ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ4ÖÜ

°ä²¼¹¦·ò 2019-01-28

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê1ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼°²È«·ì϶46¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇSchneider Electric IIoT MonitorÓ²±àÂëÃØÔ¿ÐÅϢй¶·ì϶ £»Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å £»Advantech WebAccess/SCADA SQL×¢Èë·ì϶ £»Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶ £»PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÆ¾¾ÝGDPRÌõÀý£¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle· £¿î5000ÍòÅ·Ôª;Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶;ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢£¬Ô̺¬Óû§Ö§¸¶Êý¾Ý;Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒÑϰȾԼ100ÍòÓû§;PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬×°ÖÃÎļþ±»´«È¾¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£

³ÁÒª°²È«·ì϶Áбí


1. Schneider Electric IIoT MonitorÓ²±àÂëÃØÔ¿ÐÅϢй¶·ì϶
Schneider Electric IIoT MonitorʹÓÃÁËÓ²±àÂëÃÜÔ¿£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û¡£
http://www.schneider-electric.com/sites/corporate/en/support/

2. Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å
Adobe AcrobatºÍReader´¦ÖÃÄÚ´æ¶ÔÏó´æÔÚÔ½½ç¶Á·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb18-30.html

3. Advantech WebAccess/SCADA SQL×¢Èë·ì϶
Advantech WebAccess/SCADA´æÔÚSQL×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£
https://support.advantech.com/support/DownloadSRDetail_New.aspx?SR_ID=1-MS9MJV&Doc_Source=Download

4. Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶
Cisco Small Business RV320ºÍRV325´¦ÖÃHTTP POSTÒªÇó·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject

5. PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶
PLC Wireless Router GPN2.4P21-C-CN cgi-bin/webproc?getpage=html/index.html subpage=wlsecurity URI´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬸ü¸ÄÎÞÏß°²È«ÃÜÂë¡£
https://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html

 ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Æ¾¾ÝGDPRÌõÀý£¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle· £¿î5000ÍòÅ·Ôª


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

ƾ¾ÝÅ·ÃËÓÚ2018Äê5ÔÂÉúЧµÄGDPRÌõÀý£¬·¨¹úÊý¾Ý± £»¤¼à¹Ü»ú¹¹CNIL¶ÔGoogle·¢³öÁË5000ÍòÅ·Ôª£¨Ô¼ºÏ5700ÍòÃÀÔª£©µÄ·£µ¥¡£CNIL³ÆÕâ±Ê· £¿îµÄÔ­ÒòÊÇGoogle¹«Ë¾¡°²»×ãͨÃ÷¶È¡¢ÐÅÏ¢²»ºÏ³ÆÒÔ¼°ÔÚ¸öÐÔ»¯¸æ°×·½ÃæÃ»ÓлñµÃÓû§µÄÓÐЧÔ޳ɡ±¡£ÕâÊÇCNILƾ¾ÝGDPR¿ª³öµÄÊ×ÕÅ·£µ¥¡£Google»ØÓ¦³Æ¡°ÎÒÃǼ«¶ÈÖÂÁ¦ÓÚÂú×ãÈËÃǶÔÊý¾ÝͨÃ÷¶ÈµÄ½øÕ¹ºÍGDPRµÄÒªÇó£¬ÎÒÃÇÔÚ×êÑоö¶¨ÎÒÃǽÓÏÂÀ´µÄ²½Ö衱¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/google-privacy-gdpr-fine.html

2¡¢Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


×êÑÐÈËÔ±Max Justicz·¢ÏÖLinux°üÖÎÀíÆ÷apt/apt-get´æÔÚÔ¶³Ì´úÂëÖ´Ðзì϶£¬¸Ã·ì϶£¨CVE-2019-3462£©ÔÊÐí¹¥»÷Õß½øÐÐÖÐÑëÈ˹¥»÷²¢»ñÈ¡rootȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£¸Ã·ì϶µÄÆðÒòÊÇaptĬÈÏʹÓÃHTTPͨѶ£¬¶øÆätransport²½ÖèÖд¦ÖÃHTTP³Á¶¨ÏòµÄ´úÂëûÓÐÕýÈ·²é³­Ä³Ð©²ÎÊý£¬¹¥»÷Õß¿Éͨ¹ýÖÐÑëÈ˹¥»÷ʹÓÃαÔìÊðÃûÆ­¹ý¸Ã²é³­£¬½ø¶øÔÚÓû§Ö÷»úÉÏ×°ÖÃËÁÒⷨʽ¡£ÓÉÓÚapt×ÔÉíÒѾ­»ñÈ¡ÁËrootȨÏÞ£¬¸Ã¶ñÒⷨʽ¿ÉÔÚrootȨÏÞÏÂÖ´ÐС£¸Ã·ì϶ӰÏìÁìÓò¼«Îª¿í·º£¬ËùÓÐʹÓÃÀϰ汾aptµÄÖ÷»ú¶¼Êܵ½Ó°Ïì¡£apt¿ª·¢ÈËÔ±ÒÑÔÚ°æ±¾1.4.9Öн¨¸´Á˸÷ì϶¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/linux-apt-http-hacking.html

3¡¢ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢£¬Ô̺¬Óû§Ö§¸¶Êý¾Ý

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¾ÝZDNet±¨Â·£¬°²È«×êÑÐÈËÔ±Justin Paine·¢ÏÖÒ»¸öÍøÂç´ò¶Ä¼¯ÍŵÄElasticSearch·þÎñÆ÷δÉèÃÜÂ룬µ¼Ö³¬¹ý1.08ÒÚ´ò¶ÄÐÅϢй¶¡£¸Ã·þÎñÆ÷ÉÏй¶µÄÓû§ÐÅÏ¢Ô̺¬¿Í»§µÄÕæÊµÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢µ®ÉúÈÕÆÚ¡¢ÍøÕ¾Óû§Ãû¡¢ÕÊ»§Óà¶î¡¢IPµØÖ·¡¢ä¯ÀÀÆ÷ºÍ²Ù×÷ϵͳÐÅÏ¢ÒÔ¼°ÉϴεǼÐÅÏ¢µÈ¡£´Ë±í£¬Paine»¹·¢ÏÖ1.08ÒÚÌõ´ò¶ÄÐÅÏ¢£¬ÆäÖÐÔ̺¬¿Í»§µÄ´æ¿î¡¢È¡¿îÒÔ¼°Ö§¸¶ÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/online-casino-group-leaks-information-on-108-million-bets-including-user-details/

4¡¢Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒÑϰȾԼ100ÍòÓû§

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ConfiantºÍMalwarebytesµÄ×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬¸Ã¹¥»÷»î¶¯×Ô1ÔÂ11ÈÕÒÔÀ´Ò»Ïò»îÔ¾£¬ÀûÓÃÒþдÊõÀ´·Ö·¢ShlayerľÂí¡£×êÑÐÈËÔ±¹²¼ì²âµ½Á˳¬¹ý19Íò¸ö¶ñÒâ¸æ°×£¬Ô¤¼ÆÔ¼ÓÐ100ÍòÓû§Êܵ½Ó°Ïì¡£ÕâЩ¸æ°×ͼƬÖаµ²ØÁ˶ñÒâµÄJavaScript´úÂ룬²¢¼Ù×°³ÉFlashÉý¼¶À´ÓÕʹÓû§µã»÷×°Öá£×êÑÐÈËԱƾ¾ÝÆäÓòÃû½«¹¥»÷Õß³ÆÎªVeryMal£¬µ«²¢Î´»ñµÃ¹¥»÷Õߵĸü¶àÓйØÐÅÏ¢¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/malware-in-ad-based-images-targets-mac-users/141115/

5¡¢PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬×°ÖÃÎļþ±»´«È¾

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


PHP°üÖÎÀíÆ÷PEAR£¨go-pear.phar£©µÄ¹ÙÍø£¨pear-php.net£©ÔâºÚ¿ÍÈëÇÖ£¬Æä×°ÖÃÎļþ±»´«È¾¡£Æ¾¾ÝPEAR°ä²¼µÄ°²È«²¼¸æ£¬Ô̺¬¶ñÒâ´úÂëµÄ×°ÖÃÎļþÖÁÉÙÔÚÆä¹ÙÍøÉÏ´æÔÚÁ˰ëÄêµÄ¹¦·ò¡£PEARÍŶӰµÊ¾ÔÚ½øÐе÷²é£¬ÒÔÈ·ÈϹ¥»÷µÄˮƽºÍÈëÇÖÊÇÈôºÎ²úÉúµÄ¡£Ö»ÓÐPEAR¹ÙÍøÉϵÄ×°ÖðüÊܵ½Ó°Ï죬GitHubÉÏÃæµÄ×°ÖÃÎļþδÊÜÇÖº¦¡£Óû§´Ë¿ÌÄܹ»´ÓGithub¸ßµÍÔØÐµĸɾ»°æ±¾1.10.10¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/php-pear-hacked.html

ÉêÃ÷£º±¾×ÊѶÓɱ¦ÔËÀ³¹Ù·½ÍøÕ¾Î¬ËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù