ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ42ÖÜ
Ðû²¼Ê±¼ä 2019-10-28>±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2019Äê10ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼Çå¾²Îó²î43¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇRittal Chiller SK 3232-SeriesδÊÚȨ»á¼ûÎó²î; Xiaomi Mi WiFi R3GÏÂÁî×¢ÈëÎó²î£»Google Chrome Blink CVE-2019-13700»º³åÇøÒç³öÎó²î£»PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»Fortinet FortiMail web console²»×¼È·»á¼û¿ØÖÆÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±Åû¶±£´æ4ÄêµÄLinux Wi-Fi»º³åÇøÒç³öÎó²î£»AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Ç÷ÊƿƼ¼ATTK¹¤¾ß°ü±£´æí§Òâ´úÂëÖ´ÐÐÎó²î£»CyberXÐû²¼È«ÇòÎïÁªÍø/ICSΣº¦±¨¸æ£¨2020°æ£©£»Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ±£´æDLLЮÖÆÎó²î¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
Rittal Chiller SK 3232-Series WEB½Ó¿Ú±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬Î´ÊÚȨ¸ü¸ÄÉèÖ㬷¿ª»ò¹Ø±ÕÖÆÀä×°±¸¡£
https://www.us-cert.gov/ics/advisories/icsa-19-297-01
2. Xiaomi Mi WiFi R3GÏÂÁî×¢ÈëÎó²î
Xiaomi Mi WiFi R3G±¸·ÝÎļþÉÏ´«´¦Öóͷ£±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£
https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py
3. Google Chrome Blink CVE-2019-13700»º³åÇøÒç³öÎó²î
Google Chrome Blink±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÕßÖ´ÐÐí§Òâ´úÂë¡£
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
4. PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´ÐÐÎó²î
ÔÚʹÓÃNginx + php-fpm·þÎñÆ÷ʱ£¬fastcgi_split_path_info´¦Öóͷ£%0aʱÓöµ½»»Ðзû \n µ¼ÖÂPATH_INFOΪ¿Õ¡£¶øphp-fpmÔÚ´¦Öóͷ£ PATH_INFOΪ¿ÕµÄÇéÐÎÏ£¬±£´æÂ߼ȱÏÝ£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://lab.wallarm.com/php-remote-code-execution-0-day-discovered-in-real-world-ctf-exercise/
5. Fortinet FortiMail web console²»×¼È·»á¼û¿ØÖÆÎó²î
Fortinet FortiMail web console±£´æ²»×¼È·»á¼û¿ØÖÆÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÌáÉýȨÏÞ¡£
https://fortiguard.com/psirt/FG-IR-19-237
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
GithubÊ×ϯÇå¾²¹¤³ÌʦNico Waisman·¢Ã÷Linux rtlwifiÇý¶¯³ÌÐòÖб£´æÒ»¸ö¾ßÓÐ4ÄêÀúÊ·µÄÑÏÖØÎó²î£¨CVE-2019-17666£©£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÈëÇÖÒ×Êܹ¥»÷µÄϵͳ¡£rtlwifiÇý¶¯³ÌÐòÓÃÓÚÔÊÐíRealtek Wi-FiÄ£¿éÓëLinuxϵͳ¾ÙÐÐͨѶ£¬¹¥»÷Õß¿ÉÄÜʹÓó¤¶È²»×¼È·µÄÊý¾Ý°ü´¥·¢»º³åÇøÒç³ö£¬Ê¹µÃLinux±ÀÀ£»òÊÇÔ¶³ÌÖ´ÐдúÂë¡£¾Ý³Æ¸ÃÎó²îÓ°ÏìÁËLinux°æ±¾5.3.6£¬¸ÃÎÊÌâ×Ô´Ó2015ÄêÒÔÀ´¾ÍÒ»Ö±±£´æ¡£LinuxÄÚºËÍŶÓÒѾ¿ª·¢ÁËÒ»¸öÕýÔÚÐÞ¶©µÄÐÞ¸´²¹¶¡£¬µ«¸Ã²¹¶¡ÉÐδ°üÀ¨ÔÚLinuxÄÚºËÖС£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-linux-wi-fi-bug-system-compromise/149325/
2¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/
3¡¢Ç÷ÊƿƼ¼ATTK¹¤¾ß°ü±£´æí§Òâ´úÂëÖ´ÐÐÎó²î
Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊƿƼ¼·ÀÍþв¹¤¾ß°ü£¨ATTK£©±£´æÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-9491£©£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚÄ¿µÄWindowsϵͳÉÏÔËÐжñÒâÈí¼þ¡£Æ¾Ö¤Ç÷ÊƿƼ¼Ðû²¼µÄÇ徲ͨ¸æ£¬ÈôÊǶñÒâÈí¼þ×÷Õß´ÕÇɽ«¶ñÒâÈí¼þÃüÃûΪcmd.exe»òregedit.exe£¬ÄÇôATTK½«»á¼ÓÔز¢ÔËÐиÃexeÎļþ¡£ÓÉÓÚATTKÊÇÓɾÓÉÑéÖ¤µÄ¿¯Ðз½ÊðÃûµÄ£¬Òò´Ë¿ÉÈƹýÈκÎMOTWÇå¾²ÖÒÑÔ£¬¹¥»÷ÕßÉõÖÁ¿ÉÒÔ½«ATTK×÷ΪһÖÖ³¤ÆÚÐÔ»úÖÆ¡£Ç÷ÊƿƼ¼ÏÖÒѽ«ËùÓÐATTK ¸üÐÂÖÁ1.62.0.1223°æ±¾£¬µ«ÉÐδÐû²¼ÊÖÒÕϸ½Ú¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/92818/hacking/trend-micro-anti-threat-toolkit-flaw.html4¡¢CyberXÐû²¼È«ÇòÎïÁªÍø/ICSΣº¦±¨¸æ£¨2020°æ£©
ƾ֤CyberXµÄ¡¶È«ÇòÎïÁªÍø/ICSΣº¦±¨¸æ¡·2020°æ£¬Ðí¶à¹¤ÒµÆóÒµÖÐÈÔÈ»±£´æ¹ýʱµÄ²Ù×÷ϵͳ£¬Õâ´øÀ´ÁËÑÏÖصÄΣº¦¡£¸Ã±¨¸æÊÇ»ùÓÚÈ«Çò1800¶à¸ö¹¤ÒµÆóÒµÇéÐÎÖдÓ2018Äê10ÔÂÖÁ2019Äê10ÔÂÖ®¼äÍøÂçµÄÊý¾Ý¡£ÊӲ칤¾ßÖÐÓÐ62%µÄ×°±¸ÔËÐеÄÊǹýʱÇÒ²»ÊÜÖ§³ÖµÄWindows°æ±¾£¨ÀýÈçWindows XPºÍ2000£©£¬ÈôÊǰѼ´½«ÔÚ2020Äê1ÔÂ×èÖ¹Ö§³ÖµÄWindows 7ÅÌËãÔÚÄÚ£¬ÔòÕâÒ»Êý×ÖÉÏÉýÖÁ71£¥¡£CyberX»¹·¢Ã÷£¬ÔÚ64£¥µÄÇéÐÎÏÂÆóÒµÔÚÍøÂç´«ÊäÖÐδ¶ÔÃÜÂë¾ÙÐмÓÃÜ£¬ÕâʹµÃ¹¥»÷Õ߸üÈÝÒ׽ػñÃÜÂë¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/outdated-oss-still-present-many-industrial-organizations-report5¡¢Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ±£´æDLLЮÖÆÎó²î
SafeBreach LabsÇå¾²Ñо¿Ö°Ô±·¢Ã÷Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ±£´æDLLЮÖÆÎó²î£¬¿ÉÔÊÐí¹¥»÷Õß¼ÓÔضñÒâDLLÎļþÒÔÈƹý¼ì²âºÍÌáȨ¡£¸ÃÎó²î£¨CVE-2019-17093£©Ó°ÏìÁË°æ±¾19.8ÒÔϵÄËùÓÐAvastºÍAVGɱ¶¾Èí¼þ£¬Îó²îÔµ¹ÊÔÓÉÊÇAVGSvc.exeÊÔͼÔÚÆô¶¯Ê±¼ÓÔØDLL£¬µ«ËüÔÚ¹ýʧµÄÎļþ¼ÐÖÐËÑË÷Îļþ£¨ÀýÈçC£º\Program Files\System32\£©£¬Ê¹µÃ¹¥»÷Õß¿ÉÒÔ½«Í¬ÃûDLL·ÅÈë¸ÃÎļþ¼ÐÖдӶøµ¼Ö¸ÃDLL±»ÒÔSYSTEMÌØȨ¼ÓÔØ¡£Ñо¿Ö°Ô±ÔÚAvira Antivirus 2019Öз¢Ã÷ÁËÀàËƵÄÎÊÌ⣨CVE-2019-17449£©¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/avast-avira-products-vulnerable-dll-hijacking