ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ25ÖÜ

Ðû²¼Ê±¼ä 2019-07-01

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê6ÔÂ24ÈÕÖÁ30ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬£¬£¬ £¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇActiontec WEB6000Q rootȨÏÞ»á¼ûÎó²î£»£»£»£»ÖÂÔ¶OAÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î£»£»£»£»Couchbase Sync Gatewayí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»Cesanta Mongoose ¡®parse_mqtt()¡¯º¯Êý»º³åÇøÒç³öÎó²î£»£»£»£»ABB PB610 IDAL HTTP serverÇå¾²ÈÆ¹ý´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇmacOSË«ÖØÊÍ·ÅÎó²î£¬£¬£¬ £¬£¬£¬£¬¿Éµ¼ÖÂÌáȨ¼°´úÂëÖ´ÐУ»£»£»£»ÃÀý֤ʵÃÀ¶ÔÒÁÀʵ¼µ¯¿ØÖÆÏµÍ³Ìá³«ÍøÂç¹¥»÷£»£»£»£»IBM WebSphereÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-4279£©£»£»£»£»BGP·ÓÉ×ß©µ¼ÖÂCloudflareºÍAmazon AWSÍøÂçÖÐÖ¹£»£»£»£»FireEyeÐû²¼Q1 µç×ÓÓʼþÍþв±¨¸æ£¬£¬£¬ £¬£¬£¬£¬´¹ÂÚ¹¥»÷ÔöÌí17%¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí



1. Actiontec WEB6000Q rootȨÏÞ»á¼ûÎó²î
Actiontec WEB6000Q Quantenna WiFi Controller±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄtelnetÇëÇ󣬣¬£¬ £¬£¬£¬£¬¿ÉÒÔROOTȨÏÞ»á¼û¡£¡£¡£¡£¡£¡£¡£
http://seclists.org/fulldisclosure/2019/Jun/2

2. ÖÂÔ¶OAÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î
ÖÂÔ¶OAÉÏ´«Îļþ¹¦Ð§±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬¿ÉÌá½»¶ñÒâÎļþ²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
http://www.seeyon.com/

3. Couchbase Sync Gatewayí§Òâ´úÂëÖ´ÐÐÎó²î
Couchbase Sync Gateway REST API±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬¿É×¢ÈëÆäËûN1QLÓï¾ä¡£¡£¡£¡£¡£¡£¡£
https://docs.couchbase.com/sync-gateway/2.5/release-notes.html

4. Cesanta Mongoose ¡®parse_mqtt()¡¯º¯Êý»º³åÇøÒç³öÎó²î
Cesanta Mongoose mg_mqtt.c ¡®parse_mqtt()¡¯º¯Êý±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
https://github.com/cesanta/mongoose/releases/tag/6.15

5. ABB PB610 IDAL HTTP serverÇå¾²ÈÆ¹ý´úÂëÖ´ÐÐÎó²î
ABB PB610 IDAL HTTP server±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
https://library.e.abb.com/public/b0021d2ab9ba4e3ab14d7c2796f5908e/ABB-Advisory_3ADR010377_2.pdf


Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢macOSË«ÖØÊÍ·ÅÎó²î£¬£¬£¬ £¬£¬£¬£¬¿Éµ¼ÖÂÌáȨ¼°´úÂëÖ´ÐÐ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚmacOSÖз¢Ã÷Ò»¸öË«ÖØÊÍ·ÅÎó²î£¨CVE-2019-8635£©¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉAMD×é¼þÖеÄÄÚ´æËð»µÎÊÌâÒýÆðµÄ£¬£¬£¬ £¬£¬£¬£¬ÈôÊÇÀÖ³ÉʹÓ㬣¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÌáȨÖÁrootȨÏÞ²¢ÔÚϵͳÉÏÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¸ÃCVE IDº­¸ÇÁ½¸öË«ÖØÊÍ·ÅÎó²î£¬£¬£¬ £¬£¬£¬£¬µÚÒ»¸ö±£´æÓÚAMDRadeonX4000_AMDSIGLContextÀàµÄdiscard_StretchTex2TexÒªÁìÖУ¬£¬£¬ £¬£¬£¬£¬µÚ¶þ¸öÊǸÃÀàµÄprocess_StretchTex2TexÒªÁì¡£¡£¡£¡£¡£¡£¡£AppleÔÚmacOS Mojave 10.14.4¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-8635-double-free-vulnerability-in-apple-macos-lets-attackers-escalate-system-privileges-and-execute-arbitrary-code/

2¡¢ÃÀý֤ʵÃÀ¶ÔÒÁÀʵ¼µ¯¿ØÖÆÏµÍ³Ìá³«ÍøÂç¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤ÖÜÈÕÃÀÁªÉçµÄ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬ÃÀ¹úÍøÂç˾ÁÔÚ×ÜÍ³ÌØÀÊÆÕµÄÖ±½ÓÅú׼϶ÔÒÁÀʵľüÊÂITϵͳ·¢¶¯ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÃÀÁªÉçÔ®ÒýÁËÁ½ÃûÄÚ²¿ÐÂÎÅȪԴ²¢Í¨¹ýµÚÈýλÎå½Ç´óÂ¥¹ÙÔ±¶ÔÕâÒ»ÐÂΞÙÐÐÁËÈ·ÈÏ¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂç˾ÁÕë¶ÔµÄÊÇÒÁÀʾü·½ÓÃÀ´¿ØÖƵ¼µ¯·¢ÉäÆ÷µÄÅÌËã»úϵͳ¡£¡£¡£¡£¡£¡£¡£¡¶Å¦Ô¼Ê±±¨¡·µÄ±¨µÀÏÔʾ£¬£¬£¬ £¬£¬£¬£¬ÕâЩ¹¥»÷ÔçÔÚ¼¸ÖÜǰ¾ÍÓÐÁËÍýÏ룬£¬£¬ £¬£¬£¬£¬ÒâÔÚ»ØÓ¦Õë¶ÔÓÍÂֵĹ¥»÷ÒÔ¼°×î½üÒ»¼ÜÃÀ¹úÎÞÈË»ú±»»÷ÂäµÄÊÂÎñ¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-launches-cyber-attack-aimed-at-iranian-rocket-and-missile-systems/

3¡¢IBM WebSphereÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-4279£©


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


IBMÐÞ¸´WebSphere Application ServerÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-4279£©£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÈ«ÐĽṹµÄÐòÁл¯¹¤¾ß´¥·¢¸ÃÎó²î£¬£¬£¬ £¬£¬£¬£¬×îÖÕµ¼ÖÂÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨WebSphere Application Server ND°æ±¾9.0ºÍ°æ±¾8.5¡¢WebSphere Virtual Enterprise V7.0¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚ¿ËÈÕ¸ÃÎó²îµÄ¹¥»÷·½·¨ÒÑÔÚÒ°ÍâÈö²¥£¬£¬£¬ £¬£¬£¬£¬½¨ÒéÓû§ÊµÊ±¾ÙÐзÀ»¤¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www-01.ibm.com/support/docview.wss?uid=ibm10883628

4¡¢BGP·ÓÉ×ß©µ¼ÖÂCloudflareºÍAmazon AWSÍøÂçÖÐÖ¹

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


6ÔÂ24ÈÕÓÉÓÚVerizon¹ýʧµØ×ª·¢ÁËBGP·Óɹ㲥£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÍøÂçÁ÷Á¿±»¹ýʧµØµ¼ÏòVerizon£¬£¬£¬ £¬£¬£¬£¬Ê¹µÃCloudflare¡¢Amazon AWSºÍFacebookµÈ¹«Ë¾µÄЧÀÍÎÞ·¨»á¼û¡£¡£¡£¡£¡£¡£¡£ÊÂÎñµÄÒòÓÉÊDZöϦ·¨ÄáÑÇÖݵÄÒ»¼ÒСÐÍISP AS33154-DQE CommunicationsʹÓÃNoctionµÄBGPÓÅ»¯Æ÷ÓÅ»¯ÆäÄÚ²¿ÍøÂçµÄ·ÓÉ£¬£¬£¬ £¬£¬£¬£¬µ«ÓÉÓÚ¹ýʧÉèÖÃÕâЩ·ÓÉÐÅÏ¢±»¹ýʧµØ·¢¸øÁËVerizon£¬£¬£¬ £¬£¬£¬£¬×îÖÕµ¼Ö´ó¹æÄ£µÄÍøÂçÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/technology/bgp-route-leak-causes-cloudflare-and-amazon-aws-problems/

5¡¢FireEyeÐû²¼Q1 µç×ÓÓʼþÍþв±¨¸æ£¬£¬£¬ £¬£¬£¬£¬´¹ÂÚ¹¥»÷ÔöÌí17%

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤±¾ÖܶþFireEyeÐû²¼µÄ2019ÄêµÚÒ»¼¾¶Èµç×ÓÓʼþÍþв±¨¸æ£¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃHTTPSµÄ¶ñÒâURL±ÈÀýÔöÌíÁË26%£¬£¬£¬ £¬£¬£¬£¬¶ø¹Å°åµÄ¸½¼þΪ¶ñÒâÈí¼þµÄµç×ÓÓʼþÔÚÎȲ½Ï½µ¡£¡£¡£¡£¡£¡£¡£»£»£»£»ùÓÚ¶Ô13ÒÚ·âµç×ÓÓʼþµÄÆÊÎö£¬£¬£¬ £¬£¬£¬£¬¸Ã±¨¸æÖ¸³ö2019ÄêµÚÒ»¼¾¶ÈµÄÍøÂç´¹ÂÚ¹¥»÷±ÈÉÏÒ»¼¾¶ÈÔöÌíÁË17%£¬£¬£¬ £¬£¬£¬£¬×ܹ²Óнü30%µÄ¹¥»÷ÊÇÄ£ÄâMicrosoft¡¢OneDrive¡¢Apple¡¢AmazonºÍPayPalµÈ×ÅÃûÆ·ÅÆ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬Îļþ¹²ÏíЧÀÍÔÚÕë¶ÔÆóÒµµÄÍøÂç¹¥»÷Öб»¸üƵÈÔµØÊ¹Ó㬣¬£¬ £¬£¬£¬£¬°üÀ¨Google DriveºÍDropbox¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.fireeye.com/offers/rpt-email-threat.html