ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ23ÖÜ

Ðû²¼Ê±¼ä 2019-06-17

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î63¸ö£¬£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î£» £»£»£»£»£»£»Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î£» £»£»£»£»£»£» WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î£» £»£»£»£»£»£»Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£» £»£»£»£»£»£»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ


¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£» £»£»£»£»£»£»HSMÑÏÖØÎó²î£¬£¬£¬ £¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹£» £»£»£»£»£»£»Ê©ÄÍµÂµçÆøModicon M580¶à¸öÎó²î£¬£¬£¬ £¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶£» £»£»£»£»£»£»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬²¿·Ö¹¤³§ÒѹرÕ£» £»£»£»£»£»£»Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬ £¬²¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£



Ö÷ÒªÇå¾²Îó²îÁбí



1. SAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î
SAP E-Commerce±£´æÇå¾²Îó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬×¢Èëí§Òâ´úÂ룬£¬£¬ £¬²¢ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐС£¡£¡£¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242


2. Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Campaign±£´æÇå¾²Îó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£

https://helpx.adobe.com/security/products/campaign/apsb19-28.html


3. WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î
WAGO Industrial Managed Switches¶à¸ö²úÆ·±£´æÓ²±àÂëSSHÃÜÔ¿Îó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£¡£

https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02


4. Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Microsoft Word´¦Öóͷ£WORDÎļþ±£´æÇå¾²Îó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ £¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034


5. Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î
Dahua IPC-HFW1XXX±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://www.dahuasecurity.com/support/cybersecurity/details/617



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ

welcome-°ÙÀÖ²©

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÊ¹ÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¡£¡£¡£¡£¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ï죬£¬£¬ £¬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅưüÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¡£¡£¡£¡£¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2¡¢HSMÑÏÖØÎó²î£¬£¬£¬ £¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹


welcome-°ÙÀÖ²©


LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿£¿£¿é£©ÖеÄÑÏÖØÎó²î£¬£¬£¬ £¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸£¬£¬£¬ £¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆÐ§ÀÍÉ̺͵çÐÅÔËÓªÉ̵È¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬ £¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬£¬£¬ £¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬£¬£¬ £¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/

3¡¢Ê©ÄÍµÂµçÆøModicon M580¶à¸öÎó²î£¬£¬£¬ £¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶


welcome-°ÙÀÖ²©


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯¿ØÖÆÆ÷µÄ×îвúÆ·£¬£¬£¬ £¬Ñо¿Ö°Ô±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢Ã÷¶à¸öÎó²î£¬£¬£¬ £¬°üÀ¨¿Éµ¼ÖÂDoSµÄÎó²î£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£©£¬£¬£¬ £¬¿Éµ¼ÖÂÐÅϢй¶µÄÎó²î£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-7842£©µÈ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html

4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬²¿·Ö¹¤³§ÒѹرÕ


welcome-°ÙÀÖ²©


¾Ý±ÈÀûʱýÌ屨µÀ£¬£¬£¬ £¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þѬȾ£¬£¬£¬ £¬¸Ã¹«Ë¾ÒÑ×èÖ¹ÁËËĸö¹ú¼ÒµÄ¹¤³§Éú²ú¡£¡£¡£¡£¡£¡£¸ÃѬȾÊÂÎñ±¬·¢ÔÚ6ÔÂ7ÈÕÐÇÆÚÎ壬£¬£¬ £¬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§£¬£¬£¬ £¬µ«ASCOÒ²¹Ø±ÕÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¡£¡£¡£¡£¡£¾Ý±¨µÀÍ£» £»£»£»£»£»£»úʱ¼äÔ¤¼ÆÎªÒ»ÖÜ£¬£¬£¬ £¬°üÀ¨¼´½«µ½À´µÄÖÜÄ©¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶¸ü¶àÐÅÏ¢£¬£¬£¬ £¬ÏÖÔÚÒ²²»ÖªµÀÀÕË÷Èí¼þµÄÃû³Æ¡£¡£¡£¡£¡£¡£ASCOÊÇÌìÏÂÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò»£¬£¬£¬ £¬Æä¿Í»§°üÀ¨¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/

5¡¢Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬ £¬²¨¼°Ô¼460ÍòÓû§


welcome-°ÙÀÖ²©


Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖØµÄXSSÎó²î£¬£¬£¬ £¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½Ð§ÀÍÖеÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÓÉÓÚEvernote¹ãÊܽӴý£¬£¬£¬ £¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­¹ýʧ£¬£¬£¬ £¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÂÔ£¬£¬£¬ £¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½Ð§À͵ÄÃô¸ÐÓû§ÐÅÏ¢£¬£¬£¬ £¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/