ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ48ÖÜ

Ðû²¼Ê±¼ä 2019-12-09

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ02ÈÕÖÁ08ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´48¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Kubernetes APIÖض¨Ïò©¶´; D-Link DAP-1860ÃüÁî×¢Èë´úÂëÖ´ÐЩ¶´ £»OpenBSDÑéÖ¤Èƹý©¶´ £»Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐЩ¶´ £»Mozilla Firefox ESR worker destructionÄÚ´æ´íÎóÒýÓ鶴¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÅ·ÖÞÍøÂçÄþ¾²¾ÖÐû²¼º£Ê²¿ÃÅÍøÂçÄþ¾²Ö¸ÄÏ £»Android©¶´StrandHogg¿Éαװ³ÉÈÎÒâÓ¦Óà £»GoAhead Web·þÎñÆ÷RCE©¶´Ó°Ïì´óÁ¿IoTÉ豸 £»Autodesk¡¢Ç÷ÊƿƼ¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö©¶´ £»PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÄþ¾²³ß¶È¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Google Kubernetes APIÖض¨Ïò©¶´


Google Kubernetes API serverûÓÐÕýÈ·ÑéÖ¤URLµÄÖض¨Ïò £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬½«API·þÎñÆ÷ÇëÇóÖض¨Ïòµ½ÈÎÒâÖ÷»ú¡£

https://github.com/kubernetes/kubernetes/issues/85867


2. D-Link DAP-1860ÃüÁî×¢Èë´úÂëÖ´ÐЩ¶´


D-Link DAP-1860 HNAP_TIMEºÍSOAPAction´æÔÚÃüÁî×¢È멶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/


3. OpenBSDÑéÖ¤Èƹý©¶´


OpenBSDÑé֤ϵͳ´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇóÓû§Ãû £¬Èç"-option"»ò"-schallenge" £¬ÈƹýÄþ¾²ÏÞÖÆ £¬Î´ÊÚȨ·ÃÎÊϵͳ¡£

https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html


4. Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐЩ¶´


Apache Olingo AbstractService ObjectInputStream´æÔÚ·´ÐòÁл¯Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E


5. Mozilla Firefox ESR worker destructionÄÚ´æ´íÎóÒýÓ鶴


Mozilla Firefox ESR worker destruction´æÔÚÄÚ´æ´íÎóÒýÓÃÁ½´ÎÊÍ·Å©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4555/


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Å·ÖÞÍøÂçÄþ¾²¾ÖÐû²¼º£Ê²¿ÃÅÍøÂçÄþ¾²Ö¸ÄÏ

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Å·ÖÞÍøÂçÄþ¾²¾Ö£¨ENISA£©ÒÔ¡¶¿Ú°¶ÍøÂçÄþ¾²-º£Ê²¿ÃÅÍøÂçÄþ¾²Êµ¼ù¡·ÎªÌâÐû²¼Á˺£Ê²¿ÃÅÍøÂçÄþ¾²Ö¸ÄÏ £¬Îª¿Ú°¶Éú̬ϵͳÓÈÆäÊÇ¿Ú°¶Õþ¸®ºÍÂëÍ·ÔËÓªÉÌÖеÄCIOºÍCISOÖƶ¨ÍøÂçÄþ¾²¼ÆıÌṩָµ¼ºÍ×ÊÖú¡£¸ÃÖ¸ÄÏÁгöÁË¿Ú°¶Éú̬ϵͳÃæÁÙµÄÖ÷ÒªÍþв £¬²¢ÃèÊöÁË¿ÉÄܶԿڰ¶Éú̬ϵͳÔì³ÉÓ°ÏìµÄÒªº¦ÍøÂç¹¥»÷³¡¾°¡£¸ÃÖ¸ÄÏΪÖն˱ £»¤ºÍÉúÃüÖÜÆÚ¹ÜÀí¡¢Â©¶´¹ÜÀí¡¢ÈËÁ¦×ÊÔ´Äþ¾²¡¢¹©Ó¦Á´¹ÜÀíµÈÉè¼ÆÁËÄþ¾²´ëÊ©¡£


Ô­ÎÄÁ´½Ó£º

https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/


2¡¢Android©¶´StrandHogg¿Éαװ³ÉÈÎÒâÓ¦ÓÃ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


PromonÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÒ»¸öеÄAndroid©¶´StrandHogg £¬¸Ã©¶´ÔÊÐí¶ñÒâÓ¦ÓÃαװ³ÉÈÎÒâºÏ·¨Ó¦Ó᣸鶴ÀûÓÃÁËAndroidµÄ¶àÈÎÎñ´¦Öù¦Ð§ £¬µ±Óû§µã»÷Ò»¸öÕý³£Ó¦ÓõÄͼ±êʱ £¬¶ñÒâÓ¦ÓÿÉÒÔÀûÓø鶴À¹½ØÖ¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐé¼ÙµÄ½çÃæ £¬´Ó¶øÓÕµ¼Óû§ÊÚÓèÖÖÖÖȨÏÞ¡£Ñо¿ÈËÔ±ÒѾ­·¢ÏÖÁË36¸öÕýÔÚ»ý¼«ÀûÓôË©¶´µÄ¶ñÒâÓ¦Óà £¬°üÂÞÒøÐÐľÂíBankBot¡£Ñо¿ÈËÔ±³Æ¸Ã©¶´µÄÓ°Ï췶Χ·Ç³£´ó £¬ÒòΪĬÈÏÇé¿öÏ´ó¶àÊýÓ¦Óö¼Ò×Êܹ¥»÷ £¬¶øÇÒĿǰûÓпɿ¿µÄÒªÁìÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¹È¸èÉÐδÔÚÈκΰ汾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/


3¡¢GoAhead Web·þÎñÆ÷RCE©¶´Ó°Ïì´óÁ¿IoTÉ豸


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosµÄÄþ¾²×¨¼ÒÔÚGoAheadǶÈëʽWeb·þÎñÆ÷Öз¢ÏÖÁËÁ½¸ö©¶´ £¬ÆäÖаüÂÞÒ»¸öÒªº¦µÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2019-5096£©¡£¸Ã©¶´ÓëGoAhead´¦ÖÃmulti-part/form-dataÇëÇóµÄ·½Ê½ÓÐ¹Ø £¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓø鶴´¥·¢use-after-free £¬²¢Í¨¹ý·¢ËͶñÒâHTTPÇëÇóÔÚ·þÎñÆ÷ÉÏÖ´ÐÐÈÎÒâ´úÂë¡£µÚ¶þ¸ö©¶´£¨CVE-2019-5097£©´æÔÚÓÚͬһ×é¼þÖÐ £¬¿Éµ¼Ö¾ܾø·þÎñ¹¥»÷¡£ÊÜÓ°ÏìµÄ°æ±¾°üÂÞv5.0.1¡¢v.4.1.1ºÍv3.6.5¡£Æ¾¾ÝShodanµÄËÑË÷½á¹û £¬Ì»Â¶ÔÚ¹«ÍøÉϵÄGoAhead·þÎñÆ÷ÊýÁ¿ÒÑÁè¼Ý130Íò¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/12/goahead-web-server-hacking.html


4¡¢Autodesk¡¢Ç÷ÊƿƼ¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SafeBreach LabsÑо¿ÈËÔ±Åû¶Autodesk¡¢Ç÷ÊƿƼ¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLL½Ù³Ö©¶´¡£Ç÷ÊƿƼ¼Äþ¾²Èí¼þ16.0.1221¼°ÒÔÏ°汾Êܵ½CVE-2019-15628Ó°Ïì £¬¸Ã©¶´´æÔÚÓÚcoreServiceShell.exe×é¼þÖС£ÓÉÓÚδ¶Ô¼ÓÔصÄDLLÇ©Ãû½øÐÐÑéÖ¤ £¬Òò´Ë¹¥»÷Õ߿ɼÓÔغÍÖ´ÐÐÈÎÒâDLL £¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³Ö¾ÃÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØȨÉý¼¶µÈ¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²·Ö±ðÊܵ½ÀàËƵÄ©¶´CVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/


5¡¢PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÄþ¾²³ß¶È


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


PCIÄþ¾²³ß¶ÈίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÄþ¾²³ß¶È¡£¸Ã³ß¶ÈÔÊÐí´øÓÐNFCµÄCOTSÒƶ¯É豸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£PCI CPoC³ß¶ÈÊǸÃίԱ»áΪ½â¾öÒƶ¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö³ß¶È¡£¾ßÌåÀ´Ëµ £¬PCI CPoC³ß¶È¹æ¶¨Á˹©Ó¦ÉÌÔÚ± £»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö·½°¸·½ÃæµÄһЩÄþ¾²ÉϵÄÒªÇ󡣳߶ȵÄCPoC½â¾ö·½°¸°üÂÞ¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTSÉ豸¡¢¾­ÑéÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°¶ÀÁ¢ÓÚCOTSÉ豸µÄºó¶Ëϵͳ¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1