"-option"»ò"-schallenge"£¬ÈƹýÄþ¾²ÏÞÖÆ£¬Î´ÊÚȨ·ÃÎÊϵͳ¡£
https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html
4. Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐЩ¶´
Apache Olingo AbstractService ObjectInputStream´æÔÚ·´ÐòÁл¯Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E
5. Mozilla Firefox ESR worker destructionÄÚ´æ´íÎóÒýÓ鶴
Mozilla Firefox ESR worker destruction´æÔÚÄÚ´æ´íÎóÒýÓÃÁ½´ÎÊÍ·Å©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4555/
>ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢Å·ÖÞÍøÂçÄþ¾²¾ÖÐû²¼º£Ê²¿ÃÅÍøÂçÄþ¾²Ö¸ÄÏ
Å·ÖÞÍøÂçÄþ¾²¾Ö£¨ENISA£©ÒÔ¡¶¿Ú°¶ÍøÂçÄþ¾²-º£Ê²¿ÃÅÍøÂçÄþ¾²Êµ¼ù¡·ÎªÌâÐû²¼Á˺£Ê²¿ÃÅÍøÂçÄþ¾²Ö¸ÄÏ£¬Îª¿Ú°¶Éú̬ϵͳÓÈÆäÊÇ¿Ú°¶Õþ¸®ºÍÂëÍ·ÔËÓªÉÌÖеÄCIOºÍCISOÖƶ¨ÍøÂçÄþ¾²¼ÆıÌṩָµ¼ºÍ×ÊÖú¡£¸ÃÖ¸ÄÏÁгöÁË¿Ú°¶Éú̬ϵͳÃæÁÙµÄÖ÷ÒªÍþв£¬²¢ÃèÊöÁË¿ÉÄܶԿڰ¶Éú̬ϵͳÔì³ÉÓ°ÏìµÄÒªº¦ÍøÂç¹¥»÷³¡¾°¡£¸ÃÖ¸ÄÏΪÖն˱£»¤ºÍÉúÃüÖÜÆÚ¹ÜÀí¡¢Â©¶´¹ÜÀí¡¢ÈËÁ¦×ÊÔ´Äþ¾²¡¢¹©Ó¦Á´¹ÜÀíµÈÉè¼ÆÁËÄþ¾²´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/
2¡¢Android©¶´StrandHogg¿Éαװ³ÉÈÎÒâÓ¦ÓÃ
PromonÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÒ»¸öеÄAndroid©¶´StrandHogg£¬¸Ã©¶´ÔÊÐí¶ñÒâÓ¦ÓÃαװ³ÉÈÎÒâºÏ·¨Ó¦Ó᣸鶴ÀûÓÃÁËAndroidµÄ¶àÈÎÎñ´¦Öù¦Ð§£¬µ±Óû§µã»÷Ò»¸öÕý³£Ó¦ÓõÄͼ±êʱ£¬¶ñÒâÓ¦ÓÿÉÒÔÀûÓø鶴À¹½ØÖ¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐé¼ÙµÄ½çÃ棬´Ó¶øÓÕµ¼Óû§ÊÚÓèÖÖÖÖȨÏÞ¡£Ñо¿ÈËÔ±ÒѾ·¢ÏÖÁË36¸öÕýÔÚ»ý¼«ÀûÓôË©¶´µÄ¶ñÒâÓ¦Ó㬰üÂÞÒøÐÐľÂíBankBot¡£Ñо¿ÈËÔ±³Æ¸Ã©¶´µÄÓ°Ï췶Χ·Ç³£´ó£¬ÒòΪĬÈÏÇé¿öÏ´ó¶àÊýÓ¦Óö¼Ò×Êܹ¥»÷£¬¶øÇÒĿǰûÓпɿ¿µÄÒªÁìÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¹È¸èÉÐδÔÚÈκΰ汾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/
3¡¢GoAhead Web·þÎñÆ÷RCE©¶´Ó°Ïì´óÁ¿IoTÉ豸
˼¿ÆTalosµÄÄþ¾²×¨¼ÒÔÚGoAheadǶÈëʽWeb·þÎñÆ÷Öз¢ÏÖÁËÁ½¸ö©¶´£¬ÆäÖаüÂÞÒ»¸öÒªº¦µÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5096£©¡£¸Ã©¶´ÓëGoAhead´¦ÖÃmulti-part/form-dataÇëÇóµÄ·½Ê½Óйأ¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓø鶴´¥·¢use-after-free£¬²¢Í¨¹ý·¢ËͶñÒâHTTPÇëÇóÔÚ·þÎñÆ÷ÉÏÖ´ÐÐÈÎÒâ´úÂë¡£µÚ¶þ¸ö©¶´£¨CVE-2019-5097£©´æÔÚÓÚͬһ×é¼þÖУ¬¿Éµ¼Ö¾ܾø·þÎñ¹¥»÷¡£ÊÜÓ°ÏìµÄ°æ±¾°üÂÞv5.0.1¡¢v.4.1.1ºÍv3.6.5¡£Æ¾¾ÝShodanµÄËÑË÷½á¹û£¬Ì»Â¶ÔÚ¹«ÍøÉϵÄGoAhead·þÎñÆ÷ÊýÁ¿ÒÑÁè¼Ý130Íò¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
4¡¢Autodesk¡¢Ç÷ÊƿƼ¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö©¶´
SafeBreach LabsÑо¿ÈËÔ±Åû¶Autodesk¡¢Ç÷ÊƿƼ¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLL½Ù³Ö©¶´¡£Ç÷ÊƿƼ¼Äþ¾²Èí¼þ16.0.1221¼°ÒÔÏ°汾Êܵ½CVE-2019-15628Ó°Ï죬¸Ã©¶´´æÔÚÓÚcoreServiceShell.exe×é¼þÖС£ÓÉÓÚδ¶Ô¼ÓÔصÄDLLÇ©Ãû½øÐÐÑéÖ¤£¬Òò´Ë¹¥»÷Õ߿ɼÓÔغÍÖ´ÐÐÈÎÒâDLL£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³Ö¾ÃÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØȨÉý¼¶µÈ¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²·Ö±ðÊܵ½ÀàËƵÄ©¶´CVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/
5¡¢PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÄþ¾²³ß¶È
PCIÄþ¾²³ß¶ÈίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÄþ¾²³ß¶È¡£¸Ã³ß¶ÈÔÊÐí´øÓÐNFCµÄCOTSÒƶ¯É豸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£PCI CPoC³ß¶ÈÊǸÃίԱ»áΪ½â¾öÒƶ¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö³ß¶È¡£¾ßÌåÀ´Ëµ£¬PCI CPoC³ß¶È¹æ¶¨Á˹©Ó¦ÉÌÔÚ±£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö·½°¸·½ÃæµÄһЩÄþ¾²ÉϵÄÒªÇ󡣳߶ȵÄCPoC½â¾ö·½°¸°üÂÞ¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTSÉ豸¡¢¾ÑéÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°¶ÀÁ¢ÓÚCOTSÉ豸µÄºó¶Ëϵͳ¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1