Docker Image rootÕË»§¿ÕÃÜÂ룻ÈýÐÇSmartThingsÔ´Âëй¶£»Turla APT
Ðû²¼Ê±¼ä 2019-05-10
1¡¢Alpine LinuxµÄDocker Image±£´ærootÕË»§¿ÕÃÜÂëÎó²î

Alpine LinuxµÄ¹Ù·½Docker¾µÏñ±£´ærootÕË»§¿ÕÃÜÂëÎó²î£¨CVE-2019-5021£©¡£¸ÃÎó²îÒѾ±£´æÁËÁè¼Ý3ÄêµÄʱ¼ä£¬ÆäCVSSÆÀ·ÖΪ9.8·Ö¡£¸ÃÎó²î×î³õÓÚ2015Äê·¢Ã÷²¢±»ÐÞ¸´£¬µ«2015Äê12Ô·ݵĸü¸Äµ¼ÖÂÎó²îÔٴηºÆð£¬²¢ÇÒÒ»Ö±±£´æ¡£ÏêϸÀ´Ëµ£¬Óû§ÕË»§µÄÉèÖÃÖÎÀíÎļþ/etc/shadowÖаüÀ¨¿ÕȱµÄsp_pwdp×ֶΣ¬¶ø²»ÊǼÓÃܵÄÃÜÂë¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨Alpine Docker 3.3¡¢3.4¡¢3.5¡¢3.6¡¢3.7¡¢3.8¡¢3.9ºÍAlpine Docker Edge¡£¸ÃÎó²îÒÑÓÚ2019Äê3ÔÂ8ÈÕ±»ÐÞ¸´¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bug-in-alpine-linux-docker-image-leaves-root-account-unlocked/
2¡¢¹È¸èÐû²¼5ÔÂAndroidÇå¾²¸üУ¬ÐÞ¸´15¸öÎó²î

¹È¸èÔÚ5Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË15¸öÎó²î£¬ÆäÖаüÀ¨4¸öÑÏÖØÎó²î£¬10¸ö¸ßΣÎó²îºÍ1ÆäÖÐΣÎó²î¡£Õâ4¸öÑÏÖØÎó²î£¨CVE-2019-2045£¬CVE-2019-2046£¬CVE-2019-2047ºÍCVE-2019-2044£©¾ùΪԶ³Ì´úÂëÖ´ÐÐÎó²î£¬ÆäÖÐÈý¸öÓëϵͳ½¹µãÓ¦ÓÃÓйأ¨²¦ºÅÆ÷¡¢µç×ÓÓʼþºÍÏà»ú£©£¬µÚËĸöÓëýÌå¿ò¼Ü×é¼þÓйأ¬ÏÖÔÚÔÝδÅû¶¸ü¶à²¹¶¡Ï¸½Ú¡£±ðµÄ£¬¹È¸è»¹Ðû²¼ÁËNVIDIA¡¢BroadcomºÍQualcommÆ·¼¶Èý·½¹©Ó¦ÉÌ×é¼þÖеĶà¸öÎó²î²¹¶¡£¬Ê¹µÃÐÞ¸´µÄCVE×ÜÊý´ï30¸ö¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/google-critical-remote-code-execution-flaws-android/144497/
3¡¢ÈýÐÇÒâÍâй¶SmartThingsÔ´Âë¼°¶à¸öÏîÄ¿µÄÄÚ²¿ÃÜÔ¿
ÈýÐǹ¤³ÌʦµÄÒ»¸öGitLab·þÎñÆ÷±»¹ýʧµØÉèÖÃΪpublic²¢ÇÒδÉèÖÃÃÜÂë±£»¤£¬µ¼Ö´ó×ÚÃô¸ÐÐÅϢй¶¡£¸Ã·þÎñÆ÷ÍйÜÔÚÈýÐǵÄÓòÃûVandev LabÉÏ£¬Æ¾Ö¤µÏ°ÝÇå¾²³§ÉÌSpiderSilkÑо¿Ö°Ô±Mossab HusseinµÄ·¢Ã÷£¬¸Ã·þÎñÆ÷й¶ÁËSmartThingsÈí¼þµÄÔ´´úÂëºÍ˽ÓÐÖ¤Ê飬»¹Ð¹Â¶Á˶àÃûÔ±¹¤µÄÃ÷ÎÄ˽ÓÐGitLabÁîÅÆÒÔ¼°Ò»Ð©ÄÚ²¿ÎĵµºÍPPT¡£
ÔÎÄÁ´½Ó£ºhttps://techcrunch.com/2019/05/08/samsung-source-code-leak/
4¡¢ºÚ¿ÍÍÅ»ïй¶3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÃô¸ÐÊý¾Ý
ºÚ¿ÍÍÅ»ïLulZSecºÍItaÔÚÍøÉÏÐû²¼ÁË3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÊý¾Ý£¬ÆäÖÐÉõÖÁ°üÀ¨ÂÞÂíÊ㤵ÄÊý¾Ý¡£¾Ý±¨µÀºÚ¿ÍÍÅ»ïÇÔÈ¡ÁËÔÚÂíÌ©ÀºÍ¿¨Ì¹ÔúÂÞ×¢²áµÄ״ʦÐÅÏ¢£¬±»µÁÊý¾Ý°üÀ¨µç×ÓÓʼþÕË»§¡¢Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ»á¼ûPECÕÊ»§µÄÖ¤¾Ý¡£ºÚ¿ÍÍŻﲢûÓжÔÕâЩÊý¾ÝÌá³öÀÕË÷£¬²¢³Æ²»»áʹÓÃÕâЩÊý¾Ý¾ÙÐжñÒâÔ˶¯¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/lulzsec-and-ita-hacktivist-groups-publish-the-personal-data-of-30000-roman-lawyers-6ac94567
5¡¢Turla APTʹÓÃLightNeuronºóÃÅÐ®ÖÆExchange·þÎñÆ÷

ƾ֤ESETÑо¿Ö°Ô±µÄ±¨¸æ£¬×Ô2014ÄêÒÔÀ´¶íÂÞ˹·¸·¨ÍÅ»ïTurla APTÒ»Ö±ÔÚʹÓÃLightNeuronºóÃÅÐ®ÖÆMicrosoft ExchangeÓʼþ·þÎñÆ÷¡£Ñо¿Ö°Ô±·¢Ã÷µÄÊܺ¦×éÖ¯°üÀ¨°ÍÎ÷µÄÒ»¸ö×éÖ¯ºÍ¶«Å·¼°Öж«µÄÍâ½»»ú¹¹¡£LightNeuronÊǵÚÒ»¸öÕë¶ÔExchange·þÎñÆ÷µÄ¶ñÒâÈí¼þ£¬Ëü¿ÉÒÔÉó²éºÍÐÞ¸Äͨ¹ýÓʼþ·þÎñÆ÷·¢Ë͵ÄÈκεç×ÓÓʼþ¡¢×«Ð´ºÍ·¢ËÍÐÂÓʼþÒÔ¼°×èÖ¹Èκεç×ÓÓʼþ¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/turla-threat-actor-group-hijacks-microsoft-exchange-mail-server-using-sophisticated-lightneuron-backdoor-d615cc04
6¡¢US-CERTÐû²¼Lazarus APT¶ñÒ⹤¾ßELECTRICFISHµÄÆÊÎö±¨¸æ
ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©ºÍÁìÍÁÇå¾²²¿£¨DHS£©Ðû²¼¹ØÓÚ¶ñÒâÈí¼þELECTRICFISHµÄÍŽáÆÊÎö±¨¸æ£¨MAR£©¡£¸Ã¶ñÒâÈí¼þÊdz¯ÏÊAPT×éÖ¯LazarusʹÓõŤ¾ß£¬ÓÃÓÚÍøÂçºÍÇÔÈ¡Êܺ¦ÕßµÄÊý¾Ý¡£ELECTRICFISHʵÏÖÁËÒ»ÖÖ×Ô½ç˵ÐÒ飬ÔÊÐíÔÚÔ´ºÍÄ¿µÄIPµØµãÖ®¼ä´«ÊäÁ÷Á¿¡£¹¥»÷Õß¿ÉÒÔʹÓÃÊðÀí·þÎñÆ÷/¶Ë¿Ú¾ÙÐÐÉèÖ㬴ӶøÈƹýÊÜѬȾϵͳµÄÉí·ÝÑéÖ¤¡£
ÔÎÄÁ´½Ó£ºhttps://www.us-cert.gov/ncas/analysis-reports/AR19-129A


¾©¹«Íø°²±¸11010802024551ºÅ