ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ29ÖÜ

Ðû²¼Ê±¼ä 2019-07-29

>  ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê7ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇProFTPD SITE CPFR/CPTOí§Òâ¶ÁдÎó²î£»£»£» £»Apple Webkit ¶à¸öÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£» £»Zeroshell http²ÎÊýÏÂÁî×¢ÈëÎó²î£»£»£» £»Apache Storm·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»£»£» £»McAfee Data Loss Prevention Endpoint ePOÀ©Õ¹ÏÂÁî×¢ÈëÎó²î¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǶíÂÞ˹Áª°îÇå¾²¾Ö³Ð°üÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ÉñÃØÏîÄ¿ÆØ¹â£»£»£» £»ProFTPD RCEÎó²î£¬£¬£¬£¬£¬Áè¼Ý100Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ï죻£»£» £»Ó¡¶ÈС¶îÐÅ´ûÒøÐÐJana CashÒâÍâй¶260ÍòÓû§ÉúÒâÐÅÏ¢£»£»£» £»RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬£¬£¬£¬£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª£»£»£» £»Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼­Õ¨µ¯¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£



>  Ö÷ÒªÇå¾²Îó²îÁбí



1. ProFTPD SITE CPFR/CPTOí§Òâ¶ÁдÎó²î


ProFTPD SITE CPFR/CPTOûÓÐ׼ȷ´¦Öóͷ£ºÍÉèÖ㬣¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ¶Áд²Ù×÷¡£¡£¡£

http://bugs.proftpd.org/show_bug.cgi?id=4372

2. Apple Webkit CVE-2019-8644ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Apple iOS°üÀ¨µÄWebKit±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£» £»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£

https://support.apple.com/zh-cn/HT210356

3. Zeroshell http²ÎÊýÏÂÁî×¢ÈëÎó²î


Zeroshell´¦Öóͷ£http²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://www.tarlogic.com/advisories/zeroshell-rce-root.txt

4. Apache Storm·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î


Apache Storm´¦Öóͷ£²»¿ÉÐÅÊý¾Ý±£´æ·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E

5. McAfee Data Loss Prevention Endpoint ePOÀ©Õ¹ÏÂÁî×¢ÈëÎó²î


McAfee Data Loss Prevention Endpoint ePOÀ©Õ¹±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£
https://kc.mcafee.com/corporate/index?page=content&id=SB10289



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¶íÂÞ˹Áª°îÇå¾²¾Ö³Ð°üÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ÉñÃØÏîÄ¿ÆØ¹â


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©µÄ³Ð°üÉÌSyTechÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÎªFSB¿ª·¢µÄÉñÃØÏîÄ¿±»ÆØ¹â¡£¡£¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ7ÔÂ13ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ï0v1ru$ÈëÇÖÁËSyTechµÄЧÀÍÆ÷£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË7.5TBµÄÊý¾Ý¡£¡£¡£ÕâЩÊý¾ÝËæºó±»·ÖÏí¸øºÚ¿ÍÍÅ»ïDigitalRevolution£¬£¬£¬£¬£¬ºóÕßÏòýÌå¾ÙÐÐÁËÆØ¹â¡£¡£¡£ÕâЩÉñÃØÏîÄ¿°üÀ¨Ö¼ÔÚ¸ôÀë¶íÂÞ˹»¥ÁªÍøµÄNadezhdaÏîÄ¿¡¢Ö¼ÔÚÍøÂçÉ罻ýÌåÓû§ÐÅÏ¢µÄNautilusÏîÄ¿ÒÔ¼°Ö¼ÔÚ¶ÔTorÍøÂçÓû§¾ÙÐÐÈ¥ÄäÃû»¯µÄNautilus-SÏîÄ¿µÈ¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/russian-fsb-intel-agency-contractor-hacked-secret-projects-exposed/

2¡¢ProFTPD RCEÎó²î£¬£¬£¬£¬£¬Áè¼Ý100Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ïì


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



ProFTPDÐû²¼Ð°汾1.3.6£¬£¬£¬£¬£¬ÐÞ¸´Ò»¸ö¿Éµ¼ÖÂRCEµÄÎó²î¡£¡£¡£¸ÃÎó²î£¨CVE-2019- 12815£©ÓëProFTPDµÄmod_copyÄ£¿£¿£¿£¿£¿£¿éÓйØ£¬£¬£¬£¬£¬Îó²îÔµ¹ÊÔ­ÓÉÊÇmod_copyÄ£¿£¿£¿£¿£¿£¿éµÄ×Ô½ç˵SITE CPFRºÍSITE CPTOÏÂÁîûÓа´Ô¤ÆÚÉèÖÃÊÂÇé¡£¡£¡£ÖÎÀíÔ±¿Éͨ¹ý½ûÓÃmod_copyÄ£¿£¿£¿£¿£¿£¿éÀ´»º½â¸ÃÎó²î¡£¡£¡£Æ¾Ö¤ShodanµÄËÑË÷Ч¹û£¬£¬£¬£¬£¬ÏÖÔÚÓÐÁè¼Ý100Íò¸öProFTPdЧÀÍÆ÷ÉÐδÉý¼¶ÐÞ¸´²¹¶¡¡£¡£¡£µÂ¹úCERT-BundÒ²Õë¶Ô¸ÃÎó²îÏòÓû§·¢³ö¾¯±¨¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/proftpd-remote-code-execution-bug-exposes-over-1-million-servers/

3¡¢Ó¡¶ÈС¶îÐÅ´ûÒøÐÐJana CashÒâÍâй¶260ÍòÓû§ÉúÒâÐÅÏ¢


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


Ñо¿Ö°Ô±·¢Ã÷Ó¡¶ÈС¶îÐÅ´ûÒøÐÐJana CashµÄÒ»¸öÊý¾Ý¿âδÊÜÃÜÂë±£»£»£» £»¤£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍòÓû§µÄÉúÒâÐÅÏ¢¿É±»¹ûÕæ»á¼û¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢°üÀ¨260ÍòÓû§µÄÉúÒâ¼Í¼£¬£¬£¬£¬£¬ÒÔ¼°ËûÃǵÄKYC PIIÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÇ®°üID¡¢Óû§Ãû¡¢µç×ÓÓʼþ¡¢IPµØµãºÍ¶Ë¿ÚºÅµÈ¡£¡£¡£ÔÚÑо¿Ö°Ô±×ª´ï¸Ã¹«Ë¾ºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒѶÔElasticÊý¾Ý¿â¾ÙÐб£»£»£» £»¤¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼äÒÔ¼°ÊÇ·ñÒѱ»ÆäËûÈË»á¼û¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securitydiscovery.com/jana-bank-data-leak/

4¡¢RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬£¬£¬£¬£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ƾ֤RiskIQµÄÊý¾Ý£¬£¬£¬£¬£¬È¥ÄêÍøÂç·¸·¨·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾­¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬£¬£¬£¬£¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ¡£¡£¡£ÆäËüÊý¾Ý°üÀ¨£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»£»£» £»´¹ÂÚ¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»£»£» £»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ±¾Ç®ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»£»£» £»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»£»£» £»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâÖØ¶¨ÏòΪ7¸öµÈ¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/

5¡¢Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼­Õ¨µ¯


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ǰÎ÷ÃÅ×ÓÌõÔ¼¹¤David TinleyÈÏ¿ÉÔÚΪ¹«Ë¾½¨ÉèµÄµç×Ó±í¸ñÖÐÖ²ÈëÂß¼­Õ¨µ¯£¬£¬£¬£¬£¬Ëû½«ÃæÁÙ×î¸ß10ÄêµÄî¿ÏµÒÔ¼°25ÍòÃÀÔªµÄ·£¿£¿£¿£¿£¿£¿î¡£¡£¡£Æ¾Ö¤Ïà¹Ø·¨Í¥Îļþ£¬£¬£¬£¬£¬TinleyΪÎ÷ÃÅ×ÓµÄMonroeville PAЧÀÍ´¦ÌṩÁ˽üÊ®ÄêµÄÈí¼þЧÀÍ£¬£¬£¬£¬£¬ËûÔÚ¸ø¹«Ë¾½¨ÉèÓÃÓÚÖÎÀí×°±¸¶©µ¥µÄµç×Ó±í¸ñʱֲÈëÁËÂß¼­Õ¨µ¯£¬£¬£¬£¬£¬ÕâЩըµ¯»áÔÚÌØ¶¨ÈÕÆÚ´¥·¢£¬£¬£¬£¬£¬µ¼ÖÂÎļþÍ߽⡣¡£¡£Ã¿´ÎÍß½âʱTinley¶¼»áÊÕÈ¡ÓöÈÀ´ÐÞ¸´¸ÃÎļþ£¬£¬£¬£¬£¬Ö±µ½Á½ÄêºóÎ÷ÃÅ×Ó·¢Ã÷ÁËÂß¼­Õ¨µ¯²¢Ìá³öÁËÖ¸¿Ø¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/