VMware½¨¸´Fusion¡¢HorizonÖеÄÌáȨ·ì϶ £»ºÚ¿ÍÒÔйڲ¡¶¾Îªµö¶ü´´½¨Êýǧ¸ö¶ñÒâÍøÕ¾

°ä²¼¹¦·ò 2020-03-19

1.Adobe°ä²¼´ø±í°²È«¸üР£¬½¨¸´41¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Adobe°ä²¼´ø±í°²È«¸üР£¬½¨¸´6ÖÖ²úÆ·ÖеÄ41¸ö·ì϶ £¬ÆäÖÐÔ̺¬29¸öCritical·ì϶ºÍ11¸öimportant·ì϶¡£Adobe AcrobatºÍReaderÖн¨¸´ÁË13¸ö·ì϶ £¬ÆäÖÐ9¸öΪCritical¼¶±ð £»Adobe Photoshop½¨¸´ÁË22¸ö·ì϶ £¬ÆäÖÐÔ̺¬16¸öCritical·ì϶¡£ËùÓÐCritical·ì϶¶¼ÊÇÄÚ´æ°Ü»µÎÊÌâ £¬¿ÉÄܻᵼÖÂËÁÒâ´úÂëÖ´ÐÐ £¬ColdFusionÖеÄÒ»¸öÑϳÁ·ì϶£¨CVE-2020-3761£©»¹»áµ¼Ö¹¥»÷Õß´Ó×°ÖÃĿ¼ÖжÁÈ¡ËÁÒâÎļþ¡£Õâ´Î¸üÐÂÖн¨¸´µÄ·ì϶¾ùδ¹«¿ªÅû¶»ò±»¿í·ºÀûÓá£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/03/adobe-software-update.html


2.VMware½¨¸´Fusion¡¢HorizonÖеÄÌáȨ·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


VMware°ä²¼°²È«¸üР£¬½¨¸´Á½¸ö·ì϶ £¬µÚÒ»¸ö·ì϶£¨CVE-2020-3950£©ÊÇÓÉÓÚ²»µ±Ê¹ÓÃsetuid¶þ½øÔìÎļþ¶øµ¼ÖµÄÌØÈ¨ÌáÉýÎÊÌâ £¬ÆäCVSSÆÀ·ÖΪ7.3¡£³É¹¦ÀûÓô˷ì϶¿ÉÄÜ»áʹӵÓÐͨ³£Óû§ÌØÈ¨µÄ¹¥»÷Õß½«ÆäÌØÈ¨Éý¼¶µ½rootÓû§ £¬ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬Fusion¡¢VMRCºÍHorizon Client¡£µÚ¶þ¸ö·ì϶£¨CVE-2020-3951£©ÊÇÓÉCortado Thinprint£¨VMware WorkstationºÍWindows Horizon ClientʹÓõÄÐé¹¹´òÓ¡ÒýÇæ£©ÖеĶÑÒç³öÃýÎóÒýÆðµÄ £¬ÓµÓÐÐé¹¹»ú·ÇÖÎÀíԱȨÏ޵Ĺ¥»÷Õß¿ÉÄܻᵼÖ»ؾø·þÎñ¡£Ä¬ÈÏÇé¿öÏÂÐé¹¹´òӡδÔÚWorkstationÉÏÆôÓà £¬µ«ÔÚHorizon ClientÉÏÆôÓ᣸÷ì϶µÄCVSSµÃ·ÖΪ3.2¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vmware-patches-privilege-escalation-vulnerability-in-workstation-fusion-horizon/


3.˼¿Æ½¨¸´ÆäSD-WAN½â¾ö¹æ»®ÖеÄ5¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


3ÔÂ18ºÅ˼¿Æ°ä²¼°²È«²¼¸æ £¬½¨¸´ÁËÆäSD-WAN½â¾ö¹æ»®ÖеÄÎå¸ö·ì϶ £¬ÆäÖÐÔ̺¬Èý¸öÑϳÁ·ì϶¡£ÕâЩ·ì϶¶¼ÊÇÓÉÊäÈëÑéÖ¤²»¼°ÒýÆðµÄ £¬¿Éµ¼Ö¹¥»÷Õß¶Ôϵͳ½øÐÐδ¾­ÊÚȨµÄ¸ü¸Ä¡¢Ê¹ÓÃrootȨÏÞÖ´ÐÐËÁÒâºÅÁî¡¢½«ÌØÈ¨ÌáÉýΪrootµÈ¡£Èý¸öÑϳÁ·ì϶ΪCVE-2020-3265¡¢CVE-2020-3266¡¢CVE-2020-3264 £¬¾­¹ý±¾µØÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ýÏòÖ¸±êϵͳ·¢ËͶñÒâÒªÇóÀ´ÀûÓÃÕâЩ·ì϶ £¬ÊÜÓ°ÏìµÄSD-WAN°æ±¾Îª19.2.2֮ǰµÄ°æ±¾¡£Áí±íÁ½¸ö·ì϶Ϊ´æ´¢ÐÍXSS£¨CVE-2019-16010£©ºÍSQL×¢Èë·ì϶£¨CVE-2019-16012£©¡£¸Ã¹«Ë¾Ã»Óз¢ÏÖÕâЩ·ì϶ÔÚÒ°±í±»ÀûÓá£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/99954/security/cisco-sd-wan-product-flaws.html


4.ºÚ¿ÍÒÔйڲ¡¶¾Îªµö¶ü´´½¨Êýǧ¸ö¶ñÒâÍøÕ¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝCheck PointµÄ×êÑÐ £¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃCOVID-19ÒßÇé½øÐжñÒâ»î¶¯ £¬Ô̺¬×¢²áÓëCOVID-19ÓйصĶñÒâÓòÃû¡¢´òÕÛÏúÊÛ¶ñÒâÈí¼þµÈ¡£×Ô1Ô³õÒÔÀ´ £¬ÒÑ×¢²áµÄÓëйڲ¡¶¾ÓйصĶñÒâÓòÃûÊýÁ¿³ÊÉÏÉýÇ÷Ïò¡£×êÑÐÈËÔ±³Æ2Ôµ×ÒÔÀ´ÐÂ×¢²áÓòÃûµÄ¾ùÔÈÊýÁ¿ÏÕЩÊÇǰ¼¸ÖܵÄ10±¶ £¬ÆäÖÐ0.8%ÊǶñÒâµÄ£¨93¸öÍøÕ¾£© £¬»¹ÓÐ19£¥ÊÇ¿ÉÒɵ썳¬¹ý2200¸öÍøÕ¾£©¡£ºÚ¿Í×éÖ¯SSHacker»¹ÀûÓÃCOVID-19×÷Ϊ´ÙÏú´úÂë £¬ÎªÈëÇÖFacebookÕË»§Ìṩ15£¥µÄÕÛ¿Û¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/03/covid-19-coronavirus-hacker-malware.html


5.RiskSense°ä²¼Ö÷Á÷webºÍÀûÓÿò¼Ü·ì϶µÄ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝRiskSense±¾Öܰ䲼µÄÒ»·Ý»ã±¨ £¬WordPressºÍApache StrutsÊǽüÊ®ÄêÀ´Ôâ·ê¹¥»÷×î¶àµÄWeb¼¼Êõ¡£¸Ã»ã±¨×êÑÐÁË2010ÄêÖÁ2019ÄêÖ®¼äËùÓÐÅû¶µÄ·ì϶ £¬ÔÚÒ°±í±»±øÆ÷»¯ºÍÀûÓõÄËùÓа²È«·ì϶ÖÐÔ¼ÓÐ55£¥ÊÇÕë¶ÔWordPressºÍApache StrutsµÄ¡£DrupalÄÚÈÝÖÎÀíϵͳÅÅÃûµÚÈý £¬Æä´ÎÊÇRuby on RailsºÍLaravel¡£¾Í±à³Ì˵»°¶øÑÔ £¬PHPºÍJavaÀûÓ÷¨Ê½Öеķì϶ÔÚ´ÓǰʮÄêÖб»ÀûÓÃ×î¶à £¬ÖÁÉÙµÄÊÇJavaScriptºÍPython £¬µ«RiskSenseÔ¤¼ÆÕâÖÖÇé¿ö½«ÔÚ½«À´¼¸ÄêÄÚŤת¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/wordpress-and-apache-struts-account-for-55-of-all-weaponized-vulnerabilities/


6.TrickBotÐÂÄ  £¿éÀûÓÃPC±©Á¦ÆÆ½âRDP·þÎñÆ÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


BitdefenderÔÚÒ°±í·¢ÏÖTrickBotÒøÐÐľÂíµÄÐÂÄ  £¿é £¬¸ÃÄ  £¿éʹ¹¥»÷Õß¿ÉÄÜÀûÓÃÊÜϰȾµÄϵͳÕë¶Ô¶³öÔÚInternetµÄRDP·þÎñÆ÷ÌáÒ鱩Á¦ÆÆ½â¹¥»÷¡£¸ÃÄ  £¿éÓÚ1ÔÂ30ÈÕ±»·¢ÏÖ £¬ÃûΪ¡°rdpScanDll¡± £¬¾Ý³ÆÈÔÔÚ¿ª·¢ÖС£¾Ý×êÑÐÈËÔ±³Æ¸ÃÄ  £¿éµ½Ä¿Ç°ÎªÖ¹Òѳ¢ÊÔ¹¥»÷ÃÀ¹úºÍÏã¸ÛµçÐÅ¡¢½ÌÓýºÍ½ðÈÚÁìÓòÆóÒµÖеÄ6013¸öRDP·þÎñÆ÷¡£´Ë±í £¬×êÑÐÈËÔ±¿ÉÄܼø±ð³öÖÁÉÙ3460¸ö³äÈÎC2·þÎñÆ÷µÄIPµØÖ· £¬ÆäÖÐÔ̺¬556¸öרÃÅÓÃÓÚÏÂÔØÐ²å¼þµÄ·þÎñÆ÷ºÍ22¸öͬʱ³äµ¹ØâÁ½¸ö½ÇÉ«µÄIP¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/03/trickbot-malware-rdp-bruteforce.html