ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ45ÖÜ

Ðû²¼Ê±¼ä 2019-11-18

>±¾ÖÜÇ徲̬ÊÆ×ÛÊö



2019Äê11ÔÂ11ÈÕÖÁ17ÈÕ¹²ÊÕ¼Çå¾²Îó²î48¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows OpenType×ÖÌåÆÊÎöCVE-2019-1456Ô¶³ÌÖ´ÐдúÂëÎó²î; eQ-3 Homematic CCU3 testtcl.cgi´úÂëÖ´ÐÐÎó²î£»SAP Diagnostics Agentí§ÒâOSÏÂÁî×¢ÈëÎó²î£»Istio¾Ü¾ø·þÎñÎó²î£»Adobe Illustrator CVE-2019-8248ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍйܷþÎñÉÌSmarterASP.NETÔâÀÕË÷Èí¼þ¹¥»÷£»¶íÂÞ˹з¨°¸Ç¿ÖÆÊÖ»úºÍPCԤװÖñ¾¹úÈí¼þ£»5GÐÂÎó²î¿É¸ú×ٵ绰λÖü°¹ã²¥Ðéα¾¯±¨£»McAfeeɱ¶¾Èí¼þ´úÂëÖ´ÐÐÎó²î(CVE-2019-3648)£»¸ßͨоƬ×éQSEEÎó²î¿ÉÖÂAndroid×°±¸Êý¾Ýй¶¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£


>Ö÷ÒªÇå¾²Îó²îÁбí


1. Microsoft Windows OpenType×ÖÌåÆÊÎöCVE-2019-1456Ô¶³ÌÖ´ÐдúÂëÎó²î
Microsoft Windows OpenType×ÖÌåÆÊÎö´¦Öóͷ£Opentype×ÖÌå±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1456

2. eQ-3 Homematic CCU3 testtcl.cgi´úÂëÖ´ÐÐÎó²î
eQ-3 Homematic CCU3 save.cgi¾ç±¾¿ÉÓÃÀ´ÉÏ´«¾ç±¾²¢±»testtcl.cgi¾ç±¾Ö´ÐУ¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://psytester.github.io/CVE-2019-18938/

3. SAP Diagnostics Agentí§ÒâOSÏÂÁî×¢ÈëÎó²î
SAP Diagnostic Agent±£´æδÃ÷Çå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528880390

4. Istio¾Ü¾ø·þÎñÎó²î
Istio±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐòÍ߽⡣
https://github.com/istio/istio/issues/18229

5. Adobe Illustrator CVE-2019-8248ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Illustrator´¦Öóͷ£Îļþ±£´æÄÚ´æÆÆËðÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë»òÕß¾ÙÐоܾø·þÎñ¹¥»÷¡£
https://helpx.adobe.com/security/products/illustrator/apsb19-36.html


>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÍйܷþÎñÉÌSmarterASP.NETÔâÀÕË÷Èí¼þ¹¥»÷


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


SmarterASP.NETÊÇÒ»¼ÒÓµÓÐÁè¼Ý44Íò¸ö¿Í»§µÄASP.NETÍйܷþÎñÉÌ£¬¸Ã¹«Ë¾ÔÚÖÜÄ©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷¡£Ä¿½ñSmarterASP.NETÌåÏÖÕýÔÚÆð¾¢»Ö¸´¿Í»§µÄ·þÎñÆ÷£¬µ«²»ÇåÎú¸Ã¹«Ë¾ÊÇÖ§¸¶ÁËÊê½ðÕÕ¾ÉÔÚ´Ó±¸·ÝÖлָ´¡£´Ë´Î¹¥»÷Öв»µ«¿Í»§Êý¾ÝÊܵ½Ó°Ï죬²¢ÇÒSmarterASP.NET×Ô¼ºÒàÊÜÓ°Ïì¡£¸Ã¹«Ë¾µÄÍøÕ¾ÔÚÐÇÆÚÁùÈ«Ì춼ÏÂÏߣ¬Ö±µ½ÐÇÆÚÌìÔçÉϲÅÖØÐÂÉÏÏß¡£·þÎñÆ÷»Ö¸´ÊÂÇéÏ£Íû»ºÂý£¬Ðí¶à¿Í»§ÈÔÈ»ÎÞ·¨»á¼ûÆäÕË»§ºÍÊý¾Ý£¬°üÀ¨ÍøÕ¾ÎļþºÍºó¶ËÊý¾Ý¿â¡£Æ¾Ö¤ÔÚTwitterÉÏÐû²¼µÄ½Øͼ£¬±»¼ÓÃܵĿͻ§Îļþºó¸½¼ÓÁË¡°.kjhbx¡±À©Õ¹Ãû£¬ÏÖÔÚÑо¿Ö°Ô±ÈÔÔÚÊÔͼȷÈÏÀÕË÷Èí¼þµÄÖÖÀà¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-asp-net-hosting-provider-infected-by-ransomware/

2¡¢¶íÂÞ˹з¨°¸Ç¿ÖÆÊÖ»úºÍPCԤװÖñ¾¹úÈí¼þ


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


¶íÂÞ˹Òé»áÕýÔÚÍƶ¯Ò»ÏîÁ¢·¨£¬¸Ã·¨°¸½«Ç¿ÖÆÒªÇóËùÓÐÔÚ¶íÂÞ˹ÏúÊ۵ĵç×Ó×°±¸£¨°üÀ¨ÖÇÄÜÊÖ»ú¡¢PCºÍÖÇÄܵçÊӵȣ©Ô¤×°Öñ¾¹ú¿Æ¼¼¹«Ë¾µÄÓ¦Óá£Õâ¿ÉÄÜ»á´øÀ´Çå¾²Òþ»¼¡£Á¢·¨ÕßÌåÏָ÷¨°¸ÊÇΪÁ˱£»¤ÍâµØµÄÊÖÒÕÊг¡ÃâÊÜÍâ¹ú£¨¿ÉÄÜÊÇÖ¸ÃÀ¹ú£©µÄ¾ºÕù¡£Õþ¸®½«Õë¶ÔÿÖÖ×°±¸ÀàÐÍÐû²¼Ò»·ÝÈí¼þÁбí£¬×°±¸¹©Ó¦ÉÌÐèÒªÔÚ¶íÂÞ˹ÏúÊÛµÄ×°±¸ÉÏԤװÖÃÕâЩÈí¼þ¡£ÈôÊǹ©Ó¦É̲»×ñÊØ»®¶¨£¬½«±»´¦ÒÔ×î¸ß20Íò¬²¼£¨Ô¼ºÏ3100ÃÀÔª£©µÄ· £¿î¡£¸Ã·¨°¸»ñµÃÁËËùÓÐÖ÷ÒªÕþµ³µÄÖ§³Ö£¬ÕâÒâζ×ÅËüºÜÓпÉÄܽ«ÔÚ2020Äê7ÔÂ1ÈÕÉúЧ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/phones-and-pcs-sold-in-russia-will-have-to-come-pre-installed-with-russian-apps/

3¡¢5GÐÂÎó²î¿É¸ú×ٵ绰λÖü°¹ã²¥Ðéα¾¯±¨


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Æնɴóѧ£¨Purdue University£©ºÍ°®ºÉ»ª´óѧ£¨University of Iowa£©µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷¿ìÒª12¸ö5GÇå¾²Îó²î£¬Ñо¿Ö°Ô±ÌåÏÖÕâЩÎó²î¿ÉÔÊÐí¹¥»÷Õß»ñÈ¡Ä¿µÄÓû§µç»°µÄÐÂ/¾ÉÔÝʱÍøÂç±êʶ·û£¬´Ó¶ø¸ú×ٵ绰µÄλÖã¬ÉõÖÁЮÖÆÑ°ºôÐŵÀ¾ÙÐÐÐéαµÄ½ôÆȾ¯±¨¹ã²¥¡£ÔÚijЩÇéÐÎÏ£¬ÕâЩÎó²î¿ÉÄܱ»ÓÃÀ´½«·äÎÑÅþÁ¬½µ¼¶Îª²»Ì«Çå¾²µÄ±ê×¼¡£Ò»Ð©ÐµĹ¥»÷Ò²¿ÉÄÜÔÚÏÖÓеÄ4GÍøÂçÉϱ»Ê¹Ó᣼øÓÚÎó²îµÄÐÔ×Ó£¬Ñо¿Ö°Ô±ÌåÏÖËûÃDz»ÍýÏë¹ûÕæÆäPoC´úÂ룬µ«ËûÃǽ«ÕâЩ·¢Ã÷֪ͨÁËÈ«Çò·äÎÑÍøÂçGSMЭ»á£¨GSMA£©¡£GSMAûÓÐ͸¶ÊÇ·ñ¿ÉÒÔÐÞ¸´Îó²î£¬Ò²Ã»ÓÐ͸¶ÐÞ¸´Ê±¼ä¡£


Ô­ÎÄÁ´½Ó£º

https://finance.yahoo.com/news/5g-flaws-track-phone-locations-163014364.html

4¡¢McAfeeɱ¶¾Èí¼þ´úÂëÖ´ÐÐÎó²î(CVE-2019-3648)

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


SafeBreach Labs·¢Ã÷McAfee·À²¡¶¾Èí¼þÊÜ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-3648£©µÄÓ°Ï죬¹¥»÷Õß¿ÉÈƹýMcAfeeµÄ×ÔÎÀ»úÖÆ£¬¿ÉÄܵ¼Ö¶ÔÊÜѬȾϵͳµÄ½øÒ»²½¹¥»÷¡£¸ÃÎó²îÊÇÓÉÓÚδÑéÖ¤¼ÓÔØDLLµÄÊðÃûµ¼ÖµÄ£¬¹¥»÷Õ߿ɽ«í§ÒâδÊðÃûµÄDLL¼ÓÔص½ÒÔNT AUTHORITY\SYSTEMȨÏÞÔËÐеĶà¸ö·þÎñÖС£¸Ã¹¥»÷»¹¿ÉÒÔÈƹýÓ¦ÓóÌÐò°×Ãûµ¥±£»¤²¢×èÖ¹±»Çå¾²Èí¼þ¼ì²âµ½¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/mcafee-antivirus-software-impacted-by-code-execution-vulnerability/

5¡¢¸ßͨоƬ×éQSEEÎó²î¿ÉÖÂAndroid×°±¸Êý¾Ýй¶


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ƾ֤Çå¾²³§ÉÌCheckPointµÄÒ»·Ý±¨¸æ£¬¸ßͨоƬ×éÖеÄÇå¾²Ö´ÐÐÇéÐΣ¨QSEE£©Öб£´æÎó²î£¨CVE-2019-10574£©£¬¿Éµ¼ÖÂAndroid×°±¸ÖеÄСÎÒ˽¼ÒÊý¾Ýй¶¡£QSEEÊÇ»ùÓÚARM TrustZoneÊÖÒÕµÄÊÜÐÅÍÐÖ´ÐÐÇéÐΣ¨TEE£©µÄʵÏÖ£¬ÊÇÖ÷´¦Öóͷ£Æ÷ÉϵÄÒ»¸öÓ²¼þ¸ôÀëµÄÇå¾²ÇøÓò£¬ÆäÖÐͨ³£°üÀ¨×¨ÓüÓÃÜÃÜÔ¿¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍ½è¼Ç¿¨Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£Check PointÑо¿Ö°Ô±ÄæÏòÁ˸Ãϵͳ£¬²¢Ê¹ÓÃÄ£ºý²âÊÔ¶ÔÈýÐÇ¡¢LGºÍĦÍÐÂÞÀ­×°±¸¾ÙÐÐÁ˲âÊÔ¡£×ÜÌå¶øÑÔ£¬Ñо¿Ö°Ô±·¢Ã÷ÈýÐǵÄÊÜÐÅÍдúÂë°üÀ¨ËĸöÎó²î£¬Ä¦ÍÐÂÞÀ­ºÍLG»®·Ö°üÀ¨Ò»¸öÎó²î£¬µ«ËùÓдúÂë¾ùÀ´×Ô¸ßͨ¹«Ë¾¡£ÈýÐÇ¡¢¸ßͨºÍLGÒÑÕë¶ÔÕâЩQSEEÎó²îÐû²¼Á˲¹¶¡¸üС£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/11/qualcomm-android-hacking.html