ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ50ÖÜ

Ðû²¼Ê±¼ä 2018-12-17
±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2018Äê12ÔÂ10ÈÕ16ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´82¸ö  £¬ÖµµÃ¹Ø×¢µÄÊÇThinkPHP 5.xÔ¶³ÌÃüÁîÖ´ÐЩ¶´ £»Adobe Acrobat/Reader¶à¸öÕûÊýÒç³ö©¶´ £»Microsoft Outlook CVE-2018-8587Ô¶³Ì´úÂëÖ´ÐЩ¶´ £»Microsoft Windows DNS¶ÑÒç³ö©¶´ £»Apache Commons FileUpload DiskFileItemÔ¶³Ì´úÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǰ®Á¢ÐÅÈí¼þÖ¤Êé¹ýÆÚ  £¬µ¼ÖÂ11¸ö¹ú¼ÒͨÐÅÍøÂç̱»¾ £»ÐÂAPI©¶´µ¼ÖÂ5250ÍòÓû§Òþ˽̻¶  £¬Google+½«±»Ìáǰ¹Ø±Õ £»ÃÀ¹úÖÚÒéÔºÐû²¼ÍøÂçÄþ¾²Õ½ÂÔ³ÂËß  £¬Ìá³öÁùÏîÖ¸µ¼Ô­Ôò £»ÉñǹÊÖÐж¯  £¬ÀûÓÃRising SunÃé׼ȫÇò¹ú·À¼°Òªº¦»ù´¡ÉèÊ© £»Òâ´óÀûʯÓͺÍÌìÈ»Æø¹«Ë¾SaipemÔâµ½ºÚ¿ÍÍøÂç¹¥»÷¡£

ƾ¾ÝÒÔÉÏ×ÛÊö  £¬±¾ÖÜÄþ¾²ÍþвΪÖС£



ÖØÒªÄþ¾²Â©¶´Áбí


1. ThinkPHP 5.xÔ¶³ÌÃüÁîÖ´ÐЩ¶´


ThinkPHP¶Ô¿ØÖÆÆ÷Ãû´æÔÚÊäÈëÑé֤©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó  £¬ÒÔWEBȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£

https://blog.thinkphp.cn/869075


2. Adobe Acrobat/Reader¶à¸öÕûÊýÒç³ö©¶´


Adobe Acrobat/Reader´æÔÚÕûÊýÒç³ö©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÎļþ  £¬ÓÕʹÓû§½âÎö  £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html


3. Microsoft Outlook CVE-2018-8587Ô¶³Ì´úÂëÖ´ÐЩ¶´


Microsoft Outlook²»ÕýÈ·´¦ÖÃÄڴ湤¾ß©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÎļþ  £¬ÓÕʹÓû§½âÎö  £¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-8587


4. Microsoft Windows DNS¶ÑÒç³ö©¶´


Microsoft  DNS Server´æÔÚ»ùÓڶѵÄÒç³ö©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó  £¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8626


5. Apache Commons FileUpload DiskFileItemÔ¶³Ì´úÂëÖ´ÐЩ¶´


Apache Commons FileUploadʵÏÖ´æÔÚJava Object·´ÐòÁл¯Â©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó  £¬¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

http://www.zerodayinitiative.com/advisories/ZDI-16-570/



 ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢°®Á¢ÐÅÈí¼þÖ¤Êé¹ýÆÚ  £¬µ¼ÖÂ11¸ö¹ú¼ÒͨÐÅÍøÂç̱»¾


×ðÁú¶¶È¦ - Ϊdu¶øÉú


12ÔÂ6ÈÕÈðµäͨОÞÍ·°®Á¢ÐŵÄÉ豸·ºÆðÈí¼þ¹ÊÕÏ  £¬µ¼ÖÂÊýÒÔ°ÙÍò¼ÆµÄÊÖ»úÓû§ÍøÂçͨÐÅ̱»¾  £¬¶à¸öʹÓð®Á¢ÐÅÉ豸µÄ¹ú¼ÒÊܵ½Ó°Ïì  £¬°üÂÞÓ¢¹úÒÆ¶¯ÔËÓªÉÌO2µÄÓû§¡¢ÈÕ±¾ÈíÒøµÄÓû§µÈ¡£°®Á¢ÐÅÔÚÐÂΟåÖгÆÉ豸¹ÊÕÏÊÇÓÉÌØ¶¨°æ±¾µÄSGSN¨CMMEÈí¼þµ¼Ö嵀  £¬¾ßÌåÀ´Ëµ  £¬Æä»ù´¡Ô­ÒòÊǰ²×°ÔÚ¿Í»§Éè±¹ØÁ¬ÄÈí¼þÖ¤Êé¹ýÆÚ¡£

Ô­ÎÄÁ´½Ó£º
https://www.ericsson.com/en/press-releases/2018/12/update-on-software-issue-impacting-certain-customers

2¡¢ÐÂAPI©¶´µ¼ÖÂ5250ÍòÓû§Òþ˽̻¶  £¬Google+½«±»Ìáǰ¹Ø±Õ

×ðÁú¶¶È¦ - Ϊdu¶øÉú



GoogleÈ·ÈÏGoogle+ÔÙÔâÄþ¾²Ê¼þ  £¬ÁíÒ»¸öAPI©¶´µ¼ÖµÚÈý·½Ó¦ÓúͿª·¢Õß¿ÉÔÚδ¾­Ðí¿ÉµÄÇé¿öÏ·ÃÎÊ5250ÍòÓû§µÄ¸öÈËÐÅÏ¢¡£ÕâЩÐÅÏ¢°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢Ö°ÒµºÍÄêÁäµÈ¡£Æ¾¾ÝGoogleµÄ˵·¨  £¬¸Ã©¶´ÊÇÔÚ11ÔÂͨ¹ýÈí¼þ¸üÐÂÒýÈëµÄ  £¬²¢ÔÚÒ»ÖÜÄÚ±»·¢Ïֺͽâ¾ö  £¬Ã»ÓÐÖ¤¾Ý±íÃ÷¸Ã©¶´±»µÚÈý·½ÀûÓá£Google½«ÔÚ2019Äê4Ô¹رÕGoogle+·þÎñ  £¬±ÈÔ­¶¨µÄ2019Äê8ÔÂÌáǰÁË4¸öÔ¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/google-plus-hacking.html

3¡¢ÃÀ¹úÖÚÒéÔºÐû²¼ÍøÂçÄþ¾²Õ½ÂÔ³ÂËß  £¬Ìá³öÁùÏîÖ¸µ¼Ô­Ôò

×ðÁú¶¶È¦ - Ϊdu¶øÉú



ÃÀ¹úÖÚÒéÔºÄÜÔ´ºÍÉÌҵίԱ»áÐû²¼ÍøÂçÄþ¾²Õ½ÂÔ³ÂËß  £¬Ö¼ÔÚÈ·Á¢Ô¤·ÀºÍ»º½âÍøÂçÄþ¾²Ê¼þµÄÕ½ÂÔ¡£¸Ã³ÂËßÈÏΪµ±Ç°ÃÀ¹úµÄÍøÂçÄþ¾²¾Ù´ë²¢Î´¸úÉÏ»¥ÁªÍøµÄÉú³¤  £¬´«Í³µÄÐÅÏ¢¼¼Êõ¼ÆÄ±ÔÚÓ¦¶Ô²»Í£Ôö³¤µÄÍøÂçÄþ¾²Ê¼þÖÐÊÕЧÉõ΢¡£³ÂËßÊáÀí³öÁùµãÍøÂçÄþ¾²¿´·¨ÓëÁùÏîÍøÂçÄþ¾²ÓÅÏÈÏî  £¬°üÂÞ½¨Á¢ÆÕ±é½ÓÊܵÄЭͬÅû¶·¨Ê½¡¢ÒýÈëÈí¼þÎïÁÏÇåµ¥£¨software bill of materials  £¬¼ò³ÆSBOM£©¡¢Ö§³Ö¿ªÔ´Èí¼þ¡¢ÍêÉÆCVE·¨Ê½¡¢ÊµÊ©¼¼ÊõÉúÃüÖÜÆÚÖ§³ÖÕ½ÂÔÒÔ¼°Ç¿»¯¹«Ë½ºÏ×÷ģʽ¡£


Ô­ÎÄÁ´½Ó£º
https://energycommerce.house.gov/wp-content/uploads/2018/12/12.07.18-Cybersecurity-Strategy-Report.pdf

4¡¢ÉñǹÊÖÐж¯  £¬ÀûÓÃRising SunÃé׼ȫÇò¹ú·À¼°Òªº¦»ù´¡ÉèÊ©

×ðÁú¶¶È¦ - Ϊdu¶øÉú


McAfeeÑо¿ÈËÔ±·¢ÏÖжñÒâ»î¶¯¡°ÉñǹÊÖÐж¯¡±  £¬¸Ã»î¶¯Õë¶ÔÈ«ÇòµÄ¹ú·ÀºÍÒªº¦»ù´¡ÉèÊ©  £¬°üÂÞºËÄÜ¡¢¹ú·À¡¢ÄÜÔ´ºÍ½ðÈÚÆóÒµ¡£×Ô2018Äê10ÔÂ25ÈÕÒÔÀ´  £¬Ôڶ̶ÌÁ½¸öÔÂÄÚÉñǹÊÖÐж¯ÒÑÓ°ÏìÁËÈ«Çò87¸öÆóÒµ¡£¹¥»÷Õßαװ³ÉÕÐÆ¸»î¶¯  £¬Í¨¹ýDropbox·Ö·¢°üÂÞ¶ñÒâºêµÄWordÎĵµ  £¬²¢×îÖÕ½»¸¶Rising SunºóÃÅ¡£¸ÃºóÃÅÓëAPT×éÖ¯LazarusÔÚ2015ÄêʹÓõĶñÒâÈí¼þDuuzer¾ßÓÐÏàͬµÄ´úÂë¡£¾¡¹ÜÐí¶àÏßË÷¶¼Ö¸ÏòÁËLazarus  £¬µ«Ñо¿ÈËÔ±ÈÏΪÕâЩ¹ýÓÚÃ÷ÏÔµÄÖ¤¾Ý¿ÉÄÜÖ»Êǹ¥»÷Õß¹ÊÒâÉèÖõÄfalse flag¡£


Ô­ÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/


5¡¢Òâ´óÀûʯÓͺÍÌìÈ»Æø¹«Ë¾SaipemÔâµ½ºÚ¿ÍÍøÂç¹¥»÷

×ðÁú¶¶È¦ - Ϊdu¶øÉú



±¾ÖÜÒ»Òâ´óÀûʯÓͺÍÌìÈ»Æø¹«Ë¾SaipemÔâµ½ÍøÂç¹¥»÷¡£Saipem¹«Ë¾µÄ¿Í»§±é²¼ÔÚ60¶à¸ö¹ú¼ÒÄÚ  £¬´Ë´Î¹¥»÷À´Ô´ÓÚÓ¡¶È  £¬Ö÷ÒªÓ°ÏìÁ˸ù«Ë¾ÔÚÖж«µØÓòµÄ·þÎñÆ÷  £¬°üÂÞÉ³ÌØ°¢À­²®¡¢°¢ÁªÇõºÍ¿ÆÍþÌØ  £¬ÆäÔÚÒâ´óÀû¡¢·¨¹úºÍÓ¢¹úµÄÖ÷ÒªÔËÓªÖÐÐÄûÓÐÊܵ½Ó°Ïì¡£Saipem¶Ô·͸ÉçÌåÏÖ¹¥»÷À´Ô´ÓÚÓ¡¶È½ðÄÎ  £¬µ«¹¥»÷ÕßµÄÉí·Ý²»Ã÷  £¬ÓÉÓÚϵͳ¶¼Óб¸·Ý  £¬Òò´ËûÓÐÊý¾ÝÊܵ½Ëðʧ¡£


Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78859/hacking/saipem-cyber-attack.html


ÉùÃ÷£º±¾×ÊѶÓɶ¶È¦Îª¶Ä¶øÉúάËûÃüÄþ¾²Ð¡×é·­ÒëºÍÕûÀí