ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ21ÖÜ

Ðû²¼Ê±¼ä 2019-06-03

±¾ÖÜÇ徲̬ÊÆ×ÛÊö



2019Äê5ÔÂ27ÈÕÖÁ6ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î £»ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñÎó²î £» Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î £»HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î £»Serv-U FTP ServerȨÏÞÌáÉýÎó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹ú½ðÈÚ¹«Ë¾FAFCй¶8.85ÒÚÌõµäÖÊ´û¿î¼Í¼ £»ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢ £»Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ïì £»DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬Ó°ÏìËùÓÐDocker°æ±¾ £»¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£



Ö÷ÒªÇå¾²Îó²îÁбí



1. Apache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î
Apache Hadoop±£´æÒ»¸öÇå¾²Îó²î£¬ÔÊÐíÓµÓÐYAMȨÏÞµÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔrootÓû§Éí·ÝÔËÐÐí§ÒâÏÂÁî¡£
https://seclists.org/oss-sec/2019/q2/132

2. ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾ø·þÎñÎó²î
ISC BINDµÝ¹éÆÊÎöÆ÷µÄEDNS¿Í»§¶Ë×ÓÍø±£´æÒ»¸öÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬴¦Öóͷ£°üÀ¨RRSIGµÄÏìÓ¦µÄ±¨ÎÄʱ¿Ìʹ·þÎñÆ÷Í߽⡣
https://kb.isc.org/docs/cve-2019-6469

3. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î
Adobe Flash Player±£´æÊͷźóʹÓÃÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ £»òÖ´ÐÐí§Òâ´úÂë¡£
https://helpx.adobe.com/security/products/flash-player/apsb19-26.html

4. HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
HPE Intelligent Management Center ByteMessageResource transformEntityÒªÁì±£´æ·´ÐòÁл¯Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-528/

5. Serv-U FTP ServerȨÏÞÌáÉýÎó²î
WindowsϵÄServ-U FTP ServerÑéÖ¤´¦Öóͷ£±£´æÇå¾²Îó²î£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£
https://packetstormsecurity.com/files/153128/Serv-U-FTP-Server-15.1.6.25-Local-Privilege-Escalation.html


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢ÃÀ¹ú½ðÈÚ¹«Ë¾FAFCй¶8.85ÒÚÌõµäÖÊ´û¿î¼Í¼

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢

¾ÝŦԼʱ±¨±¨µÀ£¬ÃÀ¹ú½ðÈÚ¹«Ë¾First American Financial Corporation¹ÙÍøÉϵÄÒ»¸öÎó²îй¶ÁË16ÄêÀ´ÓëµäÖÊ´û¿îÓйصÄ8.85ÒÚÌõ¼Í¼¡£¸ÃÎó²îÔÊÐíÈκÎÈË»á¼ûFirst American´æ´¢µÄÉç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢¡¢¼ÝÕÕÒÔ¼°µäÖÊ´û¿îºÍË°ÎñÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖÕýÔÚÆÀ¹À´ËÊÂÎñ¶Ô¿Í»§ÐÅÏ¢Çå¾²ÐÔµÄÓ°Ï죬ÔÚÄÚ²¿ÉóºËÍê³É֮ǰ£¬½«²»»á½ÒÏþÈκÎ̸ÂÛ¡£

Ô­ÎÄÁ´½Ó£º
https://www.nytimes.com/2019/05/24/technology/data-leak-first-american.html

2¡¢ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


5ÔÂ20ÈÕ£¬ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusµÄÊý¾Ý¿âÒòÉèÖùýʧµ¼ÖÂÂÿÍÐÅϢй¶£¬¸ÃÊý¾Ý¿â°üÀ¨3600ÍòÌõº½°àÔ¤¶¨ÐÅÏ¢¡¢1500ÍòÂÿÍÐÅÏ¢¡¢Áè¼Ý100ÍòÌõÂùÝÔ¤¶¨ÐÅÏ¢ÒÔ¼°70ÍòÌõÇ©Ö¤ÉêÇëÐÅÏ¢¡£ÆäÖÐÉõÖÁ°üÀ¨ÒÔÉ«ÁÐ×ÜÀíBenjamin NetanyahuºÍÒÔÉ«Áи߼¶Íâ½»¹ÙµÄÂÃÐÐÔ¤¶¨ÐÅÏ¢¡£¸ÃÊý¾Ý¿âÊôÓÚalp.co.il£¬ÕâÊÇÒÔÉ«ÁеÄÂÃÐж©Æ±Æ½Ì¨£¬ÎªGulliver.co.il¡¢Issta.co.ilºÍÕþ¸®ÂÃÐÐÉçInbalÌṩ·þÎñ¡£

Ô­ÎÄÁ´½Ó£º
https://www.calcalistech.com/ctech/articles/0,7340,L-3762693,00.html

3¡¢Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ïì


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ƾ֤Î÷ÃÅ×ÓÐû²¼µÄÇ徲ͨ¸æ£¬¶à¿îÎ÷ÃÅ×ÓÒ½ÁÆ×°±¸Ò×ÊÜWindows RDP·þÎñBlueKeepÎó²îµÄÓ°Ï죬°üÀ¨MagicLinkA¡¢MagicViewµÈÈí¼þ²úÆ·£¬System ACOM¡¢SensisµÈ¸ß¼¶ÖÎÁƲúÆ·£¬Axiom¡¢MobilettµÈXÉäÏß×°±¸ÒÔ¼°Atellica¡¢AptioµÈʵÑéÊÒÕï¶Ï²úÆ·¡£¸Ã¹«Ë¾ÒÑÒªÇó¿Í»§×°ÖÃ΢ÈíµÄÐÞ¸´²¹¶¡£¬µ«²»¿É°ü¹Ü²¹¶¡µÄ¼æÈÝÐÔ£¬¸Ã¹«Ë¾½¨ÒéÓû§½ÓÄɽûÓÃRDP¡¢×èÖ¹TCP¶Ë¿Ú3389µÈ»º½â²½·¥¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86222/security/siemens-healthineers-bluekeep.html

4¡¢DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬Ó°ÏìËùÓÐDocker°æ±¾


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Ñо¿Ö°Ô±Åû¶DockerÖÐδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬¸ÃÎó²îÓ°ÏìÁËËùÓеÄDocker°æ±¾¡£¸ÃÎó²îÀàËÆÓÚCVE-2018-15664£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÖ¸¶¨µÄ³ÌÐò¶Ô×ÊÔ´¾ÙÐвÙ×÷֮ǰÐÞ¸Ä×ÊԴ·¾¶£¬´Ó¶ø¿ÉÄÜ»ñµÃí§ÒâÎļþµÄ¶Áд»á¼ûȨÏÞ£¬Õâ±»³ÆΪTOCTOUÀàÐ͵Äbug¡£¸ÃÎó²îµÄ½¹µãÔ´ÓÚFollowSymlinkInScope¹¦Ð§Ò×ÊÜTOCTOU¹¥»÷¡£Ñо¿Ö°Ô±ÒѾ­Ðû²¼ÁËPoC´úÂë¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/unpatched-flaw-affects-all-docker-versions-exploits-ready/

5¡¢¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Google Project ZeroÑо¿Ô±Tavis OrmandyÔÚ΢ÈíµÄWindows¼Çʱ¾Öз¢Ã÷Ò»¸ö´úÂëÖ´ÐÐÎó²î£¬OrmandyÒÑÏò΢Èí±¨¸æÁ˸ÃÎÊÌâ¡£Îó²îµÄϸ½ÚÉÐδÅû¶£¬µ«OrmandyÔ¤¼Æ¸ÃÎó²îÊÇÒ»¸öÄÚ´æËð»µÎó²î£¬ËûÔÚTwitterÉÏ·ÖÏíµÄͼƬÑÝʾÁËÔõÑùÔÚ¼Çʱ¾Öе¯³öshell¡£Æ¾Ö¤¹È¸èµÄÎó²îÅû¶Õþ²ß£¬Ormandy½«ÔÚ90Ììºó»ò΢ÈíÐû²¼ÐÞ¸´²¹¶¡ºóÅû¶¸ü¶àÎó²îϸ½Ú¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html