ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ20ÖÜ

Ðû²¼Ê±¼ä 2018-05-21

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
        2018Äê05ÔÂ14ÈÕÖÁ20ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇRed Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î£» £»£»£»£»£»Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î£» £»£»£»£»£»Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î£» £»£»£»£»£»Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î£» £»£»£»£»£»Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î¡£¡£¡£ ¡£¡£¡£¡£

        ±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDzÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖУ» £»£»£»£»£»Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨£» £»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPЭÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ£» £»£»£»£»£»¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷£» £»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î¡£¡£¡£ ¡£¡£¡£¡£

        ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£ ¡£¡£¡£¡£


¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢Red Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î

        Red Hat DHCP Client´¦Öóͷ£ÌØÊâµÄDHCPÏìÓ¦±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâÇëÇ󣬣¬£¬£¬¿ÉÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£ ¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://access.redhat.com/security/vulnerabilities/3442151
2¡¢Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î

        Advantech WebAccess±£´æÎļþÃû³Æ»ò·¾¶Íⲿ¿ØÖÆÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿Éɾ³ýí§ÒâÎļþ¡£¡£¡£ ¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://ics-cert.us-cert.gov/advisories/ICSA-18-135-01
3¡¢Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î

        Adobe Photoshop CC´¦Öóͷ£Îļþ±£´æÔ½½çдÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâÎļþ£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻠£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://helpx.adobe.com/security/products/photoshop/apsb18-17.html
4¡¢Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î

        Google Chrome V8±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÒ³£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻠£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop.html
5¡¢Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î

        Spring FrameworkÔÚʹÓÃÒªÁìÇå¾²ÐÔ±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÈƹýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£¡£ ¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://pivotal.io/security/cve-2018-1258


Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢²ÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖÐ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

        ²ÍÒûÁ¬Ëø¹«Ë¾Chili's±¾ÖÜÐû²¼Í¨¸æ³ÆÔâµ½¶ñÒâÈí¼þ¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ÕýÔÚÓëÖ´·¨²¿·ÖºÍµÚÈý·½ÅжÏר¼ÒÒ»ÆðÊÓ²ì´ËÊÂÎñ¡£¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤ÍøÂçµ½µÄ×îÐÂϸ½Ú£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þËÆºõÒѾ­Ñ¬È¾ÁËÆäijЩ֧¸¶ÏµÍ³¡£¡£¡£ ¡£¡£¡£¡£µ«ÔÚÍøÂçÉÏ·¢Ã÷¸Ã¶ñÒâÈí¼þ£¬£¬£¬£¬³ÆÓÐÖ¤¾ÝÅú×¢¸Ã¶ñÒâÈí¼þ½öÔÚ2018Äê3ÔºÍ4ÔÂÖ®¼ä»îÔ¾¡£¡£¡£ ¡£¡£¡£¡£BrinkerҲûÓÐÌṩ»òÐíÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿£¬£¬£¬£¬µ«ÔÊÐíÔÚÊÓ²ì¾ÙÐÐʱÐû²¼¸ü¶àϸ½Ú¡£¡£¡£ ¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/card-breach-announced-at-chili-s-restaurant-chain/

2¡¢Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

        ÖÐÑëÒøÐÐÆóÒµÖ§¸¶ºÍЧÀÍϵͳ×ܼàLorenza MartinezÌåÏÖ£¬£¬£¬£¬ÔÚ4ÔºÍ5ÔÂÖÁÉÙ¶ÔÄ«Î÷¸çÑëÐеÄÒøÐмäµç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©ÌᳫÁËÎå´ÎºÚ¿Í¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£Ò»Ð©Ä«Î÷¸çýÌåÒѾ­½«±»µÁ½ð¶îÉèΪ4ÒÚ±ÈË÷£¨2040ÍòÃÀÔª£©£¬£¬£¬£¬µ«Âí¶¡ÄÚ˹·ñ¶¨ÁËÕâЩ±¨µÀ¡£¡£¡£ ¡£¡£¡£¡£Ëý˵±»µÁµÄÇ®ÊôÓÚÒøÐÐ×Ô¼º£¬£¬£¬£¬¿Í»§µÄ×ʽð´ÓδÊܵ½Ó°Ïì¡£¡£¡£ ¡£¡£¡£¡£ÔÚ·¢Ã÷¹¥»÷ºó£¬£¬£¬£¬ÒøÐÐת¶ø½ÓÄɽÏÂýµ«¸üÇå¾²µÄÒªÁ죬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐÐµĹ¥»÷¼Í¼¡£¡£¡£ ¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-divert-funds-mexico-banks-amount-unclear-official

3¡¢Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPЭÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

        ¹¥»÷ÕßÕýÔÚʵÑé½ÓÄÉͨÓü´²å¼´Óã¨UPnP£©Ð­ÒéÀ´ÆÁÕÏDDoSÂþÒçʱ´ú·¢Ë͵ÄÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃijЩDDoS»º½â½â¾ö¼Æ»®µÄÐÂÒªÁì¡£¡£¡£ ¡£¡£¡£¡£ÔÚÖÜÒ»Ðû²¼µÄÒ»·Ý±¨¸æÖУ¬£¬£¬£¬Imperva¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÖÁÉÙÓÐÁ½´Î½ÓÄÉÕâÖÖÊÖÒÕµÄDDoS¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£Í¨¹ýÆÁÕÏ´«ÈëÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú¡£¡£¡£ ¡£¡£¡£¡£ÒÀÀµ¶ÁÈ¡´ËÐÅÏ¢À´×èÖ¹¹¥»÷µÄÀÏʽDDoS»º½âϵͳÐèÒª¸üÐÂΪ¸üÖØ´óµÄ½â¾ö¼Æ»®£¬£¬£¬£¬ÕâЩ½â¾ö¼Æ»®ÒÀÀµÓÚÉî¶È°ü¼ì²â£¨DPI£©£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ±¾Ç®¸ü¸ß£¬£¬£¬£¬½¨ÒéʹÓ÷ÓÉÆ÷µÄÓû§ÈôÊDz»Ê¹Óøù¦Ð§£¬£¬£¬£¬Ôò½ûÓÃUPnPÖ§³Ö¡£¡£¡£ ¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ddos-attacks-leverage-upnp-protocol-to-avoid-mitigation/

4¡¢¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

        Anonymous¹¥»÷Á˶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©µÄ¹Ù·½ÍøÕ¾µÄ×ÓÓòÃû£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ5ÔÂ10ÈÕ£¬£¬£¬£¬ÒÔ¿¹ÒéÕþ¸®µÄÉó²éÖÆ¶È£¬£¬£¬£¬²¢ÌØÊâÌáµ½ÁËեȡTelegramµÄ»®¶¨¡£¡£¡£ ¡£¡£¡£¡£ÉϸöÔ£¬£¬£¬£¬¶íÂÞ˹Õþ¸®·â±ÕÁ˸ùúµÄTelegramÓ¦ÓóÌÐò£¬£¬£¬£¬ÓÉÓڸù«Ë¾¾Ü¾ø½«ÆäÓû§µÄ¼ÓÃÜÃÜÔ¿½»¸ø¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¾ÙÐÐÊӲ졣¡£¡£ ¡£¡£¡£¡£×Ô2018Äê5ÔÂ3ÈÕÆð£¬£¬£¬£¬¶íÂÞ˹Ïà¹Ø»ú¹¹½û·âÁË50¶à¸öÐéÄâרÓÃÍøÂ磨VPN£©¡¢ÍøÂçÊðÀíºÍÄäÃûÍøÂç¡£¡£¡£ ¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72567/hacktivism/anonymous-hask-russia-site.html

5¡¢Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

        ESETµÄÑо¿Ö°Ô±×î½ü·¢Ã÷ÁËÒ»¸ö¶ñÒâPDFÎļþ£¬£¬£¬£¬¸Ã¶ñÒâÎĵµÊ¹ÓÃWindowsÖеÄÌØÈ¨Éý¼¶Îó²î£¨CVE-2018-8120£©ºÍAdobe Reader£¨CVE-2018-4990£©ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£ ¡£¡£¡£¡£CVE-2018-8120ÊÇMicrosoftÔÚ2018Äê5Ô²¹¶¡¸üÐÂÖÐÐÞ¸´µÄÁ½¸ö0dayÎó²îÖ®Ò»£¬£¬£¬£¬¶øCVE-2018-4990ÊÇÓÉAdobeÓÚ5ÔÂ14ÈÕÐû²¼µÄ£¬£¬£¬£¬Ðû²¼ÁËÐÞ¸´½ü50¸öÆäËûÎÊÌâµÄ¸üС£¡£¡£ ¡£¡£¡£¡£Í¨¹ýÁ¬ÏµÕâÁ½¸öȱÏÝ£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÓÃ×îÉÙµÄÓû§½»»¥ÒÔ¸ü¸ßµÄȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬ÌØÊâÊÇ·­¿ª¶ñÒâPDF¡£¡£¡£ ¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/malicious-pdf-leads-discovery-adobe-reader-windows-zero-days