ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ4ÖÜ

°ä²¼¹¦·ò 2019-01-28

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê1ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼°²È«·ì϶46¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇSchneider Electric IIoT MonitorÓ²±àÂëÃØÔ¿ÐÅϢй¶·ì϶ £»Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å £»Advantech WebAccess/SCADA SQL×¢Èë·ì϶ £»Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶ £»PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶ ¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÆ¾¾ÝGDPRÌõÀý£¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle· £¿î5000ÍòÅ·Ôª;Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶;ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢£¬Ô̺¬Óû§Ö§¸¶Êý¾Ý;Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒÑϰȾԼ100ÍòÓû§;PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬×°ÖÃÎļþ±»´«È¾ ¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ ¡£


³ÁÒª°²È«·ì϶Áбí


1. Schneider Electric IIoT MonitorÓ²±àÂëÃØÔ¿ÐÅϢй¶·ì϶
Schneider Electric IIoT MonitorʹÓÃÁËÓ²±àÂëÃÜÔ¿£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û ¡£
http://www.schneider-electric.com/sites/corporate/en/support/

2. Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å
Adobe AcrobatºÍReader´¦ÖÃÄÚ´æ¶ÔÏó´æÔÚÔ½½ç¶Á·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë ¡£
https://helpx.adobe.com/security/products/acrobat/apsb18-30.html

3. Advantech WebAccess/SCADA SQL×¢Èë·ì϶
Advantech WebAccess/SCADA´æÔÚSQL×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë ¡£
https://support.advantech.com/support/DownloadSRDetail_New.aspx?SR_ID=1-MS9MJV&Doc_Source=Download

4. Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶
Cisco Small Business RV320ºÍRV325´¦ÖÃHTTP POSTÒªÇó·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî ¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject

5. PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶
PLC Wireless Router GPN2.4P21-C-CN cgi-bin/webproc?getpage=html/index.html subpage=wlsecurity URI´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬸ü¸ÄÎÞÏß°²È«ÃÜÂë ¡£
https://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html


 ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Æ¾¾ÝGDPRÌõÀý£¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle· £¿î5000ÍòÅ·Ôª

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÅ·ÃËÓÚ2018Äê5ÔÂÉúЧµÄGDPRÌõÀý£¬·¨¹úÊý¾Ý± £»¤¼à¹Ü»ú¹¹CNIL¶ÔGoogle·¢³öÁË5000ÍòÅ·Ôª£¨Ô¼ºÏ5700ÍòÃÀÔª£©µÄ·£µ¥ ¡£CNIL³ÆÕâ±Ê· £¿îµÄÔ­ÒòÊÇGoogle¹«Ë¾¡°²»×ãͨÃ÷¶È¡¢ÐÅÏ¢²»ºÏ³ÆÒÔ¼°ÔÚ¸öÐÔ»¯¸æ°×·½ÃæÃ»ÓлñµÃÓû§µÄÓÐЧÔ޳ɡ± ¡£ÕâÊÇCNILƾ¾ÝGDPR¿ª³öµÄÊ×ÕÅ·£µ¥ ¡£Google»ØÓ¦³Æ¡°ÎÒÃǼ«¶ÈÖÂÁ¦ÓÚÂú×ãÈËÃǶÔÊý¾ÝͨÃ÷¶ÈµÄ½øÕ¹ºÍGDPRµÄÒªÇó£¬ÎÒÃÇÔÚ×êÑоö¶¨ÎÒÃǽÓÏÂÀ´µÄ²½Ö衱 ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/google-privacy-gdpr-fine.html



2¡¢Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±Max Justicz·¢ÏÖLinux°üÖÎÀíÆ÷apt/apt-get´æÔÚÔ¶³Ì´úÂëÖ´Ðзì϶£¬¸Ã·ì϶£¨CVE-2019-3462£©ÔÊÐí¹¥»÷Õß½øÐÐÖÐÑëÈ˹¥»÷²¢»ñÈ¡rootȨÏÞÖ´ÐÐËÁÒâ´úÂë ¡£¸Ã·ì϶µÄÆðÒòÊÇaptĬÈÏʹÓÃHTTPͨѶ£¬¶øÆätransport²½ÖèÖд¦ÖÃHTTP³Á¶¨ÏòµÄ´úÂëûÓÐÕýÈ·²é³­Ä³Ð©²ÎÊý£¬¹¥»÷Õß¿Éͨ¹ýÖÐÑëÈ˹¥»÷ʹÓÃαÔìÊðÃûÆ­¹ý¸Ã²é³­£¬½ø¶øÔÚÓû§Ö÷»úÉÏ×°ÖÃËÁÒⷨʽ ¡£ÓÉÓÚapt×ÔÉíÒѾ­»ñÈ¡ÁËrootȨÏÞ£¬¸Ã¶ñÒⷨʽ¿ÉÔÚrootȨÏÞÏÂÖ´ÐÐ ¡£¸Ã·ì϶ӰÏìÁìÓò¼«Îª¿í·º£¬ËùÓÐʹÓÃÀϰ汾aptµÄÖ÷»ú¶¼Êܵ½Ó°Ïì ¡£apt¿ª·¢ÈËÔ±ÒÑÔÚ°æ±¾1.4.9Öн¨¸´Á˸÷ì϶ ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/linux-apt-http-hacking.html


3¡¢ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢£¬Ô̺¬Óû§Ö§¸¶Êý¾Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



¾ÝZDNet±¨Â·£¬°²È«×êÑÐÈËÔ±Justin Paine·¢ÏÖÒ»¸öÍøÂç´ò¶Ä¼¯ÍŵÄElasticSearch·þÎñÆ÷δÉèÃÜÂ룬µ¼Ö³¬¹ý1.08ÒÚ´ò¶ÄÐÅϢй¶ ¡£¸Ã·þÎñÆ÷ÉÏй¶µÄÓû§ÐÅÏ¢Ô̺¬¿Í»§µÄÕæÊµÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢µ®ÉúÈÕÆÚ¡¢ÍøÕ¾Óû§Ãû¡¢ÕÊ»§Óà¶î¡¢IPµØÖ·¡¢ä¯ÀÀÆ÷ºÍ²Ù×÷ϵͳÐÅÏ¢ÒÔ¼°ÉϴεǼÐÅÏ¢µÈ ¡£´Ë±í£¬Paine»¹·¢ÏÖ1.08ÒÚÌõ´ò¶ÄÐÅÏ¢£¬ÆäÖÐÔ̺¬¿Í»§µÄ´æ¿î¡¢È¡¿îÒÔ¼°Ö§¸¶ÐÅÏ¢ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/online-casino-group-leaks-information-on-108-million-bets-including-user-details/


4¡¢Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒÑϰȾԼ100ÍòÓû§

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ConfiantºÍMalwarebytesµÄ×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬¸Ã¹¥»÷»î¶¯×Ô1ÔÂ11ÈÕÒÔÀ´Ò»Ïò»îÔ¾£¬ÀûÓÃÒþдÊõÀ´·Ö·¢ShlayerľÂí ¡£×êÑÐÈËÔ±¹²¼ì²âµ½Á˳¬¹ý19Íò¸ö¶ñÒâ¸æ°×£¬Ô¤¼ÆÔ¼ÓÐ100ÍòÓû§Êܵ½Ó°Ïì ¡£ÕâЩ¸æ°×ͼƬÖаµ²ØÁ˶ñÒâµÄJavaScript´úÂ룬²¢¼Ù×°³ÉFlashÉý¼¶À´ÓÕʹÓû§µã»÷×°Öà ¡£×êÑÐÈËԱƾ¾ÝÆäÓòÃû½«¹¥»÷Õß³ÆÎªVeryMal£¬µ«²¢Î´»ñµÃ¹¥»÷Õߵĸü¶àÓйØÐÅÏ¢ ¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/malware-in-ad-based-images-targets-mac-users/141115/


5¡¢PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬×°ÖÃÎļþ±»´«È¾

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



PHP°üÖÎÀíÆ÷PEAR£¨go-pear.phar£©µÄ¹ÙÍø£¨pear-php.net£©ÔâºÚ¿ÍÈëÇÖ£¬Æä×°ÖÃÎļþ±»´«È¾ ¡£Æ¾¾ÝPEAR°ä²¼µÄ°²È«²¼¸æ£¬Ô̺¬¶ñÒâ´úÂëµÄ×°ÖÃÎļþÖÁÉÙÔÚÆä¹ÙÍøÉÏ´æÔÚÁ˰ëÄêµÄ¹¦·ò ¡£PEARÍŶӰµÊ¾ÔÚ½øÐе÷²é£¬ÒÔÈ·ÈϹ¥»÷µÄˮƽºÍÈëÇÖÊÇÈôºÎ²úÉúµÄ ¡£Ö»ÓÐPEAR¹ÙÍøÉϵÄ×°ÖðüÊܵ½Ó°Ï죬GitHubÉÏÃæµÄ×°ÖÃÎļþδÊÜÇÖº¦ ¡£Óû§´Ë¿ÌÄܹ»´ÓGithub¸ßµÍÔØÐµĸɾ»°æ±¾1.10.10 ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/php-pear-hacked.html


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù