Docker Image rootÕË»§¿ÕÃÜÂë £»ÈýÐÇSmartThingsÔ´Âëй¶ £»Turla APT

Ðû²¼Ê±¼ä 2019-05-10

1¡¢Alpine LinuxµÄDocker Image±£´ærootÕË»§¿ÕÃÜÂëÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Alpine LinuxµÄ¹Ù·½Docker¾µÏñ±£´ærootÕË»§¿ÕÃÜÂëÎó²î£¨CVE-2019-5021£©¡£¸ÃÎó²îÒѾ­±£´æÁËÁè¼Ý3ÄêµÄʱ¼ä£¬ÆäCVSSÆÀ·ÖΪ9.8·Ö¡£¸ÃÎó²î×î³õÓÚ2015Äê·¢Ã÷²¢±»ÐÞ¸´£¬µ«2015Äê12Ô·ݵĸü¸Äµ¼ÖÂÎó²îÔٴηºÆð£¬²¢ÇÒÒ»Ö±±£´æ¡£ÏêϸÀ´Ëµ£¬Óû§ÕË»§µÄÉèÖÃÖÎÀíÎļþ/etc/shadowÖаüÀ¨¿ÕȱµÄsp_pwdp×ֶΣ¬¶ø²»ÊǼÓÃܵÄÃÜÂë¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨Alpine Docker 3.3¡¢3.4¡¢3.5¡¢3.6¡¢3.7¡¢3.8¡¢3.9ºÍAlpine Docker Edge¡£¸ÃÎó²îÒÑÓÚ2019Äê3ÔÂ8ÈÕ±»ÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bug-in-alpine-linux-docker-image-leaves-root-account-unlocked/


2¡¢¹È¸èÐû²¼5ÔÂAndroidÇå¾²¸üУ¬ÐÞ¸´15¸öÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¹È¸èÔÚ5Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË15¸öÎó²î£¬ÆäÖаüÀ¨4¸öÑÏÖØÎó²î£¬10¸ö¸ßΣÎó²îºÍ1ÆäÖÐΣÎó²î¡£Õâ4¸öÑÏÖØÎó²î£¨CVE-2019-2045£¬CVE-2019-2046£¬CVE-2019-2047ºÍCVE-2019-2044£©¾ùΪԶ³Ì´úÂëÖ´ÐÐÎó²î£¬ÆäÖÐÈý¸öÓëϵͳ½¹µãÓ¦ÓÃÓйأ¨²¦ºÅÆ÷¡¢µç×ÓÓʼþºÍÏà»ú£©£¬µÚËĸöÓëýÌå¿ò¼Ü×é¼þÓйØ£¬ÏÖÔÚÔÝδÅû¶¸ü¶à²¹¶¡Ï¸½Ú¡£±ðµÄ£¬¹È¸è»¹Ðû²¼ÁËNVIDIA¡¢BroadcomºÍQualcommÆ·¼¶Èý·½¹©Ó¦ÉÌ×é¼þÖеĶà¸öÎó²î²¹¶¡£¬Ê¹µÃÐÞ¸´µÄCVE×ÜÊý´ï30¸ö¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/google-critical-remote-code-execution-flaws-android/144497/


3¡¢ÈýÐÇÒâÍâй¶SmartThingsÔ´Âë¼°¶à¸öÏîÄ¿µÄÄÚ²¿ÃÜÔ¿

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÈýÐǹ¤³ÌʦµÄÒ»¸öGitLab·þÎñÆ÷±»¹ýʧµØÉèÖÃΪpublic²¢ÇÒδÉèÖÃÃÜÂë± £»¤£¬µ¼Ö´ó×ÚÃô¸ÐÐÅϢй¶¡£¸Ã·þÎñÆ÷ÍйÜÔÚÈýÐǵÄÓòÃûVandev LabÉÏ£¬Æ¾Ö¤µÏ°ÝÇå¾²³§ÉÌSpiderSilkÑо¿Ö°Ô±Mossab HusseinµÄ·¢Ã÷£¬¸Ã·þÎñÆ÷й¶ÁËSmartThingsÈí¼þµÄÔ´´úÂëºÍ˽ÓÐÖ¤Ê飬»¹Ð¹Â¶Á˶àÃûÔ±¹¤µÄÃ÷ÎÄ˽ÓÐGitLabÁîÅÆÒÔ¼°Ò»Ð©ÄÚ²¿ÎĵµºÍPPT¡£


Ô­ÎÄÁ´½Ó£ºhttps://techcrunch.com/2019/05/08/samsung-source-code-leak/


4¡¢ºÚ¿ÍÍÅ»ïй¶3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÃô¸ÐÊý¾Ý

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ºÚ¿ÍÍÅ»ïLulZSecºÍItaÔÚÍøÉÏÐû²¼ÁË3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÊý¾Ý£¬ÆäÖÐÉõÖÁ°üÀ¨ÂÞÂíÊ㤵ÄÊý¾Ý¡£¾Ý±¨µÀºÚ¿ÍÍÅ»ïÇÔÈ¡ÁËÔÚÂíÌ©À­ºÍ¿¨Ì¹ÔúÂÞ×¢²áµÄ״ʦÐÅÏ¢£¬±»µÁÊý¾Ý°üÀ¨µç×ÓÓʼþÕË»§¡¢Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ»á¼ûPECÕÊ»§µÄÖ¤¾Ý¡£ºÚ¿ÍÍŻﲢûÓжÔÕâЩÊý¾ÝÌá³öÀÕË÷£¬²¢³Æ²»»áʹÓÃÕâЩÊý¾Ý¾ÙÐжñÒâÔ˶¯¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/lulzsec-and-ita-hacktivist-groups-publish-the-personal-data-of-30000-roman-lawyers-6ac94567


5¡¢Turla APTʹÓÃLightNeuronºóÃÅÐ®ÖÆExchange·þÎñÆ÷

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤ESETÑо¿Ö°Ô±µÄ±¨¸æ£¬×Ô2014ÄêÒÔÀ´¶íÂÞ˹·¸·¨ÍÅ»ïTurla APTÒ»Ö±ÔÚʹÓÃLightNeuronºóÃÅÐ®ÖÆMicrosoft ExchangeÓʼþ·þÎñÆ÷¡£Ñо¿Ö°Ô±·¢Ã÷µÄÊܺ¦×éÖ¯°üÀ¨°ÍÎ÷µÄÒ»¸ö×éÖ¯ºÍ¶«Å·¼°Öж«µÄÍâ½»»ú¹¹¡£LightNeuronÊǵÚÒ»¸öÕë¶ÔExchange·þÎñÆ÷µÄ¶ñÒâÈí¼þ£¬Ëü¿ÉÒÔÉó²éºÍÐÞ¸Äͨ¹ýÓʼþ·þÎñÆ÷·¢Ë͵ÄÈκεç×ÓÓʼþ¡¢×«Ð´ºÍ·¢ËÍÐÂÓʼþÒÔ¼°×èÖ¹Èκεç×ÓÓʼþ¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/turla-threat-actor-group-hijacks-microsoft-exchange-mail-server-using-sophisticated-lightneuron-backdoor-d615cc04


6¡¢US-CERTÐû²¼Lazarus APT¶ñÒ⹤¾ßELECTRICFISHµÄÆÊÎö±¨¸æ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©ºÍÁìÍÁÇå¾²²¿£¨DHS£©Ðû²¼¹ØÓÚ¶ñÒâÈí¼þELECTRICFISHµÄÍŽáÆÊÎö±¨¸æ£¨MAR£©¡£¸Ã¶ñÒâÈí¼þÊdz¯ÏÊAPT×éÖ¯LazarusʹÓõŤ¾ß£¬ÓÃÓÚÍøÂçºÍÇÔÈ¡Êܺ¦ÕßµÄÊý¾Ý¡£ELECTRICFISHʵÏÖÁËÒ»ÖÖ×Ô½ç˵ЭÒ飬ÔÊÐíÔÚÔ´ºÍÄ¿µÄIPµØµãÖ®¼ä´«ÊäÁ÷Á¿¡£¹¥»÷Õß¿ÉÒÔʹÓÃÊðÀí·þÎñÆ÷/¶Ë¿Ú¾ÙÐÐÉèÖ㬴ӶøÈƹýÊÜѬȾϵͳµÄÉí·ÝÑéÖ¤¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.us-cert.gov/ncas/analysis-reports/AR19-129A