¿¨°Í˹»ù2019Äê¹¤ÒµÍøÂ簲ȫÇé¿ö»ã±¨£»11¸öRuby¿â´æÔÚºóÃÅ£»SteamÌáȨ0day

°ä²¼¹¦·ò 2019-08-22
1¡¢¿¨°Í˹»ù°ä²¼2019Äê¹¤ÒµÍøÂ簲ȫÇé¿ö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ½øÐе÷ÑУ¬Õû¶Ù²¢°ä²¼ÁË¡¶2019Äê¹¤ÒµÍøÂ簲ȫÇé¿ö¡·»ã±¨¡£Æ¾¾Ý¸Ã»ã±¨£¬È¥Ä곬¹ýÒ»°ë£¨52%£©µÄ¹¤¿Ø°²È«ÊÂÎñÊÇÓɱ¨´ðʧÎóµ¼ÖµÄ¡£¹ÌÈ»¾ø´óÎÞÊý¹«Ë¾£¨81£¥£©´òËã½øÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0£¬µ«·ÖÅäÁËÍøÂ簲ȫԤËãµÄÈ´Éٵöࣨ57£¥£©¡£³ý´ËÖ®±í£¬ÕâЩ¹«Ë¾µÄÍøÂ簲ȫ¼¼ÊõÒÀÈ»ÁîÈËÓÇÓô£ºÊÜ·ÃÕßµÄÁ½´óÓÇÓô¼¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂ簲ȫר¼ÒÀ´ÖÎÀí¹¤ÒµÍøÂ磬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±é²»×㰲ȫÒâʶ¡£


Ô­ÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/


2¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹µ±¾ÖÐû¸æµÄ¸ùÖ¤Êé

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹µ±¾ÖÓÚÉϸöÔÂÐû¸æµÄ¸ùÖ¤Ê飬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£Æäʱ¹þÈø¿Ë˹̹µ±¾ÖÒªÇó¸Ã¹úISPºÏ×÷£¬Ç¿ÔìÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£´Ë¿Ìµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ£¬½«×èÖ¹ÏνӲ¢ÏÔʾÃýÎóÐÅÏ¢¡£¹þÈø¿Ë˹̹µ±¾ÖÒѾ­ÔÚ8Ô³õÖÕ³¡ÁËÕâÒ»´òË㣬һÃû¹ÙÔ±°µÊ¾Õû¸ö´òËãÖ»Êǵ±¾ÖµÄÒ»¸ö²âÊÔ¡£µ«ÈÔº±¼û°ÙÍòÉ豸ÈÔÔÚʹÓøÃÖ¤Êé¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html


3¡¢×êÑÐÈËÔ±·¢ÏÖ11¸öRuby¿âÖдæÔÚºóÃÅ´úÂë

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

RubyGemsɾ³ýÁË18¸öÔ̺¬ºóÃÅ´úÂëµÄRuby¿â¶ñÒâ°æ±¾£¬ÕâЩ¶ñÒâ°æ±¾ÊôÓÚ11¸ö·ÖÆçµÄRuby¿â£¬×Ô7ÔÂ8ÈÕÒÔÀ´£¬ÕâЩ¶ñÒâ°æ±¾ÒѾ­±»ÏÂÔØÁË3584´Î¡£±»Ö²ÈëµÄºóÃÅ´úÂë¿ÉÔÚÆäËûÈ˵ÄRubyÏîÄ¿Öз¢Õ¹ÒþÄäµÄ¶ñÒâÍÚ¿ó»î¶¯¡£ºÉÀ¼¿ª·¢ÕßJan DintelÊ×ÏÈÔÚrest-client¿âÖз¢ÏÖÁ˶ñÒâ´úÂ룬ËüÃÇ»áÍøÂçURLºÍϵͳ»·¾³ÐÅÏ¢²¢·¢ËÍÖÁÎÚ¿ËÀ¼µÄ·þÎñÆ÷¡£¾­¹ýµ÷²éºóRubyGemsÔ±¹¤·¢ÏÖÁ˸ü¶à¿âÊܵ½´«È¾£¬¾ßÌå°æ±¾ÁбíÇë²Î¿¼Á´½Ó¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/


4¡¢¶íÂÞ˹·¸×ïÍÅ»ïSilence½«Ö¸±êÀ©´óÖÁÈ«ÇòÒøÐÐ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝGroup-IB°ä²¼µÄ¡¶Silence 2.0£º×ßÏòÈ«Çò¡·»ã±¨£¬×Ô2018Äê9Ô·ÝÒÔÀ´£¬Í¨¹ýÔö³¤¹¥»÷ƵÂʵķ½Ê½£¬¸Ã¶íÂÞ˹·¿·¸×ïÍÅ»ïÒѾ­ÇÔÈ¡Á˽ü350ÍòÃÀÔªµÄ×ʽð¡£ÔÚ´ÓǰһÄêÖУ¬¸ÃÍÅ»ïÖÁÉÙÌáÒéÁË16¸öй¥»÷»î¶¯£¬¶Ô×¼ÁË30¸ö¹ú¶ÈµÄÒøÐУ¬Ö¸±êÇøÓòºá¿çÅ·ÖÞ¡¢À­¶¡ÃÀÖÞ¡¢·ÇÖÞºÍÑÇÖÞ¡£ÆäÔì³ÉµÄËðʧÔö³¤ÁË5±¶£¬´Ó80ÍòÃÀÔªÔö³¤ÖÁ420ÍòÃÀÔª¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/silence-apt-russian-hackers.html

5¡¢×êÑÐÈËÔ±Åû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¶íÂÞ˹×êÑÐÈËÔ±Vasily KravetsÅû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day£¬¸Ã·ì϶ֻӰÏìÁËWindows¿Í»§¶Ë£¬Æ¾¾ÝSteamµÄÊý¾Ý£¬Ô¼ÓÐ9600ÍòÓû§ÊÜÓ°Ïì¡£¸ÃEoP/LPE·ì϶ÔÊÐí¹¥»÷Õßͨ¹ýBaitAndSwitch¼¼ÊõÌáȨÖÁNT AUTHORITY\SYSTEMȨÏÞÖ´ÐÐËÁÒâpayload¡£Kravetsͨ¹ýÊÓÆµÑÝʾÁËÆä¹¥»÷²½Ö裬½ØÖÁĿǰVÉçÉÐδ½øÐлØÓ¦¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/

6¡¢Ë¼¿Æ½¨¸´UCSÉ豸¼°220»¥»»»úÖеÄ6¸ö¹Ø¼ü·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

˼¿Æ½¨¸´ÆäUCSÉ豸¼°220ϵÁÐÆóÒµ»¥»»»úÖеÄ6¸ö¹Ø¼ü·ì϶£¬Ô¶³Ì¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶ÊÕÊÜÖ¸±êÉ豸¡£ÆäÖÐËĸö·ì϶£¨CVE-2019-1938¡¢CVE-2019-1935¡¢CVE-2019-1974ºÍCVE-2019-1937£©µÄCVSSÆÀ·Ö¶¼Îª9.8·Ö£¬ÕâЩ·ì϶ӰÏìÁËUCSÉ豸¡£Áí±íÁ½¸ö·ì϶£¨CVE-2019-1913£¬CVSS 9.8·ÖºÍCVE-2019-1912£¬CVSS 9.1·Ö£©ÊÇ220»¥»»»úÖеĻº³åÇøÒç¶Âí½Å£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓ÷ì϶ִÐÐËÁÒâ´úÂë²¢ÊÕÊÜ»¥»»»ú¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/cisco-patches-six-critical-bugs/147585/