ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ40ÖÜ

Ðû²¼Ê±¼ä 2019-10-14

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2019Äê10ÔÂ07ÈÕÖÁ13ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬ £¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCobham plc EXPLORER 710ĬÈÏÑé֤ƾ֤Îó²î; ·ºÎ¢OAϵͳ SQL×¢ÈëÎó²î£»£»£»£»£»iTerm2Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Microsoft Windows Secure BootÇå¾²ÈÆ¹ýÎó²î£»£»£»£»£»QEMU ahci_commit_buf()¿ÕÖ¸Õë¼ä½ÓÒýÓÃÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǶíÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶£»£»£»£»£»Ponemon InstituteÐû²¼¡¶2019ÄêÈ«ÇòSMBÍøÂçÇ徲״̬±¨¸æ¡·£»£»£»£»£»VolusionÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬£¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°£»£»£»£»£»Ë¼¿ÆTalosÍŶӷ¢Ã÷NitroPDF±£´æ¶à¸öRCEÎó²î£»£»£»£»£»Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ¡£¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1. Cobham plc EXPLORER 710ĬÈÏÑé֤ƾ֤Îó²î


Cobham plc EXPLORER 710±£´æÓë֮ǰװ±¸ÏàͬµÄROOTÃÜÂ룬£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬£¬Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£¡£

https://kb.cert.org/vuls/id/719689/


2. ·ºÎ¢OAϵͳ SQL×¢ÈëÎó²î


·ºÎ¢E-cologyOA±£´æSQL×¢ÈëÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬ £¬£¬£¬£¬£¬£¬²Ù×÷Êý¾Ý¿â£¬£¬ £¬£¬£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://www.weaver.com.cn/cs/securityDownload.asp


3. iTerm2Ô¶³Ì´úÂëÖ´ÐÐÎó²î


iTerm2 tmux¼¯ÀÖ³ÉÄܱ£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£

https://kb.cert.org/vuls/id/763073/


4. Microsoft Windows Secure BootÇå¾²ÈÆ¹ýÎó²î


Microsoft Windows Secure BootûÓÐ׼ȷµØÏÞÖÆ¶Ôµ÷ÊÔ¹¦Ð§µÄ»á¼û£¬£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬£¬¿É»ñÈ¡±»±£»£»£»£»£»¤µÄÄÚºËÄÚ´æ¡£¡£¡£¡£¡£¡£¡£¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1368


5. QEMU ahci_commit_buf()¿ÕÖ¸Õë¼ä½ÓÒýÓÃÎó²î


QEMU ahci_commit_buf()±£´æ¿ÕÖ¸Õë¼ä½ÓÒýÓÃÎó²î£¬£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬£¬¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£

https://access.redhat.com/security/cve/cve-2019-12067



> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ƾ֤¶íÂÞ˹ýÌåµÄ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬£¬À´×Ô¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeelineµÄ870ÍòÃû¿Í»§Êý¾ÝÕýÔÚÍøÉϳöÊۺ͹²Ïí¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨ÏêϸµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëºÍ¼ÒÍ¥µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£¡£BeelineÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖÊý¾Ýй¶±¬·¢ÔÚ2017Ä꣬£¬ £¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2016Äê11ÔÂ֮ǰע²á¼ÒÍ¥¿í´øµÄ¶íÂÞ˹Óû§¡£¡£¡£¡£¡£¡£¡£¡£ÆäʱBeelineÕÒµ½ÁËÊý¾Ýй¶µÄÔðÈÎÈË£¬£¬ £¬£¬£¬£¬£¬£¬µ«Î´¹ûÕæ´ËÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÒѾ­±»ÔÚÍøÉϹ²Ïí£¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÔÚTelegramƵµÀÉϹ²Ïí¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/data-breach-at-russian-isp-impacts-8-7-million-customers/


2¡¢Ponemon InstituteÐû²¼¡¶2019ÄêÈ«ÇòSMBÍøÂçÇ徲״̬±¨¸æ¡·


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ƾ֤ÖܶþPonemon InstituteÐû²¼µÄ¡¶2019ÄêÈ«ÇòSMBÍøÂçÇ徲״̬±¨¸æ¡·£¬£¬ £¬£¬£¬£¬£¬£¬È«Çò66%µÄÖÐСÐÍÆóÒµ£¨SMB£©ÔÚÒÑÍù12¸öÔÂÄÚ±¨¸æÁËÍøÂç¹¥»÷ÊÂÎñ - ÆäÖÐ76%µÄÆóÒµ×ܲ¿Î»ÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£¡£PonemonÌåÏÖÕâÊÇÒ»Á¬µÚÈýÄêSMB±¨¸æµÄÍøÂçÇå¾²ÊÂÎñ·ºÆð¡°ÏÔÖøÔöÌí¡±¡£¡£¡£¡£¡£¡£¡£¡£Ä¿½ñSMBÃæÁÙµÄ×î³£¼ûÍøÂç¹¥»÷ÐÎʽÊÇÍøÂç´¹ÂÚ¡¢×°±¸ÈëÇÖ»ò±»µÁ¡¢Æ¾Ö¤ÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£¡£Ëæ×Å×Ô´ø×°±¸°ì¹«£¨BYOD£©Ä£Ê½µÄÊ¢ÐУ¬£¬ £¬£¬£¬£¬£¬£¬×°±¸µÄ±»µÁÓÈÆä³ÉΪһ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÒÑÍù12¸öÔÂÖУ¬£¬ £¬£¬£¬£¬£¬£¬¹²ÓÐ63%µÄÆóÒµ±¨¸æÁËÃô¸Ð¹«Ë¾Êý¾Ý»ò¿Í»§ÐÅϢɥʧÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬£¬¶øÔÚÃÀ¹úÕâÒ»±ÈÀýÉÏÉýÖÁ69%£¬£¬ £¬£¬£¬£¬£¬£¬ÏÔÖø¸ßÓÚËÄÄêǰµÄ50%¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/76-percent-of-us-businesses-have-experienced-a-cyberattack-in-the-past-year/


3¡¢VolusionÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬£¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ƾ֤zdnetµÄÐÂÎÅ£¬£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖVolusionµÄ»ù´¡ÉèÊ©²¢Èö²¥¶ñÒâ´úÂ룬£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý6500¼Òµç×ÓÊÐËÁÍøÕ¾ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÊÇÒ»¸öµä·¶µÄMAGECART¹©Ó¦Á´¹¥»÷£¬£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñµÃÁËVolusionµÄGoogle Cloud»ù´¡ÉèÊ©»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÔÚÆäÖÐÐÞ¸ÄÁËJSÎļþ£¬£¬ £¬£¬£¬£¬£¬£¬Ìí¼ÓÓÃÓÚ¼ÍÈÎÃü»§ÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ´úÂë±»¼ÓÔØµ½»ùÓÚVolusionµÄÔÚÏßÊÐËÁÖС£¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ¶ñÒâ´úÂëÈÔÔÚVolusionµÄЧÀÍÆ÷ÉÏ£¬£¬ £¬£¬£¬£¬£¬£¬VolusionÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-breach-volusion-and-start-collecting-card-details-from-thousands-of-sites/


4¡¢Ë¼¿ÆTalosÍŶӷ¢Ã÷NitroPDF±£´æ¶à¸öRCEÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


˼¿ÆTalosÅû¶NitroPDFÖеĶà¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¡£Nitro PDFÔÊÐíÓû§ÔÚÆäÅÌËã»úÉÏÉúÑÄ¡¢ÔĶÁºÍ±à¼­PDFÎļþ£¬£¬ £¬£¬£¬£¬£¬£¬¸Ã²úÆ··ÖΪÃâ·Ñ°æºÍÊշѰæ¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄÎó²î¶¼±£´æÓÚÊշѵÄPro°æÖС£¡£¡£¡£¡£¡£¡£¡£Îó²î°üÀ¨jpeg2000 ssizDepthÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5045£©¡¢Page KidsÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5050£©¡¢ICCBasedÉ«²Ê¿Õ¼äÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5048£©¡¢CharProcsÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5047£©¡¢ jpeg2000 yTsizÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5046£©¼°Á÷³¤¶ÈÆÊÎö¹¦Ð§ÄÚ´æËð»µÎó²î£¨CVE-2019-5053£©¡£¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾ÎªNitroPDF 12.12.1.522¡£¡£¡£¡£¡£¡£¡£¡£NitroPDFÉÐδÐû²¼Ïà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2019/10/vuln-spotlight-Nitro-PDF-RCE-bugs-sept-19.html


5¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÔÚ½ñÌìÐû²¼ÁËÒ»·ÝÏêϸµÄʺ󱨸æ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´Ë´ÎÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿µÄ±»µÁ£¬£¬ £¬£¬£¬£¬£¬£¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâÍâÅþÁ¬µ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿»á¼ûImpervaµÄÔÆ»ù´¡ÉèÊ©£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDSЧÀÍ¡£¡£¡£¡£¡£¡£¡£¡£Imperva²¢Î´Åû¶ÉÏÊöÊÂÎñ¼òÖ±ÇÐÈÕÆÚ£¬£¬ £¬£¬£¬£¬£¬£¬Òò´ËÉÐÎÞ·¨È·ÈϺڿͻá¼ûÁ˸ù«Ë¾µÄЧÀÍÆ÷¶à³¤Ê±¼ä¡£¡£¡£¡£¡£¡£¡£¡£ImpervaÊ×ϯִÐйټòª¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÄ¿£¬£¬ £¬£¬£¬£¬£¬£¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó£¬£¬ £¬£¬£¬£¬£¬£¬¿Í»§Ìæ»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Ê飬£¬ £¬£¬£¬£¬£¬£¬²¢ÖØÐÂÌìÉúÁË1400¶à¸öImperva APIÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/