ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ40ÖÜ

°ä²¼¹¦·ò 2018-10-08

Ò»¡¢±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2018Äê10ÔÂ01ÈÕÖÁ07ÈÕ¹²ÊÕ¼°²È«·ì϶41¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGit '-'×Ö·ûËÁÒâ´úÂëÖ´Ðзì϶£»Apache Ranger UnixAuthenticationService»º³åÇøÒç¶Âí½Å£»Cisco Identity Services Engine WEBÖÎÀí½Ó¿ÚËÁÒâºÅÁîÖ´Ðзì϶£»D-Link DIR-823GÖÎÀíÔ±ÃÜÂë¸ü¸Ä·ì϶£»strongSwan GMP²å¼þ»º³åÇøÒç¶Âí½Å¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇApollo¹«Ë¾ÔâºÚ¿Í¹¥»÷£¬³¬¹ý2ÒÚÌõÁªÏµÈ˼ͼй¶£»Sonatype°ä²¼Èí¼þ¹©¸øÁ´°²È«µÄµÚËİæÄê¶È»ã±¨£»×êÑÐÍŶӷ¢ÏÖ½Ù³Ö³¬¹ý10Íò¸ö·ÓÉÆ÷µÄн©Ê¬ÍøÂçGhostDNS£»GwinnettÒ½ÁÆÖÐÐÄÔâÍøÂç¹¥»÷£¬²¿ÃÅ»¼ÕßÊý¾ÝÒÉй¶£»µÂ¹úÄÜÔ´¹«Ë¾RWEÔâµ½DDoS¹¥»÷£¬ÍøÕ¾ÁÙʱÎÞ·¨½Ó¼û¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£




¶þ¡¢³ÁÒª°²È«·ì϶Áбí


1. Git '-'×Ö·ûËÁÒâ´úÂëÖ´Ðзì϶


Git´¦ÖÃ'-'×Ö·û´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£


https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404


2. Apache Ranger UnixAuthenticationService»º³åÇøÒç¶Âí½Å


Apache Ranger UnixAuthenticationService´¦ÖÃÓû§ÊäÈë´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£


https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger


3. Cisco Identity Services Engine WEBÖÎÀí½Ó¿ÚËÁÒâºÅÁîÖ´Ðзì϶


Cisco Identity Services Engine WEBÖÎÀí½Ó¿Ú´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔ¸ßȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ise-mult-vulns


4. D-Link DIR-823GÖÎÀíÔ±ÃÜÂë¸ü¸Ä·ì϶


D-Link DIR-823GÔÊÐíÎÞÐèÑéÖ¤½øÐÐ/HNAP1 SetPasswdSettingsºÅÁÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬸ü¸ÄÖÎÀíÔ±ÃÜÂë¡£


https://xz.aliyun.com/t/2834#toc-5


5. strongSwan GMP²å¼þ»º³åÇøÒç¶Âí½Å


strongSwan GMP²å¼þ´¦ÖûûÐÎÖ¤Êé´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬽øÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë¡£


https://www.strongswan.org/blog/2018/10/01/strongswan-vulnerability-(cve-2018-17540).html




Èý¡¢³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Apollo¹«Ë¾ÔâºÚ¿Í¹¥»÷£¬³¬¹ý2ÒÚÌõÁªÏµÈ˼ͼй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Apollo´Ó¹«¹²ÇþÂ·ÍøÂçÁË´óÁ¿ÐÅÏ¢£¬Ô̺¬ÐÕÃû£¬µç×ÓÓʼþµØÖ·ºÍ¹«Ë¾ÁªÏµÐÅÏ¢£¬Ëü»¹Í¨¹ýץȡTwitterºÍLinkedInÀ´ÍøÂçÊý¾Ý¡£¸Ã¹«Ë¾ÉÏÖÜÒÑÏòÆä¿Í»§´«µÝÁ˸ð²È«ÊÂÎñ£¬¸ÃÊÂÎñ²úÉúÔÚ2018Äê7ÔÂ23ÈÕ¡£ºÃÐÂÎÅÊÇ£¬Ð¹Â¶µÄÊý¾Ý²»Ô̺¬Éç»á°²È«ºÅÂ룬²ÆÕþÊý¾Ý»òµç×ÓÓʼþµØÖ·ºÍÃÜÂ룬Troy HuntÒѽ«Æä¼Í¼ÄÉÈëÆäÊý¾Ýй¶¸ú×Ù·þÎñHaveIBeenPwned¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/76878/data-breach/apollo-data-breach.html


2¡¢Sonatype°ä²¼Èí¼þ¹©¸øÁ´°²È«µÄµÚËİæÄê¶È»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Sonatype°ä²¼Á˵ÚËÄ·ÝÄê¶ÈÈí¼þ¹©¸øÁ´×´Ì¬»ã±¨£¬¸Ã»ã±¨½ÒʾÁËÈ«ÇòÆóÒµ¿í·ºÊ¹ÓÃÒ×Êܹ¥»÷µÄÈí¼þ×é¼þ¡£¹ÌÈ»¿ªÔ´ÒÀÈ»ÊÇ´´ÐµĹؼüÇý¶¯³É·Ö£¬ºÚ¿ÍÔÚÀûÓÃÕâÒ»Ôö³¤Ç÷Ïò£¬ÉõÖÁÆðÍ·½«·ì϶ֱ½Ó×¢È뿪ԴÏîÄ¿¡£µ÷²éÁ˾ÖÏÔʾ£¬ÈõÊÆÈºÌåµÄʹÓÃÔö³¤ÁË120£¥£¬Ê¹µÃ²»×ãÊʵ±ÖÎÀíµÄ×éÖ¯¶Ô¹¥»÷³ÖÊ¢¿ªÌ¬¶È¡£

Ô­ÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2018/09/27/known-vulnerable-open-source-components/


3¡¢×êÑÐÍŶӷ¢ÏÖ½Ù³Ö³¬¹ý10Íò¸ö·ÓÉÆ÷µÄн©Ê¬ÍøÂçGhostDNS


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÍŶӷ¢ÏÖÒ»¸ö±»³ÆÎªGhostDNSµÄ¹¥»÷»î¶¯£¬¸Ã»î¶¯½Ù³ÖÁ˳¬¹ý100,000¸ö¼Òͥ·ÓÉÆ÷£¬²¢Åú¸ÄÁËËûÃǵÄDNSÉèÖ㬲¢ÇÔÈ¡Óû§µÄµÇ¼ʹ´¦£¬ÓëÃûÓþɨµØµÄDNSChanger¶ñÒâÈí¼þÓкܶàÀàËÆÖ®´¦£¬Ëüͨ¹ý¸ü¸ÄÊÜϰȾÉ豸ÉϵÄDNS·þÎñÉèÖÃÀ´¹¤×÷£¬½Ù³ÖÓû§µÄ·ÓÉÆ÷²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/10/ghostdns-botnet-router-hacking.html


4¡¢GwinnettÒ½ÁÆÖÐÐÄÔâÍøÂç¹¥»÷£¬²¿ÃÅ»¼ÕßÊý¾ÝÒÉй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GwinnettÒ½ÁÆÖÐÐÄ£¨GMC£©Î»ÓÚ×ôÖÎÑÇÖݸñÍþÄÚÌØÏØ£¬ÊÇÒ»¼Ò·ÇͶ»úÐÔÒ½ÁƱ£½¡»ú¹¹¡£¸Ã×éÖ¯Õ¼ÓÐ553ÕŲ¡´²£¬¹ÍÓÃÁ˳¬¹ý5,300ÃûÔ±¹¤¡£GwinnettÒ½ÁÆÖÐÐÄ£¨GMC£©ÔÚµ÷²é¸ÃITÊÂÎñ£¬Éæ¼°ÖÁÉÙº±¼û°Ù·Ý»¼Õ߼ͼÒÑÔÚÍøÉÏй¶¡£Áª¹úµ÷²é¾Ö£¨FBI£©ÒÑÌá³öЭÖú; È»¶øÄ¿Ç°Éв»Ã÷ÏԸûú¹¹ÊÇ·ñ´æÔÚ°²È«·ì϶¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/gwinnett-medical-center-investigates-possible-data-breach/


5¡¢µÂ¹úÄÜÔ´¹«Ë¾RWEÔâµ½DDoS¹¥»÷£¬ÍøÕ¾ÁÙʱÎÞ·¨½Ó¼û


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


µÂ¹úÄÜÔ´¹«Ë¾RWE´òËãÀ©´óú̿¿ª²ÉÒµÎñ£¬²¿ÃÅ¿¹ÒéÕßÒ»ÏòÔÚºº°ÍºÕ´ÔÁÖ¶Ӫ£¬Óë´Ëͬʱ£¬RWEµÄÍøÕ¾Ôâµ½DDoS¹¥»÷£¬³ýÁËÔÚ´ÔÁÖÖжӪ±í£¬¿¹ÒéÕß»¹ÔÚYouTubeÉÏ´«²¼ÓйØÐÅÏ¢¡£Anonymous DeutschÉÏÖܰ䲼ÁËÒ»¸ö¶ÌÊÓÆµ£¬ÖÒ¸æRWE£¬µ±¼´ÖÕ³¡¿ª·¢Hambach´ÔÁÖ£¬²»È»½«Ôâµ½ÍøÂç¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-attack-on-german-energy/


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù