¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181108

Ðû²¼Ê±¼ä 2018-11-08
1¡¢Ñо¿Ö°Ô±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¶íÂÞ˹Îó²îÑо¿Ö°Ô±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£ ¡£¡£¡£¸ÃÎó²îÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬£¬£¬²¢Ê¹ÓÃÆäËüÊÖÒÕÌáȨÖÁring0¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÏêϸÐÎòÁ˸ÃÎó²î±³ºóµÄ»úÖÆ£¬£¬£¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓÆµ¡£¡£¡£ ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/


2¡¢WordPress²å¼þWooCommerceÐÞ¸´Ò»¸öí§ÒâÎļþɾ³ýÎó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷WordPress²å¼þWooCommerce±£´æÒ»¸öí§ÒâÎļþɾ³ýÎó²î£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¶ñÒâ¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÕË»§µÄÃÜÂë²¢ÍêÈ«½ÓÊÜÍøÕ¾¡£¡£¡£ ¡£¡£¡£WooCommerceÊÇWordPressÉÏ×îÊܽӴýµÄµç×ÓÉÌÎñ²å¼þÖ®Ò»£¬£¬£¬Æä×°ÖôÎÊýÁè¼Ý400Íò£¬£¬£¬Îª»¥ÁªÍøÉϽü35%µÄµç×ÓÉÌÎñÍøÕ¾Ìṩ֧³Ö¡£¡£¡£ ¡£¡£¡£WooCommerce¿ª·¢ÍŶÓÒÑÔÚ°æ±¾3.4.6ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html


3¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


˼¿ÆÐû²¼Á˶à¿î²úÆ·µÄ15¸öÇå¾²¸üУ¬£¬£¬ÆäÖаüÀ¨É¾³ýÁËСÐÍÆóÒµ½»Á÷»úÖеÄÒ»¸öºóÃÅÕË»§¡£¡£¡£ ¡£¡£¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£¡£¡£ ¡£¡£¡£ÕâЩºóÃÅÕË»§Îó²î°üÀ¨3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/


4¡¢Ñо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ESETÑо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬¸Ã¹¥»÷ÊÇͨ¹ýÍøÂçÆÊÎöƽ̨StatCounter¾ÙÐеÄ¡£¡£¡£ ¡£¡£¡£StatCounterЧÀͱ»Áè¼Ý200Íò¸öÍøÕ¾Ê¹ÓÃÒÔÊÕ¾Û»á¼ûÕßµÄͳ¼ÆÐÅÏ¢£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚStatCounterµÄJS¾ç±¾ÖÐÌí¼Ó¶ñÒâ´úÂ룬£¬£¬¿ÉÒÔÔÚËùÓеÄÕâÐ©ÍøÕ¾Öж¼×¢Èë¶ñÒâJS´úÂë¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâ´úÂëµÄÆÊÎö£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioËÆºõÊÇÕâ´Î¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£ ¡£¡£¡£µ«ÓÉÓÚ¶ñÒâ¾ç±¾»áÒ»Ö±ÌìÉúеıÈÌØ±ÒµØµã£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨µÃÖªÏêϸÓм¸¶à×ʽ𱻵Á¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2018/11/06/supply-chain-attack-cryptocurrency-exchange-gate-io/


5¡¢Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀµÄÐéÎ±ÒøÐÐÓ¦ÓÃMovil Secure

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÉÏ·¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓû§µÄ¶ñÒâÒøÐÐÓ¦ÓÃMovil Secure¡£¡£¡£ ¡£¡£¡£Movil Secureð³äÓëÎ÷°àÑÀ¶ÔÍâÒøÐÐBBVAÓйØ£¬£¬£¬²¢ÇÒ¾ßÓÐרҵµÄÍâ¹ÛºÍϸÄåµÄÓû§½çÃæ¡£¡£¡£ ¡£¡£¡£¸ÃÓ¦ÓÃÖ÷ÒªÓÃÓÚÍøÂçÓû§µÄÐÅÏ¢£¬£¬£¬°üÀ¨¶ÌÐź͵绰ºÅÂëµÈ£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ¶ÌÐÅ´¹Âڻ¡£¡£¡£ ¡£¡£¡£¸Ã¶ñÒâÓ¦ÓÃÔÚ10ÔÂ19ÈÕÐû²¼£¬£¬£¬²¢ÔÚ6ÌìÄÚÏÂÔØÁËÁè¼Ý100´Î¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±»¹ÔÚͳһ¸ö¿ª·¢Ö°Ô±ÃûÏ·¢Ã÷ÁËÆäËüÈý¸öÀàËÆµÄ¶ñÒâÓ¦Ó㬣¬£¬ÏÖÔÚÕâЩӦÓÃÒѱ»Googleɾ³ý¡£¡£¡£ ¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/fake-banking-app-found-on-google-play-used-in-smishing-scheme/


6¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄÎÞÎļþ¶ñÒâÈí¼þ¹¥»÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


CyrenÑо¿Ö°Ô±·¢Ã÷ÒѾ­±£´æÕë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄжñÒâ¹¥»÷»î¶¯¡£¡£¡£ ¡£¡£¡£Ã¿ÄêµÄºÚÎåºÍÊ¥µ®½Úʱ´ú£¬£¬£¬ÍøÂç´¹ÂÚºÍÕ©Æ­»î¶¯¶¼»áµÖ´ïÒ»¸öá¯Áë¡£¡£¡£ ¡£¡£¡£½ñÄêµÄÊ¥µ®×¼±¸ÊÂÇéÕýÔÚ¾ÙÐÐÖ®ÖУ¬£¬£¬¶øÑо¿Ö°Ô±ÒѾ­·¢Ã÷ÁËÒ»ÖÖеÄÎÞÎļþ¹¥»÷¡£¡£¡£ ¡£¡£¡£ÕâÖÖ´¹ÂÚÓʼþÒÔÊ¥µ®¶©µ¥ÎªÖ÷Ì⣬£¬£¬ÓÃÓÚ·Ö·¢NetwiredRCºóÃÅ¡£¡£¡£ ¡£¡£¡£¸ÃºóÃÅ¿ÉÒÔ¾ÙÐмüÅ̼ͼ¡¢ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ÒÔ¼°µç×ÓÓʼþƾ֤µÈ¡£¡£¡£ ¡£¡£¡£¶ñÒâÈí¼þµÄÕû¸ö×°ÖÃÀú³ÌÊDZ»×¢ÈëÄ¿µÄÀú³Ì£¬£¬£¬Ã»ÓÐÉúÑĵ½´ÅÅÌÉÏ¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.cyren.com/blog/articles/fileless-malware-already-targeting-holiday-suppliers


ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí