ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ49ÖÜ

Ðû²¼Ê±¼ä 2018-12-10
±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2018Äê12ÔÂ03ÈÕ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î55¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î £»FreeBSD bhyveí§Òâ´úÂëÖ´ÐÐÎó²î £»NUUO NVRMini2 upgrade_handle.phpÏÂÁî×¢ÈëÎó²î £»HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç³öÎó²î £»Rockwell Automation Allen-Bradley PowerMonitor 1000 »á¼û¿ØÖƹýʧÎó²î ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇQuoraÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ £»M2MЭÒé±»Æر£´æÎó²î£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøϵͳ £»ÍòºÀÂùÝÒòÊý¾Ý¿âй¶ÔâÕûÌåËßËÏ£¬±»Ë÷Åâ125ÒÚÃÀÔª £»APT×éÖ¯Tropic TrooperжñÒâÔ˶¯£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³ÎïÐÐÒµ £»Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶ ¡£

ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î


Adobe Flash Player±£´æÊͷźóʹÓÃÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£

https://helpx.adobe.com/security/products/flash-player/apsb18-42.html



2. FreeBSD bhyveí§Òâ´úÂëÖ´ÐÐÎó²î


FreeBSD¶ÔbhyveÌṩµÄ×°±¸Ä£¿éÖÐȱÉÙ׼ȷµÄ½çÏß¼ì²é£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬bhyveÀú³Ì±ÀÀ £»òÒÔrootȨÏÞÔÚÖ÷»úÉÏÖ´ÐÐí§Òâ´úÂë ¡£

https://www.freebsd.org/security/advisories/FreeBSD-SA-18:14.bhyve.asc


3. NUUO NVRMini2 upgrade_handle.phpÏÂÁî×¢ÈëÎó²î


NUUO NVRMini2 upgrade_handle.php±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔROOTÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£

https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716


4. HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç³öÎó²î


HPE Intelligent Management Center PLAT±£´æ»º³åÇøÒç³ö£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬾ÙÐоܾø·þÎñ¹¥»÷»òÖ´ÐÐí§Òâ´úÂë ¡£

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us


5. Rockwell Automation Allen-Bradley PowerMonitor 1000 »á¼û¿ØÖƹýʧÎó²î


Rockwell Automation Allen-Bradley PowerMonitor 1000 WEBÒ³Ãæ±£´æ»á¼û¿ØÖÆÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬Ìí¼Ó¾ßÓÐÖÎÀíԱȨÏÞµÄÐÂÕË»§ ¡£

http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html


Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢QuoraÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ÆÄÊܽӴýµÄÎÊ´ðÍøÕ¾QuoraÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬Ô¼1ÒÚÓû§µÄÊý¾Ý±»ÇÔ-ÏÕЩÊÇÆä¿Í»§ÈºÌåµÄÒ»°ë ¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÕË»§ÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°´ÓFacebook¡¢TwitterµÈÉ罻ýÌåµ¼ÈëµÄÊý¾Ý £»Óû§µÄ¹ûÕæÄÚÈÝ£¬ÀýÈçÌáÎÊ¡¢»Ø¸²¡¢µãÔÞºÍ̸ÂÛ £»Óû§µÄ·Ç¹ûÕæÄÚÈÝ£¬ÀýÈç»Ø¸²Ô¼Ç롢˽ÈËÐÂÎŵÈ ¡£QuoraÓÚÖÜÒ»Íí¼äÅû¶ÁË´Ë´ÎÊÂÎñ£¬ÏÖÔÚ¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖÐ ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/quora-hack.html


2¡¢M2MЭÒé±»Æر£´æÎó²î£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøϵͳ

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢



Ç÷ÊƿƼ¼Ñо¿ÍŶӷ¢Ã÷Ö÷Á÷µÄÁ½¸öM2M£¨»úе¶Ô»úе£©Ð­Òé±£´æÇå¾²Îó²î£¬¿ÉÓÃÓÚ¹¥»÷IoTºÍIIoT×°±¸ ¡£Æ¾Ö¤¸Ã¡¶¹¤ÒµÎïÁªÍøÊý¾ÝÖ÷¸ÉÖеÄųÈõÐÔ¡·±¨¸æ£¬ÕâÁ½¸öЭÒé»®·ÖÊÇÐÂÎÅÐÐÁÐÒ£²â´«ÊäЭÒ飨MQTT£©ºÍÔ¼ÊøÓ¦ÓÃЭÒ飨CoAP£© ¡£Ñо¿Ö°Ô±ÆÊÎöÁËÕâÁ½¸öЭÒéµÄÉè¼ÆºÍʵÏÖÉϱ£´æµÄÎó²î£¬²¢·¢Ã÷ÁËÊýÊ®Íǫ̀ÉèÖò»µ±µÄ·þÎñÆ÷£¬ÕâЩ·þÎñÆ÷̻¶ÁËÏà¹Øƾ֤¡¢Ãô¸ÐÐÅÏ¢ÒÔ¼°¹¤ÒµÁ÷³ÌÏà¹ØµÄÊý¾Ý ¡£ÕâЩÎó²î¿ÉÄܵ¼ÖÂDoS¡¢í§Òâ´úÂëÖ´ÐÐÒÔ¼°DDoS·Å´ó¹¥»÷µÈ ¡£


Ô­ÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/machine-to-machine-m2m-technology-design-issues-and-implementation-vulnerabilities/


3¡¢ÍòºÀÂùÝÒòÊý¾Ý¿âй¶ÔâÕûÌåËßËÏ£¬±»Ë÷Åâ125ÒÚÃÀÔª

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢



ÍòºÀ¹ú¼ÊÂùݼ¯ÍÅ(Marriott International)¿ËÈÕÒò¿Í»§Êý¾Ý¿â鶶øÔâÓöÕûÌåËßËÏ£¬Ë÷Åâ½ð¶î¸ß´ï125ÒÚÃÀÔª ¡£ÉÏÖÜÎåÍòºÀÐû²¼ÆìÏÂϲ´ïÎÝÂùÝ(Starwood Hotel)µÄÒ»¸ö¿Í»§Ô¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬Ô¼5ÒÚ¿Í»§µÄÐÅÏ¢¿ÉÄÜй¶ ¡£¾ÝϤ£¬ºÚ¿ÍÈëÇÖÔçÔÚ2014Äê¾ÍÒѾ­×îÏÈ ¡£Ëæºó£¬ÃÀ¹úGeragos&Geragos״ʦÊÂÎñËùµÄ״ʦ±¾¡¤Ã·ÈûÀ­Ë¹(Ben Meiselas)ºÍUnderdog LawÖ´·¨ÕÕÁÏÂõ¿Ë¶û¡¤¸»ÀÕ(Michael Fuller)´ú±íÁ½ÃûÔ­¸æ´óÎÀ¡¤Ô¼º²Ñ·(David Johnson)ºÍ¿ËÀï˹¡¤¹þÀï˹(Chris Harris)¶ÔÍòºÀ¹ú¼ÊÂùÝÌáÆðÕûÌåËßËÏ£¬Ë÷Åâ125ÒÚÃÀÔª ¡£ËäÈ»ÕâÒ»½ð¶î¿´ÆðÀ´Ê®·ÖÖش󣬵«Ò²½öÏ൱ÓÚ5ÒÚDZÔÚÊܺ¦¿Í»§Ã¿ÈË»ñµÃ25ÃÀÔªµÄÅâ³¥ ¡£


Ô­ÎÄÁ´½Ó£º
http://tech.sina.com.cn/i/2018-12-03/doc-ihprknvs8439051.shtml


4¡¢APT×éÖ¯Tropic TrooperжñÒâÔ˶¯£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³ÎïÐÐÒµ

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢



Windows Defender ATPÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³ÎïºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷Ô˶¯£¬»ùÓÚ¶Ô¸ÃÔ˶¯µÄÄ¿µÄÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄÆÊÎö£¬Ñо¿ÍŶÓÒÔΪ¸ÃÔ˶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌᳫµÄ ¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öʹÓÃÁËOffice¹«Ê½±à¼­Æ÷Îó²îCVE-2018-0802µÄ¶ñÒâÎĵµ£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔز¢Ö´ÐÐËæ»úÃüÃûµÄpayload ¡£Ñо¿Ö°Ô±ÒÔΪÕâЩpayloadµÄÖ÷ҪĿµÄÊÇÇÔÈ¡Êý¾Ý ¡£


Ô­ÎÄÁ´½Ó£º
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/


5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢



UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼ÖÂÁè¼Ý30Íò¿Í»§ÐÅϢй¶ ¡£Ñо¿Ö°Ô±Oliver Houghͨ¹ýShodan·¢Ã÷Á˸ÃÊý¾Ý¿â£¬ÏÖÔÚ¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬µ«²»ÖªµÀ¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼ä ¡£¸ÃÊý¾Ý¿âÖаüÀ¨Áè¼Ý30.9ÍòÓû§¼Í¼£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëµÈ ¡£±ðµÄ£¬Êý¾Ý¿âÖл¹´æ´¢ÁËÁè¼Ý35.1Íò¸ö·þÎñÔ¤¶¨¼Í¼£¬ÒÔ¼°Áè¼Ý2000¸öÍÆÄÃʦµÄÏà¹ØÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º
https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/


ÉùÃ÷£º±¾×ÊѶÓÉÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøάËûÃüÇ徲С×é·­ÒëºÍÕûÀí