PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼£»£»£»£»£»LinuxÎó²î£¨CVE-2019-14899£©¿Éµ¼Ö¹¥»÷ÕßÐ®ÖÆVPN

Ðû²¼Ê±¼ä 2019-12-06


1.OpenBSDÍŶÓÐÞ¸´4¸öÉí·ÝÑéÖ¤ÈÆ¹ý/ÌáȨÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


OpenBSDÍŶÓÐÞ¸´ÁË4¸ö¿Éµ¼ÖÂÌØÈ¨Éý¼¶ºÍÉí·ÝÑéÖ¤ÈÆ¹ýµÄÇå¾²Îó²î£¬£¬ £¬£¬Qualys Research LabsÔÚ±¾ÖÜÔçЩʱ¼ä·¢Ã÷²¢±¨¸æÁËÕâЩÎó²î£¬£¬ £¬£¬OpenBSD¿ª·¢ÍŶÓÔÚ40¸öСʱ֮ÄÚÐû²¼ÁËÕë¶ÔOpenBSD 6.5ºÍOpenBSD 6.6µÄÐÞ¸´²¹¶¡¡£¡£ ¡£Îó²î¹æÄ£°üÀ¨Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2019-19521£©ºÍÌØÈ¨Éý¼¶£¨CVE-2019-19519¡¢CVE-2019-19520ºÍCVE-2019-19520£©¡£¡£ ¡£QualysÑо¿Ö°Ô±»¹ÔÚÿ¸öÎó²îµÄ×Éѯͨ¸æÖÐÐû²¼ÁËÏà¹ØPoCʹÓᣡ£ ¡£


  Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/openbsd-patches-severe-authentication-bypass-privilege-escalation-vulnerabilities/


2.UbuntuÐû²¼Intel΢Âë¸üУ¬£¬ £¬£¬ÐÞ¸´CPU¹ÒÆðÎÊÌâ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


CanonicalΪUbuntuÐû²¼ÁËеÄLinux Intel΢´úÂë¸üУ¬£¬ £¬£¬¸Ã¸üÐÂÐÞ¸´Á˵¼ÖÂIntel Skylake CPUÔÚÈÈÖØÆôºó¹ÒÆðµÄÎÊÌâ¡£¡£ ¡£Ö®Ç°11ÔÂ12ÈÕµÄIntel΢´úÂë¸üÐÂÖлº½âÁËÊÂÎñͬ²½À©Õ¹£¨TSX£©¹¦Ð§ÖеÄÎó²îºÍÖÁÇ¿´¦Öóͷ£Æ÷ÖеÄDoSÎó²î£¬£¬ £¬£¬µ«¸Ã¸üе¼ÖÂÁËÒ»¸ö»Ø¹éÎó²î£ºIntel Skylake´¦Öóͷ£Æ÷ÔÚÈÈÖØÆôºó¹ÒÆð¡£¡£ ¡£Îª½â¾ö´ËÎÊÌ⣬£¬ £¬£¬UbuntuÍŶÓÐû²¼ÁËеÄintel-microcode-3.20191115.1ubuntu0¸üУ¬£¬ £¬£¬¸Ã¸üпɻ¹Ô­Skylake´¦Öóͷ£Æ÷µÄ΢´úÂ룬£¬ £¬£¬Ê¹Æä²»ÔÙ¹ÒÆð¡£¡£ ¡£UbuntuÓû§¿ÉÒÔÔËÐÐSoftware Updater³ÌÐòÀ´¼ì²é²¢×°ÖÃ×îиüС£¡£ ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/linux/ubuntu-linux-gets-intel-microcode-update-to-fix-cpu-hangs/


3.ÃÀ¹úÊý¾ÝÖÐÐÄÕÛÎñÉÌCyrusOneÊÜÀÕË÷Èí¼þ¹¥»÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÃÀ¹úÊý¾ÝÖÐÐÄÕÛÎñÉÌCyrusOneÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬¸Ã¹«Ë¾½²»°ÈËÔÚÒ»·âµç×ÓÓʼþÖÐ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬ £¬£¬²¢ÌåÏÖËûÃÇÏÖÔÚÕýÔÚÓëÖ´·¨»ú¹¹ºÍ·¨Ö¤¹«Ë¾ÏàÖú¾ÙÐÐÊÓ²ìÒÔ¼¿ÕÊÖú¿Í»§»Ö¸´ÊÜÓ°ÏìµÄϵͳ¡£¡£ ¡£CyrusOneÌåÏÖÓÉÓÚÀÕË÷Èí¼þ¶ÔÍøÂçÖеÄijЩװ±¸¾ÙÐмÓÃÜ£¬£¬ £¬£¬µ¼ÖÂλÓÚŦԼÊý¾ÝÖÐÐĵÄÁù¸öÍйÜЧÀͿͻ§Óöµ½ÁË¿ÉÓÃÐÔÎÊÌ⣬£¬ £¬£¬ÆäÖаüÀ¨½ðÈں;­¼Í¹«Ë¾FIA Tech¡£¡£ ¡£Æ¾Ö¤ZDNetÊÕµ½µÄÐÂÎÅ£¬£¬ £¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ12ÔÂ4ºÅ£¬£¬ £¬£¬²¢ÇÒÊÇÓÉÀÕË÷Èí¼þREvil£¨Sodinokibi£©ÒýÆðµÄ¡£¡£ ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ransomware-attack-hits-major-us-data-center-provider/


4.ÒÁÀÊAPT×é֯ʹÓÃÊý¾Ý²Á³ýÆ÷ZeroCleareÃé×¼Öж«


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


IBMÑо¿Ö°Ô±·¢Ã÷Ò»¸öÐÂµÄÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þZeroCleare£¬£¬ £¬£¬¸ÃÈí¼þ±»¹ú¼Ò×ÊÖúµÄºÚ¿Í×éÖ¯ÔÚÒ°ÍâÓÃÓÚÕë¶ÔÖж«µÄÄÜÔ´ºÍ¹¤Òµ×éÖ¯¡£¡£ ¡£Ñо¿Ö°Ô±³ÆZeroCleareÓëÁ½¸öÒÁÀÊAPT×éÖ¯Óйأ¬£¬ £¬£¬Ò»¸öÊÇAPT34£¨Ò²±»³ÆÎªITG13ºÍOilrig£©£¬£¬ £¬£¬ÁíÒ»¸öÊÇHive0081£¨Ò²±»³ÆÎªxHunt£©¡£¡£ ¡£ZeroCleareÊǶà½×¶Î¹¥»÷ÖеÄ×îÖÕpayload£¬£¬ £¬£¬ËüÓÐÁ½¸ö±äÌ壬£¬ £¬£¬»®·ÖÕë¶Ô32λºÍ64λµÄWindowsϵͳ¡£¡£ ¡£µ«Ñо¿Ö°Ô±ÌåÏÖÖ»ÓÐ32λµÄ°æ±¾¿ÉÓ㬣¬ £¬£¬ÓÉÓÚ64λ°æ±¾ÔÚÏÖʵ×îÏȲÁ³ýÊý¾Ý֮ǰ»áÍ߽⡣¡£ ¡£Ñо¿Ö°Ô±»¹³ÆZeroCleare¹¥»÷ÊÇÕë¶ÔÌØ¶¨²¿·ÖºÍ×éÖ¯µÄÕë¶ÔÐÔÐж¯¡£¡£ ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-iranian-zerocleare-data-wiper-malware-used-in-targeted-attacks/


5.PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


PCIÇå¾²±ê׼ίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£¡£ ¡£¸Ã±ê×¼ÔÊÐí´øÓÐNFCµÄCOTSÒÆ¶¯×°±¸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£¡£ ¡£PCI CPoC±ê×¼ÊǸÃίԱ»áΪ½â¾öÒÆ¶¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö±ê×¼¡£¡£ ¡£ÏêϸÀ´Ëµ£¬£¬ £¬£¬PCI CPoC±ê×¼»®¶¨Á˹©Ó¦ÉÌÔÚ±£»£»£»£»£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¼Æ»®·½ÃæµÄһЩÇå¾²ÉϵÄÒªÇ󡣡£ ¡£±ê×¼µÄCPoC½â¾ö¼Æ»®°üÀ¨¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTS×°±¸¡¢ÂÄÀúÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°×ÔÁ¦ÓÚCOTS×°±¸µÄºó¶Ëϵͳ¡£¡£ ¡£


 Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1


6.LinuxÎó²î£¨CVE-2019-14899£©¿Éµ¼Ö¹¥»÷ÕßÐ®ÖÆVPN


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Åû¶ÁËÒ»¸öÓ°Ïì*NIX×°±¸µÄÇå¾²Îó²î£¬£¬ £¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßÐá̽¡¢Ð®Öƺ͸͝VPNËíµÀÅþÁ¬£¬£¬ £¬£¬²¢½«í§ÒâÓÐÓÃÔØºÉ×¢ÈëIPv4ºÍIPv6µÄTCPÊý¾ÝÁ÷ÖС£¡£ ¡£¸ÃÎó²î£¨CVE-2019-14899£©Î»ÓÚ»ùÓÚUnix²Ù×÷ϵͳµÄÍøÂç¿ÍÕ»ÖУ¬£¬ £¬£¬¸üÏêϸµØËµ£¬£¬ £¬£¬ÔÚ²Ù×÷ϵͳ¶ÔÒâÍâµÄÍøÂçÊý¾Ý°ü̽²â¾ÙÐÐÏìÓ¦µÄÀú³ÌÖС£¡£ ¡£ÒÑÖª¸ÃÎó²î»áÓ°Ïì´ó´ó¶¼Linux¿¯ÐаæºÍÀàUnix²Ù×÷ϵͳ£¬£¬ £¬£¬°üÀ¨FreeBSD¡¢OpenBSD¡¢macOS¡¢iOSºÍAndroid¡£¡£ ¡£Ñо¿Ö°Ô±³Æ´Ë¹¥»÷¿ÉÕë¶ÔOpenVPN¡¢WireGuardºÍIKEv2/IPSecµÈVPNÊÖÒÕ£¬£¬ £¬£¬µ«ÈÔÔÚ²âÊÔÆäÕë¶ÔTorµÄ¿ÉÐÐÐÔ¡£¡£ ¡£Ð§ÀÍÆ÷ÖÎÀíÔ±¿ÉÒÔ½ÓÄɵĻº½â²½·¥°üÀ¨·­¿ª·´Ïò·¾¶¹ýÂË¡¢Ê¹ÓÃbogon¹ýÂËÐéαIPµØµã»òʹÓüÓÃܵÄÊý¾Ý°ü¾ÞϸºÍ׼ʱµÈ¡£¡£ ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/