ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ50ÖÜ

Ðû²¼Ê±¼ä 2018-12-17
±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2018Äê12ÔÂ10ÈÕ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î82¸ö£¬£¬£¬ £¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇThinkPHP 5.xÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î £»£»£»Adobe Acrobat/Reader¶à¸öÕûÊýÒç³öÎó²î £»£»£»Microsoft Outlook CVE-2018-8587Ô¶³Ì´úÂëÖ´ÐÐÎó²î £»£»£»Microsoft Windows DNS¶ÑÒç³öÎó²î £»£»£»Apache Commons FileUpload DiskFileItemÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£ ¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǰ®Á¢ÐÅÈí¼þÖ¤ÊéÓâÆÚ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂ11¸ö¹ú¼ÒÍ¨Ñ¶ÍøÂç̱»¾ £»£»£»ÐÂAPIÎó²îµ¼ÖÂ5250ÍòÓû§Òþ˽̻¶£¬£¬£¬ £¬£¬£¬£¬Google+½«±»Ìáǰ¹Ø±Õ £»£»£»ÃÀ¹úÖÚÒéÔºÐû²¼ÍøÂçÇå¾²Õ½ÂÔ±¨¸æ£¬£¬£¬ £¬£¬£¬£¬Ìá³öÁùÏîÖ¸µ¼Ô­Ôò £»£»£»ÉñǹÊÖÐж¯£¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃRising SunÃé׼ȫÇò¹ú·À¼°Òªº¦»ù´¡ÉèÊ© £»£»£»Òâ´óÀûʯÓͺÍ×ÔÈ»Æø¹«Ë¾SaipemÔâµ½ºÚ¿ÍÍøÂç¹¥»÷¡£¡£¡£¡£¡£ ¡£¡£

ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£ ¡£¡£



Ö÷ÒªÇå¾²Îó²îÁбí


1. ThinkPHP 5.xÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î


ThinkPHP¶Ô¿ØÖÆÆ÷Ãû±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬ÒÔWEBȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£ ¡£¡£

https://blog.thinkphp.cn/869075


2. Adobe Acrobat/Reader¶à¸öÕûÊýÒç³öÎó²î


Adobe Acrobat/Reader±£´æÕûÊýÒç³öÎó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬£¬ £¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ £»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£¡£

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html


3. Microsoft Outlook CVE-2018-8587Ô¶³Ì´úÂëÖ´ÐÐÎó²î


Microsoft Outlook²»×¼È·´¦Öóͷ£Äڴ湤¾ßÎó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬£¬ £¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-8587


4. Microsoft Windows DNS¶ÑÒç³öÎó²î


Microsoft  DNS Server±£´æ»ùÓڶѵÄÒç³öÎó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8626


5. Apache Commons FileUpload DiskFileItemÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Apache Commons FileUploadʵÏÖ±£´æJava Object·´ÐòÁл¯Îó²î£¬£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£¡£

http://www.zerodayinitiative.com/advisories/ZDI-16-570/



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢°®Á¢ÐÅÈí¼þÖ¤ÊéÓâÆÚ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂ11¸ö¹ú¼ÒÍ¨Ñ¶ÍøÂç̱»¾


welcome-°ÙÀÖ²©


12ÔÂ6ÈÕÈðµäͨѶ¾ÞÍ·°®Á¢ÐŵÄ×°±¸·ºÆðÈí¼þ¹ÊÕÏ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÊýÒÔ°ÙÍò¼ÆµÄÊÖ»úÓû§ÍøÂçͨѶ̱»¾£¬£¬£¬ £¬£¬£¬£¬¶à¸öʹÓð®Á¢ÐÅ×°±¸µÄ¹ú¼ÒÊܵ½Ó°Ï죬£¬£¬ £¬£¬£¬£¬°üÀ¨Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2µÄÓû§¡¢ÈÕ±¾ÈíÒøµÄÓû§µÈ¡£¡£¡£¡£¡£ ¡£¡£°®Á¢ÐÅÔÚÐÂΟåÖгÆ×°±¸¹ÊÕÏÊÇÓÉÌØ¶¨°æ±¾µÄSGSN¨CMMEÈí¼þµ¼ÖµÄ£¬£¬£¬ £¬£¬£¬£¬ÏêϸÀ´Ëµ£¬£¬£¬ £¬£¬£¬£¬Æä»ù´¡Ôµ¹ÊÔ­ÓÉÊÇ×°ÖÃÔÚ¿Í»§Éè±¹ØÁ¬ÄÈí¼þÖ¤ÊéÓâÆÚ¡£¡£¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.ericsson.com/en/press-releases/2018/12/update-on-software-issue-impacting-certain-customers

2¡¢ÐÂAPIÎó²îµ¼ÖÂ5250ÍòÓû§Òþ˽̻¶£¬£¬£¬ £¬£¬£¬£¬Google+½«±»Ìáǰ¹Ø±Õ

welcome-°ÙÀÖ²©



GoogleÈ·ÈÏGoogle+ÔÙÔâÇå¾²ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬ÁíÒ»¸öAPIÎó²îµ¼ÖµÚÈý·½Ó¦ÓúͿª·¢Õß¿ÉÔÚδ¾­ÔÊÐíµÄÇéÐÎÏ»á¼û5250ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ ¡£¡£ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢Ö°ÒµºÍÄêËêµÈ¡£¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤GoogleµÄ˵·¨£¬£¬£¬ £¬£¬£¬£¬¸ÃÎó²îÊÇÔÚ11ÔÂͨ¹ýÈí¼þ¸üÐÂÒýÈëµÄ£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚÒ»ÖÜÄÚ±»·¢Ã÷Ï¢Õù¾ö£¬£¬£¬ £¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢¸ÃÎó²î±»µÚÈý·½Ê¹Óᣡ£¡£¡£¡£ ¡£¡£Google½«ÔÚ2019Äê4Ô¹رÕGoogle+ЧÀÍ£¬£¬£¬ £¬£¬£¬£¬±ÈÔ­¶¨µÄ2019Äê8ÔÂÌáǰÁË4¸öÔ¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/google-plus-hacking.html

3¡¢ÃÀ¹úÖÚÒéÔºÐû²¼ÍøÂçÇå¾²Õ½ÂÔ±¨¸æ£¬£¬£¬ £¬£¬£¬£¬Ìá³öÁùÏîÖ¸µ¼Ô­Ôò

welcome-°ÙÀÖ²©



ÃÀ¹úÖÚÒéÔºÄÜÔ´ºÍÉÌҵίԱ»áÐû²¼ÍøÂçÇå¾²Õ½ÂÔ±¨¸æ£¬£¬£¬ £¬£¬£¬£¬Ö¼ÔÚÈ·Á¢Ô¤·À»ººÍ½âÍøÂçÇå¾²ÊÂÎñµÄÕ½ÂÔ¡£¡£¡£¡£¡£ ¡£¡£¸Ã±¨¸æÒÔΪĿ½ñÃÀ¹úµÄÍøÂçÇå¾²Ðж¯²¢Î´¸úÉÏ»¥ÁªÍøµÄÉú³¤£¬£¬£¬ £¬£¬£¬£¬¹Å°åµÄÐÅÏ¢ÊÖÒÕÕ½ÂÔÔÚÓ¦¶ÔÒ»Ö±ÔöÌíµÄÍøÂçÇå¾²ÊÂÎñÖÐÊÕЧÉõ΢¡£¡£¡£¡£¡£ ¡£¡£±¨¸æÊáÀí³öÁùµãÍøÂçÇå¾²¿´·¨ÓëÁùÏîÍøÂçÇå¾²ÓÅÏÈÏ£¬£¬ £¬£¬£¬£¬°üÀ¨½¨ÉèÆÕ±é½ÓÊܵÄЭͬÅû¶³ÌÐò¡¢ÒýÈëÈí¼þÎïÁÏÇåµ¥£¨software bill of materials£¬£¬£¬ £¬£¬£¬£¬¼ò³ÆSBOM£©¡¢Ö§³Ö¿ªÔ´Èí¼þ¡¢ÍêÉÆCVE³ÌÐò¡¢ÊµÑéÊÖÒÕÉúÃüÖÜÆÚÖ§³ÖÕ½ÂÔÒÔ¼°Ç¿»¯¹«Ë½ÏàÖúģʽ¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://energycommerce.house.gov/wp-content/uploads/2018/12/12.07.18-Cybersecurity-Strategy-Report.pdf

4¡¢ÉñǹÊÖÐж¯£¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃRising SunÃé׼ȫÇò¹ú·À¼°Òªº¦»ù´¡ÉèÊ©

welcome-°ÙÀÖ²©


McAfeeÑо¿Ö°Ô±·¢Ã÷жñÒâ»î¶¯¡°ÉñǹÊÖÐж¯¡±£¬£¬£¬ £¬£¬£¬£¬¸Ã»î¶¯Õë¶ÔÈ«ÇòµÄ¹ú·ÀºÍÒªº¦»ù´¡ÉèÊ©£¬£¬£¬ £¬£¬£¬£¬°üÀ¨ºËÄÜ¡¢¹ú·À¡¢ÄÜÔ´ºÍ½ðÈÚÆóÒµ¡£¡£¡£¡£¡£ ¡£¡£×Ô2018Äê10ÔÂ25ÈÕÒÔÀ´£¬£¬£¬ £¬£¬£¬£¬Ôڶ̶ÌÁ½¸öÔÂÄÚÉñǹÊÖÐж¯ÒÑÓ°ÏìÁËÈ«Çò87¸öÆóÒµ¡£¡£¡£¡£¡£ ¡£¡£¹¥»÷Õßαװ³ÉÕÐÆ¸»î¶¯£¬£¬£¬ £¬£¬£¬£¬Í¨¹ýDropbox·Ö·¢°üÀ¨¶ñÒâºêµÄWordÎĵµ£¬£¬£¬ £¬£¬£¬£¬²¢×îÖÕ½»¸¶Rising SunºóÃÅ¡£¡£¡£¡£¡£ ¡£¡£¸ÃºóÃÅÓëAPT×éÖ¯LazarusÔÚ2015ÄêʹÓõĶñÒâÈí¼þDuuzer¾ßÓÐÏàͬµÄ´úÂë¡£¡£¡£¡£¡£ ¡£¡£Ö»¹ÜÐí¶àÏßË÷¶¼Ö¸ÏòÁËLazarus£¬£¬£¬ £¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪÕâЩ¹ýÓÚÏÔ×ŵÄÖ¤¾Ý¿ÉÄÜÖ»Êǹ¥»÷Õß¾ÓÐÄÉèÖõÄfalse flag¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/


5¡¢Òâ´óÀûʯÓͺÍ×ÔÈ»Æø¹«Ë¾SaipemÔâµ½ºÚ¿ÍÍøÂç¹¥»÷

welcome-°ÙÀÖ²©



±¾ÖÜÒ»Òâ´óÀûʯÓͺÍ×ÔÈ»Æø¹«Ë¾SaipemÔâµ½ÍøÂç¹¥»÷¡£¡£¡£¡£¡£ ¡£¡£Saipem¹«Ë¾µÄ¿Í»§±é²¼ÔÚ60¶à¸ö¹ú¼ÒÄÚ£¬£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷ȪԴÓÚÓ¡¶È£¬£¬£¬ £¬£¬£¬£¬Ö÷ÒªÓ°ÏìÁ˸ù«Ë¾ÔÚÖж«µØÇøµÄЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬£¬°üÀ¨É³Ìذ¢À­²®¡¢°¢ÁªÇõºÍ¿ÆÍþÌØ£¬£¬£¬ £¬£¬£¬£¬ÆäÔÚÒâ´óÀû¡¢·¨¹úºÍÓ¢¹úµÄÖ÷ÒªÔËÓªÖÐÐÄûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£ ¡£¡£Saipem¶Ô·͸ÉçÌåÏÖ¹¥»÷ȪԴÓÚÓ¡¶È½ðÄΣ¬£¬£¬ £¬£¬£¬£¬µ«¹¥»÷ÕßµÄÉí·Ý²»Ã÷£¬£¬£¬ £¬£¬£¬£¬ÓÉÓÚϵͳ¶¼Óб¸·Ý£¬£¬£¬ £¬£¬£¬£¬Òò´ËûÓÐÊý¾ÝÊܵ½Ëðʧ¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78859/hacking/saipem-cyber-attack.html


ÉùÃ÷£º±¾×ÊѶÓɰÙÀÖ²©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí