ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ51ÖÜ

Ðû²¼Ê±¼ä 2019-12-30

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´43¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇPalo Alto Networks PA-7080 ROOTȨÏÞ»ñȡ©¶´; Mozilla Network Security Services»º³åÇøÒç³ö©¶´ £»Docker docker-credential-secretserviceÄÚ´æ´íÎóÓ¦ÓÃȨÏÞÌáÉý©¶´ £»TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´ÐЩ¶´ £»D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢ £»CitrixËùÓвúÎï´æÔÚ´úÂëÖ´ÐЩ¶´£¨CVE-2019-19781£© £»¶íÂÞ˹Õþ¸®Ðû²¼ÀֳɽøÐл¥ÁªÍø¶Ï¿ª²âÊÔ £»P2P½©Ê¬ÍøÂçMoziÖ÷ÒªÕë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷ £»°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§ £¬¹È¸èÆ»¹û½ô¼±Ï¼ܡ£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Palo Alto Networks PA-7080 ROOTȨÏÞ»ñȡ©¶´


Palo Alto Networks PA-7080ûÓÐÕýÈ·ÏÞÖƶÔLog Forwarding CardͨÐŵÄÏÞÖÆ £¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿É»ñÈ¡rootȨÏÞ¡£

https://nvd.nist.gov/vuln/detail/CVE-2019-17440


2. Mozilla Network Security Services»º³åÇøÒç³ö©¶´


Mozilla Network Security Services cryptographic primitives³¤¶È´¦ÖôæÔÚ»º³åÇøÒç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴¹¹½¨¶ñÒâWEBÒ³ £¬ÓÕʹÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://access.redhat.com/security/cve/cve-2019-17006


3. Docker docker-credential-secretserviceÄÚ´æ´íÎóÓ¦ÓÃȨÏÞÌáÉý©¶´


Docker docker-credential-secretservice´æÔÚÁ½´ÎÊÍ·Å©¶´ £¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÌáÉýȨÏÞ²¢Ö´ÐдúÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-19-1030/


4. TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´ÐЩ¶´


TigerVNC ZlibInStream´æÔÚÄÚ´æÆÆ»µÂ©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄ·þÎñÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÕßÖ´ÐÐÈÎÒâ´úÂë¡£

https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40


5. D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´ÐЩ¶´


D-Link DCS-960L HNAP SOAPAction´æÔÚÕ»Òç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-19-1031/


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢ÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÓÎÏ·¿ª·¢ÉÌZyngaÔÚ9Ô·ÝÔâµ½ºÚ¿ÍÈëÇÖ £¬½ü1.73ÒÚ¸öÓû§ÃûºÍÃÜÂëй¶¡£ËäÈ»ZyngaÓÚ9Ôµ×ÈÏ¿ÉÁËÕâһʼþ £¬µ«Êý¾Ýй¶֪ͨÍøÕ¾HaveIBeenPwnedÏÖÔÚÊÕ¼¯µ½ÁËÓйØÊÜÓ°ÏìÕË»§ÊýÁ¿µÄ¹Ù·½Êý×Ö¡£Æ¾¾Ý¸ÃÍøÕ¾µÄ¸üР£¬¹²ÓÐ1.729ÒÚ¸ö²îÒìµÄµç×ÓÓʼþµØÖ·ÒÔ¼°Óû§ÃûºÍÃÜÂëÔڴ˴ι¥»÷ÖÐй¶ £¬ºÃÏûÏ¢ÊÇÕâЩÃÜÂëÒÔ¼ÓÑεÄSHA-1É¢ÁÐÐÎʽ´æ´¢ £¬Ê¹ÆäÄÑÒÔ±»Æƽ⡣


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/zynga-breach-hit-173-million/


2¡¢CitrixËùÓвúÎï´æÔÚ´úÂëÖ´ÐЩ¶´£¨CVE-2019-19781£©


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Äþ¾²×¨¼ÒMikhail KlyuchnikovÔÚCitrix Application Delivery ControllerºÍCitrix Gateway²úÎïÖз¢ÏÖÒ»¸öÑÏÖصĴúÂëÖ´ÐЩ¶´ £¬¸Ã©¶´£¨CVE-2019-19781£©Ê¹158¸ö¹ú¼ÒµÄÁè¼Ý8Íò¼Ò¹«Ë¾ÃæÁÙ·çÏÕ¡£ÓÉÓÚÀûÓø鶴µÄ¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿É·ÃÎʹ«Ë¾µÄÄÚ²¿ÍøÂç £¬Òò´Ë¸Ã©¶´ÓÈÆäΣÏÕ¡£ÀÖ³ÉÀûÓø鶴¿Éµ¼ÖÂÈÎÒâ´úÂëÖ´ÐС£Æ¾¾ÝCitrix £¬¸Ã©¶´Ó°ÏìÁËËùÓÐÊÜÖ§³ÖµÄ²úÎï°æ±¾ºÍƽ̨ £¬¾¡¹ÜCitrixÉÐδÐû²¼Ð¹̼þÀ´½â¾ö¸ÃÎÊÌâ £¬µ«¸Ã¹«Ë¾ÒÑÐû²¼ÁËÒ»Ì×Õë¶Ô¶ÀÁ¢ÏµÍ³ºÍ¼¯ÈºµÄ»º½â´ëÊ© £¬²¢Ç¿ÁÒ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§½ÓÄÉËüÃÇ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-citrix-flaw-may-expose-thousands-of-firms-to-attacks/


3¡¢¶íÂÞ˹Õþ¸®Ðû²¼ÀֳɽøÐл¥ÁªÍø¶Ï¿ª²âÊÔ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¶íÂÞ˹Õþ¸®ÖÜÒ»Ðû²¼ÀֳɽøÐл¥ÁªÍø¶Ï¿ª²âÊÔ¡£¸ÃÏî²âÊÔ´ÓÉÏÖÜ¿ªÊ¼½øÐÐ £¬Á¬ÐøÁ˶àÌì £¬Éæ¼°¶íÂÞ˹Õþ¸®»ú¹¹¡¢µ±µØ»¥ÁªÍø·þÎñÌṩÉ̺ͶíÂÞ˹µ±µØ»¥ÁªÍø¹«Ë¾¡£ÊµÑéµÄÄ¿µÄÊDzâÊԸùú¼ÒµÄ»¥ÁªÍø»ù´¡ÉèÊ©£¨ÔÚ¶íÂÞ˹ÄÚ²¿³ÆΪRuNet£©ÊÇ·ñ¿ÉÒÔÔÚ²»·ÃÎÊÈ«ÇòDNSϵͳºÍÍⲿ»¥ÁªÍøµÄÇé¿öÏÂÔËÐС £»¥ÁªÍøÁ÷Á¿ÔÚ¶íÂÞ˹ÄÚ²¿½øÐÐÁËÖØзÓÉ £¬ÓÐЧµØʹ¶íÂÞ˹µÄRuNet³ÉΪÊÀ½çÉÏ×î´óµÄÄÚÁªÍø¡£Õþ¸®Ã»ÓÐ͸¶ÓйزâÊÔ¼°Æä×é¼þµÄÈκμ¼Êõϸ½Ú £¬Ö»ÊDZíÃ÷Õþ¸®²âÊÔÁ˼¸ÖֶϿªÁ¬½ÓµÄ³¡¾° £¬°üÂÞÄ£Äâ¹úÍâÍøÂç¹¥»÷µÄ³¡¾°¡£Õþ¸®ÔÚÐû²¼»áÉÏÌåÏÖ¸ÃʵÑé»ñµÃÁËÀֳɡ£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russia-successfully-disconnected-from-the-internet/


4¡¢P2P½©Ê¬ÍøÂçMoziÖ÷ÒªÕë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ñо¿ÈËÔ±·¢ÏÖÐÂP2P½©Ê¬ÍøÂçMoziÕýÔÚ»ý¼«Õë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªµÄ·ÓÉÆ÷¡£¸Ã½©Ê¬ÍøÂçÓë¶ñÒâÈí¼þGafgytÓÐ¹Ø £¬ÒòΪËüÖØÓÃÁ˺óÕߵIJ¿ÃÅ´úÂë¡£MoziµÄÖ÷ҪĿµÄÊÇÓÃÓÚDDoS¹¥»÷¡£Ñо¿ÈËÔ±·¢Ïָý©Ê¬ÍøÂçʹÓÃÒ»ÖÖ¶¨ÖƵÄÀ©Õ¹ÂþÑÜʽ¹þÏ£±í£¨DHT£©Ð­ÒéÀ´ÊµÏÖ £¬¸ÃЭÒéͨ³£±»torrent¿Í»§¶ËºÍÆäËûP2Pƽ̨ÓÃÓÚ´æ´¢½ÚµãÁªÏµÐÅÏ¢¡£Mozi»¹Ê¹ÓÃECDSA384ºÍXORËã·¨À´È·±£½©Ê¬ÍøÂç×é¼þºÍP2PÍøÂçµÄÍêÕûÐÔºÍÄþ¾²ÐÔ¡£MoziÖ÷Ҫͨ¹ýtelnetÀûÓÃÈõÃÜÂë·ÃÎÊÒ×Êܹ¥»÷µÄÉ豸 £¬²¢ÔÚ¼ÓÔضñÒâÈí¼þºóËÑË÷ºÍѬȾÆäËüÒ×Êܹ¥»÷µÄÉ豸¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-mozi-p2p-botnet-takes-over-netgear-d-link-huawei-routers/


5¡¢°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§ £¬¹È¸èÆ»¹û½ô¼±Ï¼Ü


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¡¶Å¦Ô¼Ê±±¨¡·±¨µÀ £¬°¢ÁªÇõÕþ¸®Ê¹ÓÃÁ÷ÐеÄͨѶӦÓÃToTok×÷Ϊ¼àÊÓ¹¤¾ß £¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¸ÃAPPÄ¿Ç°Òѱ»AppleºÍGoogleÔÚÏßÉ̵êϼܡ£ToTokµÄÓû§°üÂÞ°¢ÁªÇõºÍÖж«ÆäËû¹ú¼ÒµÄÊý°ÙÍòÃñÖÚ¡£¸Ã³ÂËß³Æ £¬ÃÀ¹úÇ鱨¹ÙÔ±ºÍÄþ¾²Ñо¿ÈËԱȷ¶¨°¢ÁªÇõÕþ¸®ÕýÔÚʹÓøÃAPP½øÐмàÊӻ¡£ToTok·ñÈÏÁËÓëÕþ¸®¼à¿Ø¼Æ»®ÓÐ¹Ø £¬²¢ÌåÏÖ¸ÃÓ¦Óñ»Ï¼ÜÊÇÓÉÓÚ¡°¼¼ÊõÎÊÌ⡱¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html