ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ37ÖÜ

°ä²¼¹¦·ò 2018-09-21
 Ò»¡¢±¾Öܰ²È«Ì¬ÊÆ×ÛÊö

2018Äê09ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼°²È«·ì϶67¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Word PDFÔ¶³Ì´úÂëÖ´Ðзì϶£»Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç¶Âí½Å£»¶à¿îI-O DATA²úÆ·ËÁÒâºÅÁîÖ´Ðзì϶£»Cisco SD-WAN Solution CVE-2018-0432ÃýÎó»ã±¨Ö°ÄÜȨÏÞÌáÉý·ì϶£»Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉý·ì϶¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇVeeamÒòMongoDBÅäÖÃÃýÎóµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶£»×êÑÐÈËÔ±·¢ÏÖ½Ù³Ö³¬¹ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯£»×êÑÐÈËÔ±³Æ¿É¹«¿ª½Ó¼ûµÄ.GitĿ¼µ¼Ö³¬¹ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷£»Nexusguard°ä²¼2018ÄêQ2Íþв»ã±¨£¬DDoS¹¥»÷ͬ±ÈÔö³¤³¬¹ý500%£»ÈüÃÅÌú¿Ë°ä²¼¼¾¶ÈÒÆ¶¯Íþв»ã±¨£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÁ¿Ôö³¤54%¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£

¶þ¡¢³ÁÒª°²È«·ì϶Áбí


1. Microsoft Word PDFÔ¶³Ì´úÂëÖ´Ðзì϶


Microsoft Word´¦ÖÃPDFÎļþ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8430

2. Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç¶Âí½Å


Microsoft JET Database Engine´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄExcelÎļþÒªÇó£¬ÓÕʹÓû§ÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8393

3. ¶à¿îI-O DATA²úÆ·ËÁÒâºÅÁîÖ´Ðзì϶


I-O DATA TS-WRLP¡¢TS-WRLAºÍTS-WRLP/EʹÓÃÓ²±àÂëÆ¾Ö¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Ö´ÐÐËÁÒâOSºÅÁî¡£
http://jvn.jp/en/jp/JVN83701666/index.html

4. Cisco SD-WAN Solution CVE-2018-0432ÃýÎó»ã±¨Ö°ÄÜȨÏÞÌáÉý·ì϶


Cisco SD-WAN SolutionÃýÎó»ã±¨Ö°ÄÜ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔROOTȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation

5. Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉý·ì϶
Micronet INplc SDK´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÌáÉýȨÏÞ£¬Ö´ÐÐËÁÒâ´úÂë¡£
http://www.mnc.co.jp/INplc/info_20180907_E.htm

Èý¡¢³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢VeeamÒòMongoDBÅäÖÃÃýÎóµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


9ÔÂ5ÈÕ°²È«×êÑÐÈËÔ±Bob Diachenko·¢ÏÖÊý¾ÝÖÎÀí¹«Ë¾VeeamµÄMongoDB·þÎñÆ÷¿É¹«¿ª½Ó¼û£¬Ò»¸ö³¬¹ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£¸ÃÊý¾Ý¿âÔ̺¬Ô¼4.45ÒÚÌõÓû§¼Í¼£¬Ô̺¬Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¾Óס¹ú¶È/µØÓòµÈÓ×ÎÒÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØÖ·¡¢ÓйØURL¡¢Óû§´úÀíµÅתÏúÓйØÐÅÏ¢¡£VeeamÒѶԸÃÊý¾Ý¿â²ÉÈ¡Á˱£»¤´ëÊ©¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/

2¡¢×êÑÐÈËÔ±·¢ÏÖ½Ù³Ö³¬¹ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±Troy Mursch·¢ÏÖÒ»¸öÀûÓ÷ì϶£¨CVE-2018-14847£©½Ù³ÖMikroTik·ÓÉÆ÷½øÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£¹ÌÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ݰ䲼ÁËÓйؽ¨¸´²¹¶¡£¬µ«ÈÔÓв¿ÃÅÓû§Ã»ÓнøÐÐÉý¼¶¡£Æ¾¾ÝMursch»ã±¨µÄÍÚ¿ó¾ç±¾£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTikÉ豸¡£´óÎÞÊýÊÜϰȾµÄÉ豸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬ÖØÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔö³¤µ½80%²¢³ÖÐø½øÐÐÍÚ¿ó¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢×êÑÐÈËÔ±³Æ¿É¹«¿ª½Ó¼ûµÄ.GitĿ¼µ¼Ö³¬¹ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Lynt ServicesµÄ×êÑÐÈËÔ±Vladim¨ªrSmitka·¢Ïֿɹ«¿ª½Ó¼ûµÄ.gitĿ¼µ¼Ö³¬¹ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷¡£ºÜ¶àWeb¿ª·¢ÈËԱʹÓÿªÔ´¹¤¾ßGitÀ´¹¹½¨Ò³Ã棬µ«ËûÃÇÍùÍù½«.gitÎļþ¼ÐÒÅÁôÔÚÍøÕ¾µÄ¹«¹²¿É½Ó¼û²¿ÃÅ£¬ÉõÖÁÔ̺¬Ò»Ð©³ÁÒªµÄÐÅÏ¢£¬ÀýÈçÍøÕ¾½á¹¹µÄÐÅÏ¢¡¢Êý¾Ý¿âÃÜÂë¡¢APIÃÜÔ¿¡¢¿ª·¢IDEÉèÖõÈ¡£


Ô­ÎÄÁ´½Ó£º
https://threatpost.com/open-git-directories-leave-390k-websites-vulnerable/137299/

4¡¢Nexusguard°ä²¼2018ÄêQ2Íþв»ã±¨£¬DDoS¹¥»÷ͬ±ÈÔö³¤³¬¹ý500%


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝNexusguardµÄ2018ÄêµÚ¶þ¼¾¶ÈÍþв»ã±¨£¬DDoS¹¥»÷¾ùÔÈÔö³¤³¬¹ý26Gbps£¬¹æÄ£Ôö³¤Á˳¬¹ý500%¡£Óë2017ÄêͬÆÚÏà±È£¬DDoS¹¥»÷µÄ×î´ó¹æÄ£·­ÁËËı¶£¬´ï359Gbps¡£×êÑÐÈËÔ±³ÆÊý¾ÝµÄ¼¤ÔöÔ´ÓÚÎïÁªÍø½©Ê¬ÍøÂçSatoriµÄÔö³¤¡£×î´óµÄ0day·çÏÕÀ´×ÔÓÚ·ÖÆçµÄ¼ÒÓ÷ÓÉÆ÷£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÉ豸Õë¶Ô¹Ø¼ü·þÎñºÍÍøÂçÌáÒé´ó¹æÄ£DDoS¹¥»÷¡£Synºé·º¹¥»÷Õ¼¾ÝÁËÖ÷µ¼Ö°Î»¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-attacks-increase-in-size-by/

5¡¢ÈüÃÅÌú¿Ë°ä²¼¼¾¶ÈÒÆ¶¯Íþв»ã±¨£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÁ¿Ôö³¤54%


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÈüÃÅÌú¿ËµÄ¼¾¶ÈÒÆ¶¯Íþв»ã±¨×ܽáÁË2017ÄêµÄÒÆ¶¯ÍþвÊý¾Ý£¬ÖØÒª·¢ÏÖÔ̺¬Òƶ¯¶ñÒâÈí¼þµÄ±äÖÖºÍÊýÁ¿¶¼ÓÐËùÔö³¤£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þ±äÖÖµÄÊýÁ¿Ôö³¤ÁË54%£»²¿ÃÅÒÆ¶¯É豸³ÖÐøÊ¹ÓùýÆÚµÄ²Ù×÷ϵͳ£¬Ö»ÓÐ3%µÄAndroidÉ豸¸üÐÂÖÁ×îеIJÙ×÷ϵͳ°æ±¾£¬41%µÄAndroidÉ豸ÖÁÉÙ¶ÌȱÁ½¸öԵݲȫ²¹¶¡£¬iOSÉ豸Ïà¶Ô½ÏºÃ£¬80%µÄiOSÉ豸װÖÃÁË×îеĸüУ»Î£ÏÕµÄWi-FiÍøÂç±ÈÒÔÍùÈκÎʱ³½¶¼Ô½·¢¿í·º¡£


Ô­ÎÄÁ´½Ó£º
https://www.symantec.com/connect/es/blogs/las-amenazas-moviles



ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù