ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ21ÖÜ
Ðû²¼Ê±¼ä 2019-06-03±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2019Äê5ÔÂ27ÈÕÖÁ6ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î£»ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñÎó²î£» Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î£»HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»Serv-U FTP ServerȨÏÞÌáÉýÎó²î¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
Ö÷ÒªÇå¾²Îó²îÁбí
Apache Hadoop±£´æÒ»¸öÇå¾²Îó²î£¬ÔÊÐíÓµÓÐYAMȨÏÞµÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔrootÓû§Éí·ÝÔËÐÐí§ÒâÏÂÁî¡£
https://seclists.org/oss-sec/2019/q2/132
2. ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñÎó²î
ISC BINDµÝ¹éÆÊÎöÆ÷µÄEDNS¿Í»§¶Ë×ÓÍø±£´æÒ»¸öÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬴¦Öóͷ£°üÀ¨RRSIGµÄÏìÓ¦µÄ±¨ÎÄʱ¿Ìʹ·þÎñÆ÷Í߽⡣
https://kb.isc.org/docs/cve-2019-6469
3. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î
Adobe Flash Player±£´æÊͷźóʹÓÃÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://helpx.adobe.com/security/products/flash-player/apsb19-26.html
4. HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
HPE Intelligent Management Center ByteMessageResource transformEntityÒªÁì±£´æ·´ÐòÁл¯Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-528/
5. Serv-U FTP ServerȨÏÞÌáÉýÎó²î
WindowsϵÄServ-U FTP ServerÑéÖ¤´¦Öóͷ£±£´æÇå¾²Îó²î£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£
https://packetstormsecurity.com/files/153128/Serv-U-FTP-Server-15.1.6.25-Local-Privilege-Escalation.html
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

¾ÝŦԼʱ±¨±¨µÀ£¬ÃÀ¹ú½ðÈÚ¹«Ë¾First American Financial Corporation¹ÙÍøÉϵÄÒ»¸öÎó²îй¶ÁË16ÄêÀ´ÓëµäÖÊ´û¿îÓйصÄ8.85ÒÚÌõ¼Í¼¡£¸ÃÎó²îÔÊÐíÈκÎÈË»á¼ûFirst American´æ´¢µÄÉç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢¡¢¼ÝÕÕÒÔ¼°µäÖÊ´û¿îºÍË°ÎñÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖÕýÔÚÆÀ¹À´ËÊÂÎñ¶Ô¿Í»§ÐÅÏ¢Çå¾²ÐÔµÄÓ°Ï죬ÔÚÄÚ²¿ÉóºËÍê³É֮ǰ£¬½«²»»á½ÒÏþÈκÎ̸ÂÛ¡£
ÔÎÄÁ´½Ó£º
https://www.nytimes.com/2019/05/24/technology/data-leak-first-american.html
2¡¢ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢
ÔÎÄÁ´½Ó£º
https://www.calcalistech.com/ctech/articles/0,7340,L-3762693,00.html
3¡¢Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ïì
ƾ֤Î÷ÃÅ×ÓÐû²¼µÄÇ徲ͨ¸æ£¬¶à¿îÎ÷ÃÅ×ÓÒ½ÁÆ×°±¸Ò×ÊÜWindows RDP·þÎñBlueKeepÎó²îµÄÓ°Ï죬°üÀ¨MagicLinkA¡¢MagicViewµÈÈí¼þ²úÆ·£¬System ACOM¡¢SensisµÈ¸ß¼¶ÖÎÁƲúÆ·£¬Axiom¡¢MobilettµÈXÉäÏß×°±¸ÒÔ¼°Atellica¡¢AptioµÈʵÑéÊÒÕï¶Ï²úÆ·¡£¸Ã¹«Ë¾ÒÑÒªÇó¿Í»§×°ÖÃ΢ÈíµÄÐÞ¸´²¹¶¡£¬µ«²»¿É°ü¹Ü²¹¶¡µÄ¼æÈÝÐÔ£¬¸Ã¹«Ë¾½¨ÒéÓû§½ÓÄɽûÓÃRDP¡¢×èÖ¹TCP¶Ë¿Ú3389µÈ»º½â²½·¥¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86222/security/siemens-healthineers-bluekeep.html
4¡¢DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬Ó°ÏìËùÓÐDocker°æ±¾
Ñо¿Ö°Ô±Åû¶DockerÖÐδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬¸ÃÎó²îÓ°ÏìÁËËùÓеÄDocker°æ±¾¡£¸ÃÎó²îÀàËÆÓÚCVE-2018-15664£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÖ¸¶¨µÄ³ÌÐò¶Ô×ÊÔ´¾ÙÐвÙ×÷֮ǰÐÞ¸Ä×ÊԴ·¾¶£¬´Ó¶ø¿ÉÄÜ»ñµÃí§ÒâÎļþµÄ¶Áд»á¼ûȨÏÞ£¬Õâ±»³ÆΪTOCTOUÀàÐ͵Äbug¡£¸ÃÎó²îµÄ½¹µãÔ´ÓÚFollowSymlinkInScope¹¦Ð§Ò×ÊÜTOCTOU¹¥»÷¡£Ñо¿Ö°Ô±ÒѾÐû²¼ÁËPoC´úÂë¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/unpatched-flaw-affects-all-docker-versions-exploits-ready/
5¡¢¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î
Google Project ZeroÑо¿Ô±Tavis OrmandyÔÚ΢ÈíµÄWindows¼Çʱ¾Öз¢Ã÷Ò»¸ö´úÂëÖ´ÐÐÎó²î£¬OrmandyÒÑÏò΢Èí±¨¸æÁ˸ÃÎÊÌâ¡£Îó²îµÄϸ½ÚÉÐδÅû¶£¬µ«OrmandyÔ¤¼Æ¸ÃÎó²îÊÇÒ»¸öÄÚ´æËð»µÎó²î£¬ËûÔÚTwitterÉÏ·ÖÏíµÄͼƬÑÝʾÁËÔõÑùÔÚ¼Çʱ¾Öе¯³öshell¡£Æ¾Ö¤¹È¸èµÄÎó²îÅû¶Õþ²ß£¬Ormandy½«ÔÚ90Ììºó»ò΢ÈíÐû²¼ÐÞ¸´²¹¶¡ºóÅû¶¸ü¶àÎó²îϸ½Ú¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html