ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ48ÖÜ

Ðû²¼Ê±¼ä 2018-12-03
 ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³ö©¶´£»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý©¶´£»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÃüÁîÖ´ÐЩ¶´£»Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä©¶´£»FreeBSD CVE-2018-17156»º³åÇøÒç³ö©¶´¡£



±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶ £¬²¨¼°5ÒÚÓû§£»UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª£»Atrium HealthÔâºÚ¿Í¹¥»÷ £¬Ô¼265Íò»¼ÕßÐÅϢй¶£»ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý£»»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ £¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


ÖØÒªÄþ¾²Â©¶´Áбí


1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³ö©¶´

VMWare WorkstationºÍFusion´æÔÚÕûÊýÒç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983


2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý©¶´
Apache Hadoop´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐí¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬ÒÔrootȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E


3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÃüÁîÖ´ÐЩ¶´
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»ÕýÈ·´¦ÖÃÓû§ÊäÈ멶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐÈÎÒâSHELLÃüÁî¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE


4. Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä©¶´
Schneider Electric Modicon M340 WEB·þÎñÆ÷´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿É·ÃÎÊ¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/


5. FreeBSD CVE-2018-17156»º³åÇøÒç³ö©¶´
FreeBSDÔÚICMPʵÏÖÖдæÔÚ»º³åÇøÒç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿É½øÐоܾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc


 ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢ÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶ £¬²¨¼°5ÒÚÓû§


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ÍòºÀ¹ú¼Ê¾Æµê¼¯ÍÅ(Marriott International)½ñÈÕÐû²¼ £¬ÆìÏÂϲ´ïÎݾƵê(Starwood Hotel)µÄÒ»¸öÖ÷¹ËÔ¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ £¬¿ÉÄÜÓÐÔ¼5ÒÚÖ÷¹ËµÄÐÅϢй¶¡£¸ÃÏûÏ¢Ðû²¼ºó £¬ÍòºÀ¹ú¼Ê¾Æµê¹É¼ÛÔÚ½ñÈÕÅÌÇ°½»Ò×ÖÐÒ»¶ÈϵøÓâ5%¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ £¬ÊÓ²ì½á¹ûÏÔʾ £¬ÓÐһδÊÚȨ·½¸´ÖƲ¢¼ÓÃÜÁËÕâЩÊý¾Ý¡£¶øÇÒ £¬×Ô2014Äê¾Í¿ªÊ¼Á˶Ôϲ´ïÎݾƵêÍøÂç½øÐÐδÊÚȨ·ÃÎÊ¡£Ä¿Ç° £¬ÍòºÀ¹ú¼Ê¾ÆµêÒѽÓÄÉÁ˵÷Í£´ëÊ© £¬µ«²¢Î´Ðû²¼½øÒ»²½µÄÐÅÏ¢¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ £¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢°üÂÞÖ÷¹ËµÄÐÕÃû¡¢Í¨ÐŵØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩ¸öÈËÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html


2¡¢UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª

×ðÁú¶¶È¦ - Ϊdu¶øÉú


Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý±£»¤»ú¹¹Autoriteit Persoonsgegevens·Ö±ðÒò2016Äê10ÔµÄÊý¾Ýй¶Ê¼þ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ·£¿î¡£ICOÌåÏÖ¸ÃʼþÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì¡£·£¿îµÄÖ÷ÒªÔ­ÒòÊÇUberÑÓ³ÙÁ˽üÒ»Äê²Å³ÂËß´Ë´Îй¶Ê¼þ £¬ÕâÑÏÖØÎ¥·´ÁËÏà¹ØÖ´·¨ÌõÀý £¬¶øÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæÁÙ¸ü¸ßµÄÆÛÕ©·çÏÕ¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/


3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷ £¬Ô¼265Íò»¼ÕßÐÅϢй¶

×ðÁú¶¶È¦ - Ϊdu¶øÉú


ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇÓªÀûÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷ £¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶¡£¸Ã¹¥»÷ʼþ·¢ÉúÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕÆÚ¼ä £¬Ð¹Â¶µÄÐÅÏ¢°üÂÞÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢±£ÏÕÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼǼ±àºÅºÍÕË»§Óà¶îµÈ¡£´ËÍâ £¬»¹Óн«½ü70Íò¸öÉç±£ºÅÂëй¶ £¬µ«Ã»ÓвÆÕþÐÅϢй¶¡£¸Ã×éÖ¯Òѽ«Ïà¹Øʼþ֪ͨFBI £¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓüà¿Ø·þÎñ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/


4¡¢ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý

×ðÁú¶¶È¦ - Ϊdu¶øÉú


Äþ¾²³§ÉÌHackenµÄÑо¿ÈËÔ±Bob Diachenkoͨ¹ýShodan·¢ÏÖÁËÒ»¸ö¿É¹ûÈ»·ÃÎʵÄElasticSearch·þÎñÆ÷ £¬ÆäÊý¾Ý¿â̻¶ÁËÁè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý¡£ÕâЩÊý¾Ý°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØÖ·µÈÐÅÏ¢¡£Ñо¿ÈËÔ±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕß £¬µ«ËûÈÏΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®ÓйØ¡£Ä¿Ç°¸Ã·þÎñÆ÷Òѱ»½øÐÐÄþ¾²¼Ó¹Ì¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/


5¡¢»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ £¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ

×ðÁú¶¶È¦ - Ϊdu¶øÉú


Äþ¾²³§ÉÌForcepoint·¢ÏÖÒ»¸öÀûÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤Òµ¼äµý»î¶¯ £¬¸Ã»î¶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬Æä2018Äê»î¶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£ForcepointÌåÏָû±³ºóµÄÍŶӿÉÄÜÊ®·ÖÅÓ´ó £¬¹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²îÒì¹ú¼Ò/µØÓòµÄ¶à¸ö¹«Ë¾ £¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ £¬ÁíÒ»¸ö¹¥»÷»î¶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ¡£¹¥»÷ÕßÖ÷ҪʹÓðüÂÞ¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æʽµöÓãÓʼþʵʩ¹¥»÷ £¬ÕâЩAutoCADÎļþÖаüÂÞÒþ²ØµÄ.fasÄ£¿é£¨ÀàËÆÓÚwordÖеĺ꣩ £¬ÓÃÓÚÁ¬½ÓÔ¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£


Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/


ÉùÃ÷£º±¾×ÊѶÓɶ¶È¦Îª¶Ä¶øÉúάËûÃüÄþ¾²Ð¡×é·­ÒëºÍÕûÀí