¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181011

Ðû²¼Ê±¼ä 2018-10-11
1¡¢AdobeÐû²¼10ÔÂÇå¾²¸üУ¬£¬ £¬ £¬£¬£¬¹²ÐÞ¸´11¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


AdobeÐû²¼10ÔÂÇå¾²¸üУ¬£¬ £¬ £¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î£¬£¬ £¬ £¬£¬£¬ÆäÖаüÀ¨4¸ö¸ßΣÎó²î¡£¡£Adobe»¹Ðû²¼ÁËFlash PlayerµÄа汾£¬£¬ £¬ £¬£¬£¬µ«¸Ã°æ±¾²¢Î´°üÀ¨Èκβ¹¶¡ÐÞ¸´¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬£¬±¾ÔÂÐÞ¸´µÄ11¸öÎó²î¶¼Ã»Óб»¹ûÕæÅû¶»òÒ°ÍâʹÓùý¡£¡£ËùÓеÄ4¸ö¸ßΣÎó²î£¬£¬ £¬ £¬£¬£¬°üÀ¨3¸ö¶ÑÒç³öÎó²îºÍ1¸öUse after freeÎó²î£¬£¬ £¬ £¬£¬£¬¶¼±£´æÓÚµç×ÓÊéÔĶÁÖÎÀíÈí¼þAdobe Digital EditionsÖУ¬£¬ £¬ £¬£¬£¬ÕâЩÎó²î¿ÉÔÊÐí¹¥»÷ÕßÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£½¨ÒéÓû§¾¡¿ì½«ÊÜÓ°ÏìµÄÈí¼þ¸üÐÂÖÁ×îа汾¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/10/adobe-security-updates.html


2¡¢SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬ £¬ £¬£¬£¬ÐÞ¸´¶à¸öÇå¾²Îó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


SAPµÄ10ÔÂÇå¾²¸üй²°üÀ¨11¸öSecurity Notes£¬£¬ £¬ £¬£¬£¬ÐÞ¸´Á˶à¸öÇå¾²Îó²î£¬£¬ £¬ £¬£¬£¬°üÀ¨SAP BusinessObjects BI¿Í»§¶ËÖеÄÐÅϢй¶Îó²î£¨CVE-2018-2471£¬£¬ £¬ £¬£¬£¬CVSSÆÀ·ÖΪ9.8£©ÒÔ¼°GardenerÖеÄȱÉÙÍøÂç¸ôÀëÎó²î£¨CVE-2018-2475£©¡¢SAP Plant ConnectivityÖеľܾøÐ§ÀÍÎó²î£¨CVE-2018-12585ºÍCVE-2018-12086£©µÈ¡£¡£ÐÅϢй¶Îó²îÊÇ×î³£¼ûµÄÎó²î£¬£¬ £¬ £¬£¬£¬Æä´ÎÊÇXSS¡¢XXEºÍCSRFµÈ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sap-patches-critical-vulnerability-businessobjects

3¡¢Ë¼¿ÆTalosÍŶÓÅû¶VMware WorkstationÖеĿɵ¼ÖÂDoSµÄÇå¾²Îó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


˼¿ÆTalosÍŶÓÅû¶VMware WorkstationÖеÄÒ»¸ö¿Éµ¼Ö¾ܾøÐ§À͵ÄÇå¾²Îó²î¡£¡£¸ÃÎó²î£¨TALOS-2018-0589/CVE-2018-6977£©±£´æÓÚVMware Workstation 14µÄÏñËØ×ÅÉ«Æ÷ÖУ¬£¬ £¬ £¬£¬£¬¿ÉÒÔ´ÓVMware¿Í»§»ú»òVMwareÖ÷»úÖд¥·¢´ËÎó²î£¬£¬ £¬ £¬£¬£¬µ¼ÖÂÀú³ÌÍß½âºÍDoS״̬¡£¡£Æ¾Ö¤VMwareÐû²¼µÄÇ徲ͨ¸æ£¬£¬ £¬ £¬£¬£¬¸ÃÎó²îÏÖÔÚûÓÐÐÞ¸´²¹¶¡£¬£¬ £¬ £¬£¬£¬µ«¿ÉÒÔͨ¹ý½ûÓÃ3D¼ÓËÙ¹¦Ð§µÄworkaroundÀ´½â¾ö¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/10/vuln-spot-vmware-dos.html

4¡¢ÈüÃÅÌú¿Ë·¢Ã÷Ö÷ÒªÕë¶ÔÕþ¸®ºÍ¾üÊÂÄ¿µÄµÄз¸·¨ÍÅ»ïGallmaker


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÈüÃÅÌú¿ËÑо¿Ö°Ô±·¢Ã÷Ò»¸öÒÔǰδ֪µÄ·¸·¨ÍÅ»ïGallmaker¡£¡£¸Ã×éÖ¯ÖÁÉÙ´Ó2017Äê12ÔÂ×îÏÈ»îÔ¾£¬£¬ £¬ £¬£¬£¬Æä¹¥»÷»î¶¯ÔÚ2018ÄêµÚ¶þ¼¾¶ÈÓÐËùÔöÌí£¬£¬ £¬ £¬£¬£¬ÆäÖÐÔÚ2018Äê4Ô·ºÆðÁËì­Éý¡£¡£¸Ã×éÖ¯Ö÷ÒªÕë¶ÔÕþ¸®¡¢¾ü¶ÓºÍ¹ú·ÀÄ¿µÄ£¬£¬ £¬ £¬£¬£¬°üÀ¨¶«Å·¹ú¼ÒµÄÍâÑó´óʹ¹Ý¡¢Öж«µÄ²¿·Ö¾üʺ͹ú·ÀÄ¿µÄµÈ¡£¡£¸Ã×éÖ¯µÄ»î¶¯ËƺõÊǸ߶ÈÕë¶ÔÐԵ쬣¬ £¬ £¬£¬£¬ÆäËÆºõÍêÈ«ÒÀÀµÓÚLotLÕ½ÂԺ͹ûÕæµÄºÚ¿Í¹¤¾ß£¬£¬ £¬ £¬£¬£¬ÕâʹµÃÆä»î¶¯¼«Äѱ»·¢Ã÷¡£¡£¸Ã×éÖ¯¿ÉÄÜÊÇÓɹú¼Ò×ÊÖúµÄÒ»¸öÍøÂçÌØ¹¤»î¶¯¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.symantec.com/blogs/threat-intelligence/gallmaker-attack-group


5¡¢¿¨°Í˹»ùÐû²¼¹ØÓÚAPT×éÖ¯MuddyWaterµÄÆÊÎö±¨¸æ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùʵÑéÊÒÊӲ쵽APT×éÖ¯MuddyWaterµÄй¥»÷»î¶¯¡£¡£MuddyWater·ºÆðÓÚ2017Ä꣬£¬ £¬ £¬£¬£¬Ñо¿ÍŶÓÊӲ쵽¸Ã×éÖ¯×î½üµÄ´¹ÂÚÓʼþ¹¥»÷»î¶¯¡£¡£¸Ã´¹ÂڻÖ÷ÒªÕë¶ÔÔ¼µ©¡¢ÍÁ¶úÆä¡¢°¢Èû°Ý½®¡¢°Í»ù˹̹ÒÔ¼°ÒÁÀ­¿ËºÍÉ³ÌØ°¢À­²®µÄÕþ¸®»ú¹¹¡¢¾üÊÂʵÌå¡¢µçÐŹ«Ë¾ºÍ½ÌÓý»ú¹¹µÈ£¬£¬ £¬ £¬£¬£¬ÆäËüÄ¿µÄ»¹°üÀ¨ÂíÀï¡¢°ÂµØÀû¡¢¶íÂÞ˹¡¢ÒÁÀʺͰÍÁÖ¡£¡£¸Ã´¹ÂÚ¹¥»÷´Ó2018ÄêÍ·×îÏÈ£¬£¬ £¬ £¬£¬£¬²¢´Ó5ÔÂÆðÖð²½Éý¼¶£¬£¬ £¬ £¬£¬£¬ÏÖÔÚ»¹ÔÚ¼ÌÐø¾ÙÐÐÖ®ÖС£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/muddywater/88059/

6¡¢GAOÐû²¼±¨¸æ³ÆÃÀ¹úÖ÷ÒªµÄÎäÆ÷ϵͳ±£´æ´ó×ÚÇå¾²Îó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÃÀ¹úÕþ¸®ÎÊÔð¾Ö£¨GAO£©Ðû²¼±¨¸æ³ÆÃÀ¹ú¹ú·À²¿¿ª·¢µÄÖ÷ÒªÎäÆ÷ϵͳ±£´æ´ó×ÚÇå¾²Îó²î£¬£¬ £¬ £¬£¬£¬¼«Ò×Ôâµ½ºÚ¿Í¹¥»÷¡£¡£GAOµÄÉ󼯴Ó2017Äê7ÔÂÒ»Á¬µ½2018Äê10Ô¡£¡£Õâ·ÝÖÜÈ«µÄ±¨¸æ½è¼øÁ˽ü30ÄêÀ´µÄÑо¿Ð§¹û£¬£¬ £¬ £¬£¬£¬°üÀ¨½üÆÚ¶ÔÌØ¶¨ÎäÆ÷ϵͳµÄÍøÂçÇå¾²ÆÀ¹ÀÒÔ¼°¶ÔÃÀ¹ú¹ú·À²¿¡¢¹ú¼ÒÇå¾²¾ÖºÍÎäÆ÷²âÊÔ»ú¹¹Ö°Ô±µÄ²É·Ã£¬£¬ £¬ £¬£¬£¬º­¸ÇÁË´ó¹æÄ£µÄÃÀ¹úÎäÆ÷£¬£¬ £¬ £¬£¬£¬²¢¼ì²éÁËËùÓоüÖÖ¼°Ì«¿ÕÖеÄϵͳ¡£¡£±¨¸æ³Æ£¬£¬ £¬ £¬£¬£¬²âÊÔÍŶÓʹÓÃÏà¶Ô¼òÆÓµÄ¹¤¾ßºÍÊÖÒÕ£¬£¬ £¬ £¬£¬£¬Í¨¹ýÖîÈçÈõÃÜÂëºÍδ¼ÓÃܵÄͨѶµÈ»ù±¾ÎÊÌ⣬£¬ £¬ £¬£¬£¬¿ÉÒÔÈÝÒ×µØÔÚ²»±»²ì¾õµÄÇéÐÎϽÓÊÜÕæÊµµÄÎäÆ÷ϵͳ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-advanced-weaponry-is-easy-to-hack-even-by-low-skilled-attackers/

ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí