ÐÅÏ¢°²È«Öܱ¨-2018ÄêµÚ48ÖÜ

°ä²¼¹¦·ò 2018-12-03
 ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼°²È«·ì϶57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç¶Âí½Å £»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý·ì϶ £»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌºÅÁîÖ´Ðзì϶ £»Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä·ì϶ £»FreeBSD CVE-2018-17156»º³åÇøÒç¶Âí½Å¡£



±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§ £»UberÒò2016ÄêÊý¾Ýй¶±»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª £»Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶ £»ElasticSearch·þÎñÆ÷¶³ö³¬¹ý5700ÍòÃÀ¹ú¹«ÃñµÄÓ×ÎÒÊý¾Ý £»»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬ÖØÒªÕë¶ÔÄÜÔ´ÐÐÒµ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


³ÁÒª°²È«·ì϶Áбí


1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç¶Âí½Å

VMWare WorkstationºÍFusion´æÔÚÕûÊýÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983


2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý·ì϶
Apache Hadoop´æÔÚ°²È«·ì϶£¬ÔÊÐí¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔrootȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E


3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌºÅÁîÖ´Ðзì϶
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»ÕýÈ·´¦ÖÃÓû§ÊäÈë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâSHELLºÅÁî¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE


4. Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä·ì϶
Schneider Electric Modicon M340 WEB·þÎñÆ÷´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽӼû¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/


5. FreeBSD CVE-2018-17156»º³åÇøÒç¶Âí½Å
FreeBSDÔÚICMPʵÏÖÖдæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc


 ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍòºÀ¹ú¼Ê¾Æµê¼¯ÍÅ(Marriott International)½ñÈÕ°ä·¢£¬ÆìÏÂϲ´ïÎݾƵê(Starwood Hotel)µÄÒ»¸ö¹Ë¿ÍÔ¤Ô¼Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬¿ÉÄÜÓÐÔ¼5Òڹ˿͵ÄÐÅϢй¶¡£¸ÃÐÂÎŰ䲼ºó£¬ÍòºÀ¹ú¼Ê¾Æµê¹É¼ÛÔÚ½ñÈÕÅÌǰÂòÂôÖÐÒ»¶È×ÅÂäÓâ5%¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ£¬µ÷²éÁ˾ÖÏÔʾ£¬ÓÐһδÊÚȨ·½¸´Ôì²¢¼ÓÃÜÁËÕâЩÊý¾Ý¡£²¢ÇÒ£¬×Ô2014Äê¾ÍÆðÍ·Á˶Ôϲ´ïÎݾƵêÍøÂç½øÐÐδÊÚȨ½Ó¼û¡£Ä¿Ç°£¬ÍòºÀ¹ú¼Ê¾ÆµêÒѲÉÈ¡Á˲¹¾È´ëÊ©£¬µ«²¢Î´°ä²¼½øÒ»²½µÄÐÅÏ¢¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ£¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢Ô̺¬¹Ë¿ÍµÄÐÕÃû¡¢Í¨Ñ¶µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩÓ×ÎÒÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html


2¡¢UberÒò2016ÄêÊý¾Ýй¶±»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý± £»¤»ú¹¹Autoriteit Persoonsgegevens±ðÀëÒò2016Äê10ÔµÄÊý¾Ýй¶ÊÂÎñ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ·£¿î¡£ICO°µÊ¾¸ÃÊÂÎñÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì¡£·£¿îµÄÖØÒªÔ­ÒòÊÇUberÑÓ³¤Á˽üÒ»Äê²Å»ã±¨Õâ´Îй¶ÊÂÎñ£¬ÕâÑϳÁÎ¥·´ÁËÓйØË¾·¨ÌõÀý£¬²¢ÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæ¶Ô¸ü¸ßµÄڲƭ·çÏÕ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/


3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇͶ»úÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶¡£¸Ã¹¥»÷ÊÂÎñ²úÉúÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕÆÚ¼ä£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢¼Òͥסַ¡¢µ®ÉúÈÕÆÚ¡¢±£ÏÕÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼͼ±àºÅºÍÕË»§Óà¶îµÈ¡£´Ë±í£¬»¹Óн«½ü70Íò¸öÉç±£ºÅÂëй¶£¬µ«Ã»ÓвÆÕþÐÅϢй¶¡£¸Ã×éÖ¯Òѽ«ÓйØÊÂÎñ֪ͨFBI£¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓþ¼à¿Ø·þÎñ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/


4¡¢ElasticSearch·þÎñÆ÷¶³ö³¬¹ý5700ÍòÃÀ¹ú¹«ÃñµÄÓ×ÎÒÊý¾Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«³§ÉÌHackenµÄ×êÑÐÈËÔ±Bob Diachenkoͨ¹ýShodan·¢ÏÖÁËÒ»¸ö¿É¹«¿ª½Ó¼ûµÄElasticSearch·þÎñÆ÷£¬ÆäÊý¾Ý¿â¶³öÁ˳¬¹ý5700ÍòÃÀ¹ú¹«ÃñµÄÓ×ÎÒÊý¾Ý¡£ÕâЩÊý¾ÝÔ̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØÖ·µÈÐÅÏ¢¡£×êÑÐÈËÔ±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕߣ¬µ«ËûÒÔΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®ÓйØ¡£Ä¿Ç°¸Ã·þÎñÆ÷Òѱ»½øÐа²È«¼Ó¹Ì¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/


5¡¢»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬ÖØÒªÕë¶ÔÄÜÔ´ÐÐÒµ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«³§ÉÌForcepoint·¢ÏÖÒ»¸öÀûÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤Òµ¼äµý»î¶¯£¬¸Ã»î¶¯×Ô2014ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬Æä2018Äê»î¶¯µÄнüÊܺ¦ÕßÖØÒªÎ»ÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£Forcepoint°µÊ¾¸Ã»î¶¯±³ºóµÄÍŶӿÉÄܼ«¶È¸´ÔÓ£¬¹¥»÷Õ߳ɹ¦µØ¹¥»÷ÁËλÓÚ·ÖÆç¹ú¶È/µØÓòµÄ¶à¸ö¹«Ë¾£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷»î¶¯ÖØÒªÕë¶ÔÄÜÔ´Òµ£¬ÁíÒ»¸ö¹¥»÷»î¶¯×¨Ò»ÓÚÆû³µÔì×÷Òµ¡£¹¥»÷ÕßÖØÒªÊ¹ÓÃÔ̺¬¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æÊ½´¹µöÓʼþÖ´Ðй¥»÷£¬ÕâЩAutoCADÎļþÖÐÔ̺¬°µ²ØµÄ.fasÄ£¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬ÓÃÓÚÏνÓÔ¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù