ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ48ÖÜ

°ä²¼¹¦·ò 2019-12-09

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ02ÈÕÖÁ08ÈÕ¹²ÊÕ¼°²È«·ì϶48¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Kubernetes APIÖØ¶¨Ïò·ì϶; D-Link DAP-1860ºÅÁî×¢Èë´úÂëÖ´Ðзì϶£»£»OpenBSDÑéÖ¤ÈÆ¹ý·ì϶£»£»Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´Ðзì϶£»£»Mozilla Firefox ESR worker destructionÄÚ´æÃýÎóÒýÓ÷ì϶¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÅ·ÖÞÍøÂ簲ȫ¾Ö°ä²¼º£Ê²¿ÃÅÍøÂ簲ȫָÄÏ£»£»Android·ì϶StrandHogg¿É¼Ù×°³ÉËÁÒâÀûÓ㻣»GoAhead Web·þÎñÆ÷RCE·ì϶ӰÏì´óÁ¿IoTÉ豸£»£»Autodesk¡¢¡¢¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶£»£»PCI SSC°ä²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾Ý°²È«³ß¶È¡£¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£¡£


>ÖØÒª°²È«·ì϶Áбí


1. Google Kubernetes APIÖØ¶¨Ïò·ì϶


Google Kubernetes API serverûÓÐÕýÈ·ÑéÖ¤URLµÄÖØ¶¨Ïò£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬½«API·þÎñÆ÷ÒªÇóÖØ¶¨Ïòµ½ËÁÒâÖ÷»ú¡£¡£¡£

https://github.com/kubernetes/kubernetes/issues/85867


2. D-Link DAP-1860ºÅÁî×¢Èë´úÂëÖ´Ðзì϶


D-Link DAP-1860 HNAP_TIMEºÍSOAPAction´æÔÚºÅÁî×¢Èë·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£

https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/


3. OpenBSDÑéÖ¤ÈÆ¹ý·ì϶


OpenBSDÑé֤ϵͳ´æÔÚ°²È«·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇóÓû§Ãû£¬£¬£¬Èç"-option"»ò"-schallenge"£¬£¬£¬Èƹý°²È«ÏÞ¶È£¬£¬£¬Î´ÊÚȨ½Ó¼ûϵͳ¡£¡£¡£

https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html


4. Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´Ðзì϶


Apache Olingo AbstractService ObjectInputStream´æÔÚ·´ÐòÁл¯·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£

https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E


5. Mozilla Firefox ESR worker destructionÄÚ´æÃýÎóÒýÓ÷ì϶


Mozilla Firefox ESR worker destruction´æÔÚÄÚ´æÃýÎóÒýÓÃÁ½´Î¿ªÊÍ·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇ󣬣¬£¬ÓÕʹÓû§½âÎö£¬£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£

https://www.auscert.org.au/bulletins/ESB-2019.4555/


>ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢¡¢Å·ÖÞÍøÂ簲ȫ¾Ö°ä²¼º£Ê²¿ÃÅÍøÂ簲ȫָÄÏ

OG¶«·½Ìü¡¤(Öйú´ó½)


Å·ÖÞÍøÂ簲ȫ¾Ö£¨ENISA£©ÒÔ¡¶¸Û¿ÚÍøÂ簲ȫ-º£Ê²¿ÃÅÍøÂ簲ȫʵ¼Ê¡·ÎªÌâ°ä²¼Á˺£Ê²¿ÃÅÍøÂ簲ȫָÄÏ£¬£¬£¬Îª¸Û¿ÚÉú̬ϵͳÓÈÆäÊǸۿڵ±¾ÖºÍ´¬²ºÔËÓªÉÌÖеÄCIOºÍCISOÖÆ¶©ÍøÂ簲ȫսÊõÌṩÁìµ¼ºÍÔ®ÊÖ¡£¡£¡£¸ÃÖ¸ÄÏÁгöÁ˸ۿÚÉúÌ¬ÏµÍ³Ãæ¶ÔµÄÖØÒªÍþв£¬£¬£¬²¢ÃèÊöÁË¿ÉÄܶԸۿÚÉú̬ϵͳÔì³ÉÓ°ÏìµÄ¹Ø¼üÍøÂç¹¥»÷³¡¾°¡£¡£¡£¸ÃÖ¸ÄÏΪÖն˱£»£»¤ºÍÐÔÃüÖÜÆÚÖÎÀí¡¢¡¢¡¢·ì϶ÖÎÀí¡¢¡¢¡¢ÈËÁ¦×ÊÔ´°²È«¡¢¡¢¡¢¹©¸øÁ´ÖÎÀíµÈÉè¼ÆÁ˰²È«´ëÊ©¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/


2¡¢¡¢¡¢Android·ì϶StrandHogg¿É¼Ù×°³ÉËÁÒâÀûÓÃ


OG¶«·½Ìü¡¤(Öйú´ó½)


Promon°²È«×êÑÐÈËÔ±·¢ÏÖÒ»¸öеÄAndroid·ì϶StrandHogg£¬£¬£¬¸Ã·ì϶ÔÊÐí¶ñÒâÀûÓüÙ×°³ÉËÁÒâºÏ·¨ÀûÓᣡ£¡£¸Ã·ì϶ÀûÓÃÁËAndroidµÄ¶à¹¤×÷´¦ÖÃÖ°ÄÜ£¬£¬£¬µ±Óû§µã»÷Ò»¸öÕý³£ÀûÓõÄͼ±êʱ£¬£¬£¬¶ñÒâÀûÓÃÄܹ»ÀûÓø÷ì϶À¹½ØÖ¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐéαµÄ½çÃæ£¬£¬£¬´Ó¶øÓÕµ¼Óû§ÊÚÓè¸÷ÀàȨÏÞ¡£¡£¡£×êÑÐÈËÔ±ÒѾ­·¢ÏÖÁË36¸öÕýÔÚ»ý¼«ÀûÓô˷ì϶µÄ¶ñÒâÀûÓ㬣¬£¬Ô̺¬ÒøÐÐľÂíBankBot¡£¡£¡£×êÑÐÈËÔ±³Æ¸Ã·ì϶µÄÓ°ÏìÁìÓò¼«¶È´ó£¬£¬£¬ÓÉÓÚĬÈÏÇé¿öÏ´óÎÞÊýÀûÓö¼Ò×Êܹ¥»÷£¬£¬£¬²¢ÇÒĿǰûÓп¿µÃסµÄ²½ÖèÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¡£¡£¹È¸èÉÐδÔÚÖ°ºÎ°æ±¾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/


3¡¢¡¢¡¢GoAhead Web·þÎñÆ÷RCE·ì϶ӰÏì´óÁ¿IoTÉ豸


OG¶«·½Ìü¡¤(Öйú´ó½)


˼¿ÆTalosµÄ°²È«×¨¼ÒÔÚGoAheadǶÈëʽWeb·þÎñÆ÷Öз¢ÏÖÁËÁ½¸ö·ì϶£¬£¬£¬ÆäÖÐÔ̺¬Ò»¸ö¹Ø¼üµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-5096£©¡£¡£¡£¸Ã·ì϶ÓëGoAhead´¦ÖÃmulti-part/form-dataÒªÇóµÄ·½Ê½ÓйØ£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓø÷ì϶´¥·¢use-after-free£¬£¬£¬²¢Í¨¹ý·¢ËͶñÒâHTTPÒªÇóÔÚ·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£µÚ¶þ¸ö·ì϶£¨CVE-2019-5097£©´æÔÚÓÚͳһ×é¼þÖУ¬£¬£¬¿Éµ¼Ö»ؾø·þÎñ¹¥»÷¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾Ô̺¬v5.0.1¡¢¡¢¡¢v.4.1.1ºÍv3.6.5¡£¡£¡£Æ¾¾ÝShodanµÄËÑË÷Á˾Ö£¬£¬£¬Â¶³öÔÚ¹«ÍøÉϵÄGoAhead·þÎñÆ÷ÊýÁ¿Òѳ¬¹ý130Íò¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://thehackernews.com/2019/12/goahead-web-server-hacking.html


4¡¢¡¢¡¢Autodesk¡¢¡¢¡¢Ç÷Ïò¿Æ¼¼¼°¿¨°Í˹»ùÆØDLL½Ù³Ö·ì϶


OG¶«·½Ìü¡¤(Öйú´ó½)


SafeBreach Labs×êÑÐÈËÔ±Åû¶Autodesk¡¢¡¢¡¢Ç÷Ïò¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLL½Ù³Ö·ì϶¡£¡£¡£Ç÷Ïò¿Æ¼¼°²È«Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬£¬£¬¸Ã·ì϶´æÔÚÓÚcoreServiceShell.exe×é¼þÖС£¡£¡£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû½øÐÐÑéÖ¤£¬£¬£¬Òò¶ø¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐËÁÒâDLL£¬£¬£¬µ¼Ö°×Ãûµ¥Èƹý¡¢¡¢¡¢»ñµÃÓÆ¾ÃÐÔ¡¢¡¢¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£¡£¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÀûÓÃÒ²±ðÀëÊܵ½ÀàËÆµÄ·ì϶CVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/


5¡¢¡¢¡¢PCI SSC°ä²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾Ý°²È«³ß¶È


OG¶«·½Ìü¡¤(Öйú´ó½)


PCI°²È«³ß¶ÈίԱ»á£¨PCI SSC£©°ä²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾Ý°²È«³ß¶È¡£¡£¡£¸Ã³ß¶ÈÔÊÐí´øÓÐNFCµÄCOTSÒÆ¶¯É豸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£¡£¡£PCI CPoC³ß¶ÈÊǸÃίԱ»áΪ½â¾öÒÆ¶¯·Ç½Ó´¥Ê½Ö§¸¶°ä²¼µÄµÚ¶þ¸ö³ß¶È¡£¡£¡£¾ßÌåÀ´Ëµ£¬£¬£¬PCI CPoC³ß¶È»®¶¨Á˹©¸øÉÌÔÚ±£»£»¤Êý¾Ý¡¢¡¢¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¹æ»®·½ÃæµÄһЩ°²È«ÉϵÄÒªÇ󡣡£¡£³ß¶ÈµÄCPoC½â¾ö¹æ»®Ô̺¬ÓµÓÐǶÈëʽNFC½Ó¿ÚµÄCOTSÉ豸¡¢¡¢¡¢¾­ÑéÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°¶ÀÁ¢ÓÚCOTSÉ豸µÄºó¶Ëϵͳ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1