ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ33ÖÜ

Ðû²¼Ê±¼ä 2019-08-26

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ19ÈÕÖÁ25ÈÕ¹²ÊÕ¼Çå¾²Îó²î46¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇForcepoint Next Generation FirewallÃÜÂëÑéÖ¤ÈÆ¹ýÎó²î£»Aspose Aspose.Cells LabelSst´úÂëÖ´ÐÐÎó²î£»Cisco Small Business 220ϵÁÐÖÇÄܽ»Á÷»úÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»IBM DB2 High Performance UnloadȨÏÞÌáÉýÎó²î£»Google Nest Cam IQ Indoor Weave PASEÆÊÎö¹¦Ð§ÐÅϢй¶Îó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ΢ÈíÈ·ÈÏWindows10 1903¸üб£´æ¹ýʧ0x80073701£»ÏµÍ³ÖÎÀíÔ±¹¤¾ßWebmin±£´æ0dayÎó²î¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Ê飻¿¨°Í˹»ùÐû²¼2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖС£


> Ö÷ÒªÇå¾²Îó²îÁбí



1. Forcepoint Next Generation FirewallÃÜÂëÑéÖ¤ÈÆ¹ýÎó²î


Forcepoint Next Generation Firewall LDAPÑéÖ¤ÒªÁì±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÈÆ¹ýÃÜÂëÑéÖ¤ £¬»á¼ûÊܱ£»¤·þÎñ¡£
https://support.forcepoint.com/KBArticle?id=000017474

2. Aspose Aspose.Cells LabelSst´úÂëÖ´ÐÐÎó²î


Aspose Cells labelSst record parser±£´æÔ½½ç¶ÁÎó²î £¬ÔÊÐíδÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄXLSÇëÇó £¬ÓÕʹÓû§ÆÊÎö £¬¿ÉÒÔÓû§ÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0794

3. Cisco Small Business 220ϵÁÐÖÇÄܽ»Á÷»úÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Cisco Small Business 220ϵÁÐÖÇÄܽ»Á÷»ú¶ÁÈ¡Êý¾Ýµ½ÄÚ²¿»º³åÇøÊ±±£´æ»º³åÇøÒç³ö¹¥»÷ £¬ÔÊÐíδÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce

4. IBM DB2 High Performance UnloadȨÏÞÌáÉýÎó²î


IBM DB2 High Performance Unload´¦Öóͷ£PATH±£´æÇå¾²Îó²î £¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿É¼ÓÔØ¶ñÒâ¹²Ïí¿â £¬ÌáÉýȨÏÞ¡£
https://www-01.ibm.com/support/docview.wss?uid=ibm10964592

5. Google Nest Cam IQ Indoor Weave PASEÆÊÎö¹¦Ð§ÐÅϢй¶Îó²î


Google Nest Cam IQ Indoor Weave PASEÆÊÎö¹¦Ð§±£´æÐÅϢй¶Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄweave±¨ÎÄÇëÇó £¬¿É¿ØÖÆ×°±¸¡£
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0798


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢Î¢ÈíÈ·ÈÏWindows10 1903¸üб£´æ¹ýʧ0x80073701


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


MicrosoftÒÑÈ·ÈÏËûÃÇÕýÔÚÐÞ¸´Óû§ÔÚ×°ÖÃеÄv1903¸üÐÂʱÊÕµ½µÄ0x80073701¹ýʧ¡£ÔÚ2019Äê8Ô²¹¶¡ÐÇÆÚ¶þ¸üÐÂÐû²¼ºó £¬Óû§×îÏȱ¨¸æËûÃÇÔÚʵÑé×°ÖÃWindows 10°æ±¾1903ÀÛ»ý¸üÐÂʱÊÕµ½¹ýʧ¡£ËäÈ»´ó´ó¶¼Óû§±¨¸æÅú×¢ÎÊÌâʼÓÚ8ÔÂ13ÈÕ £¬µ«Î¢ÈíÌåÏÖ £¬ÔÚÐû²¼2019Äê5ÔÂ29ÈÕKB4497935  ÀÛ»ý¸üÐÂʱ £¬ÎÊÌâÏÖʵÉÏÒѾ­·ºÆð¡£ÏÖÔÚÉв»ÇåÎúÈκÎδÀ´µÄÐÞ¸´³ÌÐòÊÇ·ñÒ²½«ÆÊÎöÓû§ÕýÔÚÎüÊյįäËû¹ýʧ´úÂë¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-windows-10-1903-update-error-0x80073701-working-on-fix/

2¡¢ÏµÍ³ÖÎÀíÔ±¹¤¾ßWebmin±£´æ0dayÎó²î¿ÉÖÂÔ¶³Ì´úÂëÖ´ÐÐ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ê¢ÐеÄϵͳÖÎÀíÔ±¹¤¾ßWebminÔÚÖØÖÃÃÜÂ빦ЧÖз¢Ã÷ÁËÒ»¸ö¹ýʧ £¬¸Ã¹ýʧÔÊÐí¶ñÒâµÚÈý·½ÓÉÓÚȱÉÙÊäÈëÑéÖ¤¶øÖ´ÐжñÒâ´úÂë¡£ £¬ÒÑÖªÔÚ¶Ë¿Ú10000ÉÏÔËÐÐ £¬²¢ÇÒÓ°Ïì×îа汾1.920 £¬WebminÉÐδÐû²¼¹ûÕæÉùÃ÷»ò²¹¶¡ £¬ÏÖÔÚ»¥ÁªÍøÉϹûÕæµÄWebminÖÁÉÙÁè¼Ý13Íò¸ö¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.firosolutions.com/exploits/webmin/

3¡¢ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÉÏÖÜÎåµÂ¿ËÈøË¹Öݶà´ï23¼ÒʵÌå»ú¹¹-ÆäÖдó´ó¶¼Êǵط½Õþ¸®-Ôâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬µÂ¿ËÈøË¹ÖݹÙÔ±³ÆÕâÊÇÒ»¸ö¼òµ¥¹¥»÷ÕßÌᳫµÄÕë¶ÔÐÔ¹¥»÷µÄÒ»²¿·Ö¡£×èÖ¹ÖÜÁùÍí £¬µÂ¿ËÈøË¹ÖÝÐÅÏ¢×ÊÔ´²¿£¨DIR£©ÌåÏÖÓ¦¼±ÏìÓ¦ÍŶÓÕýÆð¾¢ÓëËùÓÐ23¸öʵÌåÏàÖú £¬Ê¹ÆäÏµÍ³ÖØÐÂÉÏÏß £¬²¢Çҵ¿ËÈøË¹ÖݵÄϵͳºÍÍøÂç²»»áÊܵ½Ó°Ïì¡£ÏÖÔÚÏêϸ¹¥»÷ϸ½ÚÈÔȻȱ·¦ £¬DIRҲûÓÐ̸ÂÛÄÄЩϵͳ·ºÆð¹ÊÕÏ¡¢ÏµÍ³ÔõÑù±»Ñ¬È¾ÒÔ¼°ÏêϸµÄÊê½ðÊý¶î¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/

4¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Êé


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®ÓÚÉϸöÔ½ÒÏþµÄ¸ùÖ¤Êé £¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£Æäʱ¹þÈø¿Ë˹̹Õþ¸®ÒªÇó¸Ã¹úISPÏàÖú £¬Ç¿ÖÆÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£ÏÖÔÚµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ £¬½«×èÖ¹ÅþÁ¬²¢ÏÔʾ¹ýʧÐÅÏ¢¡£¹þÈø¿Ë˹̹Õþ¸®ÒѾ­ÔÚ8Ô³õ×èÖ¹ÁËÕâÒ»ÍýÏë £¬Ò»Ãû¹ÙÔ±ÌåÏÖÕû¸öÍýÏëÖ»ÊÇÕþ¸®µÄÒ»¸ö²âÊÔ¡£µ«ÈÔÓÐÊý°ÙÍò×°±¸ÈÔÔÚʹÓøÃÖ¤Êé¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html

5¡¢¿¨°Í˹»ùÐû²¼2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ¾ÙÐе÷ÑÐ £¬ÕûÀí²¢Ðû²¼ÁË¡¶2019Äê¹¤ÒµÍøÂçÇ徲״̬¡·±¨¸æ¡£Æ¾Ö¤¸Ã±¨¸æ £¬È¥ÄêÁè¼ÝÒ»°ë£¨52%£©µÄ¹¤¿ØÇå¾²ÊÂÎñÊÇÓÉÈËΪʧÎóµ¼ÖµÄ¡£ËäÈ»¾ø´ó´ó¶¼¹«Ë¾£¨81£¥£©ÍýÏë¾ÙÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0 £¬µ«·ÖÅÉÁËÍøÂçÇå¾²Ô¤ËãµÄÈ´Éٵöࣨ57£¥£©¡£³ý´ËÖ®Íâ £¬ÕâЩ¹«Ë¾µÄÍøÂçÇå¾²ÊÖÒÕÈÔÈ»ÁîÈ˵£ÐÄ£ºÊÜ·ÃÕßµÄÁ½´óµ£Ðļ¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂçÇ徲ר¼ÒÀ´ÖÎÀí¹¤ÒµÍøÂç £¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±éȱ·¦Çå¾²Òâʶ¡£

Ô­ÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/