ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ48ÖÜ
°ä²¼¹¦·ò 2019-12-09>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê12ÔÂ02ÈÕÖÁ08ÈÕ¹²ÊÕ¼°²È«·ì϶48¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Kubernetes API³Á¶¨Ïò·ì϶; D-Link DAP-1860ºÅÁî×¢Èë´úÂëÖ´Ðзì϶£»OpenBSDÑéÖ¤ÈÆ¹ý·ì϶£»Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´Ðзì϶£»Mozilla Firefox ESR worker destructionÄÚ´æÃýÎóÒýÓ÷ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÅ·ÖÞÍøÂ簲ȫ¾Ö°ä²¼º£Ê²¿ÃÅÍøÂ簲ȫָÄÏ£»Android·ì϶StrandHogg¿É¼Ù×°³ÉËÁÒâÀûÓã»GoAhead Web·þÎñÆ÷RCE·ì϶ӰÏì´óÁ¿IoTÉ豸£»Autodesk¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶£»PCI SSC°ä²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾Ý°²È«³ß¶È¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
>³ÁÒª°²È«·ì϶Áбí
1. Google Kubernetes API³Á¶¨Ïò·ì϶
Google Kubernetes API serverûÓÐÕýÈ·ÑéÖ¤URLµÄ³Á¶¨Ïò£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬽«API·þÎñÆ÷ÒªÇó³Á¶¨Ïòµ½ËÁÒâÖ÷»ú¡£
https://github.com/kubernetes/kubernetes/issues/85867
2. D-Link DAP-1860ºÅÁî×¢Èë´úÂëÖ´Ðзì϶
D-Link DAP-1860 HNAP_TIMEºÍSOAPAction´æÔÚºÅÁî×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/
3. OpenBSDÑéÖ¤ÈÆ¹ý·ì϶
OpenBSDÑé֤ϵͳ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇóÓû§Ãû£¬Èç"-option"»ò"-schallenge"£¬Èƹý°²È«ÏÞ¶È£¬Î´ÊÚȨ½Ó¼ûϵͳ¡£
https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html
4. Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´Ðзì϶
Apache Olingo AbstractService ObjectInputStream´æÔÚ·´ÐòÁл¯·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E
5. Mozilla Firefox ESR worker destructionÄÚ´æÃýÎóÒýÓ÷ì϶
Mozilla Firefox ESR worker destruction´æÔÚÄÚ´æÃýÎóÒýÓÃÁ½´Î¿ªÊÍ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4555/
>³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢Å·ÖÞÍøÂ簲ȫ¾Ö°ä²¼º£Ê²¿ÃÅÍøÂ簲ȫָÄÏ
Å·ÖÞÍøÂ簲ȫ¾Ö£¨ENISA£©ÒÔ¡¶¸Û¿ÚÍøÂ簲ȫ-º£Ê²¿ÃÅÍøÂ簲ȫʵ¼Ê¡·ÎªÌâ°ä²¼Á˺£Ê²¿ÃÅÍøÂ簲ȫָÄÏ£¬Îª¸Û¿ÚÉú̬ϵͳÓÈÆäÊǸۿڵ±¾ÖºÍ´¬²ºÔËÓªÉÌÖеÄCIOºÍCISOÔì¶©ÍøÂ簲ȫսÊõÌṩÁìµ¼ºÍÔ®ÊÖ¡£¸ÃÖ¸ÄÏÁгöÁ˸ۿÚÉúÌ¬ÏµÍ³Ãæ¶ÔµÄÖØÒªÍþв£¬²¢ÃèÊöÁË¿ÉÄܶԸۿÚÉú̬ϵͳÔì³ÉÓ°ÏìµÄ¹Ø¼üÍøÂç¹¥»÷³¡¾°¡£¸ÃÖ¸ÄÏΪÖն˱£»¤ºÍÐÔÃüÖÜÆÚÖÎÀí¡¢·ì϶ÖÎÀí¡¢ÈËÁ¦×ÊÔ´°²È«¡¢¹©¸øÁ´ÖÎÀíµÈÉè¼ÆÁ˰²È«´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/
2¡¢Android·ì϶StrandHogg¿É¼Ù×°³ÉËÁÒâÀûÓÃ
Promon°²È«×êÑÐÈËÔ±·¢ÏÖÒ»¸öеÄAndroid·ì϶StrandHogg£¬¸Ã·ì϶ÔÊÐí¶ñÒâÀûÓüÙ×°³ÉËÁÒâºÏ·¨ÀûÓ᣸÷ì϶ÀûÓÃÁËAndroidµÄ¶à¹¤×÷´¦ÖÃÖ°ÄÜ£¬µ±Óû§µã»÷Ò»¸öÕý³£ÀûÓõÄͼ±êʱ£¬¶ñÒâÀûÓÃÄܹ»ÀûÓø÷ì϶À¹½ØÖ¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐéαµÄ½çÃæ£¬´Ó¶øÓÕµ¼Óû§ÊÚÓè¸÷ÀàȨÏÞ¡£×êÑÐÈËÔ±ÒѾ·¢ÏÖÁË36¸öÔÚ»ý¼«ÀûÓô˷ì϶µÄ¶ñÒâÀûÓã¬Ô̺¬ÒøÐÐľÂíBankBot¡£×êÑÐÈËÔ±³Æ¸Ã·ì϶µÄÓ°ÏìÁìÓò¼«¶È´ó£¬ÓÉÓÚĬÈÏÇé¿öÏ´óÎÞÊýÀûÓö¼Ò×Êܹ¥»÷£¬²¢ÇÒĿǰûÓп¿µÃסµÄ²½ÖèÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¹È¸èÉÐδÔÚÖ°ºÎ°æ±¾µÄAndroidÉϽ¨¸´´ËÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/
3¡¢GoAhead Web·þÎñÆ÷RCE·ì϶ӰÏì´óÁ¿IoTÉ豸
˼¿ÆTalosµÄ°²È«×¨¼ÒÔÚGoAheadǶÈëʽWeb·þÎñÆ÷Öз¢ÏÖÁËÁ½¸ö·ì϶£¬ÆäÖÐÔ̺¬Ò»¸ö¹Ø¼üµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5096£©¡£¸Ã·ì϶ÓëGoAhead´¦ÖÃmulti-part/form-dataÒªÇóµÄ·½Ê½Óйأ¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓø÷ì϶´¥·¢use-after-free£¬²¢Í¨¹ý·¢ËͶñÒâHTTPÒªÇóÔÚ·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£µÚ¶þ¸ö·ì϶£¨CVE-2019-5097£©´æÔÚÓÚͳһ×é¼þÖУ¬¿Éµ¼Ö»ؾø·þÎñ¹¥»÷¡£ÊÜÓ°ÏìµÄ°æ±¾Ô̺¬v5.0.1¡¢v.4.1.1ºÍv3.6.5¡£Æ¾¾ÝShodanµÄËÑË÷Á˾֣¬Â¶³öÔÚ¹«ÍøÉϵÄGoAhead·þÎñÆ÷ÊýÁ¿Òѳ¬¹ý130Íò¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
4¡¢Autodesk¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶
SafeBreach Labs×êÑÐÈËÔ±Åû¶Autodesk¡¢Ç÷Ïò¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLL½Ù³Ö·ì϶¡£Ç÷Ïò¿Æ¼¼°²È«Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬¸Ã·ì϶´æÔÚÓÚcoreServiceShell.exe×é¼þÖС£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû½øÐÐÑéÖ¤£¬Òò¶ø¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐËÁÒâDLL£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃÓÆ¾ÃÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÀûÓÃÒ²±ðÀëÊܵ½ÀàËÆµÄ·ì϶CVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/
5¡¢PCI SSC°ä²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾Ý°²È«³ß¶È
PCI°²È«³ß¶ÈίԱ»á£¨PCI SSC£©°ä²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾Ý°²È«³ß¶È¡£¸Ã³ß¶ÈÔÊÐí´øÓÐNFCµÄCOTSÒÆ¶¯É豸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£PCI CPoC³ß¶ÈÊǸÃίԱ»áΪ½â¾öÒÆ¶¯·Ç½Ó´¥Ê½Ö§¸¶°ä²¼µÄµÚ¶þ¸ö³ß¶È¡£¾ßÌåÀ´Ëµ£¬PCI CPoC³ß¶È»®¶¨Á˹©¸øÉÌÔÚ±£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¹æ»®·½ÃæµÄһЩ°²È«ÉϵÄÒªÇ󡣳߶ȵÄCPoC½â¾ö¹æ»®Ô̺¬ÓµÓÐǶÈëʽNFC½Ó¿ÚµÄCOTSÉ豸¡¢¾ÑéÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°¶ÀÁ¢ÓÚCOTSÉ豸µÄºó¶Ëϵͳ¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1


¾©¹«Íø°²±¸11010802024551ºÅ