ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ48ÖÜ

Ðû²¼Ê±¼ä 2018-12-03
 ±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³öÎó²î£»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉýÎó²î£»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î£»Schneider Electric Modicon M340ÃÜÂë¸ü¸ÄÎó²î£»FreeBSD CVE-2018-17156»º³åÇøÒç³öÎó²î ¡£



±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍòºÀÂùݼ¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§£»UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª£»Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶£»ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý£»»ùÓÚAutoCADµÄÌع¤Ô˶¯±»·¢Ã÷£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ ¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³öÎó²î

VMWare WorkstationºÍFusion±£´æÕûÊýÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë ¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983


2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉýÎó²î
Apache Hadoop±£´æÇå¾²Îó²î£¬ÔÊÐí¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî ¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E


3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»×¼È·´¦Öóͷ£Óû§ÊäÈëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§ÒâSHELLÏÂÁî ¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE


4. Schneider Electric Modicon M340ÃÜÂë¸ü¸ÄÎó²î
Schneider Electric Modicon M340 WEB·þÎñÆ÷±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɻá¼û¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë ¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/


5. FreeBSD CVE-2018-17156»º³åÇøÒç³öÎó²î
FreeBSDÔÚICMPʵÏÖÖб£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɾÙÐоܾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÍòºÀÂùݼ¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ÍòºÀ¹ú¼ÊÂùݼ¯ÍÅ(Marriott International)½ñÈÕÐû²¼£¬ÆìÏÂϲ´ïÎÝÂùÝ(Starwood Hotel)µÄÒ»¸öÖ÷¹ËÔ¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬¿ÉÄÜÓÐÔ¼5ÒÚÖ÷¹ËµÄÐÅϢй¶ ¡£¸ÃÐÂÎÅÐû²¼ºó£¬ÍòºÀ¹ú¼ÊÂùݹɼÛÔÚ½ñÈÕÅÌÇ°ÉúÒâÖÐÒ»¶ÈϵøÓâ5% ¡£ÍòºÀ¹ú¼ÊÂùݳÆ£¬ÊÓ²ìЧ¹ûÏÔʾ£¬ÓÐһδÊÚȨ·½¸´ÖƲ¢¼ÓÃÜÁËÕâЩÊý¾Ý ¡£²¢ÇÒ£¬×Ô2014Äê¾Í×îÏÈÁ˶Ôϲ´ïÎÝÂùÝÍøÂç¾ÙÐÐδÊÚȨ»á¼û ¡£ÏÖÔÚ£¬ÍòºÀ¹ú¼ÊÂùÝÒѽÓÄÉÁ˵÷½â²½·¥£¬µ«²¢Î´Ðû²¼½øÒ»²½µÄÐÅÏ¢ ¡£ÍòºÀ¹ú¼ÊÂùݳÆ£¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢°üÀ¨Ö÷¹ËµÄÐÕÃû¡¢Í¨Ñ¶µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩСÎÒ˽¼ÒÐÅÏ¢ ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html


2¡¢UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý±£»¤»ú¹¹Autoriteit Persoonsgegevens»®·ÖÒò2016Äê10ÔµÄÊý¾Ýй¶ÊÂÎñ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ·£¿î ¡£ICOÌåÏÖ¸ÃÊÂÎñÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú ¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì ¡£·£¿îµÄÖ÷ÒªÔµ¹ÊÔ­ÓÉÊÇUberÑÓ³ÙÁ˽üÒ»Äê²Å±¨¸æ´Ë´Îй¶ÊÂÎñ£¬ÕâÑÏÖØÎ¥·´ÁËÏà¹ØÖ´·¨ÌõÀý£¬²¢ÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæÁÙ¸ü¸ßµÄڲƭΣº¦ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/


3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇÓªÀûÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶ ¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕʱ´ú£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢°ü¹ÜÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼͼ±àºÅºÍÕË»§Óà¶îµÈ ¡£±ðµÄ£¬ÉÐÓпìÒª70Íò¸öÉç±£ºÅÂëй¶£¬µ«Ã»ÓвÆÎñÐÅϢй¶ ¡£¸Ã×éÖ¯Òѽ«Ïà¹ØÊÂÎñ֪ͨFBI£¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓüà¿Ø·þÎñ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/


4¡¢ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Çå¾²³§ÉÌHackenµÄÑо¿Ö°Ô±Bob Diachenkoͨ¹ýShodan·¢Ã÷ÁËÒ»¸ö¿É¹ûÕæ»á¼ûµÄElasticSearch·þÎñÆ÷£¬ÆäÊý¾Ý¿â̻¶ÁËÁè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý ¡£ÕâЩÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØµãµÈÐÅÏ¢ ¡£Ñо¿Ö°Ô±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕߣ¬µ«ËûÒÔΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®ÓйØ ¡£ÏÖÔڸ÷þÎñÆ÷Òѱ»¾ÙÐÐÇå¾²¼Ó¹Ì ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/


5¡¢»ùÓÚAutoCADµÄÌع¤Ô˶¯±»·¢Ã÷£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Çå¾²³§ÉÌForcepoint·¢Ã÷Ò»¸öʹÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤ÒµÌع¤Ô˶¯£¬¸ÃÔ˶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Æä2018ÄêÔ˶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ ¡£ForcepointÌåÏÖ¸ÃÔ˶¯±³ºóµÄÍŶӿÉÄÜÊ®·ÖÖش󣬹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²î±ð¹ú¼Ò/µØÇøµÄ¶à¸ö¹«Ë¾£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷Ô˶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ£¬ÁíÒ»¸ö¹¥»÷Ô˶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ ¡£¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æʽ´¹ÂÚÓʼþʵÑé¹¥»÷£¬ÕâЩAutoCADÎļþÖаüÀ¨Òþ²ØµÄ.fasÄ£¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬ÓÃÓÚÅþÁ¬Ô¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/


ÉùÃ÷£º±¾×ÊѶÓÉÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøάËûÃüÇ徲С×é·­ÒëºÍÕûÀí