ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ33ÖÜ

Ðû²¼Ê±¼ä 2019-08-26

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ19ÈÕÖÁ25ÈÕ¹²ÊÕ¼Çå¾²Îó²î46¸ö£¬£¬ £¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇForcepoint Next Generation FirewallÃÜÂëÑéÖ¤ÈÆ¹ýÎó²î£»£»£» £»£»£»£»Aspose Aspose.Cells LabelSst´úÂëÖ´ÐÐÎó²î£»£»£» £»£»£»£»Cisco Small Business 220ϵÁÐÖÇÄܽ»Á÷»úÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£» £»£»£»£»IBM DB2 High Performance UnloadȨÏÞÌáÉýÎó²î£»£»£» £»£»£»£»Google Nest Cam IQ Indoor Weave PASEÆÊÎö¹¦Ð§ÐÅϢй¶Îó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ΢ÈíÈ·ÈÏWindows10 1903¸üб£´æ¹ýʧ0x80073701£»£»£» £»£»£»£»ÏµÍ³ÖÎÀíÔ±¹¤¾ßWebmin±£´æ0dayÎó²î¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»£»£» £»£»£»£»ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»£»£» £»£»£»£»¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Ê飻£»£» £»£»£»£»¿¨°Í˹»ùÐû²¼2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí



1. Forcepoint Next Generation FirewallÃÜÂëÑéÖ¤ÈÆ¹ýÎó²î


Forcepoint Next Generation Firewall LDAPÑéÖ¤ÒªÁì±£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬¿ÉÈÆ¹ýÃÜÂëÑéÖ¤£¬£¬ £¬£¬£¬»á¼ûÊܱ£»£»£» £»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£
https://support.forcepoint.com/KBArticle?id=000017474

2. Aspose Aspose.Cells LabelSst´úÂëÖ´ÐÐÎó²î


Aspose Cells labelSst record parser±£´æÔ½½ç¶ÁÎó²î£¬£¬ £¬£¬£¬ÔÊÐíδÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄXLSÇëÇ󣬣¬ £¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬ £¬£¬£¬¿ÉÒÔÓû§ÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0794

3. Cisco Small Business 220ϵÁÐÖÇÄܽ»Á÷»úÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Cisco Small Business 220ϵÁÐÖÇÄܽ»Á÷»ú¶ÁÈ¡Êý¾Ýµ½ÄÚ²¿»º³åÇøÊ±±£´æ»º³åÇøÒç³ö¹¥»÷£¬£¬ £¬£¬£¬ÔÊÐíδÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬¿ÉÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce

4. IBM DB2 High Performance UnloadȨÏÞÌáÉýÎó²î


IBM DB2 High Performance Unload´¦Öóͷ£PATH±£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬¿É¼ÓÔØ¶ñÒâ¹²Ïí¿â£¬£¬ £¬£¬£¬ÌáÉýȨÏÞ¡£¡£¡£¡£
https://www-01.ibm.com/support/docview.wss?uid=ibm10964592

5. Google Nest Cam IQ Indoor Weave PASEÆÊÎö¹¦Ð§ÐÅϢй¶Îó²î


Google Nest Cam IQ Indoor Weave PASEÆÊÎö¹¦Ð§±£´æÐÅϢй¶Îó²î£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄweave±¨ÎÄÇëÇ󣬣¬ £¬£¬£¬¿É¿ØÖÆ×°±¸¡£¡£¡£¡£
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0798


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢Î¢ÈíÈ·ÈÏWindows10 1903¸üб£´æ¹ýʧ0x80073701


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


MicrosoftÒÑÈ·ÈÏËûÃÇÕýÔÚÐÞ¸´Óû§ÔÚ×°ÖÃеÄv1903¸üÐÂʱÊÕµ½µÄ0x80073701¹ýʧ¡£¡£¡£¡£ÔÚ2019Äê8Ô²¹¶¡ÐÇÆÚ¶þ¸üÐÂÐû²¼ºó£¬£¬ £¬£¬£¬Óû§×îÏȱ¨¸æËûÃÇÔÚʵÑé×°ÖÃWindows 10°æ±¾1903ÀÛ»ý¸üÐÂʱÊÕµ½¹ýʧ¡£¡£¡£¡£ËäÈ»´ó´ó¶¼Óû§±¨¸æÅú×¢ÎÊÌâʼÓÚ8ÔÂ13ÈÕ£¬£¬ £¬£¬£¬µ«Î¢ÈíÌåÏÖ£¬£¬ £¬£¬£¬ÔÚÐû²¼2019Äê5ÔÂ29ÈÕKB4497935  ÀÛ»ý¸üÐÂʱ£¬£¬ £¬£¬£¬ÎÊÌâÏÖʵÉÏÒѾ­·ºÆð¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÈκÎδÀ´µÄÐÞ¸´³ÌÐòÊÇ·ñÒ²½«ÆÊÎöÓû§ÕýÔÚÎüÊյįäËû¹ýʧ´úÂë¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-windows-10-1903-update-error-0x80073701-working-on-fix/

2¡¢ÏµÍ³ÖÎÀíÔ±¹¤¾ßWebmin±£´æ0dayÎó²î¿ÉÖÂÔ¶³Ì´úÂëÖ´ÐÐ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Ê¢ÐеÄϵͳÖÎÀíÔ±¹¤¾ßWebminÔÚÖØÖÃÃÜÂ빦ЧÖз¢Ã÷ÁËÒ»¸ö¹ýʧ£¬£¬ £¬£¬£¬¸Ã¹ýʧÔÊÐí¶ñÒâµÚÈý·½ÓÉÓÚȱÉÙÊäÈëÑéÖ¤¶øÖ´ÐжñÒâ´úÂë¡£¡£¡£¡££¬£¬ £¬£¬£¬ÒÑÖªÔÚ¶Ë¿Ú10000ÉÏÔËÐУ¬£¬ £¬£¬£¬²¢ÇÒÓ°Ïì×îа汾1.920£¬£¬ £¬£¬£¬WebminÉÐδÐû²¼¹ûÕæÉùÃ÷»ò²¹¶¡£¬£¬ £¬£¬£¬ÏÖÔÚ»¥ÁªÍøÉϹûÕæµÄWebminÖÁÉÙÁè¼Ý13Íò¸ö¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.firosolutions.com/exploits/webmin/

3¡¢ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ÉÏÖÜÎåµÂ¿ËÈøË¹Öݶà´ï23¼ÒʵÌå»ú¹¹-ÆäÖдó´ó¶¼Êǵط½Õþ¸®-Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬µÂ¿ËÈøË¹ÖݹÙÔ±³ÆÕâÊÇÒ»¸ö¼òµ¥¹¥»÷ÕßÌᳫµÄÕë¶ÔÐÔ¹¥»÷µÄÒ»²¿·Ö¡£¡£¡£¡£×èÖ¹ÖÜÁùÍí£¬£¬ £¬£¬£¬µÂ¿ËÈøË¹ÖÝÐÅÏ¢×ÊÔ´²¿£¨DIR£©ÌåÏÖÓ¦¼±ÏìÓ¦ÍŶÓÕýÆð¾¢ÓëËùÓÐ23¸öʵÌåÏàÖú£¬£¬ £¬£¬£¬Ê¹ÆäÏµÍ³ÖØÐÂÉÏÏߣ¬£¬ £¬£¬£¬²¢Çҵ¿ËÈøË¹ÖݵÄϵͳºÍÍøÂç²»»áÊܵ½Ó°Ïì¡£¡£¡£¡£ÏÖÔÚÏêϸ¹¥»÷ϸ½ÚÈÔȻȱ·¦£¬£¬ £¬£¬£¬DIRҲûÓÐ̸ÂÛÄÄЩϵͳ·ºÆð¹ÊÕÏ¡¢ÏµÍ³ÔõÑù±»Ñ¬È¾ÒÔ¼°ÏêϸµÄÊê½ðÊý¶î¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/

4¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Êé


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®ÓÚÉϸöÔ½ÒÏþµÄ¸ùÖ¤Ê飬£¬ £¬£¬£¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£¡£¡£¡£Æäʱ¹þÈø¿Ë˹̹Õþ¸®ÒªÇó¸Ã¹úISPÏàÖú£¬£¬ £¬£¬£¬Ç¿ÖÆÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£¡£¡£¡£ÏÖÔÚµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ£¬£¬ £¬£¬£¬½«×èÖ¹ÅþÁ¬²¢ÏÔʾ¹ýʧÐÅÏ¢¡£¡£¡£¡£¹þÈø¿Ë˹̹Õþ¸®ÒѾ­ÔÚ8Ô³õ×èÖ¹ÁËÕâÒ»ÍýÏ룬£¬ £¬£¬£¬Ò»Ãû¹ÙÔ±ÌåÏÖÕû¸öÍýÏëÖ»ÊÇÕþ¸®µÄÒ»¸ö²âÊÔ¡£¡£¡£¡£µ«ÈÔÓÐÊý°ÙÍò×°±¸ÈÔÔÚʹÓøÃÖ¤Êé¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html

5¡¢¿¨°Í˹»ùÐû²¼2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ¾ÙÐе÷ÑУ¬£¬ £¬£¬£¬ÕûÀí²¢Ðû²¼ÁË¡¶2019Äê¹¤ÒµÍøÂçÇ徲״̬¡·±¨¸æ¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬ £¬£¬£¬È¥ÄêÁè¼ÝÒ»°ë£¨52%£©µÄ¹¤¿ØÇå¾²ÊÂÎñÊÇÓÉÈËΪʧÎóµ¼Öµġ£¡£¡£¡£ËäÈ»¾ø´ó´ó¶¼¹«Ë¾£¨81£¥£©ÍýÏë¾ÙÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0£¬£¬ £¬£¬£¬µ«·ÖÅÉÁËÍøÂçÇå¾²Ô¤ËãµÄÈ´Éٵöࣨ57£¥£©¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬ £¬£¬£¬ÕâЩ¹«Ë¾µÄÍøÂçÇå¾²ÊÖÒÕÈÔÈ»ÁîÈ˵£ÐÄ£ºÊÜ·ÃÕßµÄÁ½´óµ£Ðļ¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂçÇ徲ר¼ÒÀ´ÖÎÀí¹¤ÒµÍøÂ磬£¬ £¬£¬£¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±éȱ·¦Çå¾²Òâʶ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/