ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ3ÖÜ
°ä²¼¹¦·ò 2019-01-21±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ»úƱԤԼϵͳAmadeusÑϳÁ·ì϶£¬Ó°ÏìÈ«Çò141¼Òº½¿Õ¹«Ë¾;ÃÀOklahomaÖݵ±¾Ö·þÎñÆ÷ÒⱩ¶³ö3TBÃô¸ÐÊý¾Ý;Ó¢¹úBSIA°ä²¼»¥Áª°²Õûϵͳ×î¼Ñʵ¼ÊÖ¸ÄÏ;VoIP·þÎñÉÌVOIPOÒâ±íй¶´ÓǰËÄÄêµÄ¿Í»§Êý¾Ý;ESÎļþä¯ÀÀÆ÷Á½¸ö·ì϶ʹµÃ³¬¹ý1ÒÚAndroidÓû§Ãæ¶Ô·çÏÕ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
³ÁÒª°²È«·ì϶Áбí
Brocade Network Advisor´æÔÚÓ²±àÂë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɵǼµ½JBoss Administration½çÃæ²¢×°ÖÃÆäËûJEEÀûÓ÷¨Ê½¡£
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-743
2. systemd-journaldÕ»»º³åÇøÒç¶Âí½Å
systemd-journaldʵÏÖ´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Ê¹systemd-journald±ÀÀ£»òÒÔjournaldȨÏÞÖ´ÐдúÂë¡£
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864
3. SAS Web Infrastructure Platform·´ÐòÁл¯´úÂëÖ´Ðзì϶
SAS Web Infrastructure PlatformµÄ·´ÐòÁл¯·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://support.sas.com/kb/63/391.html
4. IDenticard PremisysÊý¾Ý¿âĬÈÏÆ¾Ö¤·ì϶
IDenticard Premisys Identicard·þÎñÔÚ×°ÖÃʱʹÓÃĬÈϵÄÊý¾Ý¿âÓû§ÃûºÍÃÜÂ룬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Î´ÊÚȨ½Ó¼ûÊý¾Ý¿âȨÏÞ¡£
http://www.securityfocus.com/bid/106552
5. LCDS LAquis SCADAδÊÚȨ½Ó¼û·ì϶
LCDS LAquis SCADAʵÏÖ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÈƹýÉí·ÝÑéÖ¤£¬»ñÈ¡Ãô¸ÐÐÅÏ¢¡£
https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01
³ÁÒª°²È«ÊÂÎñ×ÛÊö
ÒÔÉ«Áа²È«×êÑÐÔ±Noam Rotem·¢ÏÖ»úƱԤԼϵͳAmadeus´æÔÚÒ»¸öÑϳÁµÄ°²È«·ì϶£¬¿Éµ¼ÖÂÓû§ÐÅϢй¶ºÍÕË»§¸ü¸Ä¡£RotemÔÚÒÔÉ«Áк½¿Õ¹«Ë¾ELALÔ¤Ô¼»úƱʱ·¢ÏÖÁËÕâÒ»ÎÊÌ⣬ÔÚÔ¤Ô¼º½°àºó£¬´î¿Í»áÊÕµ½PNRºÅÂëºÍÓÃÓڲ鿴ԤԼÐÅÏ¢µÄÁ´½Ó¡£Rotem·¢ÏÖͨ¹ý½«¸ÃÁ´½ÓÉϵÄRULE_SOURCE_1_ID²ÎÊýÅú¸ÄΪÆäËüÈ˵ÄPNRºÅÂë¼´¿É²é¿´ËûÈ˵ÄÔ¤Ô¼ÐÅÏ¢£¬¹¥»÷Õß»¹¿ÉÀûÓÃÕâЩÐÅÏ¢½Ó¼ûELALÃÅ»§ÍøÕ¾²¢¸ü¸ÄÊܺ¦ÕßµÄÕË»§ÐÅÏ¢£¬Ô̺¬¶Ò»»Àï³Ì¡¢¸ü¸ÄÓʼþµØÖ·ºÍµç»°ºÅÂëµÈ¡£ÓÉÓÚAmadeus¿ª·¢µÄ»úƱԤԼϵͳ±»È«ÇòÖÁÉÙ141¼Òº½¿Õ¹«Ë¾Ê¹Óã¨Ô̺¬ÃÀ¹ú½áºÏº½¿Õ¹«Ë¾¡¢µÂ¹úººÉ¯º½¿Õ¹«Ë¾ºÍ¼ÓÄô󺽿չ«Ë¾µÈ£©£¬Òò¶ø¸Ã·ì϶¿ÉÄÜÓ°ÏìÁËÊýÒÚ´î¿Í¡£Ä¿Ç°AmadeusÒѾ½¨¸´Á˸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/airlines-flight-hacking.html
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/oklahoma-fbi-data-leak.html
3¡¢Ó¢¹úBSIA°ä²¼»¥Áª°²Õûϵͳ×î¼Ñʵ¼ÊÖ¸ÄÏ
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/bsia-guidelines-digital-sabotage/
4¡¢VoIP·þÎñÉÌVOIPOÒâ±íй¶´ÓǰËÄÄêµÄ¿Í»§Êý¾Ý
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/voip-service-database-hacking.html
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/es-file-explorer-flaws-put-100-million-users-data-at-risk-fix-promised/
ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ