¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181018

Ðû²¼Ê±¼ä 2018-10-22

1£¬Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAPT×éÖ¯GreyEnergy£¬¸ÃAPT×éÖ¯±»ÒÔΪÊÇBlackEnergyµÄ¼ÌÐøÕß¡£ÔÚÒÑÍùÈýÄêÄÚ£¬GreyEnergyÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼µÄÄÜÔ´¹«Ë¾µÈ¸ß¼ÛֵĿµÄ¡£GreyEnergyµÄ¶ñÒâÈí¼þ¿ò¼ÜÓëBlackEnergy¾ßÓÐÐí¶àÏàËÆÖ®´¦¡£Ñо¿Ö°Ô±²¢Ã»ÓÐÊӲ쵽רÃÅÕë¶ÔICSµÄ¶ñÒâÈí¼þÄ£¿é£¬µ«GreyEnergyµÄ¹¥»÷Õ½ÂÔÒ»Ö±ÊÇÕë¶ÔÒªº¦»ù´¡ÉèÊ©ÖеÄSCADAÊÂÇéÕ¾ºÍ·þÎñÆ÷µÈ¡£


 Ô­ÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/

2£¬OracleÐû²¼µÚÈý¼¾¶ÈÖ÷Òª²¹¶¡¸üУ¬¹²ÐÞ¸´301¸öÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

OracleÇå¾²ÍŶÓÐû²¼2018ÄêµÚÈý¼¾¶ÈµÄÖ÷Òª²¹¶¡¸üУ¨CPU£©£¬¹²ÐÞ¸´301¸öÎó²î¡£ÆäÖÐ48¸öÎó²îµÄCVSSÆÀ·ÖΪ9.8·Ö£¬ÉÐÓÐÒ»¸öÎó²îµÄÆÀ·ÖΪÂú·Ö10·Ö¡£Õâ¸öÎó²îÊÇOracle GoldenGateµÄMonitoring Manager×é¼þÖеÄÕ»»º³åÇøÒç³öÎó²î£¨CVE-2018-2913£©£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý¶ñÒâGGSCIÖ¸Áî´¥·¢¸ÃÎó²î¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¸ÃCPUÒ²ÊÇOracle2018ÄêµÄ×îºóÒ»¸öCPU¡£


 Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/oracle-patches-301-vulnerabilities-including-46-with-a-9-8-severity-rating/

3£¬LibsshÐû²¼Çå¾²¸üУ¬ÐÞ¸´Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-10933£©


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


LibsshÐÞ¸´·þÎñÆ÷¶ËÉí·ÝÈÏÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-10993£©¡£¸ÃÎó²î±£´æÓÚlibssh 0.6¼°ÒÔÉϵİ汾ÖУ¬ÔÚÏòlibssh·þÎñÆ÷¶ËÈÏÖ¤µÄÁ÷³ÌÖУ¬¹¥»÷Õß¿Éͨ¹ý½«SSH2_MSG_USERAUTH_REQUESTÐÂÎÅÌæ»»ÎªSSH2_MSG_USERAUTH_SUCCESSÐÂÎÅ£¬ÔÚûÓÐÓÐÓÃÆ¾Ö¤µÄÇéÐÎÏÂÈÏÖ¤Àֳɲ¢½ÓÊÜ·þÎñÆ÷¡£libsshÔÚ°æ±¾0.8.4ºÍ0.7.6ÖÐÐÞ¸´Á˸ÃÎó²î¡£

 

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/10/libssh-ssh-protocol-library.html

4£¬VMwareÐû²¼Çå¾²¸üУ¬ÐÞ¸´í§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2018-6974£©

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

VMwareÐû²¼Çå¾²¸üУ¬ÐÞ¸´ÆäSVGAÐéÄâÏÔ¿¨ÖеÄÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î¡£¸ÃÎó²î£¨CVE-2018-6974£©Ó°ÏìÁËVMware ESXi¡¢FusionºÍWorkstation²úÆ·¡£ZDIÔÚ6ÔÂÖÐÑ®ÏòVMware±¨¸æÁ˸ÃÎó²î¡£Æ¾Ö¤ZDIµÄ˵·¨£¬¸ÃÎó²îÊÇÒ»¸ö¶Ñ»º³åÇøÒç³öÎó²î£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÍŽáÆäËüÎó²îÔÚÖ÷»úϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£


 Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77176/security/vmware-code-execution-flaws-2.html

5£¬Ë¼¿ÆTalosÅû¶Linksys EϵÁзÓÉÆ÷ÖеĶà¸öÇå¾²Îó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

˼¿ÆTalosÍŶӷ¢Ã÷Linksys EϵÁзÓÉÆ÷Öб£´æ¶à¸ö¿ÉʹÓõÄOSÏÂÁî×¢ÈëÎó²î¡£EϵÁзÓÉÆ÷Ö÷ÒªÊÊÓÃÓÚ¼ÒÍ¥»òСÐͰ칫ÊÒ£¬ÓÃÓÚÅþÁ¬µçÄÔ¡¢µçÊÓ¡¢ÊÖ»úºÍÓÎÏ·»úµÈ×°±¸¡£¹¥»÷Õß¿Éͨ¹ýHTTPÇëÇóʹÓÃÕâЩÎó²î£¨CVE-2018-3953¡¢CVE-2018-3954ºÍCVE-2018-3955£©²¢Ö´ÐÐí§Òâ´úÂë¡£½¨ÒéÓû§½«¸Ã·ÓÉÆ÷µÄ¹Ì¼þ¸üÐÂÖÁ×îа汾¡£


 Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-linksys-eseries.html

6£¬Ë¼¿ÆÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ15¸öÇå¾²Îó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

˼¿ÆÐÞ¸´¶à¿î²úÆ·ÖеÄ15¸öÇå¾²Îó²î£¬ÆäÖÐ5¸öÎó²î£¨CVE-2018-0443¡¢CVE-2018-0456¡¢CVE-2018-0378¡¢CVE-2018-0395ºÍCVE-2018-0441£©¿Éµ¼Ö¾ܾø·þÎñ£¬2¸öÎó²î£¨CVE-2018-0417ºÍCVE-2018-0443£©¿Éµ¼ÖÂÌáȨºÍÐÅϢй¶£¬ÆäËüÎó²î»¹°üÀ¨Ä¿Â¼±éÀú¡¢XSSºÍCSRFµÈ¡£Ë¼¿ÆµÄ²úÆ·Çå¾²ÊÂÎñÏìӦС×飨PSIRT£©³ÆÃ»Óз¢Ã÷ÕâЩÎó²î±»Ò°ÍâʹÓõļ£Ïó¡£

 

Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/cisco-patches-remotely-exploitable-high-risk-security-bugs-in-multiple-products-523295.shtml


ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí