¿¨°Í˹»ù2019Äê¹¤ÒµÍøÂ簲ȫÇé¿ö»ã±¨£»11¸öRuby¿â´æÔÚºóÃÅ£»SteamÌáȨ0day

°ä²¼¹¦·ò 2019-08-22
1¡¢¿¨°Í˹»ù°ä²¼2019Äê¹¤ÒµÍøÂ簲ȫÇé¿ö»ã±¨

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ½øÐе÷ÑÐ £¬Õû¶Ù²¢°ä²¼ÁË¡¶2019Äê¹¤ÒµÍøÂ簲ȫÇé¿ö¡·»ã±¨¡£Æ¾¾Ý¸Ã»ã±¨ £¬È¥Ä곬¹ýÒ»°ë£¨52%£©µÄ¹¤¿Ø°²È«ÊÂÎñÊÇÓɱ¨´ðʧÎóµ¼ÖµÄ¡£¹ÌÈ»¾ø´óÎÞÊý¹«Ë¾£¨81£¥£©´òËã½øÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0 £¬µ«·ÖÅäÁËÍøÂ簲ȫԤËãµÄÈ´Éٵöࣨ57£¥£©¡£³ý´ËÖ®±í £¬ÕâЩ¹«Ë¾µÄÍøÂ簲ȫ¼¼ÊõÒÀÈ»ÁîÈËÓÇÓô£ºÊÜ·ÃÕßµÄÁ½´óÓÇÓô¼¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂ簲ȫר¼ÒÀ´ÖÎÀí¹¤ÒµÍøÂç £¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±é²»×㰲ȫÒâʶ¡£


Ô­ÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/


2¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹µ±¾ÖÐû¸æµÄ¸ùÖ¤Êé

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹µ±¾ÖÓÚÉϸöÔÂÐû¸æµÄ¸ùÖ¤Êé £¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£Æäʱ¹þÈø¿Ë˹̹µ±¾ÖÒªÇó¸Ã¹úISPºÏ×÷ £¬Ç¿ÔìÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£´Ë¿Ìµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ £¬½«×èÖ¹ÏνӲ¢ÏÔʾÃýÎóÐÅÏ¢¡£¹þÈø¿Ë˹̹µ±¾ÖÒѾ­ÔÚ8Ô³õÖÕ³¡ÁËÕâÒ»´òËã £¬Ò»Ãû¹ÙÔ±°µÊ¾Õû¸ö´òËãÖ»Êǵ±¾ÖµÄÒ»¸ö²âÊÔ¡£µ«ÈÔº±¼û°ÙÍòÉ豸ÈÔÔÚʹÓøÃÖ¤Êé¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html


3¡¢×êÑÐÈËÔ±·¢ÏÖ11¸öRuby¿âÖдæÔÚºóÃÅ´úÂë

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

RubyGemsɾ³ýÁË18¸öÔ̺¬ºóÃÅ´úÂëµÄRuby¿â¶ñÒâ°æ±¾ £¬ÕâЩ¶ñÒâ°æ±¾ÊôÓÚ11¸ö·ÖÆçµÄRuby¿â £¬×Ô7ÔÂ8ÈÕÒÔÀ´ £¬ÕâЩ¶ñÒâ°æ±¾ÒѾ­±»ÏÂÔØÁË3584´Î¡£±»Ö²ÈëµÄºóÃÅ´úÂë¿ÉÔÚÆäËûÈ˵ÄRubyÏîÄ¿Öз¢Õ¹ÒþÄäµÄ¶ñÒâÍÚ¿ó»î¶¯¡£ºÉÀ¼¿ª·¢ÕßJan DintelÊ×ÏÈÔÚrest-client¿âÖз¢ÏÖÁ˶ñÒâ´úÂë £¬ËüÃÇ»áÍøÂçURLºÍϵͳ»·¾³ÐÅÏ¢²¢·¢ËÍÖÁÎÚ¿ËÀ¼µÄ·þÎñÆ÷¡£¾­¹ýµ÷²éºóRubyGemsÔ±¹¤·¢ÏÖÁ˸ü¶à¿âÊܵ½´«È¾ £¬¾ßÌå°æ±¾ÁбíÇë²Î¿¼Á´½Ó¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/


4¡¢¶íÂÞ˹·¸×ïÍÅ»ïSilence½«Ö¸±êÀ©´óÖÁÈ«ÇòÒøÐÐ


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ƾ¾ÝGroup-IB°ä²¼µÄ¡¶Silence 2.0£º×ßÏòÈ«Çò¡·»ã±¨ £¬×Ô2018Äê9Ô·ÝÒÔÀ´ £¬Í¨¹ýÔö³¤¹¥»÷ƵÂʵķ½Ê½ £¬¸Ã¶íÂÞ˹·¿·¸×ïÍÅ»ïÒѾ­ÇÔÈ¡Á˽ü350ÍòÃÀÔªµÄ×ʽð¡£ÔÚ´ÓǰһÄêÖÐ £¬¸ÃÍÅ»ïÖÁÉÙÌáÒéÁË16¸öй¥»÷»î¶¯ £¬¶Ô×¼ÁË30¸ö¹ú¶ÈµÄÒøÐÐ £¬Ö¸±êÇøÓòºá¿çÅ·ÖÞ¡¢À­¶¡ÃÀÖÞ¡¢·ÇÖÞºÍÑÇÖÞ¡£ÆäÔì³ÉµÄËðʧÔö³¤ÁË5±¶ £¬´Ó80ÍòÃÀÔªÔö³¤ÖÁ420ÍòÃÀÔª¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/silence-apt-russian-hackers.html

5¡¢×êÑÐÈËÔ±Åû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¶íÂÞ˹×êÑÐÈËÔ±Vasily KravetsÅû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day £¬¸Ã·ì϶ֻӰÏìÁËWindows¿Í»§¶Ë £¬Æ¾¾ÝSteamµÄÊý¾Ý £¬Ô¼ÓÐ9600ÍòÓû§ÊÜÓ°Ïì¡£¸ÃEoP/LPE·ì϶ÔÊÐí¹¥»÷Õßͨ¹ýBaitAndSwitch¼¼ÊõÌáȨÖÁNT AUTHORITY\SYSTEMȨÏÞÖ´ÐÐËÁÒâpayload¡£Kravetsͨ¹ýÊÓÆµÑÝʾÁËÆä¹¥»÷²½Öè £¬½ØÖÁĿǰVÉçÉÐδ½øÐлØÓ¦¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/

6¡¢Ë¼¿Æ½¨¸´UCSÉ豸¼°220»¥»»»úÖеÄ6¸ö¹Ø¼ü·ì϶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

˼¿Æ½¨¸´ÆäUCSÉ豸¼°220ϵÁÐÆóÒµ»¥»»»úÖеÄ6¸ö¹Ø¼ü·ì϶ £¬Ô¶³Ì¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶ÊÕÊÜÖ¸±êÉ豸¡£ÆäÖÐËĸö·ì϶£¨CVE-2019-1938¡¢CVE-2019-1935¡¢CVE-2019-1974ºÍCVE-2019-1937£©µÄCVSSÆÀ·Ö¶¼Îª9.8·Ö £¬ÕâЩ·ì϶ӰÏìÁËUCSÉ豸¡£Áí±íÁ½¸ö·ì϶£¨CVE-2019-1913 £¬CVSS 9.8·ÖºÍCVE-2019-1912 £¬CVSS 9.1·Ö£©ÊÇ220»¥»»»úÖеĻº³åÇøÒç¶Âí½Å £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓ÷ì϶ִÐÐËÁÒâ´úÂë²¢ÊÕÊÜ»¥»»»ú¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/cisco-patches-six-critical-bugs/147585/