¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180725

Ðû²¼Ê±¼ä 2018-07-25

¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ2 DDoS¹¥»÷Ç÷ÊÆµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒÐû²¼2018ÄêµÚ¶þ¼¾¶ÈµÄDDoS¹¥»÷Ç÷ÊÆµÄÆÊÎö±¨¸æ¡£±¾¼¾¶ÈDDoS¹¥»÷µÄá¯ÁëÆÚÊÇ4ÔÂÖÐÑ®£¬¶ø5ÔÂÏÂÑ®ºÍ6Ô³õ½ÏΪÇå¾²¡£Ôâµ½¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÖйú£¨59.03%£©¡£SYN¹¥»÷µÄ±ÈÀý¼±¾çÉÏÉý£¬´ï80.2%£¬Æä´ÎÊÇUDP¹¥»÷£¬Îª10.6%¡£Linux½©Ê¬ÍøÂçµÄ¹¥»÷ËùÕ¼·Ý¶îÏÔÖøÔöÌí£¬Õ¼94.47%¡£

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-in-q2-2018/86537/


¡¾Îó²î²¹¶¡¡¿Ñо¿Ö°Ô±·¢Ã÷ÐÂÀ¶ÑÀÎó²î£¨CVE-2018-5383£©£¬Apple¡¢IntelµÈ¾ùÊÜÓ°Ïì


ÒÔÉ«ÁÐÀí¹¤Ñ§ÔºµÄÑо¿Ö°Ô±Lior NeumannºÍEli Biham·¢Ã÷еÄÀ¶ÑÀÎó²î£¨CVE-2018-5383£©£¬¸ÃÎó²îÓ°ÏìÁËApple¡¢Broadcom¡¢Intel¡¢QualcommµÈÖ÷ÒªÓ²¼þ¹©Ó¦ÉÌ¡£Æ¾Ö¤CERT/CCÐû²¼µÄ±¨¸æ£¬²¿·ÖÀ¶ÑÀʵÏÖµÄÍÖÔ²ÇúÏß¼ÓÃÜËã·¨µÄ²ÎÊýûÓо­ÓÉÑéÖ¤£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔ×赲ϢÕùÃÜÓû§µÄÐÅÏ¢¡£¸ÃÎó²î¶ÔGoogle¡¢AndroidºÍLinuxµÄÓ°ÏìÈÔȻδ֪¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/bluetooth-hack-vulnerability.html


¡¾Îó²î²¹¶¡¡¿Apache TomcatÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¸öÇå¾²Îó²î


ASFÐû²¼Apache TomcatµÄÇå¾²¸üУ¬ÐÞ¸´¶à¸öÇå¾²Îó²î£¬°üÀ¨¿Éµ¼ÖÂÐÅϢй¶µÄÎó²î£¨CVE-2018-8037£©¡¢¿Éµ¼Ö¾ܾø·þÎñµÄÎó²î£¨CVE-2018-1336£©ÒÔ¼°Çå¾²ÈÆ¹ýÎó²î£¨CVE-2018-8034£©¡£ASFÌåÏÖÏÖÔÚûÓз¢Ã÷ÈκÎʹÓÃÕâЩÎó²îµÄÊÂÎñ¡£½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îа汾¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/apache-tomcat-server.html


¡¾Îó²î²¹¶¡¡¿AVEVAÐÞ¸´ÆäInTouchºÍInduSoft¹¤¾ßÖеÄ2¸öRCEÎó²î


Ó¢¹ú¹¤ÒµÈí¼þ¹«Ë¾AVEVAÐÞ¸´ÁËÆäInTouchºÍInduSoft¿ª·¢¹¤¾ßÖеÄ2¸ö¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÇå¾²Îó²î¡£½ñÄêÔçЩʱ¼äAVEVAÓëÊ©ÄÍµÂµçÆøºÏ²¢£¬²¢½ÓÊÜÁËAvantisºÍWonderwareÆ·ÅÆ¡£CyberXÑо¿Ö°Ô±George Lashenko·¢Ã÷ijЩ°æ±¾µÄInTouch±£´æ»º³åÇøÒç³öÎó²î£¨CVE-2018-10628£©£¬TenableµÄÑо¿Ö°Ô±·¢Ã÷ÁËÁíÒ»¸öÎó²î£¨CVE-2018-10620£©¡£ÕâЩÎó²î¿ÉÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£7ÔÂ13ÈÕAVEVAÔÚHotfix 81.1.00.08ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/aveva-patches-critical-flaws-hmiscada-tools-following-schneider-merger


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔOracle WebLogic·þÎñÆ÷µÄй¥»÷Ô˶¯


Ñо¿Ö°Ô±·¢Ã÷Ö÷ÒªÕë¶ÔOracle WebLogic·þÎñÆ÷µÄ¹¥»÷Ô˶¯£¬ÕâЩ¹¥»÷Ô˶¯Ö÷ҪʹÓÃÎó²î£¨CVE-2018-2893£©¾ÙÐй¥»÷¡£OracleÔÚ7ÔÂ18ÈÕÐû²¼Á˸ÃÎó²îµÄÏà¹Ø²¹¶¡£¬7ÔÂ21ÈÕÆäÏà¹ØPoC±»Åû¶¡£Ñо¿Ö°Ô±·¢Ã÷ÖÁÉÙ2¸ö×éÖ¯ÕýÔÚʹÓøÃÎó²î¾ÙÐй¥»÷£¬½¨Ò黹δ¸üеÄÓû§¾¡¿ì¾ÙÐÐÉý¼¶¡£Ò×Êܹ¥»÷µÄ°æ±¾°üÀ¨10.3.6.0¡¢12.1.3.0¡¢12.2.1.2ºÍ12.2.1.3¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/attacks-on-oracle-weblogic-servers-detected-after-publication-of-poc-code/


¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±·¢Ã÷CPUÎó²îÓÄÁéµÄбäÖÖSpectreRSB


À´×ÔUCRµÄÑо¿Ö°Ô±·¢Ã÷CPUÎó²îÓÄÁéµÄбäÖÖSpectreRSB¡£SpectreRSBͬÑùʹÓÃÁËCPUÍÆ²âÖ´ÐеÄÀú³Ì£¬ÓëÆäËû±äÖÖ²î±ðµÄÊÇ£¬¸Ã¹¥»÷Ö÷ÒªÕë¶ÔCPU×é¼þRSB¡£Ñо¿Ö°Ô±Ö»²âÊÔÁËIntel CPUÉϵÄSpectreRSBÎó²î£¬µ«ÓÉÓÚAMDºÍARM´¦Öóͷ£Æ÷ҲʹÓÃRSBÀ´Õ¹Íû·µ»ØµØµã£¬Òò´ËËüÃǺÜÓпÉÄÜÒ²ÊÜÓ°Ïì¡£SpectreRSB¹¥»÷¿ÉÒÔÈÆ¹ýÏÖÔÚËùÓеÄÐÞ¸´²¹¶¡¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/researchers-detail-new-cpu-side-channel-attack-named-spectrersb/