ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ20ÖÜ

Ðû²¼Ê±¼ä 2018-05-21

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
        2018Äê05ÔÂ14ÈÕÖÁ20ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö £¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇRed Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î£»£»£»£» £»Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î£»£»£»£» £»Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£» £»Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î£»£»£»£» £»Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£

        ±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDzÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖУ»£»£»£» £»Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨£»£»£»£» £»Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPЭÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ£»£»£»£» £»¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷£»£»£»£» £»Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î¡£¡£¡£¡£¡£

        ƾ֤ÒÔÉÏ×ÛÊö £¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£


¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢Red Hat DHCP Client Script´úÂëÖ´ÐÐÎó²î

        Red Hat DHCP Client´¦Öóͷ£ÌØÊâµÄDHCPÏìÓ¦±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâÇëÇó £¬£¬£¬£¬£¬£¬¿ÉÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://access.redhat.com/security/vulnerabilities/3442151
2¡¢Advantech WebAccessí§ÒâÎļþɾ³ýÎó²î

        Advantech WebAccess±£´æÎļþÃû³Æ»ò·¾¶Íⲿ¿ØÖÆÎó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬¿Éɾ³ýí§ÒâÎļþ¡£¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://ics-cert.us-cert.gov/advisories/ICSA-18-135-01
3¡¢Adobe Photoshop CCÔ½½çдí§Òâ´úÂëÖ´ÐÐÎó²î

        Adobe Photoshop CC´¦Öóͷ£Îļþ±£´æÔ½½çдÎó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâÎļþ £¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö £¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£» £»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://helpx.adobe.com/security/products/photoshop/apsb18-17.html
4¡¢Google Chrome V8 CVE-2018-6122´úÂëÖ´ÐÐÎó²î

        Google Chrome V8±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÒ³ £¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö £¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£» £»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop.html
5¡¢Spring Framework CVE-2018-1258Çå¾²ÈÏÖ¤ÈÆ¹ýÎó²î

        Spring FrameworkÔÚʹÓÃÒªÁìÇå¾²ÐÔ±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬ÈƹýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£¡£¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://pivotal.io/security/cve-2018-1258


Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢²ÍÒûÁ¬Ëø¹«Ë¾Chili'sÔâµ½¶ñÒâÈí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬Ö´·¨²¿·ÖÕýÔÚÊÓ²ìÖÐ

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        ²ÍÒûÁ¬Ëø¹«Ë¾Chili's±¾ÖÜÐû²¼Í¨¸æ³ÆÔâµ½¶ñÒâÈí¼þ¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ £¬£¬£¬£¬£¬£¬ÕýÔÚÓëÖ´·¨²¿·ÖºÍµÚÈý·½ÅжÏר¼ÒÒ»ÆðÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçµ½µÄ×îÐÂϸ½Ú £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þËÆºõÒѾ­Ñ¬È¾ÁËÆäijЩ֧¸¶ÏµÍ³¡£¡£¡£¡£¡£µ«ÔÚÍøÂçÉÏ·¢Ã÷¸Ã¶ñÒâÈí¼þ £¬£¬£¬£¬£¬£¬³ÆÓÐÖ¤¾ÝÅú×¢¸Ã¶ñÒâÈí¼þ½öÔÚ2018Äê3ÔºÍ4ÔÂÖ®¼ä»îÔ¾¡£¡£¡£¡£¡£BrinkerҲûÓÐÌṩ»òÐíÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿ £¬£¬£¬£¬£¬£¬µ«ÔÊÐíÔÚÊÓ²ì¾ÙÐÐʱÐû²¼¸ü¶àϸ½Ú¡£¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/card-breach-announced-at-chili-s-restaurant-chain/

2¡¢Ä«Î÷¸çµÄÒøÐеç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©¶à´ÎÔâµ½ºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬£¬±»µÁ×ʽð²»È·¶¨

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        ÖÐÑëÒøÐÐÆóÒµÖ§¸¶ºÍЧÀÍϵͳ×ܼàLorenza MartinezÌåÏÖ £¬£¬£¬£¬£¬£¬ÔÚ4ÔºÍ5ÔÂÖÁÉÙ¶ÔÄ«Î÷¸çÑëÐеÄÒøÐмäµç×ÓÖ§¸¶ÏµÍ³£¨SPEI£©ÌᳫÁËÎå´ÎºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£Ò»Ð©Ä«Î÷¸çýÌåÒѾ­½«±»µÁ½ð¶îÉèΪ4ÒÚ±ÈË÷£¨2040ÍòÃÀÔª£© £¬£¬£¬£¬£¬£¬µ«Âí¶¡ÄÚ˹·ñ¶¨ÁËÕâЩ±¨µÀ¡£¡£¡£¡£¡£Ëý˵±»µÁµÄÇ®ÊôÓÚÒøÐÐ×Ô¼º £¬£¬£¬£¬£¬£¬¿Í»§µÄ×ʽð´ÓδÊܵ½Ó°Ïì¡£¡£¡£¡£¡£ÔÚ·¢Ã÷¹¥»÷ºó £¬£¬£¬£¬£¬£¬ÒøÐÐת¶ø½ÓÄɽÏÂýµ«¸üÇå¾²µÄÒªÁì £¬£¬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐÐµĹ¥»÷¼Í¼¡£¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-divert-funds-mexico-banks-amount-unclear-official

3¡¢Ñо¿ÍŶӷ¢Ã÷Á½ÆðʹÓÃUPnPЭÒé¾ÙÐеÄDDoS¹¥»÷ÊÂÎñ

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        ¹¥»÷ÕßÕýÔÚʵÑé½ÓÄÉͨÓü´²å¼´Óã¨UPnP£©Ð­ÒéÀ´ÆÁÕÏDDoSÂþÒçʱ´ú·¢Ë͵ÄÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú £¬£¬£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃijЩDDoS»º½â½â¾ö¼Æ»®µÄÐÂÒªÁì¡£¡£¡£¡£¡£ÔÚÖÜÒ»Ðû²¼µÄÒ»·Ý±¨¸æÖÐ £¬£¬£¬£¬£¬£¬Imperva¹«Ë¾ÌåÏÖ £¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÖÁÉÙÓÐÁ½´Î½ÓÄÉÕâÖÖÊÖÒÕµÄDDoS¹¥»÷¡£¡£¡£¡£¡£Í¨¹ýÆÁÕÏ´«ÈëÍøÂçÊý¾Ý°üµÄÔ´¶Ë¿Ú¡£¡£¡£¡£¡£ÒÀÀµ¶ÁÈ¡´ËÐÅÏ¢À´×èÖ¹¹¥»÷µÄÀÏʽDDoS»º½âϵͳÐèÒª¸üÐÂΪ¸üÖØ´óµÄ½â¾ö¼Æ»® £¬£¬£¬£¬£¬£¬ÕâЩ½â¾ö¼Æ»®ÒÀÀµÓÚÉî¶È°ü¼ì²â£¨DPI£© £¬£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ±¾Ç®¸ü¸ß £¬£¬£¬£¬£¬£¬½¨ÒéʹÓ÷ÓÉÆ÷µÄÓû§ÈôÊDz»Ê¹Óøù¦Ð§ £¬£¬£¬£¬£¬£¬Ôò½ûÓÃUPnPÖ§³Ö¡£¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ddos-attacks-leverage-upnp-protocol-to-avoid-mitigation/

4¡¢¶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©¹Ù·½ÍøÕ¾ÔâºÚ¿Í¹¥»÷

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        Anonymous¹¥»÷Á˶íÂÞ˹Áª°î¹ú¼ÊÏàÖúÊð£¨Rossotrudnichestvo£©µÄ¹Ù·½ÍøÕ¾µÄ×ÓÓòÃû £¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ5ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬ÒÔ¿¹ÒéÕþ¸®µÄÉó²éÖÆ¶È £¬£¬£¬£¬£¬£¬²¢ÌØÊâÌáµ½ÁËեȡTelegramµÄ»®¶¨¡£¡£¡£¡£¡£ÉϸöÔ £¬£¬£¬£¬£¬£¬¶íÂÞ˹Õþ¸®·â±ÕÁ˸ùúµÄTelegramÓ¦ÓóÌÐò £¬£¬£¬£¬£¬£¬ÓÉÓڸù«Ë¾¾Ü¾ø½«ÆäÓû§µÄ¼ÓÃÜÃÜÔ¿½»¸ø¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¾ÙÐÐÊӲ졣¡£¡£¡£¡£×Ô2018Äê5ÔÂ3ÈÕÆð £¬£¬£¬£¬£¬£¬¶íÂÞ˹Ïà¹Ø»ú¹¹½û·âÁË50¶à¸öÐéÄâרÓÃÍøÂ磨VPN£©¡¢ÍøÂçÊðÀíºÍÄäÃûÍøÂç¡£¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72567/hacktivism/anonymous-hask-russia-site.html

5¡¢Ñо¿ÍŶӷ¢Ã÷¶ñÒâPDFÎļþͬʱʹÓÃWindowsÌáȨÎó²îºÍAdobe ReaderµÄRCEÎó²î

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        ESETµÄÑо¿Ö°Ô±×î½ü·¢Ã÷ÁËÒ»¸ö¶ñÒâPDFÎļþ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÎĵµÊ¹ÓÃWindowsÖеÄÌØÈ¨Éý¼¶Îó²î£¨CVE-2018-8120£©ºÍAdobe Reader£¨CVE-2018-4990£©ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£CVE-2018-8120ÊÇMicrosoftÔÚ2018Äê5Ô²¹¶¡¸üÐÂÖÐÐÞ¸´µÄÁ½¸ö0dayÎó²îÖ®Ò» £¬£¬£¬£¬£¬£¬¶øCVE-2018-4990ÊÇÓÉAdobeÓÚ5ÔÂ14ÈÕÐû²¼µÄ £¬£¬£¬£¬£¬£¬Ðû²¼ÁËÐÞ¸´½ü50¸öÆäËûÎÊÌâµÄ¸üС£¡£¡£¡£¡£Í¨¹ýÁ¬ÏµÕâÁ½¸öȱÏÝ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÓÃ×îÉÙµÄÓû§½»»¥ÒÔ¸ü¸ßµÄȨÏÞÖ´ÐÐí§Òâ´úÂë £¬£¬£¬£¬£¬£¬ÌØÊâÊÇ·­¿ª¶ñÒâPDF¡£¡£¡£¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/malicious-pdf-leads-discovery-adobe-reader-windows-zero-days