ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ05ÖÜ
Ðû²¼Ê±¼ä 2020-02-05
> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê01ÔÂ27ÈÕÖÁ2ÔÂ02ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇDrayTek VigorϵÁÐÈÎÒâÃüÁîÖ´ÐЩ¶´; Adobe Illustrator CC CVE-2020-3710ÄÚ´æÆÆ»µ´úÂëÖ´ÐЩ¶´£»OpenSMTPD smtp_mailaddrÈÎÒâÃüÁîÖ´ÐЩ¶´£»Adobe Acrobat/ReaderÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´£»IBM Security Access Manager Appliance XXE×¢È멶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇOpenSMTPD¿âRCE©¶´Ó°Ïì¶à¸öBSDºÍLinux¿¯Ðа棻2019Ä꽩ʬÍøÂçC2·þÎñÆ÷ÊýÁ¿Í¬±ÈÔö³¤71%£»ÃÀ¹ú¹ú¼ÒÄþ¾²¾ÖÐû²¼Óйػº½âÔÆ©¶´µÄÄþ¾²Ö¸ÄÏ£»Î¢ÈíÐû²¼AzureÄþ¾²»ù×¼£¬Ìṩ90¶àÖÖÄþ¾²Êµ¼ù½¨Ò飻ŦԼз¨°¸ÌáÒé½ûÖ¹ÊÐÕþÕþ¸®Ö§¸¶ÀÕË÷Èí¼þÊê½ð¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
>ÖØÒªÄþ¾²Â©¶´Áбí
1. DrayTek VigorϵÁÐÈÎÒâÃüÁîÖ´ÐЩ¶´
DrayTek Vigor300B cgi-bin/mainfunction.cgi URI²»ÕýÈ·´¦ÖÃSHELL×Ö·û£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔROOTȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html
2. Adobe Illustrator CC CVE-2020-3710ÄÚ´æÆÆ»µ´úÂëÖ´ÐЩ¶´
Adobe Illustrator CC´¦ÖÃÎļþ´æÔÚÄÚ´æÆÆ»µÂ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://helpx.adobe.com/security/products/illustrator/apsb20-03.html
3. OpenSMTPD smtp_mailaddrÈÎÒâÃüÁîÖ´ÐЩ¶´
OpenSMTPD smtp_session.c smtp_mailaddr´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄMAIL FROM×Ö¶ÎÇëÇ󣬿ÉÖ´ÐÐÈÎÒâÃüÁî¡£
http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
4. Adobe Acrobat/ReaderÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´
Adobe Acrobat and Reader´¦ÖÃÎļþ´æÔÚÀàÐÍ»ìÏý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb19-02.html
5. IBM Security Access Manager Appliance XXE×¢È멶´
IBM Security Access Manager Appliance´¦ÖÃXMLÊý¾Ý´æÔÚXXE¹¥»÷©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄXMLÇëÇ󣬿ɻñÈ¡Ãô¸ÐÐÅÏ¢»ò½øÐоܾø·þÎñ¹¥»÷¡£
https://exchange.xforce.ibmcloud.com/vulnerabilities/172018
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢OpenSMTPD¿âRCE©¶´Ó°Ïì¶à¸öBSDºÍLinux¿¯Ðаæ
Äþ¾²Ñо¿ÈËÔ±ÒѾÔÚÐí¶àBSDºÍLinux¿¯ÐаæËùʹÓõÄÓëµç×ÓÓʼþÏà¹ØµÄºËÐÄ¿âÖз¢ÏÖÁËÒ»¸ö©¶´£¬Â©¶´¸ú×ÙΪCVE-2020-7247£¬Ó°Ïì·þÎñÆ÷¶ËSMTPÐÒéµÄ¿ªÔ´ÊµÏÖOpenSMTPD¡£¸Ã¿¯ÐаæÖÐͨ³£°üÂ޸ÿ⣬ÕâЩ¿¯ÐаæÖ¼ÔÚÔÚ·þÎñÆ÷ÉÏÔËÐУ¬´Ó¶øʹ·þÎñÆ÷¿ÉÒÔ´¦ÖÃÓëSMTPÏà¹ØµÄµç×ÓÓʼþºÍÁ÷Á¿¡£OpenSMTPD¿â×î³õÊÇΪOpenBSD²Ù×÷ϵͳ¿ª·¢µÄ£¬µ«¸Ã¿âÊÇ¿ªÔ´µÄ£¬Æä¡°±ãЯʽ°æ±¾¡±Ò²ÒѺϲ¢µ½ÆäËûOSÖУ¬ÀýÈçFreeBSD£¬NetBSDºÍһЩLinux¿¯Ðа棬ÀýÈçDebian£¬Fedora £¬Alpine LinuxµÈ¡£OpenSMTPD¿ª·¢ÈËÔ±ÒÑÈ·ÈÏ´Ë©¶´£¬²¢ÓÚ½ñÌìÔçЩʱºòÐû²¼Á˲¹¶¡-OpenSMTPD°æ±¾6.6.2p1¡£½¨ÒéÒѽ«ÆäBSDºÍLinux·þÎñÆ÷ÅäÖÃΪʹÓÃOpenSMTPD¿Í»§¶ËµÄϵͳ¹ÜÀíÔ±¾¡¿ìÓ¦ÓôËÐÞ²¹·¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/rce-in-opensmtpd-library-impacts-bsd-and-linux-distros/
2¡¢2019Ä꽩ʬÍøÂçC2·þÎñÆ÷ÊýÁ¿Í¬±ÈÔö³¤71%
Spamhaus³ÆÓë2018ÄêÏà±ÈÈ«ÇòÓÃÓÚ¿ØÖÆÊܶñÒâÈí¼þѬȾµÄϵͳµÄ·þÎñÆ÷Ô¾ÉýÁË71£¥ÒÔÉÏ¡£Á¬ÐøÁ½ÄêÈ«Çò¹¥»÷ÕßÓÃÀ´¿ØÖÆÊܶñÒâÈí¼þѬȾµÄϵͳµÄ·þÎñÆ÷ÊýÁ¿¼±¾çÔö¼Ó¡£SpamhausÏîÄ¿¸ú×ÙÍþв¼ÓÈëÕßÓÃÓÚÍйܽ©Ê¬ÍøÂçÃüÁîºÍ¿ØÖÆ·þÎñÆ÷£¨C2£©µÄÓòÃûºÍIPµØÖ·£¬¸ÃÏîÄ¿È·¶¨ÁË2019ÄêÈ«Çò¹²ÓÐ1210¸ö²îÒìÍøÂçÍйܵÄ17602¸ö´ËÀà·þÎñÆ÷¡£Õâ¸öÊý×Ö±ÈSpamhausÔÚ2018Äê¼ì²âµ½µÄ10263̨½©Ê¬ÍøÂçC2·þÎñÆ÷Ôö³¤ÁË71.5£¥£¬±È2018ÄêµÄ9500̨½©Ê¬ÍøÂçÊýÁ¿Ôö¼ÓÁ˽üÒ»±¶¡£Êµ¼ÊÉÏ£¬½©Ê¬ÍøÂçC2Õ¼ËùÓÐÁбíÖеÄ41£¥¡£SpamhausÔÚ2019ÄêµÄºÚÃûµ¥ÖУ¬¶ø2017Äê½öΪ15£¥£¬È¥ÄêΪ25£¥¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/number-of-botnet-command-and-control-servers-soared-in-2019/d/d-id/1336914
3¡¢ÃÀ¹ú¹ú¼ÒÄþ¾²¾ÖÐû²¼Óйػº½âÔÆ©¶´µÄÄþ¾²Ö¸ÄÏ
¹ú¼ÒÄþ¾²¾Ö£¨NSA£©Ðû²¼ÁËÒ»·ÝÐÅÏ¢±í£¬ÆäÖаüÂÞÓйػº½âÔÆ©¶´µÄÖ¸ÄÏ¡£NSA»áÈ·¶¨ÔÆÄþ¾²×é¼þ£¬²¢ÌÖÂÛÍþвÒòËØ£¬ÔÆ©¶´ºÍDZÔڵĻº½â´ëÊ©¡£¸ÃÎĵµ½«ÔÆ©¶´·ÖΪËÄÀࣨÅäÖôíÎ󣬷ÃÎÊ¿ØÖƲ¹²Ïí×⻧©¶´ºÍ¹©Ó¦Á´Â©¶´£©£¬ÕâЩ©¶´º¸ÇÁË´ó¶àÊýÒÑ֪©¶´¡£ÌṩÿÖÖ©¶´Àà´ËÍâÃèÊöÒÔ¼°×îÓÐЧµÄ»º½â´ëÊ©¡£¸ÃÖ¸ÄÏÖ¸³ö£¬¸ÃÖ¸ÄϽö¹©×éÖ¯Áìµ¼ºÍ¼¼ÊõÈËԱʹÓᣡ°×éÖ¯Áìµ¼¿ÉÒԲο¼¡°ÔÆ×é¼þ¡±²¿ÃÅ£¬¡°ÔÆÍþв¼ÓÈëÕß¡±²¿ÃÅÒÔ¼°¡°ÔÆ©¶´ºÍ»º½â´ëÊ©¡±¸ÅÊö£¬ÒÔ»ñÈ¡¶ÔÔÆÄþ¾²ÔÔòµÄ¿´·¨¡£¼¼ÊõºÍÄþ¾²×¨ÒµÈËÔ±Ó¦·¢ÏÖ¸ÃÎĵµÓÐÖúÓÚ½â¾öÔÆ·þÎñÆÚ¼äºÍÖ®ºóµÄÔÆÄþ¾²×¢ÒâÊÂÏî²É¹º¡±¡£
ÔÎÄÁ´½Ó£º
https://www.securitymagazine.com/articles/91618-national-security-agency-releases-guide-on-mitigating-cloud-vulnerabilities
4¡¢Î¢ÈíÐû²¼AzureÄþ¾²»ù×¼£¬Ìṩ90¶àÖÖÄþ¾²Êµ¼ù½¨Òé
΢Èí±¾ÖÜÐû²¼ÁËAzureÄþ¾²»ù×¼v1£¨ASB£©µÄ¿ÉÓÃÐÔ£¬ÕâÊÇÕë¶ÔAzure¿Í»§µÄ90¶àÖÖÄþ¾²×î¼Ñʵ¼ù½¨ÒéµÄ¼¯ºÏ¡£Î¢ÈíÌåÏÖ£¬ASBÖ¼ÔÚͨ¹ý´´½¨°üÂÞÏàͬ¸ñʽµÄAzure·þÎñËùÓн¨ÒéµÄ¿ò¼ÜÀ´Ìá¸ßAzure·þÎñÄþ¾²ÎĵµµÄÒ»ÖÂÐÔ¡£ASBÖ¼ÔÚ×ÊÖú×éÖ¯Ìá¸ßAzureÖÐÊÂÇ鸺ÔصÄÕûÌåÄþ¾²ÐԺͺϹæÐÔ£¬ÆäÖаüÂÞ11¸öÊÜInternetÄþ¾²ÖÐÐÄ£¨CIS£©7.1¿ØÖÆ¿ò¼ÜÆô·¢²¢Ó³Éäµ½ÆäÖеÄÄþ¾²¿ØÖÆ¡£ASBÖаüÂ޵ĿؼþÕë¶ÔÍøÂçÄþ¾²£¬ÈÕÖ¾¼Ç¼ºÍ¼àÊÓ£¬Éí·ÝºÍ·ÃÎÊ¿ØÖÆ£¬Êý¾Ý±£»¤£¬Â©¶´¹ÜÀí£¬¿â´æºÍ×ʲú¹ÜÀí£¬Äþ¾²ÅäÖ㬶ñÒâÈí¼þ·ÀÓù£¬Êý¾Ý»Ö¸´£¬Ê¼þÏìÓ¦ÒÔ¼°Éø͸²âÊԺͺìÉ«ÍŶÓÁ·Ï°¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/microsoft-releases-azure-security-benchmark
5¡¢Å¦Ô¼Ð·¨°¸ÌáÒé½ûÖ¹ÊÐÕþÕþ¸®Ö§¸¶ÀÕË÷Èí¼þÊê½ð
¹ú¼Ò²ÎÒéÔ±Phil Boyle£¬George M. BorrelloºÍSue Serino ÓÚ±¾Ô³õÌá³öÁ˲ÎÒéÔº·¨°¸S7246£¬ÒÔÓ¦¶ÔÕë¶ÔÈ«¹ú¸÷µØÕþ¸®»ú¹¹ºÍÊÐÕþʵÌåµÄÍøÂç¹¥»÷À˳±¡£ÔÚijЩµ÷Í£´ëÊ©ÖУ¬ÆäÖÐһЩ£¨ÀýÈçÀïά°£Àº£Ì²ºÍ·ðÂÞÀï´ïÖݵĺþ³Ç£©ÒÑÖ§¸¶ÁËÊê½ð¡£ÆäËûµÄ£¬ÀýÈçÂíÈøÖîÈûÖݵÄб´µÂ¸£µÂºÍÑÇÌØÀ¼´óÊУ¬ÔòûÓÐÖ§¸¶ÈκÎÊê½ð¡£ÔÚºóÒ»ÖÖÇé¿öÏ£¬¸ÃÊÐ×îÖÕ»¨·ÑÁË260ÍòÃÀÔª ͨ¹ýʼþÏìÓ¦ºÍÊý×ÖÈ¡Ö¤µÄÖ§³ö£¬ÌرðµÄÈËÔ±Å䱸ºÍMicrosoft Cloud»ù´¡¼Ü¹¹×¨ÒµÖªÊ¶À´»Ö¸´¡£¾¡¹ÜÍøÂçÄþ¾²×¨¼ÒÖ¸³ö£¬¸¶·Ñ»¹ÊDz»¸¶·ÑµÄ¾ö¶¨ÊÇÒ»¸öÅÓ´óµÄ¾ö¶¨£¬È¡¾öÓÚ¸öÈËÇé¿ö£¬Ô¤ËãºÍÊý¾Ý·çÏÕ¡£SB S7246ºÅ·¨°¸ÔÚŦԼÖÝÌá³öÁËÒ»Ïî×ÜÀ¨ÐÔÕþ²ß¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/new-york-ban-cities-paying-ransomware/152233/