ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ37ÖÜ

Ðû²¼Ê±¼ä 2018-09-21
 Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö

2018Äê09ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î67¸ö £¬ £¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Word PDFÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£» £»£»Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³öÎó²î£»£»£» £»£»¶à¿îI-O DATA²úÆ·í§ÒâÏÂÁîÖ´ÐÐÎó²î£»£»£» £»£»Cisco SD-WAN Solution CVE-2018-0432¹ýʧ±¨¸æ¹¦Ð§È¨ÏÞÌáÉýÎó²î£»£»£» £»£»Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉýÎó²î¡£¡£¡£¡£¡£¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇVeeamÒòMongoDBÉèÖùýʧµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶£»£»£» £»£»Ñо¿Ö°Ô±·¢Ã÷Ð®ÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯£»£»£» £»£»Ñо¿Ö°Ô±³Æ¿É¹ûÕæ»á¼ûµÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷£»£»£» £»£»NexusguardÐû²¼2018ÄêQ2Íþв±¨¸æ £¬ £¬£¬£¬£¬£¬DDoS¹¥»÷ͬ±ÈÔöÌíÁè¼Ý500%£»£»£» £»£»ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒÆ¶¯Íþв±¨¸æ £¬ £¬£¬£¬£¬£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÄ¿ÔöÌí54%¡£¡£¡£¡£¡£¡£

ƾ֤ÒÔÉÏ×ÛÊö £¬ £¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£

¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí


1. Microsoft Word PDFÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Microsoft Word´¦Öóͷ£PDFÎļþ±£´æÇå¾²Îó²î £¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó £¬ £¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö £¬ £¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8430

2. Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³öÎó²î


Microsoft JET Database Engine±£´æ»º³åÇøÒç³öÎó²î £¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄExcelÎļþÇëÇó £¬ £¬£¬£¬£¬£¬ÓÕʹÓû§ÇëÇó £¬ £¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8393

3. ¶à¿îI-O DATA²úÆ·í§ÒâÏÂÁîÖ´ÐÐÎó²î


I-O DATA TS-WRLP¡¢TS-WRLAºÍTS-WRLP/EʹÓÃÓ²±àÂëÆ¾Ö¤Îó²î £¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ £¬£¬£¬£¬£¬Ö´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£¡£
http://jvn.jp/en/jp/JVN83701666/index.html

4. Cisco SD-WAN Solution CVE-2018-0432¹ýʧ±¨¸æ¹¦Ð§È¨ÏÞÌáÉýÎó²î


Cisco SD-WAN Solution¹ýʧ±¨¸æ¹¦Ð§±£´æÇå¾²Îó²î £¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ £¬£¬£¬£¬£¬ÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation

5. Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉýÎó²î
Micronet INplc SDK±£´æÇå¾²Îó²î £¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ £¬£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ £¬ £¬£¬£¬£¬£¬Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
http://www.mnc.co.jp/INplc/info_20180907_E.htm

Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢VeeamÒòMongoDBÉèÖùýʧµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


9ÔÂ5ÈÕÇå¾²Ñо¿Ö°Ô±Bob Diachenko·¢Ã÷Êý¾ÝÖÎÀí¹«Ë¾VeeamµÄMongoDBЧÀÍÆ÷¿É¹ûÕæ»á¼û £¬ £¬£¬£¬£¬£¬Ò»¸öÁè¼Ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨Ô¼4.45ÒÚÌõÓû§¼Í¼ £¬ £¬£¬£¬£¬£¬°üÀ¨Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÆÜÉí¹ú¼Ò/µØÇøµÈСÎÒ˽¼ÒÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØµã¡¢Ïà¹ØURL¡¢Óû§ÊðÀíµÈÓªÏúÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£¡£VeeamÒѶԸÃÊý¾Ý¿â½ÓÄÉÁ˱£»£»£» £»£»¤²½·¥¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/

2¡¢Ñо¿Ö°Ô±·¢Ã÷Ð®ÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Troy Mursch·¢Ã÷Ò»¸öʹÓÃÎó²î£¨CVE-2018-14847£©Ð®ÖÆMikroTik·ÓÉÆ÷¾ÙÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡ £¬ £¬£¬£¬£¬£¬µ«ÈÔÓв¿·ÖÓû§Ã»ÓоÙÐÐÉý¼¶¡£¡£¡£¡£¡£¡£Æ¾Ö¤Mursch±¨¸æµÄÍÚ¿ó¾ç±¾ £¬ £¬£¬£¬£¬£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTik×°±¸¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÊÜѬȾµÄ×°±¸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ £¬ £¬£¬£¬£¬£¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¡£¡£¡£¡£¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔöÌíµ½80%²¢Ò»Á¬¾ÙÐÐÍڿ󡣡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢Ñо¿Ö°Ô±³Æ¿É¹ûÕæ»á¼ûµÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Lynt ServicesµÄÑо¿Ö°Ô±Vladim¨ªrSmitka·¢Ã÷¿É¹ûÕæ»á¼ûµÄ.gitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷¡£¡£¡£¡£¡£¡£Ðí¶àWeb¿ª·¢Ö°Ô±Ê¹ÓÿªÔ´¹¤¾ßGitÀ´¹¹½¨Ò³Ãæ £¬ £¬£¬£¬£¬£¬µ«ËûÃÇÍùÍù½«.gitÎļþ¼ÐÒÅÁôÔÚÍøÕ¾µÄ¹«¹²¿É»á¼û²¿·Ö £¬ £¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨Ò»Ð©Ö÷ÒªµÄÐÅÏ¢ £¬ £¬£¬£¬£¬£¬ÀýÈçÍøÕ¾½á¹¹µÄÐÅÏ¢¡¢Êý¾Ý¿âÃÜÂë¡¢APIÃÜÔ¿¡¢¿ª·¢IDEÉèÖõÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://threatpost.com/open-git-directories-leave-390k-websites-vulnerable/137299/

4¡¢NexusguardÐû²¼2018ÄêQ2Íþв±¨¸æ £¬ £¬£¬£¬£¬£¬DDoS¹¥»÷ͬ±ÈÔöÌíÁè¼Ý500%


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤NexusguardµÄ2018ÄêµÚ¶þ¼¾¶ÈÍþв±¨¸æ £¬ £¬£¬£¬£¬£¬DDoS¹¥»÷ƽ¾ùÔöÌíÁè¼Ý26Gbps £¬ £¬£¬£¬£¬£¬¹æÄ£ÔöÌíÁËÁè¼Ý500%¡£¡£¡£¡£¡£¡£Óë2017ÄêͬÆÚÏà±È £¬ £¬£¬£¬£¬£¬DDoS¹¥»÷µÄ×î´ó¹æÄ£·­ÁËËı¶ £¬ £¬£¬£¬£¬£¬´ï359Gbps¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÊý¾ÝµÄ¼¤ÔöÔ´ÓÚÎïÁªÍø½©Ê¬ÍøÂçSatoriµÄÔöÌí¡£¡£¡£¡£¡£¡£×î´óµÄ0dayΣº¦À´×ÔÓÚ²î±ðµÄ¼ÒÓ÷ÓÉÆ÷ £¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩװ±¸Õë¶ÔÒªº¦Ð§ÀͺÍÍøÂçÌᳫ´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£¡£Synºé·º¹¥»÷Õ¼ÓÐÁËÖ÷µ¼Ö°Î»¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-attacks-increase-in-size-by/

5¡¢ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒÆ¶¯Íþв±¨¸æ £¬ £¬£¬£¬£¬£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÄ¿ÔöÌí54%


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÈüÃÅÌú¿ËµÄ¼¾¶ÈÒÆ¶¯Íþв±¨¸æ×ܽáÁË2017ÄêµÄÒÆ¶¯ÍþвÊý¾Ý £¬ £¬£¬£¬£¬£¬Ö÷Òª·¢Ã÷°üÀ¨Òƶ¯¶ñÒâÈí¼þµÄ±äÖÖºÍÊýÄ¿¶¼ÓÐËùÔöÌí £¬ £¬£¬£¬£¬£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þ±äÖÖµÄÊýÄ¿ÔöÌíÁË54%£»£»£» £»£»²¿·ÖÒÆ¶¯×°±¸¼ÌÐøÊ¹ÓùýʱµÄ²Ù×÷ϵͳ £¬ £¬£¬£¬£¬£¬Ö»ÓÐ3%µÄAndroid×°±¸¸üÐÂÖÁ×îеIJÙ×÷ϵͳ°æ±¾ £¬ £¬£¬£¬£¬£¬41%µÄAndroid×°±¸ÖÁÉÙȱÉÙÁ½¸öÔµÄÇå¾²²¹¶¡ £¬ £¬£¬£¬£¬£¬iOS×°±¸Ïà¶Ô½ÏºÃ £¬ £¬£¬£¬£¬£¬80%µÄiOS×°±¸×°ÖÃÁË×îеĸüУ»£»£» £»£»Î£ÏÕµÄWi-FiÍøÂç±ÈÒÔÍùÈκÎʱ¼ä¶¼Ô½·¢ÆÕ±é¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.symantec.com/connect/es/blogs/las-amenazas-moviles



ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí