ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ6ÖÜ

Ðû²¼Ê±¼ä 2019-03-04

±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2019Äê2ÔÂ04ÈÕÖÁ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î39¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇWIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶Îó²î£»NGINX Unit¶ÑÒç³ö¾Ü¾ø·þÎñÎó²î; WibuKey Network server management WkbProgramLow¶ÑÒç³öÎó²î£»Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂëÎó²î£»Forcepoint User ID (FUID) serverí§ÒâÎļþÉÏ´«Îó²î¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇGoogle PlayÖб£´æ29¿î¶ñÒâÏà»úÓ¦Óã¬×ÜÏÂÔØÁ¿Áè¼Ý400Íò´Î£»ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP±ê×¼±»·£¿î1000ÍòÃÀÔª£»MacOS KeychainÐÂ0day£¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶£»°Ä´óÀûÑÇÁª°îÒé»áµÄÅÌËã»úÍøÂçÔâºÚ¿Í¹¥»÷£»AndroidÌع¤Èí¼þ¿ò¼ÜTriout¾íÍÁÖØÀ´£¬ÏÂÔØÁ¿Áè¼Ý5000Íò´Î¡£

ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£

Ö÷ÒªÇå¾²Îó²îÁбí


1. WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶Îó²î
WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTL´¦Öóͷ£±£´æÇå¾²Îó²î£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬻ñÈ¡ÄÚºËÄÚ´æÐÅϢй¶¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657

2. NGINX Unit¶ÑÒç³ö¾Ü¾ø·þÎñÎó²î
Nginx Unit±£´æ¶ÑÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬾ÙÐоܾø·þÎñ¹¥»÷¡£
http://mailman.nginx.org/pipermail/unit/2019-February/000113.html

3. WibuKey Network server management WkbProgramLow¶ÑÒç³öÎó²î
WibuKey Network server management WkbProgramLowº¯Êý±£´æ¶ÑÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄTCP±¨ÎÄ£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659

4. Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂëÎó²î
Cisco Aironet Active SensorĬÈÏÉèÖñ£´æĬÈÏÃÜÂëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬Î´ÊÚȨ»á¼û¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds

5. Forcepoint User ID (FUID) serverí§ÒâÎļþÉÏ´«Îó²î
Forcepoint User ID (FUID) server TCP 5001¶Ë¿Ú±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÉÏ´«ÇëÇó£¬Ö´ÐÐí§Òâ´úÂë¡£
https://support.forcepoint.com/KBArticle?id=000016550

 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Google PlayÖб£´æ29¿î¶ñÒâÏà»úÓ¦Óã¬×ÜÏÂÔØÁ¿Áè¼Ý400Íò´Î

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢

Google PlayÊÐËÁÖÐÌṩµÄÓ¦Óò¢²»ÁÏζ×ÅËüÊÇÕýµ±Ó¦Óá£Ö»¹Ü¹È¸è×ö³öÁËÔÆÔƶàµÄÆð¾¢£¬µ«Ò»Ð©ÐéαºÍ¶ñÒâµÄÓ¦ÓóÌÐòȷʵDZÈëÁËÊý°ÙÍò²»ÖªÇéµÄÓû§¡£ÍøÂçÇå¾²¹«Ë¾Ç÷ÊƿƼ¼·¢Ã÷ÖÁÉÙ29¸öÕÕƬӦÓóÌÐòÒÑÀֳɽøÈë¹È¸èPlayÊÐËÁ£¬²¢ÇÒÔڹȸè´ÓÆäÓ¦ÓóÌÐòÊÐËÁÖÐɾ³ý֮ǰÒѾ­ÏÂÔØÁËÁè¼Ý400Íò´Î¡£ÓÐÎÊÌâµÄÒƶ¯Ó¦ÓóÌÐòαװ³ÉÕÕƬ±à¼­ºÍÃÀÈÝÓ¦ÓóÌÐò£¬Éù³ÆʹÓÃÄúµÄÊÖ»úÏà»úÅÄÉã¸üºÃµÄÕÕƬ»òÃÀ»¯ÄúÅÄÉãµÄÕÕƬ£¬µ«·¢Ã÷ÆäÖб£´æ¶ñÒâ´úÂë¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/beauty-camera-android-apps.html

2¡¢ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP±ê×¼±»·£¿î1000ÍòÃÀÔª

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


NERCÉÏÖÜÐû²¼ÁË·£¿î¡£¸Ã»ú¹¹Ðû²¼ÁËÒ»·Ýͨ¸æ£¬µ«Ã»ÓÐ͸¶ĿµÄ¹«Ë¾µÄÃû³Æ£¬µ«E£¦EÐÂÎźͻª¶û½ÖÈÕ±¨±¨µÀ˵£¬ËüÊÇλÓÚ±±¿¨ÂÞÀ´ÄÉÖݵĶſËÄÜÔ´¹«Ë¾£¬ÊÇÃÀ¹ú×î´óµÄµçÁ¦¹«Ë¾Ö®Ò»¡£NERCµÄCIP¿É¿¿ÐÔ±ê×¼ÐÎòÁ˱±ÃÀ´óÈÝÁ¿µçÁ¦ÏµÍ³£¨BPS£©ÔËÓªÉ̵ÄÎïÀíºÍÍøÂçÇå¾²ÒªÇ󡣸Ã×éÖ¯ÒÑÓëÎ¥¹æÄÜÔ´¹«Ë¾¸æ¿¢Ï¢ÕùЭÒé¡£³ýÁ˸ù«Ë¾ÒÑÔÞ³ÉÖ§¸¶µÄ1000ÍòÃÀÔª·£¿îÍ⣬¸ÃÏ¢Õù»¹°üÀ¨ïÔÌ­Ò»Á¬Î¥¹æÐÐΪ²¢Ôö½øδÀ´µÄºÏ¹æÐÔ¡£NERC·¢Ã÷µÄ127ÆðÎ¥¹æÊÂÎñÖоø´ó´ó¶¼±»¹éÀàΪ¡°Öеȡ±»ò¡°Öеȡ±£¬µ«ÓÐ13Æð±»³ÆΪ¡°ÑÏÖØ¡±¡£¸Ã»ú¹¹µÄÆÀ¹À³Æ£¬Î¥¹æÐÐΪ¡°ÅäºÏ×é³ÉÁ˶ÔÇå¾²ÐԺͿɿ¿ÐÔµÄÑÏÖØÍþв¡±¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/us-energy-firm-fined-10-million-security-failures

3¡¢MacOS KeychainÐÂ0day£¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


¸ÃÎó²î¿ÉÄÜÔÊÐíÔÚMacOSϵͳÉÏÔËÐеĶñÒâÓ¦ÓóÌÐò»á¼û´æ´¢ÔÚKeychainÃÜÂëÖÎÀíϵͳÖеÄÃÜÂë¡£·¢Ã÷¸ÃÎó²îµÄÇå¾²Ñо¿Ö°Ô±¾Ü¾øÓëÆ»¹û¹«Ë¾·ÖÏíÓйظÃÎó²îµÄ¸ü¶àÏêϸÐÅÏ¢£¬Ò»Î»µÂ¹úÇå¾²Ñо¿Ö°Ô±Ðû²¼ÁËÒ»¶ÎÊÓƵ£¬ÐÎòÁËÓ°ÏìApple MacOSµÄ0dayÎó²î¡£´ËÎó²î»áÓ°ÏìËùÓеÄMacOS°æ±¾£¬×îеÄ10.14.3 Mojave£¬²¢ÌåÏÖAppleȱÉÙÕë¶ÔMacOSµÄbugÉͽðÍýÏë¡£

Ô­ÎÄÁ´½Ó£º
https://cyware.com/news/a-new-macos-zero-day-vulnerability-found-in-keychain-password-management-system-3565521d

4¡¢°Ä´óÀûÑÇÁª°îÒé»áµÄÅÌËã»úÍøÂçÔâºÚ¿Í¹¥»÷

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


°Ä´óÀûÑÇÒé»áÖÜÎå͸¶£¬ÆäÅÌËã»úÍøÂçÒÑÔ⵽δ֪µÄ¡°Çå¾²ÊÂÎñ¡±µÄÓ°Ï죬²¢ÌåÏÖÕýÔÚ¾ÙÐÐÊӲ졣¡°ÔÚÒé»áÅÌËãÍøÂ籬·¢Çå¾²ÊÂÎñºó£¬ÒѾ­½ÓÄÉÁËһϵÁв½·¥À´±£»¤ÍøÂç¼°ÆäÓû§£¬¡±Òé»áÕþ¸®ÔÚÒ»·ÝÉùÃ÷ÖÐ˵¡£¹ÙÔ±¾Ü¾ø¾ÍÍøÂçÇå¾²Îó²îµÄÐÔ×Ó½ÒÏþ̸ÂÛ£¬µ«ÌåÏÖûÓÐÆðÔ´Ö¤¾ÝÅú×¢Êý¾ÝÒѱ»»á¼û¡£¡°ÎÒÃÇûÓÐÖ¤¾ÝÅú×¢ÕâÊÇÊÔͼӰÏìÒé»áÀú³ÌµÄЧ¹û£¬»òÊÇÆÆËð»òÓ°ÏìÑ¡¾Ù»òÕþÖÎÀú³Ì£¬¡±Ò»·ÝÉùÃ÷˵¡£¡°ÎÒÃÇÄ¿½ñµÄÖصãÊDZ£»¤ÍøÂç²¢±£»¤Êý¾ÝºÍÓû§¡£¡±ËùÓÐÒé»áÃÜÂ붼±»ÖØÖá£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/australian-parliament-computer-network-breached

5¡¢AndroidÌع¤Èí¼þ¿ò¼ÜTriout¾íÍÁÖØÀ´£¬ÏÂÔØÁ¿Áè¼Ý5000Íò´Î

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


2018Äê8Ô£¬BitdefenderÑо¿Ö°Ô±ÎÞÒâ·¢Ã÷ÁËÒ»¸öÃûΪTrioutµÄAndroid¶ñÒâÈí¼þ¿ò¼Ü£¬¸Ã¿ò¼Ü°üÀ¨ÁË´ó×ڵļà¿Ø¹¦Ð§¡£À¦°óÁË´Ó¹Ù·½Google PlayÊг¡ÖÐɾ³ýµÄÕýµ±Ó¦ÓóÌÐò£¬Ìع¤Èí¼þ¿ò¼Ü¿ÉÒÔÒþ²ØÔÚ×°±¸ÉÏ£¬²¢¼Í¼µç»°£¬¼Í¼´«ÈëµÄÎı¾ÐÂÎÅ£¬Â¼ÖÆÊÓƵ£¬ÕÕÏ࣬ÉõÖÁÍøÂçGPS×ø±ê¡£ËùÓÐÕâЩÐÅÏ¢¶¼±»·¢Ë͵½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷¡£Ö®Ç°°æ±¾µÄÌع¤Èí¼þ¿ò¼ÜÀ¦°óÔÚÒ»¸öÏÔʾ³ÉÈËÄÚÈݵÄÓ¦ÓóÌÐòÖУ¬µ«BitdefenderÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеı»Ñ¬È¾µÄÓ¦ÓóÌÐò£¬ÓÃÓÚÈö²¥´ËÀà³ÌÐò¡£

Ô­ÎÄÁ´½Ó£º
https://labs.bitdefender.com/2019/02/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads/

ÉùÃ÷£º±¾×ÊѶÓÉÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøάËûÃüÇ徲С×é·­ÒëºÍÕûÀí