ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ48ÖÜ

Ðû²¼Ê±¼ä 2019-12-09

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ02ÈÕÖÁ08ÈÕ¹²ÊÕ¼Çå¾²Îó²î48¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Kubernetes APIÖØ¶¨ÏòÎó²î; D-Link DAP-1860ÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î£»£»£»£» £»£»£»£»OpenBSDÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£» £»£»£»£»Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»£»£»£» £»£»£»£»Mozilla Firefox ESR worker destructionÄÚ´æ¹ýʧÒýÓÃÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÅ·ÖÞÍøÂçÇå¾²¾ÖÐû²¼º£Ê²¿·ÖÍøÂçÇå¾²Ö¸ÄÏ£»£»£»£» £»£»£»£»AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦Ó㻣»£»£» £»£»£»£»GoAhead WebЧÀÍÆ÷RCEÎó²îÓ°Ïì´ó×ÚIoT×°±¸£»£»£»£» £»£»£»£»Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î£»£»£»£» £»£»£»£»PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí


1. Google Kubernetes APIÖØ¶¨ÏòÎó²î


Google Kubernetes API serverûÓÐ׼ȷÑéÖ¤URLµÄÖØ¶¨Ïò£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬½«APIЧÀÍÆ÷ÇëÇóÖØ¶¨Ïòµ½í§ÒâÖ÷»ú¡£¡£¡£¡£¡£¡£¡£¡£

https://github.com/kubernetes/kubernetes/issues/85867


2. D-Link DAP-1860ÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î


D-Link DAP-1860 HNAP_TIMEºÍSOAPAction±£´æÏÂÁî×¢ÈëÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/


3. OpenBSDÑéÖ¤ÈÆ¹ýÎó²î


OpenBSDÑé֤ϵͳ±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇóÓû§Ãû£¬£¬£¬Èç"-option"»ò"-schallenge"£¬£¬£¬ÈƹýÇå¾²ÏÞÖÆ£¬£¬£¬Î´ÊÚȨ»á¼ûϵͳ¡£¡£¡£¡£¡£¡£¡£¡£

https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html


4. Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î


Apache Olingo AbstractService ObjectInputStream±£´æ·´ÐòÁл¯Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E


5. Mozilla Firefox ESR worker destructionÄÚ´æ¹ýʧÒýÓÃÎó²î


Mozilla Firefox ESR worker destruction±£´æÄÚ´æ¹ýʧÒýÓÃÁ½´ÎÊÍ·ÅÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£» £»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://www.auscert.org.au/bulletins/ESB-2019.4555/


>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Å·ÖÞÍøÂçÇå¾²¾ÖÐû²¼º£Ê²¿·ÖÍøÂçÇå¾²Ö¸ÄÏ

ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Å·ÖÞÍøÂçÇå¾²¾Ö£¨ENISA£©ÒÔ¡¶¿Ú°¶ÍøÂçÇå¾²-º£Ê²¿·ÖÍøÂçÇ徲ʵ¼ù¡·ÎªÌâÐû²¼Á˺£Ê²¿·ÖÍøÂçÇå¾²Ö¸ÄÏ£¬£¬£¬Îª¿Ú°¶Éú̬ϵͳÓÈÆäÊǿڰ¶Õþ¸®ºÍÂëÍ·ÔËÓªÉÌÖеÄCIOºÍCISOÖÆ¶©ÍøÂçÇå¾²Õ½ÂÔÌṩָµ¼ºÍ×ÊÖú¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÁгöÁ˿ڰ¶ÉúÌ¬ÏµÍ³ÃæÁÙµÄÖ÷ÒªÍþв£¬£¬£¬²¢ÐÎòÁË¿ÉÄܶԿڰ¶Éú̬ϵͳÔì³ÉÓ°ÏìµÄÒªº¦ÍøÂç¹¥»÷³¡¾°¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏΪÖն˱£»£»£»£» £»£»£»£»¤ºÍÉúÃüÖÜÆÚÖÎÀí¡¢Îó²îÖÎÀí¡¢ÈËÁ¦×ÊÔ´Çå¾²¡¢¹©Ó¦Á´ÖÎÀíµÈÉè¼ÆÁËÇå¾²²½·¥¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/


2¡¢AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦ÓÃ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


PromonÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄAndroidÎó²îStrandHogg£¬£¬£¬¸ÃÎó²îÔÊÐí¶ñÒâÓ¦ÓÃαװ³Éí§ÒâÕýµ±Ó¦Óᣡ£¡£¡£¡£¡£¡£¡£¸ÃÎó²îʹÓÃÁËAndroidµÄ¶àʹÃü´¦Öóͷ£¹¦Ð§£¬£¬£¬µ±Óû§µã»÷Ò»¸öÕý³£Ó¦ÓõÄͼ±êʱ£¬£¬£¬¶ñÒâÓ¦ÓÿÉÒÔʹÓøÃÎó²î×èµ²Ö¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐéαµÄ½çÃæ£¬£¬£¬´Ó¶øÓÕµ¼Óû§ÊÚÓèÖÖÖÖȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒѾ­·¢Ã÷ÁË36¸öÕýÔÚÆð¾¢Ê¹ÓôËÎó²îµÄ¶ñÒâÓ¦Ó㬣¬£¬°üÀ¨ÒøÐÐľÂíBankBot¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îµÄÓ°Ïì¹æÄ£ºÜÊǴ󣬣¬£¬ÓÉÓÚĬÈÏÇéÐÎÏ´ó´ó¶¼Ó¦Óö¼Ò×Êܹ¥»÷£¬£¬£¬²¢ÇÒÏÖÔÚûÓпɿ¿µÄÒªÁìÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¹È¸èÉÐδÔÚÈκΰ汾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/


3¡¢GoAhead WebЧÀÍÆ÷RCEÎó²îÓ°Ïì´ó×ÚIoT×°±¸


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


˼¿ÆTalosµÄÇ徲ר¼ÒÔÚGoAheadǶÈëʽWebЧÀÍÆ÷Öз¢Ã÷ÁËÁ½¸öÎó²î£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÒªº¦µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5096£©¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓëGoAhead´¦Öóͷ£multi-part/form-dataÇëÇóµÄ·½·¨ÓйØ£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î´¥·¢use-after-free£¬£¬£¬²¢Í¨¹ý·¢ËͶñÒâHTTPÇëÇóÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²î£¨CVE-2019-5097£©±£´æÓÚͳһ×é¼þÖУ¬£¬£¬¿Éµ¼Ö¾ܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨v5.0.1¡¢v.4.1.1ºÍv3.6.5¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ShodanµÄËÑË÷Ч¹û£¬£¬£¬Ì»Â¶ÔÚ¹«ÍøÉϵÄGoAheadЧÀÍÆ÷ÊýÄ¿ÒÑÁè¼Ý130Íò¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/12/goahead-web-server-hacking.html


4¡¢Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


SafeBreach LabsÑо¿Ö°Ô±Åû¶Autodesk¡¢Ç÷ÊÆ¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLLÐ®ÖÆÎó²î¡£¡£¡£¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Çå¾²Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬£¬£¬¸ÃÎó²î±£´æÓÚcoreServiceShell.exe×é¼þÖС£¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû¾ÙÐÐÑéÖ¤£¬£¬£¬Òò´Ë¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐí§ÒâDLL£¬£¬£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³¤ÆÚÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£¡£¡£¡£¡£¡£¡£¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²»®·ÖÊܵ½ÀàËÆµÄÎó²îCVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/


5¡¢PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


PCIÇå¾²±ê׼ίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£¡£¡£¡£¡£¡£¡£¡£¸Ã±ê×¼ÔÊÐí´øÓÐNFCµÄCOTSÒÆ¶¯×°±¸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£¡£¡£¡£¡£¡£¡£¡£PCI CPoC±ê×¼ÊǸÃίԱ»áΪ½â¾öÒÆ¶¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö±ê×¼¡£¡£¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬PCI CPoC±ê×¼»®¶¨Á˹©Ó¦ÉÌÔÚ±£»£»£»£» £»£»£»£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¼Æ»®·½ÃæµÄһЩÇå¾²ÉϵÄÒªÇ󡣡£¡£¡£¡£¡£¡£¡£±ê×¼µÄCPoC½â¾ö¼Æ»®°üÀ¨¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTS×°±¸¡¢ÂÄÀúÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°×ÔÁ¦ÓÚCOTS×°±¸µÄºó¶Ëϵͳ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1