VolusionÔâºÚ¿ÍÈëÇÖ£¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°£»¹È¸èÐû²¼10ÔÂAndroidÇå¾²¸üУ¬ÐÞ¸´¶à¸öRCEÎó²î

Ðû²¼Ê±¼ä 2019-10-10
 1.VolusionÔâºÚ¿ÍÈëÇÖ£¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ƾ֤zdnetµÄÐÂÎÅ£¬ºÚ¿ÍÈëÇÖVolusionµÄ»ù´¡ÉèÊ©²¢Èö²¥¶ñÒâ´úÂ룬µ¼ÖÂÁè¼Ý6500¼Òµç×ÓÊÐËÁÍøÕ¾ÊÜÓ°Ïì¡£¸ÃÊÂÎñÊÇÒ»¸öµä·¶µÄMAGECART¹©Ó¦Á´¹¥»÷£¬¹¥»÷Õß»ñµÃÁËVolusionµÄGoogle Cloud»ù´¡ÉèÊ©»á¼ûȨÏÞ£¬²¢ÔÚÆäÖÐÐÞ¸ÄÁËJSÎļþ£¬Ìí¼ÓÓÃÓÚ¼ÍÈÎÃü»§ÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâ´úÂë¡£ÕâЩ¶ñÒâ´úÂë±»¼ÓÔØµ½»ùÓÚVolusionµÄÔÚÏßÊÐËÁÖС£×èÖ¹ÏÖÔÚ¶ñÒâ´úÂëÈÔÔÚVolusionµÄ·þÎñÆ÷ÉÏ£¬VolusionÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-breach-volusion-and-start-collecting-card-details-from-thousands-of-sites/


2.΢Èí×èÖ¹Õë¶ÔÊýÊ®¸öÆóÒµµÄLokiBotÀ¬»øÓʼþÔ˶¯


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


΢ÈíDefender ATPÍŶÓ×èÖ¹Õë¶ÔÊýÊ®¸öÆóÒµµÄƾ֤͵ÇÔ¹¥»÷Ô˶¯¡£¸Ã¹¥»÷±¬·¢ÔÚ7Ô³õ£¬¹¥»÷Õßͨ¹ýÀ¬»øÓʼþÔ˶¯·Ö·¢¶ñÒâÈí¼þLokiBot£¬¿ìÒª100¼ÒÆóÒµ³ÉΪ¹¥»÷Ä¿µÄ£¬ÕâЩÆóÒµÖ÷ÒªÂþÑÜÔÚ°¢ÁªÇõ¡¢µÂ¹úºÍÆÏÌÑÑÀ¡£ÎªÁË·Ö·¢Lokibot£¬¹¥»÷ÕßʹÓÃÁËÕë¶ÔÐÔ½ÏÇ¿µÄ´¹ÂÚÓʼþ£¬ÀýÈç¹ØÓÚÒ»¼ÒÖÆÒ©¹«Ë¾£¬¹¥»÷ÕßʹÓÃÁËרҵÊõÓïÀ´ÔöÌí¿ÉÐŶÈ¡£Ò»µ©Êܺ¦Õß·­¿ª¶ñÒ⸽¼þ£¬¾Í»á´Ó¹¥»÷Õß¿ØÖƵÄWordPressÍøÕ¾¼ÓÔØ¶ñÒâ´úÂ룬²¢Ê¹ÓÃOffice¹«Ê½±à¼­Æ÷Îó²îCVE-2017-11882·Ö·¢Lokibot¡£Lokibot¿ÉÒÔÍøÂçÓÊÏäÃÜÂë¡¢FTPƾ֤¡¢ä¯ÀÀÆ÷´æ´¢µÄÃÜÂëµÈ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-blocks-credential-theft-attack-targeting-dozens-of-orgs/

3.¹È¸èÐû²¼10ÔÂAndroidÇå¾²¸üУ¬ÐÞ¸´¶à¸öRCEÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

¹È¸èÐû²¼10ÔÂAndroidÇå¾²¸üУ¬ÐÞ¸´Ã½Ìå¿ò¼Ü×é¼þÖеÄ3¸öÑÏÖØ¼¶±ðµÄRCEÎó²î¡£ÕâЩÎó²î£¨CVE-2019-2184¡¢CVE-2019-2185¡¢CVE-2019-2186£©Ó°ÏìÁËAndroidϵͳ°æ±¾7.1.1¡¢7.1.2¡¢8.0¡¢8.1ºÍ9¡£±ðµÄ£¬¹È¸è»¹ÐÞ¸´Á˸ßͨ×é¼þÖеÄ18¸öÎó²î£¬ÆäÖÐ8¸öΪÑÏÖØ¼¶±ð£¬°üÀ¨ÄÚºËÎó²î£¨CVE-2018-13916£©¡¢¶àÄ£ºô½Ð´¦Öóͷ£Æ÷Îó²î£¨CVE-2019-2271£©ºÍÆôÏÂÊÖÒÕÎó²î£¨CVE-2019-2251£©µÈ¡£¹È¸è»¹¶Ô½üÆÚÅû¶µÄAndroid 0day£¨CVE-2019-2215£©Ðû²¼ÁËÐÞ¸´²¹¶¡£¬¸ÃÎó²îÓ°ÏìÁËPixel¡¢ÈýÐÇ¡¢»ªÎª¡¢Ð¡Ã×µÈ18ÖÖÐͺŵÄÊÖ»ú¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/google-october-android-security-update/148964/

4.TwinCAT PLC±£´æ¶à¸öÎó²î£¬¿Éµ¼Ö¾ܾø·þÎñ¹¥»÷


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


µÂ¹ú³§ÉÌBeckhoffÖÆÔìµÄTwinCAT PLC±£´æ¶à¸öDoSÎó²î¡£BeckhoffÖ÷ÒªÌṩ¹¤ÒµPC¡¢I/O¼°ÏÖ³¡×ÜÏß×é¼þ¡¢ÇýÏÂÊÖÒÕºÍ×Ô¶¯»¯Èí¼þµÈ¹¤Òµ½â¾ö¼Æ»®£¬¸Ã¹«Ë¾ÌåÏÖÆä²úÆ·ÒÑÔÚÈ«ÇòÁè¼Ý75¸ö¹ú¼Ò/µØÇøÊ¹Óá£Rapid7Ñо¿Ö°Ô±·¢Ã÷TwinCATÊÜÁ½¸öDoSÎó²îµÄÓ°Ï죬°üÀ¨ProfinetÇý¶¯³ÌÐòÖеÄÎó²î£¨CVE-2019-5637£©¼°×é¼þÄÚ²¿Í¨Ñ¶Ð­ÒéADSÓйصÄÎó²î£¨CVE-2019-5636£©¡£Rapid7Ö¸³ö£¬¿ÉÄܵ¼ÖÂDoS״̬µÄÊý¾Ý°üÀàÐÍͨ³£ÊÇÓÉnmapºÍÆäËûÍøÂçɨÃè³ÌÐò·¢³öµÄ£¬ÕâÒâζ×ÅÕýµ±µÄÍøÂçɨÃè»òÎó²îÖÎÀíÔ˶¯¿ÉÄÜ»áÔÝÊ±ÆÆËð×°±¸£¬µ«´ËÀà×°±¸Í¨³£²»»á̻¶ÔÚ»¥ÁªÍøÉÏ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerabilities-expose-twincat-industrial-systems-dos-attacks

5.Ñо¿ÍŶÓÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøµÄModicon¿É±à³Ì×Ô¶¯»¯¿ØÖÆÆ÷²úÆ·ÏßÖеÄ×îвúÆ·¡£Ñо¿Ö°Ô±·¢Ã÷Modicon¶ÔFTPµÄʹÓÃÖб£´æ¶à¸öÎó²î£¬°üÀ¨FTPÃ÷ÎÄÉí·ÝÑéÖ¤Îó²î£¨CVE-2019-6846£©¡¢FTP¹Ì¼þ¸üй¦Ð§µ¼Öµľܾø·þÎñÎó²î£¨CVE-2019-6844~CVE-2019-6841£¬CVE-2019-6847£©¡¢UMASÃ÷ÎÄÊý¾Ý´«ÊäÎó²î£¨CVE-2019-6845£©ÒÔ¼°TFTP·þÎñÆ÷ÐÅϢй¶Îó²î£¨CVE-2019-6851£©¡£ÊÜÓ°ÏìµÄ²úÆ·°æ±¾ÎªModicon M580 BMEP582040 SV2.80¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/10/vuln-spotlight-schneider-electric-m580-part-2-sept-2019.html

6.macOSÖÕ¶ËÄ£ÄâÆ÷iTerm2ÆØ³ö±£´æ7ÄêµÄRCEÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Çå¾²³§ÉÌROS·¢Ã÷macOSÖÕ¶ËÄ£ÄâÆ÷iTerm2±£´æÒ»¸ö¾ßÓÐ7ÄêÀúÊ·µÄÑÏÖØRCEÎó²î£¨CVE-2019-9535£©£¬¸ÃÑо¿ÊÇMozilla¿ªÔ´Ö§³ÖÍýÏ루MOSS£©µÄÒ»²¿·Ö¡£Æ¾Ö¤MozillaÐû²¼µÄ²©¿ÍÎÄÕ£¬¸ÃRCEÎó²î±£´æÓÚiTerm2µÄtmux¼¯ÀÖ³ÉÄÜÖУ¬¹¥»÷Õß¿Éͨ¹ýÏòÖÕ¶ËÌṩ¶ñÒâÊä³öÀ´Ö´ÐÐí§ÒâÏÂÁî¡£ÊÓÆµÑÝʾÅú×¢£¬´ËÎó²îµÄDZÔÚ¹¥»÷ǰÑÔ°üÀ¨ÅþÁ¬µ½¹¥»÷Õß¿ØÖƵĶñÒâSSH·þÎñÆ÷¡¢Ê¹ÓÃcurlµÈÏÂÁî»ñÈ¡¶ñÒâÍøÕ¾»òʹÓÃtail -f¸ú×Ù°üÀ¨Ä³Ð©¶ñÒâÄÚÈݵÄÈÕÖ¾ÎļþµÈ£¬»òÊÇʹÓÃÏÂÁîÐй¤¾ßÓÕʹÓû§´òÓ¡¹¥»÷Õß¿ØÖƵÄÄÚÈÝÀ´´¥·¢¡£MozillaÖÒÑԳƸÃÎó²îÓ°Ïì3.3.5¼°¸ü¸ß°æ±¾µÄiTerm2£¬²¢ÒÑÔÚiTerm2 3.3.6ÖÐÐÞ¸´¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/10/iterm2-macos-terminal-rce.html