ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ6ÖÜ

Ðû²¼Ê±¼ä 2019-03-04

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2019Äê2ÔÂ04ÈÕÖÁ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î39¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇWIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶Îó²î£»NGINX Unit¶ÑÒç³ö¾Ü¾ø·þÎñÎó²î; WibuKey Network server management WkbProgramLow¶ÑÒç³öÎó²î£»Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂëÎó²î£»Forcepoint User ID (FUID) serverí§ÒâÎļþÉÏ´«Îó²î ¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇGoogle PlayÖб£´æ29¿î¶ñÒâÏà»úÓ¦Óã¬×ÜÏÂÔØÁ¿Áè¼Ý400Íò´Î£»ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP±ê×¼±»·£¿î1000ÍòÃÀÔª£»MacOS KeychainÐÂ0day£¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶£»°Ä´óÀûÑÇÁª°îÒé»áµÄÅÌËã»úÍøÂçÔâºÚ¿Í¹¥»÷£»AndroidÌØ¹¤Èí¼þ¿ò¼ÜTriout¾íÍÁÖØÀ´£¬ÏÂÔØÁ¿Áè¼Ý5000Íò´Î ¡£

ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£

Ö÷ÒªÇå¾²Îó²îÁбí


1. WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTLÄÚºËÐÅϢй¶Îó²î
WIBU-SYSTEMS WibuKey.sys  0x8200E804 IOCTL´¦Öóͷ£±£´æÇå¾²Îó²î£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬻ñÈ¡ÄÚºËÄÚ´æÐÅϢй¶ ¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657

2. NGINX Unit¶ÑÒç³ö¾Ü¾ø·þÎñÎó²î
Nginx Unit±£´æ¶ÑÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬾ÙÐоܾø·þÎñ¹¥»÷ ¡£
http://mailman.nginx.org/pipermail/unit/2019-February/000113.html

3. WibuKey Network server management WkbProgramLow¶ÑÒç³öÎó²î
WibuKey Network server management WkbProgramLowº¯Êý±£´æ¶ÑÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄTCP±¨ÎÄ£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë ¡£
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659

4. Cisco Aironet Active SensorĬÈÏÕË»§¾²Ì¬ÃÜÂëÎó²î
Cisco Aironet Active SensorĬÈÏÉèÖñ£´æÄ¬ÈÏÃÜÂëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬Î´ÊÚȨ»á¼û ¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds

5. Forcepoint User ID (FUID) serverí§ÒâÎļþÉÏ´«Îó²î
Forcepoint User ID (FUID) server TCP 5001¶Ë¿Ú±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÉÏ´«ÇëÇó£¬Ö´ÐÐí§Òâ´úÂë ¡£
https://support.forcepoint.com/KBArticle?id=000016550

 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Google PlayÖб£´æ29¿î¶ñÒâÏà»úÓ¦Óã¬×ÜÏÂÔØÁ¿Áè¼Ý400Íò´Î

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

Google PlayÊÐËÁÖÐÌṩµÄÓ¦Óò¢²»ÁÏζ×ÅËüÊÇÕýµ±Ó¦Óà ¡£Ö»¹Ü¹È¸è×ö³öÁËÔÆÔÆ¶àµÄÆð¾¢£¬µ«Ò»Ð©ÐéαºÍ¶ñÒâµÄÓ¦ÓóÌÐòȷʵDZÈëÁËÊý°ÙÍò²»ÖªÇéµÄÓû§ ¡£ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼·¢Ã÷ÖÁÉÙ29¸öÕÕÆ¬Ó¦ÓóÌÐòÒÑÀֳɽøÈë¹È¸èPlayÊÐËÁ£¬²¢ÇÒÔڹȸè´ÓÆäÓ¦ÓóÌÐòÊÐËÁÖÐɾ³ý֮ǰÒѾ­ÏÂÔØÁËÁè¼Ý400Íò´Î ¡£ÓÐÎÊÌâµÄÒÆ¶¯Ó¦ÓóÌÐòαװ³ÉÕÕÆ¬±à¼­ºÍÃÀÈÝÓ¦ÓóÌÐò£¬Éù³ÆÊ¹ÓÃÄúµÄÊÖ»úÏà»úÅÄÉã¸üºÃµÄÕÕÆ¬»òÃÀ»¯ÄúÅÄÉãµÄÕÕÆ¬£¬µ«·¢Ã÷ÆäÖб£´æ¶ñÒâ´úÂë ¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/beauty-camera-android-apps.html

2¡¢ÃÀ¹úÄÜÔ´¹«Ë¾Duke EnergyÒòÎ¥·´CIP±ê×¼±»·£¿î1000ÍòÃÀÔª

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


NERCÉÏÖÜÐû²¼ÁË·£¿î ¡£¸Ã»ú¹¹Ðû²¼ÁËÒ»·Ýͨ¸æ£¬µ«Ã»ÓÐ͸¶ĿµÄ¹«Ë¾µÄÃû³Æ£¬µ«E£¦EÐÂÎźͻª¶û½ÖÈÕ±¨±¨µÀ˵£¬ËüÊÇλÓÚ±±¿¨ÂÞÀ´ÄÉÖݵĶſËÄÜÔ´¹«Ë¾£¬ÊÇÃÀ¹ú×î´óµÄµçÁ¦¹«Ë¾Ö®Ò» ¡£NERCµÄCIP¿É¿¿ÐÔ±ê×¼ÐÎòÁ˱±ÃÀ´óÈÝÁ¿µçÁ¦ÏµÍ³£¨BPS£©ÔËÓªÉ̵ÄÎïÀíºÍÍøÂçÇå¾²ÒªÇó ¡£¸Ã×éÖ¯ÒÑÓëÎ¥¹æÄÜÔ´¹«Ë¾¸æ¿¢Ï¢ÕùЭÒé ¡£³ýÁ˸ù«Ë¾ÒÑÔÞ³ÉÖ§¸¶µÄ1000ÍòÃÀÔª·£¿îÍ⣬¸ÃÏ¢Õù»¹°üÀ¨ïÔÌ­Ò»Á¬Î¥¹æÐÐΪ²¢Ôö½øÎ´À´µÄºÏ¹æÐÔ ¡£NERC·¢Ã÷µÄ127ÆðÎ¥¹æÊÂÎñÖоø´ó´ó¶¼±»¹éÀàΪ¡°Öеȡ±»ò¡°Öеȡ±£¬µ«ÓÐ13Æð±»³ÆÎª¡°ÑÏÖØ¡± ¡£¸Ã»ú¹¹µÄÆÀ¹À³Æ£¬Î¥¹æÐÐΪ¡°ÅäºÏ×é³ÉÁ˶ÔÇå¾²ÐԺͿɿ¿ÐÔµÄÑÏÖØÍþв¡± ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/us-energy-firm-fined-10-million-security-failures

3¡¢MacOS KeychainÐÂ0day£¬¿Éµ¼ÖÂÓû§ÃÜÂëй¶

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


¸ÃÎó²î¿ÉÄÜÔÊÐíÔÚMacOSϵͳÉÏÔËÐеĶñÒâÓ¦ÓóÌÐò»á¼û´æ´¢ÔÚKeychainÃÜÂë¹ÜÀíϵͳÖеÄÃÜÂë ¡£·¢Ã÷¸ÃÎó²îµÄÇå¾²Ñо¿Ö°Ô±¾Ü¾øÓëÆ»¹û¹«Ë¾·ÖÏíÓйظÃÎó²îµÄ¸ü¶àÏêϸÐÅÏ¢£¬Ò»Î»µÂ¹úÇå¾²Ñо¿Ö°Ô±Ðû²¼ÁËÒ»¶ÎÊÓÆµ£¬ÐÎòÁËÓ°ÏìApple MacOSµÄ0dayÎó²î ¡£´ËÎó²î»áÓ°ÏìËùÓеÄMacOS°æ±¾£¬×îеÄ10.14.3 Mojave£¬²¢ÌåÏÖAppleȱÉÙÕë¶ÔMacOSµÄbugÉͽðÍýÏë ¡£

Ô­ÎÄÁ´½Ó£º
https://cyware.com/news/a-new-macos-zero-day-vulnerability-found-in-keychain-password-management-system-3565521d

4¡¢°Ä´óÀûÑÇÁª°îÒé»áµÄÅÌËã»úÍøÂçÔâºÚ¿Í¹¥»÷

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


°Ä´óÀûÑÇÒé»áÖÜÎå͸¶£¬ÆäÅÌËã»úÍøÂçÒÑÔ⵽δ֪µÄ¡°Çå¾²ÊÂÎñ¡±µÄÓ°Ï죬²¢ÌåÏÖÕýÔÚ¾ÙÐÐÊÓ²ì ¡£¡°ÔÚÒé»áÅÌËãÍøÂ籬·¢Çå¾²ÊÂÎñºó£¬ÒѾ­½ÓÄÉÁËһϵÁв½·¥À´±£»¤ÍøÂç¼°ÆäÓû§£¬¡±Òé»áÕþ¸®ÔÚÒ»·ÝÉùÃ÷ÖÐ˵ ¡£¹ÙÔ±¾Ü¾ø¾ÍÍøÂçÇå¾²Îó²îµÄÐÔ×Ó½ÒÏþ̸ÂÛ£¬µ«ÌåÏÖûÓÐÆðÔ´Ö¤¾ÝÅú×¢Êý¾ÝÒѱ»»á¼û ¡£¡°ÎÒÃÇûÓÐÖ¤¾ÝÅú×¢ÕâÊÇÊÔͼӰÏìÒé»áÀú³ÌµÄЧ¹û£¬»òÊÇÆÆËð»òÓ°ÏìÑ¡¾Ù»òÕþÖÎÀú³Ì£¬¡±Ò»·ÝÉùÃ÷˵ ¡£¡°ÎÒÃÇÄ¿½ñµÄÖØµãÊDZ£»¤ÍøÂç²¢±£»¤Êý¾ÝºÍÓû§ ¡£¡±ËùÓÐÒé»áÃÜÂë¶¼±»ÖØÖà ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/australian-parliament-computer-network-breached

5¡¢AndroidÌØ¹¤Èí¼þ¿ò¼ÜTriout¾íÍÁÖØÀ´£¬ÏÂÔØÁ¿Áè¼Ý5000Íò´Î

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


2018Äê8Ô£¬BitdefenderÑо¿Ö°Ô±ÎÞÒâ·¢Ã÷ÁËÒ»¸öÃûΪTrioutµÄAndroid¶ñÒâÈí¼þ¿ò¼Ü£¬¸Ã¿ò¼Ü°üÀ¨ÁË´ó×ÚµÄ¼à¿Ø¹¦Ð§ ¡£À¦°óÁË´Ó¹Ù·½Google PlayÊг¡ÖÐɾ³ýµÄÕýµ±Ó¦ÓóÌÐò£¬Ìع¤Èí¼þ¿ò¼Ü¿ÉÒÔÒþ²ØÔÚ×°±¸ÉÏ£¬²¢¼Í¼µç»°£¬¼Í¼´«ÈëµÄÎı¾ÐÂÎÅ£¬Â¼ÖÆÊÓÆµ£¬ÕÕÏ࣬ÉõÖÁÍøÂçGPS×ø±ê ¡£ËùÓÐÕâЩÐÅÏ¢¶¼±»·¢Ë͵½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ ¡£Ö®Ç°°æ±¾µÄÌØ¹¤Èí¼þ¿ò¼ÜÀ¦°óÔÚÒ»¸öÏÔʾ³ÉÈËÄÚÈݵÄÓ¦ÓóÌÐòÖУ¬µ«BitdefenderÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеı»Ñ¬È¾µÄÓ¦ÓóÌÐò£¬ÓÃÓÚÈö²¥´ËÀà³ÌÐò ¡£

Ô­ÎÄÁ´½Ó£º
https://labs.bitdefender.com/2019/02/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads/

ÉùÃ÷£º±¾×ÊѶÓÉÒ«ÊÀÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí