ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ25ÖÜ
Ðû²¼Ê±¼ä 2019-07-01±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2019Äê6ÔÂ24ÈÕÖÁ30ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇActiontec WEB6000Q rootȨÏÞ»á¼ûÎó²î£»ÖÂÔ¶OAÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î£»Couchbase Sync Gatewayí§Òâ´úÂëÖ´ÐÐÎó²î£»Cesanta Mongoose ¡®parse_mqtt()¡¯º¯Êý»º³åÇøÒç³öÎó²î£»ABB PB610 IDAL HTTP serverÇå¾²Èƹý´úÂëÖ´ÐÐÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇmacOSË«ÖØÊÍ·ÅÎó²î£¬¿Éµ¼ÖÂÌáȨ¼°´úÂëÖ´ÐУ»ÃÀý֤ʵÃÀ¶ÔÒÁÀʵ¼µ¯¿ØÖÆϵͳÌᳫÍøÂç¹¥»÷£»IBM WebSphereÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-4279£©£»BGP·ÓÉ×ß©µ¼ÖÂCloudflareºÍAmazon AWSÍøÂçÖÐÖ¹£»FireEyeÐû²¼Q1 µç×ÓÓʼþÍþв±¨¸æ£¬´¹ÂÚ¹¥»÷ÔöÌí17%¡£
Ö÷ÒªÇå¾²Îó²îÁбí
Actiontec WEB6000Q Quantenna WiFi Controller±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄtelnetÇëÇ󣬿ÉÒÔROOTȨÏÞ»á¼û¡£
http://seclists.org/fulldisclosure/2019/Jun/2
2. ÖÂÔ¶OAÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î
ÖÂÔ¶OAÉÏ´«Îļþ¹¦Ð§±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÌá½»¶ñÒâÎļþ²¢Ö´ÐÐí§Òâ´úÂë¡£
http://www.seeyon.com/
3. Couchbase Sync Gatewayí§Òâ´úÂëÖ´ÐÐÎó²î
Couchbase Sync Gateway REST API±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿É×¢ÈëÆäËûN1QLÓï¾ä¡£
https://docs.couchbase.com/sync-gateway/2.5/release-notes.html
4. Cesanta Mongoose ¡®parse_mqtt()¡¯º¯Êý»º³åÇøÒç³öÎó²î
Cesanta Mongoose mg_mqtt.c ¡®parse_mqtt()¡¯º¯Êý±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://github.com/cesanta/mongoose/releases/tag/6.15
5. ABB PB610 IDAL HTTP serverÇå¾²Èƹý´úÂëÖ´ÐÐÎó²î
ABB PB610 IDAL HTTP server±£´æÄÚ´æÆÆËðÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÇå¾²ÏÞÖÆÖ´ÐÐí§Òâ´úÂë¡£
https://library.e.abb.com/public/b0021d2ab9ba4e3ab14d7c2796f5908e/ABB-Advisory_3ADR010377_2.pdf
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

Ç÷ÊƿƼ¼Ñо¿Ö°Ô±ÔÚmacOSÖз¢Ã÷Ò»¸öË«ÖØÊÍ·ÅÎó²î£¨CVE-2019-8635£©¡£¸ÃÎó²îÊÇÓÉAMD×é¼þÖеÄÄÚ´æËð»µÎÊÌâÒýÆðµÄ£¬ÈôÊÇÀÖ³ÉʹÓ㬹¥»÷Õß¿ÉÌáȨÖÁrootȨÏÞ²¢ÔÚϵͳÉÏÖ´ÐжñÒâ´úÂë¡£¸ÃCVE IDº¸ÇÁ½¸öË«ÖØÊÍ·ÅÎó²î£¬µÚÒ»¸ö±£´æÓÚAMDRadeonX4000_AMDSIGLContextÀàµÄdiscard_StretchTex2TexÒªÁìÖУ¬µÚ¶þ¸öÊǸÃÀàµÄprocess_StretchTex2TexÒªÁì¡£AppleÔÚmacOS Mojave 10.14.4¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-8635-double-free-vulnerability-in-apple-macos-lets-attackers-escalate-system-privileges-and-execute-arbitrary-code/
2¡¢ÃÀý֤ʵÃÀ¶ÔÒÁÀʵ¼µ¯¿ØÖÆϵͳÌᳫÍøÂç¹¥»÷
ƾ֤ÖÜÈÕÃÀÁªÉçµÄ±¨µÀ£¬ÃÀ¹úÍøÂç˾ÁÔÚ×ÜͳÌØÀÊÆÕµÄÖ±½ÓÅú׼϶ÔÒÁÀʵľüÊÂITϵͳ·¢¶¯ÁËÍøÂç¹¥»÷¡£ÃÀÁªÉçÔ®ÒýÁËÁ½ÃûÄÚ²¿ÐÂÎÅȪԴ²¢Í¨¹ýµÚÈýλÎå½Ç´óÂ¥¹ÙÔ±¶ÔÕâÒ»ÐÂΞÙÐÐÁËÈ·ÈÏ¡£ÃÀ¹úÍøÂç˾ÁÕë¶ÔµÄÊÇÒÁÀʾü·½ÓÃÀ´¿ØÖƵ¼µ¯·¢ÉäÆ÷µÄÅÌËã»úϵͳ¡£¡¶Å¦Ô¼Ê±±¨¡·µÄ±¨µÀÏÔʾ£¬ÕâЩ¹¥»÷ÔçÔÚ¼¸ÖÜÇ°¾ÍÓÐÁËÍýÏ룬ÒâÔÚ»ØÓ¦Õë¶ÔÓÍÂֵĹ¥»÷ÒÔ¼°×î½üÒ»¼ÜÃÀ¹úÎÞÈË»ú±»»÷ÂäµÄÊÂÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-launches-cyber-attack-aimed-at-iranian-rocket-and-missile-systems/
3¡¢IBM WebSphereÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-4279£©
IBMÐÞ¸´WebSphere Application ServerÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-4279£©£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÈ«ÐĽṹµÄÐòÁл¯¹¤¾ß´¥·¢¸ÃÎó²î£¬×îÖÕµ¼ÖÂÔÚ·þÎñÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨WebSphere Application Server ND°æ±¾9.0ºÍ°æ±¾8.5¡¢WebSphere Virtual Enterprise V7.0¡£ÓÉÓÚ¿ËÈÕ¸ÃÎó²îµÄ¹¥»÷·½·¨ÒÑÔÚÒ°ÍâÈö²¥£¬½¨ÒéÓû§ÊµÊ±¾ÙÐзÀ»¤¡£
ÔÎÄÁ´½Ó£º
https://www-01.ibm.com/support/docview.wss?uid=ibm10883628
4¡¢BGP·ÓÉ×ß©µ¼ÖÂCloudflareºÍAmazon AWSÍøÂçÖÐÖ¹
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/technology/bgp-route-leak-causes-cloudflare-and-amazon-aws-problems/
5¡¢FireEyeÐû²¼Q1 µç×ÓÓʼþÍþв±¨¸æ£¬´¹ÂÚ¹¥»÷ÔöÌí17%
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/offers/rpt-email-threat.html