ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ21ÖÜ

Ðû²¼Ê±¼ä 2019-06-03

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê5ÔÂ27ÈÕÖÁ6ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇApache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î£»ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñÎó²î£» Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î£»HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»Serv-U FTP ServerȨÏÞÌáÉýÎó²î ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹ú½ðÈÚ¹«Ë¾FAFCй¶8.85ÒÚÌõµäÖÊ´û¿î¼Í¼£»ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢£»Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ï죻DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î £¬Ó°ÏìËùÓÐDocker°æ±¾£»¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î ¡£
ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£



Ö÷ÒªÇå¾²Îó²îÁбí



1. Apache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î
Apache Hadoop±£´æÒ»¸öÇå¾²Îó²î £¬ÔÊÐíÓµÓÐYAMȨÏÞµÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔrootÓû§Éí·ÝÔËÐÐí§ÒâÏÂÁî ¡£
https://seclists.org/oss-sec/2019/q2/132

2. ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñÎó²î
ISC BINDµÝ¹éÆÊÎöÆ÷µÄEDNS¿Í»§¶Ë×ÓÍø±£´æÒ»¸öÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬´¦Öóͷ£°üÀ¨RRSIGµÄÏìÓ¦µÄ±¨ÎÄʱ¿Ìʹ·þÎñÆ÷Í߽⠡£
https://kb.isc.org/docs/cve-2019-6469

3. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î
Adobe Flash Player±£´æÊͷźóʹÓÃÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó £¬ÓÕʹÓû§ÇëÇó £¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë ¡£
https://helpx.adobe.com/security/products/flash-player/apsb19-26.html

4. HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
HPE Intelligent Management Center ByteMessageResource transformEntityÒªÁì±£´æ·´ÐòÁл¯Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐí§Òâ´úÂë ¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-528/

5. Serv-U FTP ServerȨÏÞÌáÉýÎó²î
WindowsϵÄServ-U FTP ServerÑéÖ¤´¦Öóͷ£±£´æÇå¾²Îó²î £¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÌáÉýȨÏÞ ¡£
https://packetstormsecurity.com/files/153128/Serv-U-FTP-Server-15.1.6.25-Local-Privilege-Escalation.html


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢ÃÀ¹ú½ðÈÚ¹«Ë¾FAFCй¶8.85ÒÚÌõµäÖÊ´û¿î¼Í¼

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

¾ÝŦԼʱ±¨±¨µÀ £¬ÃÀ¹ú½ðÈÚ¹«Ë¾First American Financial Corporation¹ÙÍøÉϵÄÒ»¸öÎó²îй¶ÁË16ÄêÀ´ÓëµäÖÊ´û¿îÓйصÄ8.85ÒÚÌõ¼Í¼ ¡£¸ÃÎó²îÔÊÐíÈκÎÈË»á¼ûFirst American´æ´¢µÄÉç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢¡¢¼ÝÕÕÒÔ¼°µäÖÊ´û¿îºÍ˰ÎñÐÅÏ¢ ¡£¸Ã¹«Ë¾ÌåÏÖÕýÔÚÆÀ¹À´ËÊÂÎñ¶Ô¿Í»§ÐÅÏ¢Çå¾²ÐÔµÄÓ°Ïì £¬ÔÚÄÚ²¿ÉóºËÍê³É֮ǰ £¬½«²»»á½ÒÏþÈκÎ̸ÂÛ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.nytimes.com/2019/05/24/technology/data-leak-first-american.html

2¡¢ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


5ÔÂ20ÈÕ £¬ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusµÄÊý¾Ý¿âÒòÉèÖùýʧµ¼ÖÂÂÿÍÐÅϢй¶ £¬¸ÃÊý¾Ý¿â°üÀ¨3600ÍòÌõº½°àÔ¤¶¨ÐÅÏ¢¡¢1500ÍòÂÿÍÐÅÏ¢¡¢Áè¼Ý100ÍòÌõÂùÝÔ¤¶¨ÐÅÏ¢ÒÔ¼°70ÍòÌõǩ֤ÉêÇëÐÅÏ¢ ¡£ÆäÖÐÉõÖÁ°üÀ¨ÒÔÉ«ÁÐ×ÜÀíBenjamin NetanyahuºÍÒÔÉ«Áи߼¶Íâ½»¹ÙµÄÂÃÐÐÔ¤¶¨ÐÅÏ¢ ¡£¸ÃÊý¾Ý¿âÊôÓÚalp.co.il £¬ÕâÊÇÒÔÉ«ÁеÄÂÃÐж©Æ±Æ½Ì¨ £¬ÎªGulliver.co.il¡¢Issta.co.ilºÍÕþ¸®ÂÃÐÐÉçInbalÌṩ·þÎñ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.calcalistech.com/ctech/articles/0,7340,L-3762693,00.html

3¡¢Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ïì


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤Î÷ÃÅ×ÓÐû²¼µÄÇ徲ͨ¸æ £¬¶à¿îÎ÷ÃÅ×ÓÒ½ÁÆ×°±¸Ò×ÊÜWindows RDP·þÎñBlueKeepÎó²îµÄÓ°Ïì £¬°üÀ¨MagicLinkA¡¢MagicViewµÈÈí¼þ²úÆ· £¬System ACOM¡¢SensisµÈ¸ß¼¶ÖÎÁƲúÆ· £¬Axiom¡¢MobilettµÈXÉäÏß×°±¸ÒÔ¼°Atellica¡¢AptioµÈʵÑéÊÒÕï¶Ï²úÆ· ¡£¸Ã¹«Ë¾ÒÑÒªÇó¿Í»§×°ÖÃ΢ÈíµÄÐÞ¸´²¹¶¡ £¬µ«²»¿É°ü¹Ü²¹¶¡µÄ¼æÈÝÐÔ £¬¸Ã¹«Ë¾½¨ÒéÓû§½ÓÄɽûÓÃRDP¡¢×èÖ¹TCP¶Ë¿Ú3389µÈ»º½â²½·¥ ¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86222/security/siemens-healthineers-bluekeep.html

4¡¢DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î £¬Ó°ÏìËùÓÐDocker°æ±¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±Åû¶DockerÖÐδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î £¬¸ÃÎó²îÓ°ÏìÁËËùÓеÄDocker°æ±¾ ¡£¸ÃÎó²îÀàËÆÓÚCVE-2018-15664 £¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÖ¸¶¨µÄ³ÌÐò¶Ô×ÊÔ´¾ÙÐвÙ×÷֮ǰÐÞ¸Ä×ÊԴ·¾¶ £¬´Ó¶ø¿ÉÄÜ»ñµÃí§ÒâÎļþµÄ¶Áд»á¼ûȨÏÞ £¬Õâ±»³ÆÎªTOCTOUÀàÐ͵Äbug ¡£¸ÃÎó²îµÄ½¹µãÔ´ÓÚFollowSymlinkInScope¹¦Ð§Ò×ÊÜTOCTOU¹¥»÷ ¡£Ñо¿Ö°Ô±ÒѾ­Ðû²¼ÁËPoC´úÂë ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/unpatched-flaw-affects-all-docker-versions-exploits-ready/

5¡¢¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Google Project ZeroÑо¿Ô±Tavis OrmandyÔÚ΢ÈíµÄWindows¼Çʱ¾Öз¢Ã÷Ò»¸ö´úÂëÖ´ÐÐÎó²î £¬OrmandyÒÑÏò΢Èí±¨¸æÁ˸ÃÎÊÌâ ¡£Îó²îµÄϸ½ÚÉÐδÅû¶ £¬µ«OrmandyÔ¤¼Æ¸ÃÎó²îÊÇÒ»¸öÄÚ´æËð»µÎó²î £¬ËûÔÚTwitterÉÏ·ÖÏíµÄͼƬÑÝʾÁËÔõÑùÔÚ¼Çʱ¾Öе¯³öshell ¡£Æ¾Ö¤¹È¸èµÄÎó²îÅû¶Õþ²ß £¬Ormandy½«ÔÚ90Ììºó»ò΢ÈíÐû²¼ÐÞ¸´²¹¶¡ºóÅû¶¸ü¶àÎó²îϸ½Ú ¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html