ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ51ÖÜ

°ä²¼¹¦·ò 2019-12-30

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼°²È«·ì϶43¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇPalo Alto Networks PA-7080 ROOTȨÏÞ»ñÈ¡·ì϶; Mozilla Network Security Services»º³åÇøÒç³ö·ì϶£»Docker docker-credential-secretserviceÄÚ´æÃýÎóÀûÓÃȨÏÞÌáÉý·ì϶£»TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´Ðзì϶£»D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´Ðзì϶¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢£»CitrixËùÓвúÆ·´æÔÚ´úÂëÖ´Ðзì϶£¨CVE-2019-19781£©£»¶íÂÞ˹µ±¾Ö°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ£»P2P½©Ê¬ÍøÂçMoziÖØÒªÕë¶ÔÍø¼þ¡¢¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷£»°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬£¬£¬¹È¸èÆ»¹û´¹Î£Ï¼Ü¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£


>ÖØÒª°²È«·ì϶Áбí


1. Palo Alto Networks PA-7080 ROOTȨÏÞ»ñÈ¡·ì϶


Palo Alto Networks PA-7080ûÓÐÕýÈ·Ï޶ȶÔLog Forwarding CardͨѶµÄÏÞ¶È£¬£¬£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿É»ñÈ¡rootȨÏÞ¡£¡£

https://nvd.nist.gov/vuln/detail/CVE-2019-17440


2. Mozilla Network Security Services»º³åÇøÒç³ö·ì϶


Mozilla Network Security Services cryptographic primitives³¤¶È´¦ÖôæÔÚ»º³åÇøÒç³ö·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶¹¹½¨¶ñÒâWEBÒ³£¬£¬£¬ÓÕʹҪÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://access.redhat.com/security/cve/cve-2019-17006


3. Docker docker-credential-secretserviceÄÚ´æÃýÎóÀûÓÃȨÏÞÌáÉý·ì϶


Docker docker-credential-secretservice´æÔÚÁ½´Î¿ªÊÍ·ì϶£¬£¬£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉÌáÉýȨÏÞ²¢Ö´ÐдúÂë¡£¡£

https://www.zerodayinitiative.com/advisories/ZDI-19-1030/


4. TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´Ðзì϶


TigerVNC ZlibInStream´æÔÚÄÚ´æ·ÛËé·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄ·þÎñÒªÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40


5. D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´Ðзì϶


D-Link DCS-960L HNAP SOAPAction´æÔÚÕ»Òç³ö·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://www.zerodayinitiative.com/advisories/ZDI-19-1031/


>ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢ÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢


OG¶«·½Ìü¡¤(Öйú´ó½)


ÓÎÏ·¿ª·¢ÉÌZyngaÔÚ9Ô·ÝÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬½ü1.73ÒÚ¸öÓû§ÃûºÍÃÜÂëй¶¡£¡£¹ÌÈ»ZyngaÓÚ9Ôµ×ÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬£¬£¬µ«Êý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾HaveIBeenPwned´Ë¿ÌÍøÂçµ½ÁËÓйØÊÜÓ°ÏìÕË»§ÊýÁ¿µÄ¹Ù·½Êý×Ö¡£¡£Æ¾¾Ý¸ÃÍøÕ¾µÄ¸üУ¬£¬£¬¹²ÓÐ1.729ÒÚ¸ö·ÖÆçµÄµç×ÓÓʼþµØÖ·ÒÔ¼°Óû§ÃûºÍÃÜÂëÔÚÕâ´Î¹¥»÷ÖÐй¶£¬£¬£¬ºÃÐÂÎÅÊÇÕâЩÃÜÂëÒÔ¼ÓÑεÄSHA-1É¢Áдó¾Ö´æ´¢£¬£¬£¬Ê¹ÆäÄÑÒÔ±»ÆÆ½â¡£¡£


Ô­ÎÄÁ´½Ó£º £º

https://www.infosecurity-magazine.com/news/zynga-breach-hit-173-million/


2¡¢¡¢CitrixËùÓвúÆ·´æÔÚ´úÂëÖ´Ðзì϶£¨CVE-2019-19781£©


OG¶«·½Ìü¡¤(Öйú´ó½)


°²È«×¨¼ÒMikhail KlyuchnikovÔÚCitrix Application Delivery ControllerºÍCitrix Gateway²úÆ·Öз¢ÏÖÒ»¸öÑÏÖØµÄ´úÂëÖ´Ðзì϶£¬£¬£¬¸Ã·ì϶£¨CVE-2019-19781£©Ê¹158¸ö¹ú¶ÈµÄ³¬¹ý8Íò¼Ò¹«Ë¾Ãæ¶Ô·çÏÕ¡£¡£ÓÉÓÚÀûÓø÷ì϶µÄ¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿É½Ó¼û¹«Ë¾µÄÄÚ²¿ÍøÂ磬£¬£¬Òò¶ø¸Ã·ì϶ÓÈÆäΣÏÕ¡£¡£³É¹¦ÀûÓø÷ì϶¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐС£¡£Æ¾¾ÝCitrix£¬£¬£¬¸Ã·ì϶ӰÏìÁËËùÓÐÊÜÖ§³ÖµÄ²úÆ·°æ±¾ºÍƽ̨£¬£¬£¬Ö»¹ÜCitrixÉÐδ°ä²¼Ð¹̼þÀ´½â¾ö¸ÃÎÊÌ⣬£¬£¬µ«¸Ã¹«Ë¾ÒѰ䲼ÁËÒ»Ì×Õë¶Ô¶ÀÁ¢ÏµÍ³ºÍ¼¯ÈºµÄ»º½â´ëÊ©£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§Ñ¡È¡ËüÃÇ¡£¡£


Ô­ÎÄÁ´½Ó£º £º

https://www.bleepingcomputer.com/news/security/critical-citrix-flaw-may-expose-thousands-of-firms-to-attacks/


3¡¢¡¢¶íÂÞ˹µ±¾Ö°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ


OG¶«·½Ìü¡¤(Öйú´ó½)


¶íÂÞ˹µ±¾ÖÖÜÒ»°ä·¢³É¹¦½øÐл¥ÁªÍø¶Ï¿ª²âÊÔ¡£¡£¸ÃÏî²âÊÔ´ÓÉÏÖÜÆðÍ·½øÐУ¬£¬£¬³ÖÐøÁ˶àÌ죬£¬£¬Éæ¼°¶íÂÞ˹µ±¾Ö»ú¹¹¡¢¡¢±¾µØ»¥ÁªÍø·þÎñÌṩÉ̺ͶíÂÞ˹±¾µØ»¥ÁªÍø¹«Ë¾¡£¡£³¢ÊÔµÄÖ÷ÕÅÊDzâÊԸùú¶ÈµÄ»¥ÁªÍø»ù´¡ÉèÊ©£¨ÔÚ¶íÂÞ˹ÄÚ²¿³ÆÎªRuNet£©ÊÇ·ñÄܹ»ÔÚ²»½Ó¼ûÈ«ÇòDNSϵͳºÍÍⲿ»¥ÁªÍøµÄÇé¿öÏÂÔËÐС£¡£»¥ÁªÍøÁ÷Á¿ÔÚ¶íÂÞ˹ÄÚ²¿½øÐÐÁËÖØÐ·ÓÉ£¬£¬£¬ÓÐЧµØÊ¹¶íÂÞ˹µÄRuNet³ÉΪÊÀ½çÉÏ×î´óµÄÄÚÁªÍø¡£¡£µ±¾ÖûÓÐй©ÓйزâÊÔ¼°Æä×é¼þµÄÈκμ¼Êõϸ½Ú£¬£¬£¬Ö»ÊÇÅú×¢µ±¾Ö²âÊÔÁ˼¸ÖÖ¶Ï¿ªÏνӵij¡¾°£¬£¬£¬Ô̺¬·ÂÕÕ¹úÍâÍøÂç¹¥»÷µÄ³¡¾°¡£¡£µ±¾ÖÔÚ°ä²¼»áÉϰµÊ¾¸Ã³¢ÊÔ»ñµÃÁ˳ɹ¦¡£¡£


Ô­ÎÄÁ´½Ó£º £º

https://www.zdnet.com/article/russia-successfully-disconnected-from-the-internet/


4¡¢¡¢P2P½©Ê¬ÍøÂçMoziÖØÒªÕë¶ÔÍø¼þ¡¢¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷


OG¶«·½Ìü¡¤(Öйú´ó½)


×êÑÐÈËÔ±·¢ÏÖÐÂP2P½©Ê¬ÍøÂçMoziÕýÔÚ»ý¼«Õë¶ÔÍø¼þ¡¢¡¢D-LinkºÍ»ªÎªµÄ·ÓÉÆ÷¡£¡£¸Ã½©Ê¬ÍøÂçÓë¶ñÒâÈí¼þGafgytÓйØ£¬£¬£¬ÓÉÓÚËüÖØÓÃÁ˺óÕߵIJ¿ÃÅ´úÂë¡£¡£MoziµÄÖØÒªÖ÷ÕÅÊÇÓÃÓÚDDoS¹¥»÷¡£¡£×êÑÐÈËÔ±·¢Ïָý©Ê¬ÍøÂçʹÓÃÒ»ÖÖ¶¨ÖƵÄÀ©´óÉ¢²¼Ê½¹þÏ£±í£¨DHT£©ºÍ̸À´ÊµÏÖ£¬£¬£¬¸ÃºÍ̸ͨ³£±»torrent¿Í»§¶ËºÍÆäËûP2Pƽ̨ÓÃÓÚ´æ´¢½ÚµãÁªÏµÐÅÏ¢¡£¡£Mozi»¹Ê¹ÓÃECDSA384ºÍXORËã·¨À´È·±£½©Ê¬ÍøÂç×é¼þºÍP2PÍøÂçµÄÆëÈ«ÐԺͰ²È«ÐÔ¡£¡£MoziÖØÒªÍ¨¹ýtelnetÀûÓÃÈõÃÜÂë½Ó¼ûÒ×Êܹ¥»÷µÄÉ豸£¬£¬£¬²¢ÔÚ¼ÓÔØ¶ñÒâÈí¼þºóËÑË÷ºÍϰȾÆäËüÒ×Êܹ¥»÷µÄÉ豸¡£¡£


Ô­ÎÄÁ´½Ó£º £º

https://www.bleepingcomputer.com/news/security/new-mozi-p2p-botnet-takes-over-netgear-d-link-huawei-routers/


5¡¢¡¢°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬£¬£¬¹È¸èÆ»¹û´¹Î£Ï¼Ü


OG¶«·½Ìü¡¤(Öйú´ó½)


ƾ¾Ý¡¶Å¦Ô¼Ê±±¨¡·±¨µÀ£¬£¬£¬°¢ÁªÇõµÐÔÖʹÓÃÊ¢ÐеÄͨѶÀûÓÃToTok×÷Ϊ¼à¶½¹¤¾ß£¬£¬£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¡£¸ÃAPPĿǰÒѱ»AppleºÍGoogleÔÚÏßÉ̵êϼÜ¡£¡£ToTokµÄÓû§Ô̺¬°¢ÁªÇõºÍÖж«ÆäËû¹ú¶ÈµÄÊý°ÙÍòÃñÖÚ¡£¡£¸Ã»ã±¨³Æ£¬£¬£¬ÃÀ¹úµý±¨¹ÙÔ±ºÍ°²È«×êÑÐÈËԱȷ¶¨°¢ÁªÇõµ±¾ÖÕýÔÚʹÓøÃAPP½øÐмල»î¶¯¡£¡£ToTok·ñ¶¨ÁËÓëµ±¾ÐÄà¿Ø´òËãÓйØ£¬£¬£¬²¢°µÊ¾¸ÃÀûÓñ»Ï¼ÜÊÇÓÉÓÚ¡°¼¼ÊõÎÊÌ⡱¡£¡£


Ô­ÎÄÁ´½Ó£º £º

https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html