ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ48ÖÜ

Ðû²¼Ê±¼ä 2018-12-03
 ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³öÎó²î £»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉýÎó²î £»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î £»Schneider Electric Modicon M340ÃÜÂë¸ü¸ÄÎó²î £»FreeBSD CVE-2018-17156»º³åÇøÒç³öÎó²î¡£



±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍòºÀÂùݼ¯Íų¬´ó¹æÄ£Êý¾Ýй¶ £¬²¨¼°5ÒÚÓû§ £»UberÒò2016ÄêÊý¾Ýй¶±»ºÉÀ¼ºÍÓ¢¹ú· £¿î120ÍòÃÀÔª £»Atrium HealthÔâºÚ¿Í¹¥»÷ £¬Ô¼265Íò»¼ÕßÐÅϢй¶ £»ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý £»»ùÓÚAutoCADµÄÌØ¹¤Ô˶¯±»·¢Ã÷ £¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖС£


Ö÷ÒªÇå¾²Îó²îÁбí


1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³öÎó²î

VMWare WorkstationºÍFusion±£´æÕûÊýÒç³öÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983


2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉýÎó²î
Apache Hadoop±£´æÇå¾²Îó²î £¬ÔÊÐí¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E


3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»×¼È·´¦Öóͷ£Óû§ÊäÈëÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐí§ÒâSHELLÏÂÁî¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE


4. Schneider Electric Modicon M340ÃÜÂë¸ü¸ÄÎó²î
Schneider Electric Modicon M340 WEB·þÎñÆ÷±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿É»á¼û¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/


5. FreeBSD CVE-2018-17156»º³åÇøÒç³öÎó²î
FreeBSDÔÚICMPʵÏÖÖб£´æ»º³åÇøÒç³öÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿É¾ÙÐоܾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÍòºÀÂùݼ¯Íų¬´ó¹æÄ£Êý¾Ýй¶ £¬²¨¼°5ÒÚÓû§


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÍòºÀ¹ú¼ÊÂùݼ¯ÍÅ(Marriott International)½ñÈÕÐû²¼ £¬ÆìÏÂϲ´ïÎÝÂùÝ(Starwood Hotel)µÄÒ»¸öÖ÷¹ËÔ¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ £¬¿ÉÄÜÓÐÔ¼5ÒÚÖ÷¹ËµÄÐÅϢй¶¡£¸ÃÐÂÎÅÐû²¼ºó £¬ÍòºÀ¹ú¼ÊÂùݹɼÛÔÚ½ñÈÕÅÌǰÉúÒâÖÐÒ»¶ÈϵøÓâ5%¡£ÍòºÀ¹ú¼ÊÂùݳÆ £¬ÊÓ²ìЧ¹ûÏÔʾ £¬ÓÐһδÊÚȨ·½¸´ÖƲ¢¼ÓÃÜÁËÕâЩÊý¾Ý¡£²¢ÇÒ £¬×Ô2014Äê¾Í×îÏÈÁ˶Ôϲ´ïÎÝÂùÝÍøÂç¾ÙÐÐδÊÚȨ»á¼û¡£ÏÖÔÚ £¬ÍòºÀ¹ú¼ÊÂùÝÒѽÓÄÉÁ˵÷½â²½·¥ £¬µ«²¢Î´Ðû²¼½øÒ»²½µÄÐÅÏ¢¡£ÍòºÀ¹ú¼ÊÂùݳÆ £¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢°üÀ¨Ö÷¹ËµÄÐÕÃû¡¢Í¨Ñ¶µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩСÎÒ˽¼ÒÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html


2¡¢UberÒò2016ÄêÊý¾Ýй¶±»ºÉÀ¼ºÍÓ¢¹ú· £¿î120ÍòÃÀÔª

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý± £»¤»ú¹¹Autoriteit Persoonsgegevens»®·ÖÒò2016Äê10ÔµÄÊý¾Ýй¶ÊÂÎñ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ· £¿î¡£ICOÌåÏÖ¸ÃÊÂÎñÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì¡£· £¿îµÄÖ÷ÒªÔµ¹ÊÔ­ÓÉÊÇUberÑÓ³ÙÁ˽üÒ»Äê²Å±¨¸æ´Ë´Îй¶ÊÂÎñ £¬ÕâÑÏÖØÎ¥·´ÁËÏà¹ØÖ´·¨ÌõÀý £¬²¢ÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæÁÙ¸ü¸ßµÄڲƭΣº¦¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/


3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷ £¬Ô¼265Íò»¼ÕßÐÅϢй¶

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇÓªÀûÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷ £¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕʱ´ú £¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢°ü¹ÜÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼͼ±àºÅºÍÕË»§Óà¶îµÈ¡£±ðµÄ £¬ÉÐÓпìÒª70Íò¸öÉç±£ºÅÂëй¶ £¬µ«Ã»ÓвÆÎñÐÅϢй¶¡£¸Ã×éÖ¯Òѽ«Ïà¹ØÊÂÎñ֪ͨFBI £¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓÃ¼à¿Ø·þÎñ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/


4¡¢ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Çå¾²³§ÉÌHackenµÄÑо¿Ö°Ô±Bob Diachenkoͨ¹ýShodan·¢Ã÷ÁËÒ»¸ö¿É¹ûÕæ»á¼ûµÄElasticSearch·þÎñÆ÷ £¬ÆäÊý¾Ý¿â̻¶ÁËÁè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý¡£ÕâЩÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØµãµÈÐÅÏ¢¡£Ñо¿Ö°Ô±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕß £¬µ«ËûÒÔΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®ÓйØ¡£ÏÖÔڸ÷þÎñÆ÷Òѱ»¾ÙÐÐÇå¾²¼Ó¹Ì¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/


5¡¢»ùÓÚAutoCADµÄÌØ¹¤Ô˶¯±»·¢Ã÷ £¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Çå¾²³§ÉÌForcepoint·¢Ã÷Ò»¸öʹÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤ÒµÌع¤Ô˶¯ £¬¸ÃÔ˶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬Æä2018ÄêÔ˶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£ForcepointÌåÏÖ¸ÃÔ˶¯±³ºóµÄÍŶӿÉÄÜÊ®·ÖÖØ´ó £¬¹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²î±ð¹ú¼Ò/µØÇøµÄ¶à¸ö¹«Ë¾ £¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷Ô˶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ £¬ÁíÒ»¸ö¹¥»÷Ô˶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ¡£¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æÊ½´¹ÂÚÓʼþʵÑé¹¥»÷ £¬ÕâЩAutoCADÎļþÖаüÀ¨Òþ²ØµÄ.fasÄ £¿é£¨ÀàËÆÓÚwordÖеĺ꣩ £¬ÓÃÓÚÅþÁ¬Ô¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/


ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí