ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ20ÖÜ

Ðû²¼Ê±¼ä 2018-05-21

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
        2018Äê05ÔÂ14ÈÕÖÁ20ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇRed Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î£»£»£»£»£»Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î¡£¡£ ¡£¡£

        ±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDzÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖУ»£»£»£»£»Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPЭÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ£»£»£»£»£»¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î¡£¡£ ¡£¡£

        ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£ ¡£¡£


¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢Red Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î

        Red Hat DHCP Client´¦Öóͷ£ÌØÊâµÄDHCPÏìÓ¦±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£ ¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://access.redhat.com/security/vulnerabilities/3442151
2¡¢Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î

        Advantech WebAccess±£´æÎļþÃû³Æ»ò·¾¶Íⲿ¿ØÖÆÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿Éɾ³ýí§ÒâÎļþ¡£¡£ ¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://ics-cert.us-cert.gov/advisories/ICSA-18-135-01
3¡¢Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î

        Adobe Photoshop CC´¦Öóͷ£Îļþ±£´æÔ½½çдÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâÎļþ£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://helpx.adobe.com/security/products/photoshop/apsb18-17.html
4¡¢Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î

        Google Chrome V8±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÒ³£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop.html
5¡¢Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î

        Spring FrameworkÔÚʹÓÃÒªÁìÇå¾²ÐÔ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÈƹýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£ ¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://pivotal.io/security/cve-2018-1258


Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢²ÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖÐ

ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾

        ²ÍÒûÁ¬Ëø¹«Ë¾Chili's±¾ÖÜÐû²¼Í¨¸æ³ÆÔâµ½¶ñÒâÈí¼þ¹¥»÷¡£¡£ ¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕýÔÚÓëÖ´·¨²¿·ÖºÍµÚÈý·½ÅжÏר¼ÒÒ»ÆðÊÓ²ì´ËÊÂÎñ¡£¡£ ¡£¡£Æ¾Ö¤ÍøÂçµ½µÄ×îÐÂϸ½Ú£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þËÆºõÒѾ­Ñ¬È¾ÁËÆäijЩ֧¸¶ÏµÍ³¡£¡£ ¡£¡£µ«ÔÚÍøÂçÉÏ·¢Ã÷¸Ã¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬³ÆÓÐÖ¤¾ÝÅú×¢¸Ã¶ñÒâÈí¼þ½öÔÚ2018Äê3ÔºÍ4ÔÂÖ®¼ä»îÔ¾¡£¡£ ¡£¡£BrinkerҲûÓÐÌṩ»òÐíÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿£¬£¬£¬£¬£¬£¬£¬µ«ÔÊÐíÔÚÊÓ²ì¾ÙÐÐʱÐû²¼¸ü¶àϸ½Ú¡£¡£ ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/card-breach-announced-at-chili-s-restaurant-chain/

2¡¢Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨

ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾

        ÖÐÑëÒøÐÐÆóÒµÖ§¸¶ºÍЧÀÍϵͳ×ܼàLorenza MartinezÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÔÚ4ÔºÍ5ÔÂÖÁÉÙ¶ÔÄ«Î÷¸çÑëÐеÄÒøÐмäµç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©ÌᳫÁËÎå´ÎºÚ¿Í¹¥»÷¡£¡£ ¡£¡£Ò»Ð©Ä«Î÷¸çýÌåÒѾ­½«±»µÁ½ð¶îÉèΪ4ÒÚ±ÈË÷£¨2040ÍòÃÀÔª£©£¬£¬£¬£¬£¬£¬£¬µ«Âí¶¡ÄÚ˹·ñ¶¨ÁËÕâЩ±¨µÀ¡£¡£ ¡£¡£Ëý˵±»µÁµÄÇ®ÊôÓÚÒøÐÐ×Ô¼º£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄ×ʽð´ÓδÊܵ½Ó°Ïì¡£¡£ ¡£¡£ÔÚ·¢Ã÷¹¥»÷ºó£¬£¬£¬£¬£¬£¬£¬ÒøÐÐת¶ø½ÓÄɽÏÂýµ«¸üÇå¾²µÄÒªÁ죬£¬£¬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐÐµĹ¥»÷¼Í¼¡£¡£ ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-divert-funds-mexico-banks-amount-unclear-official

3¡¢Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPЭÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ

ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾

        ¹¥»÷ÕßÕýÔÚʵÑé½ÓÄÉͨÓü´²å¼´Óã¨UPnP£©Ð­ÒéÀ´ÆÁÕÏDDoSÂþÒçʱ´ú·¢Ë͵ÄÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃijЩDDoS»º½â½â¾ö¼Æ»®µÄÐÂÒªÁì¡£¡£ ¡£¡£ÔÚÖÜÒ»Ðû²¼µÄÒ»·Ý±¨¸æÖУ¬£¬£¬£¬£¬£¬£¬Imperva¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÖÁÉÙÓÐÁ½´Î½ÓÄÉÕâÖÖÊÖÒÕµÄDDoS¹¥»÷¡£¡£ ¡£¡£Í¨¹ýÆÁÕÏ´«ÈëÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú¡£¡£ ¡£¡£ÒÀÀµ¶ÁÈ¡´ËÐÅÏ¢À´×èÖ¹¹¥»÷µÄÀÏʽDDoS»º½âϵͳÐèÒª¸üÐÂΪ¸üÖØ´óµÄ½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬ÕâЩ½â¾ö¼Æ»®ÒÀÀµÓÚÉî¶È°ü¼ì²â£¨DPI£©£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ±¾Ç®¸ü¸ß£¬£¬£¬£¬£¬£¬£¬½¨ÒéʹÓ÷ÓÉÆ÷µÄÓû§ÈôÊDz»Ê¹Óøù¦Ð§£¬£¬£¬£¬£¬£¬£¬Ôò½ûÓÃUPnPÖ§³Ö¡£¡£ ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ddos-attacks-leverage-upnp-protocol-to-avoid-mitigation/

4¡¢¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷

ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾

        Anonymous¹¥»÷Á˶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©µÄ¹Ù·½ÍøÕ¾µÄ×ÓÓòÃû£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒÔ¿¹ÒéÕþ¸®µÄÉó²éÖÆ¶È£¬£¬£¬£¬£¬£¬£¬²¢ÌØÊâÌáµ½ÁËեȡTelegramµÄ»®¶¨¡£¡£ ¡£¡£ÉϸöÔ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹Õþ¸®·â±ÕÁ˸ùúµÄTelegramÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬ÓÉÓڸù«Ë¾¾Ü¾ø½«ÆäÓû§µÄ¼ÓÃÜÃÜÔ¿½»¸ø¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¾ÙÐÐÊӲ졣¡£ ¡£¡£×Ô2018Äê5ÔÂ3ÈÕÆð£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹Ïà¹Ø»ú¹¹½û·âÁË50¶à¸öÐéÄâרÓÃÍøÂ磨VPN£©¡¢ÍøÂçÊðÀíºÍÄäÃûÍøÂç¡£¡£ ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72567/hacktivism/anonymous-hask-russia-site.html

5¡¢Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î

ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾

        ESETµÄÑо¿Ö°Ô±×î½ü·¢Ã÷ÁËÒ»¸ö¶ñÒâPDFÎļþ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÎĵµÊ¹ÓÃWindowsÖеÄÌØÈ¨Éý¼¶Îó²î£¨CVE-2018-8120£©ºÍAdobe Reader£¨CVE-2018-4990£©ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£ ¡£¡£CVE-2018-8120ÊÇMicrosoftÔÚ2018Äê5Ô²¹¶¡¸üÐÂÖÐÐÞ¸´µÄÁ½¸ö0dayÎó²îÖ®Ò»£¬£¬£¬£¬£¬£¬£¬¶øCVE-2018-4990ÊÇÓÉAdobeÓÚ5ÔÂ14ÈÕÐû²¼µÄ£¬£¬£¬£¬£¬£¬£¬Ðû²¼ÁËÐÞ¸´½ü50¸öÆäËûÎÊÌâµÄ¸üС£¡£ ¡£¡£Í¨¹ýÁ¬ÏµÕâÁ½¸öȱÏÝ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÓÃ×îÉÙµÄÓû§½»»¥ÒÔ¸ü¸ßµÄȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ·­¿ª¶ñÒâPDF¡£¡£ ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/malicious-pdf-leads-discovery-adobe-reader-windows-zero-days