ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ6ÖÜ

Ðû²¼Ê±¼ä 2019-03-04

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2019Äê2ÔÂ04ÈÕÖÁ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î39¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇWIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶Îó²î£»NGINX Unit¶ÑÒç³ö¾Ü¾ø·þÎñÎó²î; WibuKey Network server management WkbProgramLow¶ÑÒç³öÎó²î£»Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂëÎó²î£»Forcepoint User ID (FUID) serverí§ÒâÎļþÉÏ´«Îó²î ¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇGoogle PlayÖб£´æ29¿î¶ñÒâÏà»úÓ¦Óà £¬×ÜÏÂÔØÁ¿Áè¼Ý400Íò´Î£»ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP±ê×¼±»· £¿î1000ÍòÃÀÔª£»MacOS KeychainÐÂ0day £¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶£»°Ä´óÀûÑÇÁª°îÒé»áµÄÅÌËã»úÍøÂçÔâºÚ¿Í¹¥»÷£»AndroidÌØ¹¤Èí¼þ¿ò¼ÜTriout¾íÍÁÖØÀ´ £¬ÏÂÔØÁ¿Áè¼Ý5000Íò´Î ¡£

ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£

Ö÷ÒªÇå¾²Îó²îÁбí


1. WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶Îó²î
WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTL´¦Öóͷ£±£´æÇå¾²Îó²î £¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬»ñÈ¡ÄÚºËÄÚ´æÐÅϢй¶ ¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657

2. NGINX Unit¶ÑÒç³ö¾Ü¾ø·þÎñÎó²î
Nginx Unit±£´æ¶ÑÒç³öÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¾ÙÐоܾø·þÎñ¹¥»÷ ¡£
http://mailman.nginx.org/pipermail/unit/2019-February/000113.html

3. WibuKey Network server management WkbProgramLow¶ÑÒç³öÎó²î
WibuKey Network server management WkbProgramLowº¯Êý±£´æ¶ÑÒç³öÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄTCP±¨ÎÄ £¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë ¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659

4. Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂëÎó²î
Cisco Aironet Active SensorĬÈÏÉèÖñ£´æÄ¬ÈÏÃÜÂëÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬Î´ÊÚȨ»á¼û ¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds

5. Forcepoint User ID (FUID) serverí§ÒâÎļþÉÏ´«Îó²î
Forcepoint User ID (FUID) server TCP 5001¶Ë¿Ú±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÉÏ´«ÇëÇó £¬Ö´ÐÐí§Òâ´úÂë ¡£
https://support.forcepoint.com/KBArticle?id=000016550

 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Google PlayÖб£´æ29¿î¶ñÒâÏà»úÓ¦Óà £¬×ÜÏÂÔØÁ¿Áè¼Ý400Íò´Î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

Google PlayÊÐËÁÖÐÌṩµÄÓ¦Óò¢²»ÁÏζ×ÅËüÊÇÕýµ±Ó¦Óà ¡£Ö»¹Ü¹È¸è×ö³öÁËÔÆÔÆ¶àµÄÆð¾¢ £¬µ«Ò»Ð©ÐéαºÍ¶ñÒâµÄÓ¦ÓóÌÐòȷʵDZÈëÁËÊý°ÙÍò²»ÖªÇéµÄÓû§ ¡£ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼·¢Ã÷ÖÁÉÙ29¸öÕÕÆ¬Ó¦ÓóÌÐòÒÑÀֳɽøÈë¹È¸èPlayÊÐËÁ £¬²¢ÇÒÔڹȸè´ÓÆäÓ¦ÓóÌÐòÊÐËÁÖÐɾ³ý֮ǰÒѾ­ÏÂÔØÁËÁè¼Ý400Íò´Î ¡£ÓÐÎÊÌâµÄÒÆ¶¯Ó¦ÓóÌÐòαװ³ÉÕÕÆ¬±à¼­ºÍÃÀÈÝÓ¦ÓóÌÐò £¬Éù³ÆÊ¹ÓÃÄúµÄÊÖ»úÏà»úÅÄÉã¸üºÃµÄÕÕÆ¬»òÃÀ»¯ÄúÅÄÉãµÄÕÕÆ¬ £¬µ«·¢Ã÷ÆäÖб£´æ¶ñÒâ´úÂë ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/beauty-camera-android-apps.html

2¡¢ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP±ê×¼±»· £¿î1000ÍòÃÀÔª

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


NERCÉÏÖÜÐû²¼ÁË· £¿î ¡£¸Ã»ú¹¹Ðû²¼ÁËÒ»·Ýͨ¸æ £¬µ«Ã»ÓÐ͸¶ĿµÄ¹«Ë¾µÄÃû³Æ £¬µ«E£¦EÐÂÎźͻª¶û½ÖÈÕ±¨±¨µÀ˵ £¬ËüÊÇλÓÚ±±¿¨ÂÞÀ´ÄÉÖݵĶſËÄÜÔ´¹«Ë¾ £¬ÊÇÃÀ¹ú×î´óµÄµçÁ¦¹«Ë¾Ö®Ò» ¡£NERCµÄCIP¿É¿¿ÐÔ±ê×¼ÐÎòÁ˱±ÃÀ´óÈÝÁ¿µçÁ¦ÏµÍ³£¨BPS£©ÔËÓªÉ̵ÄÎïÀíºÍÍøÂçÇå¾²ÒªÇó ¡£¸Ã×éÖ¯ÒÑÓëÎ¥¹æÄÜÔ´¹«Ë¾¸æ¿¢Ï¢ÕùЭÒé ¡£³ýÁ˸ù«Ë¾ÒÑÔÞ³ÉÖ§¸¶µÄ1000ÍòÃÀÔª· £¿îÍâ £¬¸ÃÏ¢Õù»¹°üÀ¨ïÔÌ­Ò»Á¬Î¥¹æÐÐΪ²¢Ôö½øÎ´À´µÄºÏ¹æÐÔ ¡£NERC·¢Ã÷µÄ127ÆðÎ¥¹æÊÂÎñÖоø´ó´ó¶¼±»¹éÀàΪ¡°Öеȡ±»ò¡°Öеȡ± £¬µ«ÓÐ13Æð±»³ÆÎª¡°ÑÏÖØ¡± ¡£¸Ã»ú¹¹µÄÆÀ¹À³Æ £¬Î¥¹æÐÐΪ¡°ÅäºÏ×é³ÉÁ˶ÔÇå¾²ÐԺͿɿ¿ÐÔµÄÑÏÖØÍþв¡± ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/us-energy-firm-fined-10-million-security-failures

3¡¢MacOS KeychainÐÂ0day £¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¸ÃÎó²î¿ÉÄÜÔÊÐíÔÚMacOSϵͳÉÏÔËÐеĶñÒâÓ¦ÓóÌÐò»á¼û´æ´¢ÔÚKeychainÃÜÂëÖÎÀíϵͳÖеÄÃÜÂë ¡£·¢Ã÷¸ÃÎó²îµÄÇå¾²Ñо¿Ö°Ô±¾Ü¾øÓëÆ»¹û¹«Ë¾·ÖÏíÓйظÃÎó²îµÄ¸ü¶àÏêϸÐÅÏ¢ £¬Ò»Î»µÂ¹úÇå¾²Ñо¿Ö°Ô±Ðû²¼ÁËÒ»¶ÎÊÓÆµ £¬ÐÎòÁËÓ°ÏìApple MacOSµÄ0dayÎó²î ¡£´ËÎó²î»áÓ°ÏìËùÓеÄMacOS°æ±¾ £¬×îеÄ10.14.3 Mojave £¬²¢ÌåÏÖAppleȱÉÙÕë¶ÔMacOSµÄbugÉͽðÍýÏë ¡£

Ô­ÎÄÁ´½Ó£º
https://cyware.com/news/a-new-macos-zero-day-vulnerability-found-in-keychain-password-management-system-3565521d

4¡¢°Ä´óÀûÑÇÁª°îÒé»áµÄÅÌËã»úÍøÂçÔâºÚ¿Í¹¥»÷

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


°Ä´óÀûÑÇÒé»áÖÜÎå͸¶ £¬ÆäÅÌËã»úÍøÂçÒÑÔ⵽δ֪µÄ¡°Çå¾²ÊÂÎñ¡±µÄÓ°Ïì £¬²¢ÌåÏÖÕýÔÚ¾ÙÐÐÊÓ²ì ¡£¡°ÔÚÒé»áÅÌËãÍøÂ籬·¢Çå¾²ÊÂÎñºó £¬ÒѾ­½ÓÄÉÁËһϵÁв½·¥À´±£»¤ÍøÂç¼°ÆäÓû§ £¬¡±Òé»áÕþ¸®ÔÚÒ»·ÝÉùÃ÷ÖÐ˵ ¡£¹ÙÔ±¾Ü¾ø¾ÍÍøÂçÇå¾²Îó²îµÄÐÔ×Ó½ÒÏþ̸ÂÛ £¬µ«ÌåÏÖûÓÐÆðÔ´Ö¤¾ÝÅú×¢Êý¾ÝÒѱ»»á¼û ¡£¡°ÎÒÃÇûÓÐÖ¤¾ÝÅú×¢ÕâÊÇÊÔͼӰÏìÒé»áÀú³ÌµÄЧ¹û £¬»òÊÇÆÆËð»òÓ°ÏìÑ¡¾Ù»òÕþÖÎÀú³Ì £¬¡±Ò»·ÝÉùÃ÷˵ ¡£¡°ÎÒÃÇÄ¿½ñµÄÖØµãÊDZ£»¤ÍøÂç²¢±£»¤Êý¾ÝºÍÓû§ ¡£¡±ËùÓÐÒé»áÃÜÂë¶¼±»ÖØÖà ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/australian-parliament-computer-network-breached

5¡¢AndroidÌØ¹¤Èí¼þ¿ò¼ÜTriout¾íÍÁÖØÀ´ £¬ÏÂÔØÁ¿Áè¼Ý5000Íò´Î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


2018Äê8Ô £¬BitdefenderÑо¿Ö°Ô±ÎÞÒâ·¢Ã÷ÁËÒ»¸öÃûΪTrioutµÄAndroid¶ñÒâÈí¼þ¿ò¼Ü £¬¸Ã¿ò¼Ü°üÀ¨ÁË´ó×ÚµÄ¼à¿Ø¹¦Ð§ ¡£À¦°óÁË´Ó¹Ù·½Google PlayÊг¡ÖÐɾ³ýµÄÕýµ±Ó¦ÓóÌÐò £¬Ìع¤Èí¼þ¿ò¼Ü¿ÉÒÔÒþ²ØÔÚ×°±¸ÉÏ £¬²¢¼Í¼µç»° £¬¼Í¼´«ÈëµÄÎı¾ÐÂÎÅ £¬Â¼ÖÆÊÓÆµ £¬ÕÕÏà £¬ÉõÖÁÍøÂçGPS×ø±ê ¡£ËùÓÐÕâЩÐÅÏ¢¶¼±»·¢Ë͵½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ ¡£Ö®Ç°°æ±¾µÄÌØ¹¤Èí¼þ¿ò¼ÜÀ¦°óÔÚÒ»¸öÏÔʾ³ÉÈËÄÚÈݵÄÓ¦ÓóÌÐòÖÐ £¬µ«BitdefenderÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеı»Ñ¬È¾µÄÓ¦ÓóÌÐò £¬ÓÃÓÚÈö²¥´ËÀà³ÌÐò ¡£

Ô­ÎÄÁ´½Ó£º
https://labs.bitdefender.com/2019/02/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads/

ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí