ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ37ÖÜ

Ðû²¼Ê±¼ä 2018-09-21
 Ò»¡¢±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö

2018Äê09ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´67¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Word PDFÔ¶³Ì´úÂëÖ´ÐЩ¶´ £»Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³ö©¶´ £»¶à¿îI-O DATA²úÎïÈÎÒâÃüÁîÖ´ÐЩ¶´ £»Cisco SD-WAN Solution CVE-2018-0432´íÎó³ÂËß¹¦Ð§È¨ÏÞÌáÉý©¶´ £»Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉý©¶´¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇVeeamÒòMongoDBÅäÖôíÎóµ¼ÖÂ4.45ÒÚÌõÓû§¼Ç¼й¶ £»Ñо¿ÈËÔ±·¢ÏÖ½Ù³ÖÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯ £»Ñо¿ÈËÔ±³Æ¿É¹ûÈ»·ÃÎʵÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷ £»NexusguardÐû²¼2018ÄêQ2Íþв³ÂËߣ¬DDoS¹¥»÷ͬ±ÈÔö³¤Áè¼Ý500% £»ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒÆ¶¯Íþв³ÂËߣ¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÁ¿Ôö³¤54%¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£

¶þ¡¢ÖØÒªÄþ¾²Â©¶´Áбí


1. Microsoft Word PDFÔ¶³Ì´úÂëÖ´ÐЩ¶´


Microsoft Word´¦ÖÃPDFÎļþ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8430

2. Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³ö©¶´


Microsoft JET Database Engine´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâµÄExcelÎļþÇëÇó£¬ÓÕʹÓû§ÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8393

3. ¶à¿îI-O DATA²úÎïÈÎÒâÃüÁîÖ´ÐЩ¶´


I-O DATA TS-WRLP¡¢TS-WRLAºÍTS-WRLP/EʹÓÃÓ²±àÂëÆ¾Ö¤Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó£¬Ö´ÐÐÈÎÒâOSÃüÁî¡£
http://jvn.jp/en/jp/JVN83701666/index.html

4. Cisco SD-WAN Solution CVE-2018-0432´íÎó³ÂËß¹¦Ð§È¨ÏÞÌáÉý©¶´


Cisco SD-WAN Solution´íÎó³ÂËß¹¦Ð§´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔROOTȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation

5. Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉý©¶´
Micronet INplc SDK´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ£¬Ö´ÐÐÈÎÒâ´úÂë¡£
http://www.mnc.co.jp/INplc/info_20180907_E.htm

Èý¡¢ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢VeeamÒòMongoDBÅäÖôíÎóµ¼ÖÂ4.45ÒÚÌõÓû§¼Ç¼й¶


×ðÁú¶¶È¦ - Ϊdu¶øÉú


9ÔÂ5ÈÕÄþ¾²Ñо¿ÈËÔ±Bob Diachenko·¢ÏÖÊý¾Ý¹ÜÀí¹«Ë¾VeeamµÄMongoDB·þÎñÆ÷¿É¹ûÈ»·ÃÎÊ£¬Ò»¸öÁè¼Ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£¸ÃÊý¾Ý¿â°üÂÞÔ¼4.45ÒÚÌõÓû§¼Ç¼£¬°üÂÞÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¾Óס¹ú¼Ò/µØÓòµÈ¸öÈËÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØÖ·¡¢Ïà¹ØURL¡¢Óû§ÊðÀíµÈÓªÏúÏà¹ØÐÅÏ¢¡£VeeamÒѶԸÃÊý¾Ý¿â½ÓÄÉÁ˱ £»¤´ëÊ©¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/

2¡¢Ñо¿ÈËÔ±·¢ÏÖ½Ù³ÖÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Äþ¾²Ñо¿ÈËÔ±Troy Mursch·¢ÏÖÒ»¸öÀûÓé¶´£¨CVE-2018-14847£©½Ù³ÖMikroTik·ÓÉÆ÷½øÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡£¬µ«ÈÔÓв¿ÃÅÓû§Ã»ÓнøÐÐÉý¼¶¡£Æ¾¾ÝMursch³ÂËßµÄÍÚ¿ó½Å±¾£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTikÉ豸¡£´ó¶àÊýÊÜѬȾµÄÉ豸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¸ÃÍÚ¿ó½Å±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔö¼Óµ½80%²¢Á¬Ðø½øÐÐÍÚ¿ó¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢Ñо¿ÈËÔ±³Æ¿É¹ûÈ»·ÃÎʵÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Lynt ServicesµÄÑо¿ÈËÔ±Vladim¨ªrSmitka·¢ÏֿɹûÈ»·ÃÎʵÄ.gitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷¡£Ðí¶àWeb¿ª·¢ÈËԱʹÓÿªÔ´¹¤¾ßGitÀ´¹¹½¨Ò³Ã棬µ«ËûÃÇÍùÍù½«.gitÎļþ¼ÐÒÅÁôÔÚÍøÕ¾µÄ¹«¹²¿É·ÃÎʲ¿ÃÅ£¬ÉõÖÁ°üÂÞÒ»Ð©ÖØÒªµÄÐÅÏ¢£¬ÀýÈçÍøÕ¾½á¹¹µÄÐÅÏ¢¡¢Êý¾Ý¿âÃÜÂë¡¢APIÃÜÔ¿¡¢¿ª·¢IDEÉèÖõÈ¡£


Ô­ÎÄÁ´½Ó£º
https://threatpost.com/open-git-directories-leave-390k-websites-vulnerable/137299/

4¡¢NexusguardÐû²¼2018ÄêQ2Íþв³ÂËߣ¬DDoS¹¥»÷ͬ±ÈÔö³¤Áè¼Ý500%


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ƾ¾ÝNexusguardµÄ2018ÄêµÚ¶þ¼¾¶ÈÍþв³ÂËߣ¬DDoS¹¥»÷ƽ¾ùÔö³¤Áè¼Ý26Gbps£¬¹æÄ£Ôö¼ÓÁËÁè¼Ý500%¡£Óë2017ÄêͬÆÚÏà±È£¬DDoS¹¥»÷µÄ×î´ó¹æÄ£·­ÁËËı¶£¬´ï359Gbps¡£Ñо¿ÈËÔ±³ÆÊý¾ÝµÄ¼¤ÔöÔ´ÓÚÎïÁªÍø½©Ê¬ÍøÂçSatoriµÄÔö³¤¡£×î´óµÄ0day·çÏÕÀ´×ÔÓÚ²îÒìµÄ¼ÒÓ÷ÓÉÆ÷£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÉ豸Õë¶ÔÒªº¦·þÎñºÍÍøÂçÌᳫ´ó¹æÄ£DDoS¹¥»÷¡£Synºé·º¹¥»÷Õ¼¾ÝÁËÖ÷µ¼Ö°Î»¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-attacks-increase-in-size-by/

5¡¢ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒÆ¶¯Íþв³ÂËߣ¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÁ¿Ôö³¤54%


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ÈüÃÅÌú¿ËµÄ¼¾¶ÈÒÆ¶¯Íþв³ÂËß×ܽáÁË2017ÄêµÄÒÆ¶¯ÍþвÊý¾Ý£¬Ö÷Òª·¢ÏÖ°üÂÞÒÆ¶¯¶ñÒâÈí¼þµÄ±äÖÖºÍÊýÁ¿¶¼ÓÐËùÔö¼Ó£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þ±äÖÖµÄÊýÁ¿Ôö¼ÓÁË54% £»²¿ÃÅÒÆ¶¯É豸¼ÌÐøÊ¹ÓùýʱµÄ²Ù×÷ϵͳ£¬Ö»ÓÐ3%µÄAndroidÉ豸¸üÐÂÖÁ×îеIJÙ×÷ϵͳ°æ±¾£¬41%µÄAndroidÉ豸ÖÁÉÙȱÉÙÁ½¸öÔµÄÄþ¾²²¹¶¡£¬iOSÉ豸Ïà¶Ô½ÏºÃ£¬80%µÄiOSÉ豸°²×°ÁË×îеĸüР£»Î£ÏÕµÄWi-FiÍøÂç±ÈÒÔÍùÈκÎʱºò¶¼Ô½·¢¹ã·º¡£


Ô­ÎÄÁ´½Ó£º
https://www.symantec.com/connect/es/blogs/las-amenazas-moviles



ÉùÃ÷£º±¾×ÊѶÓɶ¶È¦Îª¶Ä¶øÉúάËûÃüÄþ¾²Ð¡×é·­ÒëºÍÕûÀí