ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ20ÖÜ
Ðû²¼Ê±¼ä 2018-05-21
Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2018Äê05ÔÂ14ÈÕÖÁ20ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇRed Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î£»£»£»£»£»£»Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDzÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖУ»£»£»£»£»£»Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨£»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPÐÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ£»£»£»£»£»£»¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷£»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢Red Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î
Red Hat DHCP Client´¦Öóͷ£ÌØÊâµÄDHCPÏìÓ¦±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâÇëÇ󣬣¬£¬£¬¿ÉÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://access.redhat.com/security/vulnerabilities/3442151
2¡¢Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î
Advantech WebAccess±£´æÎļþÃû³Æ»ò·¾¶Íⲿ¿ØÖÆÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿Éɾ³ýí§ÒâÎļþ¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://ics-cert.us-cert.gov/advisories/ICSA-18-135-01
3¡¢Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Photoshop CC´¦Öóͷ£Îļþ±£´æÔ½½çдÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâÎļþ£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://helpx.adobe.com/security/products/photoshop/apsb18-17.html
4¡¢Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î
Google Chrome V8±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÒ³£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop.html
5¡¢Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î
Spring FrameworkÔÚʹÓÃÒªÁìÇå¾²ÐÔ±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÈƹýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://pivotal.io/security/cve-2018-1258
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢²ÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖÐ

²ÍÒûÁ¬Ëø¹«Ë¾Chili's±¾ÖÜÐû²¼Í¨¸æ³ÆÔâµ½¶ñÒâÈí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ÕýÔÚÓëÖ´·¨²¿·ÖºÍµÚÈý·½ÅжÏר¼ÒÒ»ÆðÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçµ½µÄ×îÐÂϸ½Ú£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þËÆºõÒѾѬȾÁËÆäijЩ֧¸¶ÏµÍ³¡£¡£¡£¡£¡£¡£¡£µ«ÔÚÍøÂçÉÏ·¢Ã÷¸Ã¶ñÒâÈí¼þ£¬£¬£¬£¬³ÆÓÐÖ¤¾ÝÅú×¢¸Ã¶ñÒâÈí¼þ½öÔÚ2018Äê3ÔºÍ4ÔÂÖ®¼ä»îÔ¾¡£¡£¡£¡£¡£¡£¡£BrinkerҲûÓÐÌṩ»òÐíÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿£¬£¬£¬£¬µ«ÔÊÐíÔÚÊÓ²ì¾ÙÐÐʱÐû²¼¸ü¶àϸ½Ú¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/card-breach-announced-at-chili-s-restaurant-chain/
2¡¢Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨

ÖÐÑëÒøÐÐÆóÒµÖ§¸¶ºÍЧÀÍϵͳ×ܼàLorenza MartinezÌåÏÖ£¬£¬£¬£¬ÔÚ4ÔºÍ5ÔÂÖÁÉÙ¶ÔÄ«Î÷¸çÑëÐеÄÒøÐмäµç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©ÌᳫÁËÎå´ÎºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ò»Ð©Ä«Î÷¸çýÌåÒѾ½«±»µÁ½ð¶îÉèΪ4ÒÚ±ÈË÷£¨2040ÍòÃÀÔª£©£¬£¬£¬£¬µ«Âí¶¡ÄÚ˹·ñ¶¨ÁËÕâЩ±¨µÀ¡£¡£¡£¡£¡£¡£¡£Ëý˵±»µÁµÄÇ®ÊôÓÚÒøÐÐ×Ô¼º£¬£¬£¬£¬¿Í»§µÄ×ʽð´ÓδÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ÔÚ·¢Ã÷¹¥»÷ºó£¬£¬£¬£¬ÒøÐÐת¶ø½ÓÄɽÏÂýµ«¸üÇå¾²µÄÒªÁ죬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐÐµĹ¥»÷¼Í¼¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-divert-funds-mexico-banks-amount-unclear-official
3¡¢Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPÐÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ

¹¥»÷ÕßÕýÔÚʵÑé½ÓÄÉͨÓü´²å¼´Óã¨UPnP£©ÐÒéÀ´ÆÁÕÏDDoSÂþÒçʱ´ú·¢Ë͵ÄÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃijЩDDoS»º½â½â¾ö¼Æ»®µÄÐÂÒªÁì¡£¡£¡£¡£¡£¡£¡£ÔÚÖÜÒ»Ðû²¼µÄÒ»·Ý±¨¸æÖУ¬£¬£¬£¬Imperva¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÖÁÉÙÓÐÁ½´Î½ÓÄÉÕâÖÖÊÖÒÕµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£Í¨¹ýÆÁÕÏ´«ÈëÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú¡£¡£¡£¡£¡£¡£¡£ÒÀÀµ¶ÁÈ¡´ËÐÅÏ¢À´×èÖ¹¹¥»÷µÄÀÏʽDDoS»º½âϵͳÐèÒª¸üÐÂΪ¸üÖØ´óµÄ½â¾ö¼Æ»®£¬£¬£¬£¬ÕâЩ½â¾ö¼Æ»®ÒÀÀµÓÚÉî¶È°ü¼ì²â£¨DPI£©£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ±¾Ç®¸ü¸ß£¬£¬£¬£¬½¨ÒéʹÓ÷ÓÉÆ÷µÄÓû§ÈôÊDz»Ê¹Óøù¦Ð§£¬£¬£¬£¬Ôò½ûÓÃUPnPÖ§³Ö¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ddos-attacks-leverage-upnp-protocol-to-avoid-mitigation/
4¡¢¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷

Anonymous¹¥»÷Á˶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©µÄ¹Ù·½ÍøÕ¾µÄ×ÓÓòÃû£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ5ÔÂ10ÈÕ£¬£¬£¬£¬ÒÔ¿¹ÒéÕþ¸®µÄÉó²éÖÆ¶È£¬£¬£¬£¬²¢ÌØÊâÌáµ½ÁËեȡTelegramµÄ»®¶¨¡£¡£¡£¡£¡£¡£¡£ÉϸöÔ£¬£¬£¬£¬¶íÂÞ˹Õþ¸®·â±ÕÁ˸ùúµÄTelegramÓ¦ÓóÌÐò£¬£¬£¬£¬ÓÉÓڸù«Ë¾¾Ü¾ø½«ÆäÓû§µÄ¼ÓÃÜÃÜÔ¿½»¸ø¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£×Ô2018Äê5ÔÂ3ÈÕÆð£¬£¬£¬£¬¶íÂÞ˹Ïà¹Ø»ú¹¹½û·âÁË50¶à¸öÐéÄâרÓÃÍøÂ磨VPN£©¡¢ÍøÂçÊðÀíºÍÄäÃûÍøÂç¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72567/hacktivism/anonymous-hask-russia-site.html
5¡¢Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î

ESETµÄÑо¿Ö°Ô±×î½ü·¢Ã÷ÁËÒ»¸ö¶ñÒâPDFÎļþ£¬£¬£¬£¬¸Ã¶ñÒâÎĵµÊ¹ÓÃWindowsÖеÄÌØÈ¨Éý¼¶Îó²î£¨CVE-2018-8120£©ºÍAdobe Reader£¨CVE-2018-4990£©ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£CVE-2018-8120ÊÇMicrosoftÔÚ2018Äê5Ô²¹¶¡¸üÐÂÖÐÐÞ¸´µÄÁ½¸ö0dayÎó²îÖ®Ò»£¬£¬£¬£¬¶øCVE-2018-4990ÊÇÓÉAdobeÓÚ5ÔÂ14ÈÕÐû²¼µÄ£¬£¬£¬£¬Ðû²¼ÁËÐÞ¸´½ü50¸öÆäËûÎÊÌâµÄ¸üС£¡£¡£¡£¡£¡£¡£Í¨¹ýÁ¬ÏµÕâÁ½¸öȱÏÝ£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÓÃ×îÉÙµÄÓû§½»»¥ÒÔ¸ü¸ßµÄȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬ÌØÊâÊÇ·¿ª¶ñÒâPDF¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/malicious-pdf-leads-discovery-adobe-reader-windows-zero-days