ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ13ÖÜ
Ðû²¼Ê±¼ä 2019-04-01±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê3ÔÂ25ÈÕÖÁ31ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApache Tomcat HTTP/2¾Ü¾øÐ§ÀÍÎó²î£»£»£»£»DedeCMSí§ÒâÓû§ÃÜÂëÖØÖÃÎó²î; Forcepoint Email SecurityÃÜÂëÖØÖÃÎó²î£»£»£»£»Green Hills INTEGRITY RTOS IPWEBSÕ»Òç³öÎó²î£»£»£»£»Dell EMC NetWorker CVE-2017-8023í§ÒâÏÂÁîÖ´ÐÐÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇUCä¯ÀÀÆ÷Ò×ÔâÖÐÐÄÈ˹¥»÷£¬£¬£¬£¬£¬£¬²¨¼°5ÒÚÓû§£»£»£»£»Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬»òÓ°ÏìÁè¼Ý100ÍòÓû§£»£»£»£»TP-Link SR20·ÓÉÆ÷0day£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ»£»£»£»Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª£»£»£»£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬Ðû²¼30¶à¸öÐéα¾¯±¨¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
Ö÷ÒªÇå¾²Îó²îÁбí
1. Apache Tomcat HTTP/2¾Ü¾øÐ§ÀÍÎó²î
Apache Tomcat HTTP/2ʵÏÖ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199
2. DedeCMSí§ÒâÓû§ÃÜÂëÖØÖÃÎó²î
DedeCMS member/resetpassword.phpÎļþûÓÐ׼ȷµØÑéÖ¤key²ÎÊý£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÖØÖÃí§ÒâÓû§µÄÃÜÂë¡£¡£¡£¡£
https://blog.csdn.net/yalecaltech/article/details/88594388
3. Forcepoint Email SecurityÃÜÂëÖØÖÃÎó²î
Forcepoint Email SecurityÃÜÂëÖØÖù¦Ð§±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÖØÖÃÃÜÂë¡£¡£¡£¡£
https://support.forcepoint.com/KBArticle?id=000016655
4. Green Hills INTEGRITY RTOS IPWEBSÕ»Òç³öÎó²î
Green Hills INTEGRITY RTOS IPWEBSÆÊÎöhttpÑé֤ͷ±£´æÕ»Òç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://github.com/bl4ckic3/GHS-Bugs
5. Dell EMC NetWorker CVE-2017-8023í§ÒâÏÂÁîÖ´ÐÐÎó²î
Dell EMC NetWorker RPCЧÀͱ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔnsrexecdЧÀÍȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
https://packetstormsecurity.com/files/152245/EMC-Networker-Remote-Code-Execution.html
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢UCä¯ÀÀÆ÷Ò×ÔâÖÐÐÄÈ˹¥»÷£¬£¬£¬£¬£¬£¬²¨¼°5ÒÚÓû§
ƾ֤Çå¾²³§ÉÌDr. WebÐû²¼µÄÒ»·Ýб¨¸æ£¬£¬£¬£¬£¬£¬UCä¯ÀÀÆ÷ÖÁÉÙ´Ó2016Äê×îÏȾ;ßÓÐÒ»¸öÒþ²ØµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬¿É´Ó¹«Ë¾µÄЧÀÍÆ÷ÏòÓû§µÄAndroid×°±¸ÏÂÔØ²¢×°ÖÃеĿâºÍÄ£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£ÓÉÓڴ˹¦Ð§ÊÇ»ùÓÚHTTPÐÒ飬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Õß¿ÉÖ´ÐÐMiTM¹¥»÷²¢ÏòÓû§ÍÆËͶñÒâÄ£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£UCä¯ÀÀÆ÷²¢Î´¼ì²é²å¼þµÄÊðÃû£¬£¬£¬£¬£¬£¬ÕâÒâζ×ŶñÒâÄ£¿£¿£¿£¿£¿£¿é½«»áÎÞÐèÑéÖ¤¶øÖ±½ÓÆô¶¯¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÕâÒ»¹¦Ð§Ò²Î¥·´ÁËGoogle PlayµÄÇå¾²Õþ²ß¡£¡£¡£¡£ËùÓа汾µÄUCä¯ÀÀÆ÷ºÍUC Miniä¯ÀÀÆ÷¾ùÊÜÓ°Ï죬£¬£¬£¬£¬£¬¾Ý³Æ¸Ãä¯ÀÀÆ÷ÔÚÖйúºÍÓ¡¶ÈÓµÓÐÁè¼Ý5ÒÚÓû§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/03/uc-browser-android-hacking.html
2¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬»òÓ°ÏìÁè¼Ý100ÍòÓû§
2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£¡£¡£¡£»£»£»£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ¡£¡£¡£¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£©£¬£¬£¬£¬£¬£¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È·¡£¡£¡£¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬£¬£¬£¬£¬£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üÐÂЧÀÍÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬£¬£¬£¬£¬£¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷¡£¡£¡£¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйء£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/
3¡¢TP-Link SR20·ÓÉÆ÷0day£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐÐ
¹È¸è¿ª·¢Ö°Ô±GarretÅû¶ÁËTP-Link SR20ÖÇÄܼҾÓ·ÓÉÆ÷ÖеÄ0day£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíÍ³Ò»ÍøÂçÖеÄDZÔÚ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£GarretÏòTP-Link±¨¸æÁ˸ÃÎó²î£¬£¬£¬£¬£¬£¬µ«ÔÚ90ÌìÄÚ²¢Î´»ñµÃTP-LinkµÄ»Ø¸´£¬£¬£¬£¬£¬£¬Òò´ËËûÐû²¼ÁËÕâÒ»Îó²î¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬Garret»¹Ðû²¼ÁËÏà¹ØPoC¡£¡£¡£¡£×èÖ¹ÏÖÔÚTP-LinkÉÐδ¾ÙÐлØÓ¦¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zero-day-tp-link-sr20-router-vulnerability-disclosed-by-google-dev/
4¡¢Norsk HydroÒòÀÕË÷Èí¼þ¹¥»÷Ëðʧ³¬4100ÍòÃÀÔª
ÔÚÉÏÖÜÔâµ½ÀÕË÷Èí¼þLockerGoga¹¥»÷Ö®ºó£¬£¬£¬£¬£¬£¬Å²ÍþÂÁÉú²úÉÌNorsk HydroÈÔÔÚ»Ö¸´ÆäITϵͳ¡£¡£¡£¡£¸Ã¹«Ë¾³Æ»ùÓڸ߲ãÆÀ¹À£¬£¬£¬£¬£¬£¬ÆðÔ´Ô¤¼ÆÍøÂç¹¥»÷Ôì³ÉµÄËðʧԼΪ3-3.5ÒÚŲÍþ¿ËÀÊ£¨ºÏ3500-4100ÍòÃÀÔª£©£¬£¬£¬£¬£¬£¬Ö÷ÒªËðʧȪԴÓÚÀûÈóºÍÂÁ²Ä¼·Ñ¹ÓªÒµµÄËðʧ¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÂÁ²Ä¼·Ñ¹½â¾ö¼Æ»®ÒѾ»Ö¸´ÁË70-80%£¬£¬£¬£¬£¬£¬µ«ÐÞ½¨ÏµÍ³ÓªÒµÈÔδ»Ö¸´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/norsk-hydro-ransomware-costs-hit-1-1/
5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬Ðû²¼30¶à¸öÐéα¾¯±¨
3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬£¬£¬£¬£¬£¬ÒýÆðÁËÍâµØ×¡ÃñµÄ¿Ö»Å¡£¡£¡£¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ£¬£¬£¬£¬£¬£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£¡£¡£¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬£¬£¬£¬£¬£¬£¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£Ð§ÀÍ¡£¡£¡£¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊӲ졣¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html


¾©¹«Íø°²±¸11010802024551ºÅ