ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ05ÖÜ
Ðû²¼Ê±¼ä 2020-02-05
> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2020Äê01ÔÂ27ÈÕÖÁ2ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇDrayTek VigorϵÁÐí§ÒâÏÂÁîÖ´ÐÐÎó²î; Adobe Illustrator CC CVE-2020-3710ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»OpenSMTPD smtp_mailaddrí§ÒâÏÂÁîÖ´ÐÐÎó²î£»Adobe Acrobat/ReaderÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î£»IBM Security Access Manager Appliance XXE×¢ÈëÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇOpenSMTPD¿âRCEÎó²îÓ°Ïì¶à¸öBSDºÍLinux¿¯Ðа棻2019Ä꽩ʬÍøÂçC2·þÎñÆ÷ÊýĿͬ±ÈÔöÌí71%£»ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÐû²¼Óйػº½âÔÆÎó²îµÄÇå¾²Ö¸ÄÏ£»Î¢ÈíÐû²¼AzureÇå¾²»ù×¼£¬Ìṩ90¶àÖÖÇ徲ʵ¼ù½¨Ò飻ŦԼз¨°¸ÌáÒéեȡÊÐÕþÕþ¸®Ö§¸¶ÀÕË÷Èí¼þÊê½ð¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. DrayTek VigorϵÁÐí§ÒâÏÂÁîÖ´ÐÐÎó²î
DrayTek Vigor300B cgi-bin/mainfunction.cgi URI²»×¼È·´¦Öóͷ£SHELL×Ö·û£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£
https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html
2. Adobe Illustrator CC CVE-2020-3710ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Adobe Illustrator CC´¦Öóͷ£Îļþ±£´æÄÚ´æÆÆËðÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://helpx.adobe.com/security/products/illustrator/apsb20-03.html
3. OpenSMTPD smtp_mailaddrí§ÒâÏÂÁîÖ´ÐÐÎó²î
OpenSMTPD smtp_session.c smtp_mailaddr±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄMAIL FROM×Ö¶ÎÇëÇ󣬿ÉÖ´ÐÐí§ÒâÏÂÁî¡£
http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
4. Adobe Acrobat/ReaderÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î
Adobe Acrobat and Reader´¦Öóͷ£Îļþ±£´æÀàÐÍ»ìÏýÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb19-02.html
5. IBM Security Access Manager Appliance XXE×¢ÈëÎó²î
IBM Security Access Manager Appliance´¦Öóͷ£XMLÊý¾Ý±£´æXXE¹¥»÷Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄXMLÇëÇ󣬿ɻñÈ¡Ãô¸ÐÐÅÏ¢»ò¾ÙÐоܾø·þÎñ¹¥»÷¡£
https://exchange.xforce.ibmcloud.com/vulnerabilities/172018
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢OpenSMTPD¿âRCEÎó²îÓ°Ïì¶à¸öBSDºÍLinux¿¯Ðаæ
Çå¾²Ñо¿Ö°Ô±ÒѾÔÚÐí¶àBSDºÍLinux¿¯ÐаæËùʹÓõÄÓëµç×ÓÓʼþÏà¹ØµÄ½¹µã¿âÖз¢Ã÷ÁËÒ»¸öÎó²î£¬Îó²î¸ú×ÙΪCVE-2020-7247£¬Ó°Ïì·þÎñÆ÷¶ËSMTPÐÒéµÄ¿ªÔ´ÊµÏÖOpenSMTPD¡£¸Ã¿¯ÐаæÖÐͨ³£°üÀ¨¸Ã¿â£¬ÕâЩ¿¯ÐаæÖ¼ÔÚÔÚ·þÎñÆ÷ÉÏÔËÐУ¬´Ó¶øʹ·þÎñÆ÷¿ÉÒÔ´¦Öóͷ£ÓëSMTPÏà¹ØµÄµç×ÓÓʼþºÍÁ÷Á¿¡£OpenSMTPD¿â×î³õÊÇΪOpenBSD²Ù×÷ϵͳ¿ª·¢µÄ£¬µ«¸Ã¿âÊÇ¿ªÔ´µÄ£¬Æä¡°±ãЯʽ°æ±¾¡±Ò²ÒѺϲ¢µ½ÆäËûOSÖУ¬ÀýÈçFreeBSD£¬NetBSDºÍһЩLinux¿¯Ðа棬ÀýÈçDebian£¬Fedora £¬Alpine LinuxµÈ¡£OpenSMTPD¿ª·¢Ö°Ô±ÒÑÈ·ÈÏ´ËÎó²î£¬²¢ÓÚ½ñÌìÔçЩʱ¼äÐû²¼Á˲¹¶¡-OpenSMTPD°æ±¾6.6.2p1¡£½¨ÒéÒѽ«ÆäBSDºÍLinux·þÎñÆ÷ÉèÖÃΪʹÓÃOpenSMTPD¿Í»§¶ËµÄϵͳÖÎÀíÔ±¾¡¿ìÓ¦ÓôËÐÞ²¹³ÌÐò¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/rce-in-opensmtpd-library-impacts-bsd-and-linux-distros/
2¡¢2019Ä꽩ʬÍøÂçC2·þÎñÆ÷ÊýĿͬ±ÈÔöÌí71%
Spamhaus³ÆÓë2018ÄêÏà±ÈÈ«ÇòÓÃÓÚ¿ØÖÆÊܶñÒâÈí¼þѬȾµÄϵͳµÄ·þÎñÆ÷Ô¾ÉýÁË71£¥ÒÔÉÏ¡£Ò»Á¬Á½ÄêÈ«Çò¹¥»÷ÕßÓÃÀ´¿ØÖÆÊܶñÒâÈí¼þѬȾµÄϵͳµÄ·þÎñÆ÷ÊýÄ¿¼±¾çÔöÌí¡£SpamhausÏîÄ¿¸ú×ÙÍþв¼ÓÈëÕßÓÃÓÚÍйܽ©Ê¬ÍøÂçÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷£¨C2£©µÄÓòÃûºÍIPµØµã£¬¸ÃÏîÄ¿È·¶¨ÁË2019ÄêÈ«Çò¹²ÓÐ1210¸ö²î±ðÍøÂçÍйܵÄ17602¸ö´ËÀà·þÎñÆ÷¡£Õâ¸öÊý×Ö±ÈSpamhausÔÚ2018Äê¼ì²âµ½µÄ10263̨½©Ê¬ÍøÂçC2·þÎñÆ÷ÔöÌíÁË71.5£¥£¬±È2018ÄêµÄ9500̨½©Ê¬ÍøÂçÊýÄ¿ÔöÌíÁ˽üÒ»±¶¡£ÏÖʵÉÏ£¬½©Ê¬ÍøÂçC2Õ¼ËùÓÐÁбíÖеÄ41£¥¡£SpamhausÔÚ2019ÄêµÄºÚÃûµ¥ÖУ¬¶ø2017Äê½öΪ15£¥£¬È¥ÄêΪ25£¥¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/number-of-botnet-command-and-control-servers-soared-in-2019/d/d-id/1336914
3¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÐû²¼Óйػº½âÔÆÎó²îµÄÇå¾²Ö¸ÄÏ
¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÒ»·ÝÐÅÏ¢±í£¬ÆäÖаüÀ¨Óйػº½âÔÆÎó²îµÄÖ¸ÄÏ¡£NSA»áÈ·¶¨ÔÆÇå¾²×é¼þ£¬²¢ÌÖÂÛÍþвÒòËØ£¬ÔÆÎó²îºÍDZÔڵĻº½â²½·¥¡£¸ÃÎĵµ½«ÔÆÎó²î·ÖΪËÄÀࣨÉèÖùýʧ£¬»á¼û¿ØÖƲ¹²Ïí×⻧Îó²îºÍ¹©Ó¦Á´Îó²î£©£¬ÕâЩÎó²îº¸ÇÁË´ó´ó¶¼ÒÑÖªÎó²î¡£ÌṩÿÖÖÎó²îÀà´ËÐÎ״òÒÔ¼°×îÓÐÓõĻº½â²½·¥¡£¸ÃÖ¸ÄÏÖ¸³ö£¬¸ÃÖ¸ÄϽö¹©×éÖ¯Ïòµ¼ºÍÊÖÒÕְԱʹÓᣡ°×éÖ¯Ïòµ¼¿ÉÒԲο¼¡°ÔÆ×é¼þ¡±²¿·Ö£¬¡°ÔÆÍþв¼ÓÈëÕß¡±²¿·ÖÒÔ¼°¡°ÔÆÎó²î»ººÍ½â²½·¥¡±¸ÅÊö£¬ÒÔ»ñÈ¡¶ÔÔÆÇå¾²ÔÔòµÄ¿´·¨¡£ÊÖÒÕºÍÇ徲רҵְԱӦ·¢Ã÷¸ÃÎĵµÓÐÖúÓÚ½â¾öÔÆ·þÎñʱ´úºÍÖ®ºóµÄÔÆÇå¾²×¢ÖØÊÂÏî²É¹º¡±¡£
ÔÎÄÁ´½Ó£º
https://www.securitymagazine.com/articles/91618-national-security-agency-releases-guide-on-mitigating-cloud-vulnerabilities
4¡¢Î¢ÈíÐû²¼AzureÇå¾²»ù×¼£¬Ìṩ90¶àÖÖÇ徲ʵ¼ù½¨Òé
΢Èí±¾ÖÜÐû²¼ÁËAzureÇå¾²»ù×¼v1£¨ASB£©µÄ¿ÉÓÃÐÔ£¬ÕâÊÇÕë¶ÔAzure¿Í»§µÄ90¶àÖÖÇå¾²×î¼Ñʵ¼ù½¨ÒéµÄÜöÝÍ¡£Î¢ÈíÌåÏÖ£¬ASBÖ¼ÔÚͨ¹ý½¨Éè°üÀ¨ÏàͬÃûÌõÄAzure·þÎñËùÓн¨ÒéµÄ¿ò¼ÜÀ´Ìá¸ßAzure·þÎñÇå¾²ÎĵµµÄÒ»ÖÂÐÔ¡£ASBÖ¼ÔÚ×ÊÖú×éÖ¯Ìá¸ßAzureÖÐÊÂÇ鸺ÔصÄÕûÌåÇå¾²ÐԺͺϹæÐÔ£¬ÆäÖаüÀ¨11¸öÊÜInternetÇå¾²ÖÐÐÄ£¨CIS£©7.1¿ØÖÆ¿ò¼ÜÆô·¢²¢Ó³Éäµ½ÆäÖеÄÇå¾²¿ØÖÆ¡£ASBÖаüÀ¨µÄ¿Ø¼þÕë¶ÔÍøÂçÇå¾²£¬ÈÕÖ¾¼Í¼ºÍ¼àÊÓ£¬Éí·ÝºÍ»á¼û¿ØÖÆ£¬Êý¾Ý±£»¤£¬Îó²îÖÎÀí£¬¿â´æºÍ×ʲúÖÎÀí£¬Çå¾²ÉèÖ㬶ñÒâÈí¼þ·ÀÓù£¬Êý¾Ý»Ö¸´£¬ÊÂÎñÏìÓ¦ÒÔ¼°Éø͸²âÊԺͺìÉ«ÍŶÓѵÁ·¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/microsoft-releases-azure-security-benchmark
5¡¢Å¦Ô¼Ð·¨°¸ÌáÒéեȡÊÐÕþÕþ¸®Ö§¸¶ÀÕË÷Èí¼þÊê½ð
¹ú¼Ò²ÎÒéÔ±Phil Boyle£¬George M. BorrelloºÍSue Serino ÓÚ±¾Ô³õÌá³öÁ˲ÎÒéÔº·¨°¸S7246£¬ÒÔÓ¦¶ÔÕë¶ÔÌìϸ÷µØÕþ¸®»ú¹¹ºÍÊÐÕþʵÌåµÄÍøÂç¹¥»÷À˳±¡£ÔÚijЩµ÷½â²½·¥ÖУ¬ÆäÖÐһЩ£¨ÀýÈçÀïά°£Àº£Ì²ºÍ·ðÂÞÀï´ïÖݵĺþ³Ç£©ÒÑÖ§¸¶ÁËÊê½ð¡£ÆäËûµÄ£¬ÀýÈçÂíÈøÖîÈûÖݵÄб´µÂ¸£µÂºÍÑÇÌØÀ¼´óÊУ¬ÔòûÓÐÖ§¸¶ÈκÎÊê½ð¡£ÔÚºóÒ»ÖÖÇéÐÎÏ£¬¸ÃÊÐ×îÖÕÆÆ·ÑÁË260ÍòÃÀÔª ͨ¹ýÊÂÎñÏìÓ¦ºÍÊý×ÖÈ¡Ö¤µÄÖ§³ö£¬ÌØÁíÍâÖ°Ô±Å䱸ºÍMicrosoft Cloud»ù´¡¼Ü¹¹×¨ÒµÖªÊ¶À´»Ö¸´¡£Ö»¹ÜÍøÂçÇ徲ר¼ÒÖ¸³ö£¬¸¶·ÑÕվɲ»¸¶·ÑµÄ¾öÒéÊÇÒ»¸öÖØ´óµÄ¾öÒ飬ȡ¾öÓÚСÎÒ˽¼ÒÇéÐΣ¬Ô¤ËãºÍÊý¾ÝΣº¦¡£SB S7246ºÅ·¨°¸ÔÚŦԼÖÝÌá³öÁËÒ»Ïî×ÜÀ¨ÐÔÕþ²ß¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/new-york-ban-cities-paying-ransomware/152233/