ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ45ÖÜ

Ðû²¼Ê±¼ä 2018-11-12

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Unity Express JAVA·´ÐòÁл¯´¦Öóͷ£í§ÒâÏÂÁîÖ´ÐÐÎó²î £»£»£»£»£»AVEVA InduSoft Web Studio/InTouch Edge HMIÔ¶³Ì´úÂëÖ´ÐÐÎó²î £»£»£»£»£»HPE Integrated Lights-Out 5¹Ì¼þ¸üÐÂÇå¾²ÏÞÖÆÈÆ¹ýÎó²î £»£»£»£»£»QEMU 'NBD_OPT_LIST'»º³åÇøÒç³öÎó²î £»£»£»£»£»Brocade Fabric OS ROOTȨÏÞÌáÈ¡Îó²î £»£»£»£»£»Apache Hive HiveServer2Çå¾²ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day £»£»£»£»£»Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§ £»£»£»£»£»¼íÆÒÕ¯¶à¼ÒISPÔâµ½¸Ã¹úÀúÊ·ÉÏ×î´ó¹æÄ£µÄDDoS¹¥»÷ £»£»£»£»£»ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ £»£»£»£»£»»ôÄáΤ¶ûÐû²¼¹ØÓÚ¹¤ÒµÉèÊ©ÖеÄUSBÍþвµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£




¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí


1. Cisco Unity Express JAVA·´ÐòÁл¯´¦Öóͷ£í§ÒâÏÂÁîÖ´ÐÐÎó²î


Cisco Unity Express¶ÔÓû§ÌṩµÄÄÚÈݾÙÐз´ÐòÁл¯²Ù×÷ÊÇûÓоÙÐÐ×ã¹»µÄ¹ýÂË£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄjavaÐòÁл¯¹¤¾ßÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue


2. AVEVA InduSoft Web Studio/InTouch Edge HMIÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Schneider Electric InduSoft Web StudioºÍInTouch Edge HMI±£´æÉèÖÃÎļþ¿ÕÃÜÂëÎÊÌ⣬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐдúÂë¡£¡£¡£¡£¡£

https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec130.pdf



3. HPE Integrated Lights-Out 5¹Ì¼þ¸üÐÂÇå¾²ÏÞÖÆÈÆ¹ýÎó²î


HPE Integrated Lights-Out 5±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬ÈƹýÇå¾²ÏÞÖÆ£¬£¬£¬£¬£¬¸üй̼þ¡£¡£¡£¡£¡£

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03894en_us



4. QEMU 'NBD_OPT_LIST'»º³åÇøÒç³öÎó²î


QEMU´¦Öóͷ£'NBD_OPT_LIST'ÇëÇóµÄЧÀÍÆ÷ÏìÓ¦±£´æÕ»Òç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄNBDЧÀÍÆ÷ÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔQEMUÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂë»òʹӦÓóÌÐòÍ߽⡣¡£¡£¡£¡£

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630



5. Brocade Fabric OS ROOTȨÏÞÌáÈ¡Îó²î


Brocade Fabric OS ¡®supportsave¡¯ÏÂÁî±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É»ñÈ¡ROOTȨÏÞ¡£¡£¡£¡£¡£
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731




Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿Ö°Ô±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¶íÂÞ˹Îó²îÑо¿Ö°Ô±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¡£¸ÃÎó²îÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬£¬£¬£¬£¬²¢Ê¹ÓÃÆäËüÊÖÒÕÌáȨÖÁring0¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÏêϸÐÎòÁ˸ÃÎó²î±³ºóµÄ»úÖÆ£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓÆµ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/


2¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆÐû²¼Á˶à¿î²úÆ·µÄ15¸öÇå¾²¸üУ¬£¬£¬£¬£¬ÆäÖаüÀ¨É¾³ýÁËСÐÍÆóÒµ½»Á÷»úÖеÄÒ»¸öºóÃÅÕË»§¡£¡£¡£¡£¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£¡£¡£¡£¡£ÕâЩºóÃÅÕË»§Îó²î°üÀ¨3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/


3¡¢¼íÆÒÕ¯¶à¼ÒISPÔâµ½¸Ã¹úÀúÊ·ÉÏ×î´ó¹æÄ£µÄDDoS¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±¾ÖܼíÆÒÕ¯×î´óµÄ¼¸¼Ò»¥ÁªÍøÐ§ÀÍÌṩÉÌ£¨ISP£©Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷£¬£¬£¬£¬£¬°üÀ¨EZECOM¡¢SINET¡¢TelcotechºÍDigi¡£¡£¡£¡£¡£¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬£¬£¬´Ë´ÎDDoS¹¥»÷ÊǸùúÀúÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷Ö®Ò»£¬£¬£¬£¬£¬±¾ÖÜÒ»µÄDDoS¹¥»÷Á÷Á¿´ï½ü150Gbps¡£¡£¡£¡£¡£¹ØÓڴ˴ι¥»÷µÄÔµ¹ÊÔ­ÓɺÍÄîÍ·Éв»ÇåÎú£¬£¬£¬£¬£¬Ò²Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£Ò»ÖÖ¿ÉÄܵÄÇéÐÎÊÇISP¾ºÕùµÐÊÖÖ®¼äµÄÏ໥¹¥»÷¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/cambodias-isps-hit-by-some-of-the-biggest-ddos-attacks-in-the-countrys-history/


4¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤֥¼Ó¸çÌ«Ñô±¨µÄ±¨µÀ£¬£¬£¬£¬£¬Ö¥¼Ó¸ç¹«Á¢Ñ§Ð£µÄÒ»Ãûǰ¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢×ÔÔ¸Õߺ͹©Ó¦É̵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢·¸·¨ÀúÊ·ºÍDCFSÊÓ²ìЧ¹ûµÈ£¬£¬£¬£¬£¬²»°üÀ¨ÈκÎÉç±£ºÅÂë¡£¡£¡£¡£¡£KrimsÏÖÔÚÒѱ»Ö¥¼Ó¸ç¾¯·½¾Ð²¶ºÍ¾ÐÁô£¬£¬£¬£¬£¬²¢½«ÃæÁÙ¶àÏî×ïÃûµÄÖ¸¿Ø¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml


5¡¢»ôÄáΤ¶ûÐû²¼¹ØÓÚ¹¤ÒµÉèÊ©ÖеÄUSBÍþвµÄÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤»ôÄáΤ¶ûÐû²¼µÄÒ»·Ýб¨¸æ£¬£¬£¬£¬£¬USB×°±¸ÊÇÕë¶Ô¹¤ÒµÉèÊ©µÄ¶ñÒâÈí¼þ¹¥»÷µÄÖ÷ҪǰÑÔ¡£¡£¡£¡£¡£¸Ã±¨¸æÊÇ»ùÓÚ»ôÄáΤ¶ûµÄÇ徲ýÌå½»Á÷£¨SMX£©ÊÖÒÕÍøÂçµÄÊý¾Ý£¬£¬£¬£¬£¬º­¸ÇÁËÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»Æø¡¢»¯Ñ§¡¢Ö½ÕÅÖÆÔìµÈÐÐÒµ¡£¡£¡£¡£¡£Êý¾ÝÅú×¢£¬£¬£¬£¬£¬26%µÄÍþв¿ÉÄܵ¼Ö¹¤ÒµÆóҵʧȥICSÇéÐεĿɼûÐÔ»ò¿ØÖÆÈ¨£¬£¬£¬£¬£¬´Ó¶øÔì³ÉÖØ´óÖÐÖ¹¡£¡£¡£¡£¡£16%µÄÍþвרÃÅÕë¶ÔICSºÍIoTϵͳ£¬£¬£¬£¬£¬ÆäÖаüÀ¨¶ñÒâÈí¼þMirai£¨6£¥£©¡¢Stuxnet£¨2£¥£©¡¢Triton£¨2£¥£©ºÍWannaCry£¨1£¥£©¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://honeywellprocess.blob.core.windows.net/public/Support/Customer/Honeywell-USB-Threat-Report.pdf


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí