ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ51ÖÜ
°ä²¼¹¦·ò 2019-12-30>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê12ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼°²È«·ì϶43¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇPalo Alto Networks PA-7080 ROOTȨÏÞ»ñÈ¡·ì϶; Mozilla Network Security Services»º³åÇøÒç³ö·ì϶£»Docker docker-credential-secretserviceÄÚ´æÃýÎóÀûÓÃȨÏÞÌáÉý·ì϶£»TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´Ðзì϶£»D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´Ðзì϶¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢£»CitrixËùÓвúÆ·´æÔÚ´úÂëÖ´Ðзì϶£¨CVE-2019-19781£©£»¶íÂÞ˹µ±¾Ö°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ£»P2P½©Ê¬ÍøÂçMoziÖØÒªÕë¶ÔÍø¼þ¡¢¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷£»°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬£¬£¬¹È¸èÆ»¹û´¹Î£Ï¼ܡ£¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£
>ÖØÒª°²È«·ì϶Áбí
1. Palo Alto Networks PA-7080 ROOTȨÏÞ»ñÈ¡·ì϶
Palo Alto Networks PA-7080ûÓÐÕýÈ·Ï޶ȶÔLog Forwarding CardͨѶµÄÏÞ¶È£¬£¬£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿É»ñÈ¡rootȨÏÞ¡£¡£
https://nvd.nist.gov/vuln/detail/CVE-2019-17440
2. Mozilla Network Security Services»º³åÇøÒç³ö·ì϶
Mozilla Network Security Services cryptographic primitives³¤¶È´¦ÖôæÔÚ»º³åÇøÒç³ö·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâWEBÒ³£¬£¬£¬ÓÕʹҪÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://access.redhat.com/security/cve/cve-2019-17006
3. Docker docker-credential-secretserviceÄÚ´æÃýÎóÀûÓÃȨÏÞÌáÉý·ì϶
Docker docker-credential-secretservice´æÔÚÁ½´Î¿ªÊÍ·ì϶£¬£¬£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉÌáÉýȨÏÞ²¢Ö´ÐдúÂë¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-1030/
4. TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´Ðзì϶
TigerVNC ZlibInStream´æÔÚÄÚ´æ·ÛËé·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄ·þÎñÒªÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40
5. D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´Ðзì϶
D-Link DCS-960L HNAP SOAPAction´æÔÚÕ»Òç³ö·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-1031/
>ÖØÒª°²È«ÊÂÎñ×ÛÊö
1¡¢¡¢ÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢
ÓÎÏ·¿ª·¢ÉÌZyngaÔÚ9Ô·ÝÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬½ü1.73ÒÚ¸öÓû§ÃûºÍÃÜÂëй¶¡£¡£¹ÌÈ»ZyngaÓÚ9Ôµ×ÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬£¬£¬µ«Êý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾HaveIBeenPwned´Ë¿ÌÍøÂçµ½ÁËÓйØÊÜÓ°ÏìÕË»§ÊýÁ¿µÄ¹Ù·½Êý×Ö¡£¡£Æ¾¾Ý¸ÃÍøÕ¾µÄ¸üУ¬£¬£¬¹²ÓÐ1.729ÒÚ¸ö·ÖÆçµÄµç×ÓÓʼþµØÖ·ÒÔ¼°Óû§ÃûºÍÃÜÂëÔÚÕâ´Î¹¥»÷ÖÐй¶£¬£¬£¬ºÃÐÂÎÅÊÇÕâЩÃÜÂëÒÔ¼ÓÑεÄSHA-1É¢Áдó¾Ö´æ´¢£¬£¬£¬Ê¹ÆäÄÑÒÔ±»ÆÆ½â¡£¡£
ÔÎÄÁ´½Ó£º£º
https://www.infosecurity-magazine.com/news/zynga-breach-hit-173-million/
2¡¢¡¢CitrixËùÓвúÆ·´æÔÚ´úÂëÖ´Ðзì϶£¨CVE-2019-19781£©
°²È«×¨¼ÒMikhail KlyuchnikovÔÚCitrix Application Delivery ControllerºÍCitrix Gateway²úÆ·Öз¢ÏÖÒ»¸öÑÏÖØµÄ´úÂëÖ´Ðзì϶£¬£¬£¬¸Ã·ì϶£¨CVE-2019-19781£©Ê¹158¸ö¹ú¶ÈµÄ³¬¹ý8Íò¼Ò¹«Ë¾Ãæ¶Ô·çÏÕ¡£¡£ÓÉÓÚÀûÓø÷ì϶µÄ¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿É½Ó¼û¹«Ë¾µÄÄÚ²¿ÍøÂ磬£¬£¬Òò¶ø¸Ã·ì϶ÓÈÆäΣÏÕ¡£¡£³É¹¦ÀûÓø÷ì϶¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐС£¡£Æ¾¾ÝCitrix£¬£¬£¬¸Ã·ì϶ӰÏìÁËËùÓÐÊÜÖ§³ÖµÄ²úÆ·°æ±¾ºÍƽ̨£¬£¬£¬Ö»¹ÜCitrixÉÐδ°ä²¼Ð¹̼þÀ´½â¾ö¸ÃÎÊÌ⣬£¬£¬µ«¸Ã¹«Ë¾ÒѰ䲼ÁËÒ»Ì×Õë¶Ô¶ÀÁ¢ÏµÍ³ºÍ¼¯ÈºµÄ»º½â´ëÊ©£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§Ñ¡È¡ËüÃÇ¡£¡£
ÔÎÄÁ´½Ó£º£º
https://www.bleepingcomputer.com/news/security/critical-citrix-flaw-may-expose-thousands-of-firms-to-attacks/
3¡¢¡¢¶íÂÞ˹µ±¾Ö°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ
¶íÂÞ˹µ±¾ÖÖÜÒ»°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ¡£¡£¸ÃÏî²âÊÔ´ÓÉÏÖÜÆðÍ·½øÐУ¬£¬£¬³ÖÐøÁ˶àÌ죬£¬£¬Éæ¼°¶íÂÞ˹µ±¾Ö»ú¹¹¡¢¡¢±¾µØ»¥ÁªÍø·þÎñÌṩÉ̺ͶíÂÞ˹±¾µØ»¥ÁªÍø¹«Ë¾¡£¡£³¢ÊÔµÄÖ÷ÕÅÊDzâÊԸùú¶ÈµÄ»¥ÁªÍø»ù´¡ÉèÊ©£¨ÔÚ¶íÂÞ˹ÄÚ²¿³ÆÎªRuNet£©ÊÇ·ñÄܹ»ÔÚ²»½Ó¼ûÈ«ÇòDNSϵͳºÍÍⲿ»¥ÁªÍøµÄÇé¿öÏÂÔËÐС£¡£»¥ÁªÍøÁ÷Á¿ÔÚ¶íÂÞ˹ÄÚ²¿½øÐÐÁËÖØÐ·ÓÉ£¬£¬£¬ÓÐЧµØÊ¹¶íÂÞ˹µÄRuNet³ÉΪÊÀ½çÉÏ×î´óµÄÄÚÁªÍø¡£¡£µ±¾ÖûÓÐй©ÓйزâÊÔ¼°Æä×é¼þµÄÈκμ¼Êõϸ½Ú£¬£¬£¬Ö»ÊÇÅú×¢µ±¾Ö²âÊÔÁ˼¸ÖÖ¶Ï¿ªÏνӵij¡¾°£¬£¬£¬Ô̺¬·ÂÕÕ¹úÍâÍøÂç¹¥»÷µÄ³¡¾°¡£¡£µ±¾ÖÔÚ°ä²¼»áÉϰµÊ¾¸Ã³¢ÊÔ»ñµÃÁ˳ɹ¦¡£¡£
ÔÎÄÁ´½Ó£º£º
https://www.zdnet.com/article/russia-successfully-disconnected-from-the-internet/
4¡¢¡¢P2P½©Ê¬ÍøÂçMoziÖØÒªÕë¶ÔÍø¼þ¡¢¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷
×êÑÐÈËÔ±·¢ÏÖÐÂP2P½©Ê¬ÍøÂçMoziÕýÔÚ»ý¼«Õë¶ÔÍø¼þ¡¢¡¢D-LinkºÍ»ªÎªµÄ·ÓÉÆ÷¡£¡£¸Ã½©Ê¬ÍøÂçÓë¶ñÒâÈí¼þGafgytÓйأ¬£¬£¬ÓÉÓÚËüÖØÓÃÁ˺óÕߵIJ¿ÃÅ´úÂë¡£¡£MoziµÄÖØÒªÖ÷ÕÅÊÇÓÃÓÚDDoS¹¥»÷¡£¡£×êÑÐÈËÔ±·¢Ïָý©Ê¬ÍøÂçʹÓÃÒ»ÖÖ¶¨ÖƵÄÀ©´óÉ¢²¼Ê½¹þÏ£±í£¨DHT£©ºÍ̸À´ÊµÏÖ£¬£¬£¬¸ÃºÍ̸ͨ³£±»torrent¿Í»§¶ËºÍÆäËûP2Pƽ̨ÓÃÓÚ´æ´¢½ÚµãÁªÏµÐÅÏ¢¡£¡£Mozi»¹Ê¹ÓÃECDSA384ºÍXORËã·¨À´È·±£½©Ê¬ÍøÂç×é¼þºÍP2PÍøÂçµÄÆëÈ«ÐԺͰ²È«ÐÔ¡£¡£MoziÖØÒªÍ¨¹ýtelnetÀûÓÃÈõÃÜÂë½Ó¼ûÒ×Êܹ¥»÷µÄÉ豸£¬£¬£¬²¢ÔÚ¼ÓÔØ¶ñÒâÈí¼þºóËÑË÷ºÍϰȾÆäËüÒ×Êܹ¥»÷µÄÉ豸¡£¡£
ÔÎÄÁ´½Ó£º£º
https://www.bleepingcomputer.com/news/security/new-mozi-p2p-botnet-takes-over-netgear-d-link-huawei-routers/
5¡¢¡¢°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬£¬£¬¹È¸èÆ»¹û´¹Î£Ï¼Ü
ƾ¾Ý¡¶Å¦Ô¼Ê±±¨¡·±¨µÀ£¬£¬£¬°¢ÁªÇõµÐÔÖʹÓÃÊ¢ÐеÄͨѶÀûÓÃToTok×÷Ϊ¼à¶½¹¤¾ß£¬£¬£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¡£¸ÃAPPĿǰÒѱ»AppleºÍGoogleÔÚÏßÉ̵êϼܡ£¡£ToTokµÄÓû§Ô̺¬°¢ÁªÇõºÍÖж«ÆäËû¹ú¶ÈµÄÊý°ÙÍòÃñÖÚ¡£¡£¸Ã»ã±¨³Æ£¬£¬£¬ÃÀ¹úµý±¨¹ÙÔ±ºÍ°²È«×êÑÐÈËԱȷ¶¨°¢ÁªÇõµ±¾ÖÕýÔÚʹÓøÃAPP½øÐмල»î¶¯¡£¡£ToTok·ñ¶¨ÁËÓëµ±¾ÐÄà¿Ø´òËãÓйأ¬£¬£¬²¢°µÊ¾¸ÃÀûÓñ»Ï¼ÜÊÇÓÉÓÚ¡°¼¼ÊõÎÊÌ⡱¡£¡£
ÔÎÄÁ´½Ó£º£º
https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html


¾©¹«Íø°²±¸11010802024551ºÅ