ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ6ÖÜ

°ä²¼¹¦·ò 2019-03-04

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê2ÔÂ04ÈÕÖÁ10ÈÕ¹²ÊÕ¼°²È«·ì϶39¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇWIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶·ì϶ £»NGINX Unit¶ÑÒç³ö»Ø¾ø·þÎñ·ì϶; WibuKey Network server management WkbProgramLow¶ÑÒç¶Âí½Å £»Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂë·ì϶ £»Forcepoint User ID (FUID) serverËÁÒâÎļþÉÏ´«·ì϶¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇGoogle PlayÖдæÔÚ29¿î¶ñÒâÏà»úÀûÓã¬×ÜÏÂÔØÁ¿³¬¹ý400Íò´Î £»ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP³ß¶È±»·£¿î1000ÍòÃÀÔª £»MacOS KeychainÐÂ0day£¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶ £»°Ä´óÀûÑÇÁª¹úÒé»áµÄÍÆËã»úÍøÂçÔâºÚ¿Í¹¥»÷ £»Android¼äµýÈí¼þ¿ò¼ÜTriout¾íÍÁ³ÁÀ´£¬ÏÂÔØÁ¿³¬¹ý5000Íò´Î¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£

³ÁÒª°²È«·ì϶Áбí


1. WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶·ì϶
WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTL´¦ÖôæÔÚ°²È«·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬻ñÈ¡ÄÚºËÄÚ´æÐÅϢй¶¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657

2. NGINX Unit¶ÑÒç³ö»Ø¾ø·þÎñ·ì϶
Nginx Unit´æÔÚ¶ÑÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬽øÐлؾø·þÎñ¹¥»÷¡£
http://mailman.nginx.org/pipermail/unit/2019-February/000113.html

3. WibuKey Network server management WkbProgramLow¶ÑÒç¶Âí½Å
WibuKey Network server management WkbProgramLowº¯Êý´æÔÚ¶ÑÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄTCP±¨ÎÄ£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐËÁÒâ´úÂë¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659

4. Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂë·ì϶
Cisco Aironet Active SensorĬÈÏÅäÖôæÔÚĬÈÏÃÜÂë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Î´ÊÚȨ½Ó¼û¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds

5. Forcepoint User ID (FUID) serverËÁÒâÎļþÉÏ´«·ì϶
Forcepoint User ID (FUID) server TCP 5001¶Ë¿Ú´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÉÏ´«ÒªÇó£¬Ö´ÐÐËÁÒâ´úÂë¡£
https://support.forcepoint.com/KBArticle?id=000016550

 ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Google PlayÖдæÔÚ29¿î¶ñÒâÏà»úÀûÓã¬×ÜÏÂÔØÁ¿³¬¹ý400Íò´Î

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Google PlayÉ̵êÖÐÌṩµÄÀûÓò¢²»ÁÏζ×ÅËüÊǺϷ¨ÀûÓá£Ö»¹Ü¹È¸è×ö³öÁËÈç´Ë¶àµÄÖÂÁ¦£¬µ«Ò»Ð©ÐéαºÍ¶ñÒâµÄÀûÓ÷¨Ê½µÄȷDZÈëÁËÊý°ÙÍò²»ÖªÇéµÄÓû§¡£ÍøÂ簲ȫ¹«Ë¾Ç÷Ïò¿Æ¼¼·¢ÏÖÖÁÉÙ29¸öÕÕÆ¬ÀûÓ÷¨Ê½Òѳɹ¦½øÈë¹È¸èPlayÉ̵꣬²¢ÇÒÔڹȸè´ÓÆäÀûÓ÷¨Ê½É̵êÖÐɾ³ý֮ǰÒѾ­ÏÂÔØÁ˳¬¹ý400Íò´Î¡£ÓÐÎÊÌâµÄÒÆ¶¯ÀûÓ÷¨Ê½¼Ù×°³ÉÕÕÆ¬±à×ëºÍÃÀÈÝÀûÓ÷¨Ê½£¬Ðû³ÆÊ¹ÓÃÄúµÄÊÖ»úÏà»úÅÄÉã¸üºÃµÄÕÕÆ¬»òÃÀ»¯ÄúÅÄÉãµÄÕÕÆ¬£¬µ«·¢ÏÔìäÖдæÔÚ¶ñÒâ´úÂë¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/beauty-camera-android-apps.html

2¡¢ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP³ß¶È±»·£¿î1000ÍòÃÀÔª

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


NERCÉÏÖܰ䷢ÁË·£¿î¡£¸Ã»ú¹¹°ä²¼ÁËÒ»·Ý²¼¸æ£¬µ«Ã»ÓÐй©ָ±ê¹«Ë¾µÄÃû³Æ£¬µ«E£¦EÐÂÎźͻª¶û½ÖÈÕ±¨±¨Â·Ëµ£¬ËüÊÇλÓÚ±±¿¨ÂÞÀ´ÄÉÖݵĶſËÄÜÔ´¹«Ë¾£¬ÊÇÃÀ¹ú×î´óµÄµçÁ¦¹«Ë¾Ö®Ò»¡£NERCµÄCIP¿¿µÃסÐԳ߶ÈÃèÊöÁ˱±ÃÀ´óÈÝÁ¿µçÁ¦ÏµÍ³£¨BPS£©ÔËÓªÉ̵ÄÎïÀíºÍÍøÂ簲ȫҪÇ󡣸Ã×éÖ¯ÒÑÓëÎ¥¹æÄÜÔ´¹«Ë¾´ï³ÉºÍ½âºÍ̸¡£³ýÁ˸ù«Ë¾ÒÑÔÞ³ÉÖ§¸¶µÄ1000ÍòÃÀÔª·£¿î±í£¬¸ÃºÍ½â»¹Ô̺¬Ï÷¼õ³ÖÐøÎ¥¹æÐÐΪ²¢Íƽø½«À´µÄºÏ¹æÐÔ¡£NERC·¢ÏÖµÄ127ÆðÎ¥¹æÊÂÎñÖоø´óÎÞÊý±»¹éÀàΪ¡°Öеȡ±»ò¡°Öеȡ±£¬µ«ÓÐ13Æð±»³ÆÎª¡°ÑϳÁ¡±¡£¸Ã»ú¹¹µÄÆÀ¹À³Æ£¬Î¥¹æÐÐΪ¡°¹²Í¬×é³ÉÁ˶԰²È«ÐԺͿ¿µÃסÐÔµÄÑϳÁÍþв¡±¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/us-energy-firm-fined-10-million-security-failures

3¡¢MacOS KeychainÐÂ0day£¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¸Ã·ì϶¿ÉÄÜÔÊÐíÔÚMacOSϵͳÉÏÔËÐеĶñÒâÀûÓ÷¨Ê½½Ó¼û´æ´¢ÔÚKeychainÃÜÂëÖÎÀíϵͳÖеÄÃÜÂë¡£·¢Ïָ÷ì϶µÄ°²È«×êÑÐÈËÔ±»Ø¾øÓëÆ»¹û¹«Ë¾·ÖÏíÓйظ÷ì϶µÄ¸ü¶à¾ßÌåÐÅÏ¢£¬Ò»Î»µÂ¹ú°²È«×êÑÐÈËÔ±°ä²¼ÁËÒ»¶ÎÊÓÆµ£¬ÃèÊöÁËÓ°ÏìApple MacOSµÄ0day·ì϶¡£´Ë·ì϶»áÓ°ÏìËùÓеÄMacOS°æ±¾£¬×îеÄ10.14.3 Mojave£¬²¢°µÊ¾Apple¶ÌȱÕë¶ÔMacOSµÄbugÉͽð´òËã¡£

Ô­ÎÄÁ´½Ó£º
https://cyware.com/news/a-new-macos-zero-day-vulnerability-found-in-keychain-password-management-system-3565521d

4¡¢°Ä´óÀûÑÇÁª¹úÒé»áµÄÍÆËã»úÍøÂçÔâºÚ¿Í¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°Ä´óÀûÑÇÒé»áÖÜÎåй©£¬ÆäÍÆËã»úÍøÂçÒÑÔ⵽δ֪µÄ¡°°²È«ÊÂÎñ¡±µÄÓ°Ï죬²¢°µÊ¾ÔÚ½øÐе÷²é¡£¡°ÔÚÒé»áÍÆËãÍøÂç²úÉú°²È«ÊÂÎñºó£¬ÒѾ­²ÉÈ¡ÁËһϵÁдëÊ©À´± £»¤ÍøÂç¼°ÆäÓû§£¬¡±Òé»áµ±¾ÖÔÚÒ»·ÝÉêÃ÷ÖÐ˵¡£¹ÙÔ±»Ø¾ø¾ÍÍøÂ簲ȫ·ì϶µÄÐÔÖʰ䷢ÆÀÂÛ£¬µ«°µÊ¾Ã»Óгõ²½Ö¤¾ÝÅú×¢Êý¾ÝÒѱ»½Ó¼û¡£¡°ÎÒÃÇûÓÐÖ¤¾ÝÅú×¢ÕâÊÇÊÔͼӰÏìÒé»á¹ý³ÌµÄÁ˾Ö£¬»òÊÇ·ÛËé»òÓ°ÏìÑ¡¾Ù»òÕþÖιý³Ì£¬¡±Ò»·ÝÉêÃ÷˵¡£¡°ÎÒÃǵ±Ç°µÄ³ÁµãÊDZ £»¤ÍøÂç²¢± £»¤Êý¾ÝºÍÓû§¡£¡±ËùÓÐÒé»áÃÜÂë¶¼±»³ÁÖá£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/australian-parliament-computer-network-breached

5¡¢Android¼äµýÈí¼þ¿ò¼ÜTriout¾íÍÁ³ÁÀ´£¬ÏÂÔØÁ¿³¬¹ý5000Íò´Î

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


2018Äê8Ô£¬Bitdefender×êÑÐÈËÔ±ÎÞÒâ·¢ÏÖÁËÒ»¸öÃûΪTrioutµÄAndroid¶ñÒâÈí¼þ¿ò¼Ü£¬¸Ã¿ò¼ÜÔ̺¬ÁË´óÁ¿µÄ¼à¿ØÖ°ÄÜ¡£°ó¸¿ÁË´Ó¹Ù·½Google PlayÊг¡ÖÐɾ³ýµÄºÏ·¨ÀûÓ÷¨Ê½£¬¼äµýÈí¼þ¿ò¼ÜÄܹ»°µ²ØÔÚÉ豸ÉÏ£¬²¢¼Í¼µç»°£¬¼Í¼´«ÈëµÄÎı¾ÐÂÎÅ£¬Â¼ÔìÊÓÆµ£¬ÅÄÕÕ£¬ÉõÖÁÍøÂçGPS×ø±ê¡£ËùÓÐÕâЩÐÅÏ¢¶¼±»·¢Ë͵½¹¥»÷ÕߵĺÅÁîºÍ½ÚÔì·þÎñÆ÷¡£Ö®Ç°°æ±¾µÄ¼äµýÈí¼þ¿ò¼Ü°ó¸¿ÔÚÒ»¸öÏÔʾ³ÉÈËÄÚÈݵÄÀûÓ÷¨Ê½ÖУ¬µ«Bitdefender×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öеı»Ï°È¾µÄÀûÓ÷¨Ê½£¬ÓÃÓÚ´«²¼´ËÀ෨ʽ¡£

Ô­ÎÄÁ´½Ó£º
https://labs.bitdefender.com/2019/02/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads/

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù