ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ22ÖÜ

Ðû²¼Ê±¼ä 2018-06-04

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
        2018Äê05ÔÂ28ÈÕÖÁ06ÔÂ01ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊǶà¿îTP-LINK²úÆ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Git 'git clone ¨Crecurse-submodules'Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Huawei 1288H V5ºÍ2288H V5 CVE-2018-7904ȨÏÞÌáÉýÎó²î£»£»£»£»£»strongSwan CVE-2018-5388»º³åÇøÒç³öÎó²î£»£»£»£»£»BeaconMedaes TotalAlert Scroll Medical Air SystemsÐÅϢй¶Îó²î¡£¡£

        ±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿ÍŶӷ¢Ã÷ʹÓÃAndroidÔ­ÉúwebÊÓͼµÄд¹Âڻ£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃRIG EK·Ö·¢Ä¾ÂíGrobiosµÄ¹¥»÷»î¶¯£»£»£»£»£»¼ÓÄôóµÄÁ½¼ÒÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬²¿·Ö¿Í»§µÄÊý¾Ýй¶£»£»£»£»£»Ñо¿Ö°Ô±³Æ¿Éͨ¹ýÉù²¨¹¥»÷ÆÆËðHDDºÍµ¼ÖÂϵͳÍ߽⣻£»£»£»£»±¾ÌïÆû³µÓ¡¶È·Ö¹«Ë¾µÄAWS S3ÉèÖùýʧ£¬£¬µ¼ÖÂ5Íò¶àÃûÓû§µÄÐÅϢй¶¡£¡£

        ƾ֤ÒÔÉÏ×ÛÊö£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£


¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢¶à¿îTP-LINK²úÆ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î

        ¶à¿îTP-LINK²úÆ·ÖеÄ/usr/lib/lua/luci/torchlight/validator.luaÎļþ±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄJSONÇëÇ󣬣¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://github.com/yough3rt/IOT-pwn-for-fun/blob/master/TP-LINK-websys-Authenticated-RCE
2¡¢Git 'git clone ¨Crecurse-submodules'Ô¶³Ì´úÂëÖ´ÐÐÎó²î

        Git ÔÚÓÃgit cloneʱûÓжÔsubmoduleµÄÎļþ¼ÐÃüÃû×ö×ã¹»µÄÑéÖ¤£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»¶ñÒâµÄ.gitmodulesÎļþ£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://git-scm.com
3¡¢Huawei 1288H V5ºÍ2288H V5 CVE-2018-7904ȨÏÞÌáÉýÎó²î

        Huawei 1288H V5ºÍ2288H V5±£´æJSON×¢ÈëÎó²î£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ÐÞ¸ÄÖÎÀíÔ±ÃÜÂ룬£¬»ñȡϵͳµÄÖÎÀíȨÏÞ¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180523-01-json-en
4¡¢strongSwan CVE-2018-5388»º³åÇøÒç³öÎó²î

        strongSwan±£´æ»º³åÇøÒç³öÎó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿ÉºÄ¾¡×ÊÔ´£¬£¬¾ÙÐоܾøÐ§À͹¥»÷¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttp://www.strongswan.org/blog
5¡¢BeaconMedaes TotalAlert Scroll Medical Air SystemsÐÅϢй¶Îó²î

        BeaconMedaes TotalAlert Scroll Medical Air Systems WEBЧÀÍÆ÷±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01


Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃAndroidÔ­ÉúwebÊÓͼµÄд¹Âڻ

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        RiskIQÑо¿ÍŶӷ¢Ã÷Õë¶ÔMyEtherWalletµÄÒ»¸öд¹Âڻ¡£¡£¹¥»÷Õßͨ¹ý½¨ÉèÒ»¸öαװ³ÉMyEtherWalletÖ§³ÖÍŶӵÄTelegram̸ÌìȺ×éÀ´·Ö·¢¶ñÒâMyEtherWallet¿Í»§¶Ë¡£¡£¸Ã¶ñÒâ³ÌÐòͨ¹ýGoNative.io½«WebÓ¦ÓÃ×÷ΪÍâµØÓ¦ÓÃÐû²¼£¬£¬ÓÃÓÚÇÔÈ¡Óû§µÄƾ֤¡£¡£Ñо¿Ö°Ô±Ðû²¼ÁËÏà¹ØIoC¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/labs/myetherwallet-android/

2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃRIG EK·Ö·¢Ä¾ÂíGrobiosµÄ¹¥»÷»î¶¯

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        FireEyeÑо¿ÍŶӷ¢Ã÷ʹÓÃRIG Exploit Kit£¨EK£©Èö²¥Ä¾ÂíGrobiosµÄ¶ñÒâ¹¥»÷»î¶¯£¬£¬¸Ã»î¶¯´Ó2018Äê3ÔÂ10ÈÕ×îÏÈ¡£¡£GrobiosʹÓÃÁ˶àÖÖÌӱܼì²âÊÖÒÕ£¬£¬²¢Í¨¹ý¶à¸ö±¸·ÝºÍ½¨Éè×Ô¶¯ÔËÐÐ×¢²á±íÏî¼°ÍýÏëʹÃüÀ´ÊµÏÖ³¤ÆÚÐÔ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72954/malware/rig-exploit-kit-grobios-campaign.html

3¡¢¼ÓÄôóµÄÁ½¼ÒÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬²¿·Ö¿Í»§µÄÊý¾Ýй¶

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        ¼ÓÄôóµÄÁ½¼ÒÒøÐÐSimplii FinancialºÍÃÉÌØÀû¶ûÒøÐÐÔÚÖÜÒ»½ÒÏþÉùÃ÷³Æ±¬·¢ÍøÂçÇå¾²ÊÂÎñ£¬£¬Simplii FinancialÌåÏÖ£¬£¬ËüÔÚÉÏÖÜÄ©·¢Ã÷¹¥»÷Õß»á¼ûÁËÔ¼4ÍòÃûSimplii¿Í»§µÄÕË»§ÐÅÏ¢¡£¡£¿ÉÊÇSimplii FinancialÔÊÐí100£¥·µ»¹ËùÊÜÓ°ÏìµÄÕË»§µÄËðʧ¡£¡£ÔÚSimplii½ÒÏþÉùÃ÷һСʱºó£¬£¬ÃÉÌØÀû¶ûÒøÐÐÒ²Ðû²¼ÁËÀàËÆµÄÉùÃ÷¡£¡£¸ÃÒøÐÐÌåÏÖ£¬£¬ºÚ¿Í×Ô¼ºÔÚÉÏÖÜÈÕÁªÏµÁËËûÃÇ£¬£¬Éù³ÆÓµÓпͻ§Êý¾Ý¡£¡£ÃÉÌØÀû¶ûÒøÐÐûÓÐ͸¶Óм¸¶à¿Í»§µÄÐÅϢй¶£¬£¬µ«ÌåÏÖËûÃÇÏàÐÅÒѾ­¹Ø±ÕÁ˺ڿͽøÈëÆäϵͳµÄÈë¿Úµã¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/two-canadian-banks-announce-hacks-over-the-weekend/

4¡¢Ñо¿Ö°Ô±³Æ¿Éͨ¹ýÉù²¨¹¥»÷ÆÆËðHDDºÍµ¼ÖÂϵͳÍß½â

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        À´×ÔÃÜЪ¸ù´óѧºÍÕã½­´óѧµÄÒ»¸öÑо¿Ð¡×鳯¿Éͨ¹ýÉù²¨/³¬Éù²¨¹¥»÷À´ÆÆËðÓ²ÅÌ£¨HDD£©µÄ¶ÁÈ¡¡¢Ð´ÈëºÍ´æ´¢¹¦Ð§ÒÔ¼°µ¼Ö²Ù×÷ϵͳÍ߽⡣¡£Ñо¿Ö°Ô±ÌåÏÖÕâÖÖ¹¥»÷¿ÉÒÔͨ¹ý×ÔÖÆµĄ̈ʽµçÄÔ»òÌõ¼Ç±¾µçÄÔµÄÑïÉùÆ÷¾ÙÐУ¬£¬Ò»ÖÖ¿ÉÄܵĹ¥»÷³¡¾°ÊÇ£¬£¬Óû§»á¼ûÁ˶ñÒâÍøÕ¾²¢²¥·ÅÁ˾ßÓÐÆÆËðÐԵĶñÒâÉù²¨¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/sonic-tone-attacks-damage-hard-disk-drives-crashes-os/132343/

5¡¢±¾ÌïÆû³µÓ¡¶È·Ö¹«Ë¾µÄAWS S3ÉèÖùýʧ£¬£¬µ¼ÖÂ5Íò¶àÃûÓû§µÄÐÅϢй¶

¿­Ðý¹ú¼ÊÓÎÏ·(Öйú)¹Ù·½ÍøÕ¾

        ƾ֤Kromtech SecurityµÄ±¨¸æ£¬£¬±¾ÌïÆû³µÓ¡¶È·Ö¹«Ë¾µÄ2¸öAmazon S3¿É¹ûÕæ»á¼û£¬£¬µ¼ÖÂÁè¼Ý5ÍòÃûÓû§µÄÐÅϢй¶¡£¡£Õâ2¸öAWS bucket°üÀ¨±¾ÌïÒÆ¶¯Ó¦ÓÃHonda ConnectµÄÓû§µÄÏêϸÐÅÏ¢£¬£¬ÀýÈçÐÕÃû¡¢ÐÔ±ð¡¢Óû§¼°Æä¿ÉÐÅÁªÏµÈ˵ĵ绰ºÅÂëºÍµç×ÓÓʼþµØµã¡¢ÕË»§ÃÜÂë¡¢Æû³µVINÂëºÍÆû³µConnect IDµÈ¡£¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/honda-india-left-details-of-50-000-customers-exposed-on-an-aws-s3-server/