ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ13ÖÜ

Ðû²¼Ê±¼ä 2019-04-01

±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2019Äê3ÔÂ25ÈÕÖÁ31ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Tomcat HTTP/2¾Ü¾ø·þÎñÎó²î£»DedeCMSí§ÒâÓû§ÃÜÂëÖØÖÃÎó²î; Forcepoint Email SecurityÃÜÂëÖØÖÃÎó²î£»Green Hills INTEGRITY RTOS IPWEBSÕ»Òç³öÎó²î£»Dell EMC NetWorker CVE-2017-8023í§ÒâÏÂÁîÖ´ÐÐÎó²î ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇUCä¯ÀÀÆ÷Ò×ÔâÖÐÐÄÈ˹¥»÷£¬²¨¼°5ÒÚÓû§£»Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷£¬»òÓ°ÏìÁè¼Ý100ÍòÓû§£»TP-Link SR20·ÓÉÆ÷0day£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ»Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬Ðû²¼30¶à¸öÐéα¾¯±¨ ¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£



Ö÷ÒªÇå¾²Îó²îÁбí


1. Apache Tomcat HTTP/2¾Ü¾ø·þÎñÎó²î


Apache Tomcat HTTP/2ʵÏÖ±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɾÙÐоܾø·þÎñ¹¥»÷ ¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199


2. DedeCMSí§ÒâÓû§ÃÜÂëÖØÖÃÎó²î
DedeCMS member/resetpassword.phpÎļþûÓÐ׼ȷµØÑéÖ¤key²ÎÊý£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖØÖÃí§ÒâÓû§µÄÃÜÂë ¡£
https://blog.csdn.net/yalecaltech/article/details/88594388


3. Forcepoint Email SecurityÃÜÂëÖØÖÃÎó²î


Forcepoint Email SecurityÃÜÂëÖØÖù¦Ð§±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÖØÖÃÃÜÂë ¡£
https://support.forcepoint.com/KBArticle?id=000016655


4. Green Hills INTEGRITY RTOS IPWEBSÕ»Òç³öÎó²î


Green Hills INTEGRITY RTOS IPWEBSÆÊÎöhttpÑé֤ͷ±£´æÕ»Òç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë ¡£
https://github.com/bl4ckic3/GHS-Bugs


5. Dell EMC NetWorker CVE-2017-8023í§ÒâÏÂÁîÖ´ÐÐÎó²î


Dell EMC NetWorker RPC·þÎñ±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔnsrexecd·þÎñȨÏÞÖ´ÐÐí§ÒâÏÂÁî ¡£
https://packetstormsecurity.com/files/152245/EMC-Networker-Remote-Code-Execution.html



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢UCä¯ÀÀÆ÷Ò×ÔâÖÐÐÄÈ˹¥»÷£¬²¨¼°5ÒÚÓû§


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ƾ֤Çå¾²³§ÉÌDr. WebÐû²¼µÄÒ»·Ýб¨¸æ£¬UCä¯ÀÀÆ÷ÖÁÉÙ´Ó2016Äê×îÏȾ;ßÓÐÒ»¸öÒþ²ØµÄ¹¦Ð§£¬¿É´Ó¹«Ë¾µÄ·þÎñÆ÷ÏòÓû§µÄAndroid×°±¸ÏÂÔز¢×°ÖÃеĿâºÍÄ £¿é ¡£ÓÉÓڴ˹¦Ð§ÊÇ»ùÓÚHTTPЭÒ飬ʹµÃ¹¥»÷Õß¿ÉÖ´ÐÐMiTM¹¥»÷²¢ÏòÓû§ÍÆËͶñÒâÄ £¿é ¡£UCä¯ÀÀÆ÷²¢Î´¼ì²é²å¼þµÄÊðÃû£¬ÕâÒâζ×ŶñÒâÄ £¿é½«»áÎÞÐèÑéÖ¤¶øÖ±½ÓÆô¶¯ ¡£±ðµÄ£¬ÕâÒ»¹¦Ð§Ò²Î¥·´ÁËGoogle PlayµÄÇå¾²Õþ²ß ¡£ËùÓа汾µÄUCä¯ÀÀÆ÷ºÍUC Miniä¯ÀÀÆ÷¾ùÊÜÓ°Ï죬¾Ý³Æ¸Ãä¯ÀÀÆ÷ÔÚÖйúºÍÓ¡¶ÈÓµÓÐÁè¼Ý5ÒÚÓû§ ¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/03/uc-browser-android-hacking.html


2¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷£¬»òÓ°ÏìÁè¼Ý100ÍòÓû§


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§ ¡£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£©£¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È· ¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷ ¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ ¡£


Ô­ÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/


3¡¢TP-Link SR20·ÓÉÆ÷0day£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐÐ


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


¹È¸è¿ª·¢Ö°Ô±GarretÅû¶ÁËTP-Link SR20ÖÇÄܼҾÓ·ÓÉÆ÷ÖеÄ0day£¬¸ÃÎó²îÔÊÐíͳһÍøÂçÖеÄDZÔÚ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë ¡£GarretÏòTP-Link±¨¸æÁ˸ÃÎó²î£¬µ«ÔÚ90ÌìÄÚ²¢Î´»ñµÃTP-LinkµÄ»Ø¸´£¬Òò´ËËûÐû²¼ÁËÕâÒ»Îó²î ¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁGarret»¹Ðû²¼ÁËÏà¹ØPoC ¡£×èÖ¹ÏÖÔÚTP-LinkÉÐδ¾ÙÐлØÓ¦ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zero-day-tp-link-sr20-router-vulnerability-disclosed-by-google-dev/


4¡¢Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ÔÚÉÏÖÜÔâµ½ÀÕË÷Èí¼þLockerGoga¹¥»÷Ö®ºó£¬Å²ÍþÂÁÉú²úÉÌNorsk HydroÈÔÔÚ»Ö¸´ÆäITϵͳ ¡£¸Ã¹«Ë¾³Æ»ùÓڸ߲ãÆÀ¹À£¬ÆðÔ´Ô¤¼ÆÍøÂç¹¥»÷Ôì³ÉµÄËðʧԼΪ3-3.5ÒÚŲÍþ¿ËÀÊ£¨ºÏ3500-4100ÍòÃÀÔª£©£¬Ö÷ÒªËðʧȪԴÓÚÀûÈóºÍÂÁ²Ä¼·Ñ¹ÓªÒµµÄËðʧ ¡£¸Ã¹«Ë¾³ÆÂÁ²Ä¼·Ñ¹½â¾ö¼Æ»®ÒѾ­»Ö¸´ÁË70-80%£¬µ«ÐÞ½¨ÏµÍ³ÓªÒµÈÔδ»Ö¸´ ¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/norsk-hydro-ransomware-costs-hit-1-1/


5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬Ðû²¼30¶à¸öÐéα¾¯±¨


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈø˹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬ÒýÆðÁËÍâµØסÃñµÄ¿Ö»Å ¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ£¬ÆäÓàµÄÔòÊÇÔÚDeSoto ¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬£¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£·þÎñ ¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊÓ²ì ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html