ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ21ÖÜ

Ðû²¼Ê±¼ä 2019-06-03

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê5ÔÂ27ÈÕÖÁ6ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇApache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î£»£»£»ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾øÐ§ÀÍÎó²î£»£»£» Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î£»£»£»HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»£»£»Serv-U FTP ServerȨÏÞÌáÉýÎó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹ú½ðÈÚ¹«Ë¾FAFCй¶8.85ÒÚÌõµäÖÊ´û¿î¼Í¼£»£»£»ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢£»£»£»Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ï죻£»£»DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬£¬ £¬Ó°ÏìËùÓÐDocker°æ±¾£»£»£»¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£



Ö÷ÒªÇå¾²Îó²îÁбí



1. Apache HadoopÔ¶³ÌȨÏÞÌáÉýÎó²î
Apache Hadoop±£´æÒ»¸öÇå¾²Îó²î£¬£¬ £¬ÔÊÐíÓµÓÐYAMȨÏÞµÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉÒÔrootÓû§Éí·ÝÔËÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
https://seclists.org/oss-sec/2019/q2/132

2. ISC BIND EDNS¿Í»§¶Ë×ÓÍø¹¦Ð§Ô¶³Ì¾Ü¾øÐ§ÀÍÎó²î
ISC BINDµÝ¹éÆÊÎöÆ÷µÄEDNS¿Í»§¶Ë×ÓÍø±£´æÒ»¸öÇå¾²Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬´¦Öóͷ£°üÀ¨RRSIGµÄÏìÓ¦µÄ±¨ÎÄʱ¿ÌʹЧÀÍÆ÷Í߽⡣¡£¡£¡£
https://kb.isc.org/docs/cve-2019-6469

3. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î
Adobe Flash Player±£´æÊͷźóʹÓÃÎó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬ £¬ÓÕʹÓû§ÇëÇ󣬣¬ £¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://helpx.adobe.com/security/products/flash-player/apsb19-26.html

4. HPE Intelligent Management Center ByteMessageResource transformEntity·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
HPE Intelligent Management Center ByteMessageResource transformEntityÒªÁì±£´æ·´ÐòÁл¯Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-19-528/

5. Serv-U FTP ServerȨÏÞÌáÉýÎó²î
WindowsϵÄServ-U FTP ServerÑéÖ¤´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬ £¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£
https://packetstormsecurity.com/files/153128/Serv-U-FTP-Server-15.1.6.25-Local-Privilege-Escalation.html


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢ÃÀ¹ú½ðÈÚ¹«Ë¾FAFCй¶8.85ÒÚÌõµäÖÊ´û¿î¼Í¼

Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾

¾ÝŦԼʱ±¨±¨µÀ£¬£¬ £¬ÃÀ¹ú½ðÈÚ¹«Ë¾First American Financial Corporation¹ÙÍøÉϵÄÒ»¸öÎó²îй¶ÁË16ÄêÀ´ÓëµäÖÊ´û¿îÓйصÄ8.85ÒÚÌõ¼Í¼¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÈκÎÈË»á¼ûFirst American´æ´¢µÄÉç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢¡¢¼ÝÕÕÒÔ¼°µäÖÊ´û¿îºÍ˰ÎñÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÕýÔÚÆÀ¹À´ËÊÂÎñ¶Ô¿Í»§ÐÅÏ¢Çå¾²ÐÔµÄÓ°Ï죬£¬ £¬ÔÚÄÚ²¿ÉóºËÍê³É֮ǰ£¬£¬ £¬½«²»»á½ÒÏþÈκÎ̸ÂÛ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.nytimes.com/2019/05/24/technology/data-leak-first-american.html

2¡¢ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusÒâÍâй¶1500ÍòÂÿÍÐÅÏ¢


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


5ÔÂ20ÈÕ£¬£¬ £¬ÒÔÉ«ÁÐÂÃÓι«Ë¾AmadeusµÄÊý¾Ý¿âÒòÉèÖùýʧµ¼ÖÂÂÿÍÐÅϢй¶£¬£¬ £¬¸ÃÊý¾Ý¿â°üÀ¨3600ÍòÌõº½°àÔ¤¶¨ÐÅÏ¢¡¢1500ÍòÂÿÍÐÅÏ¢¡¢Áè¼Ý100ÍòÌõÂùÝÔ¤¶¨ÐÅÏ¢ÒÔ¼°70ÍòÌõǩ֤ÉêÇëÐÅÏ¢¡£¡£¡£¡£ÆäÖÐÉõÖÁ°üÀ¨ÒÔÉ«ÁÐ×ÜÀíBenjamin NetanyahuºÍÒÔÉ«Áи߼¶Íâ½»¹ÙµÄÂÃÐÐÔ¤¶¨ÐÅÏ¢¡£¡£¡£¡£¸ÃÊý¾Ý¿âÊôÓÚalp.co.il£¬£¬ £¬ÕâÊÇÒÔÉ«ÁеÄÂÃÐж©Æ±Æ½Ì¨£¬£¬ £¬ÎªGulliver.co.il¡¢Issta.co.ilºÍÕþ¸®ÂÃÐÐÉçInbalÌṩЧÀÍ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.calcalistech.com/ctech/articles/0,7340,L-3762693,00.html

3¡¢Î÷ÃÅ×Ó¶à¿îÒ½ÁÆ×°±¸Ò×ÊÜWindows BlueKeepÎó²îÓ°Ïì


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ƾ֤Î÷ÃÅ×ÓÐû²¼µÄÇ徲ͨ¸æ£¬£¬ £¬¶à¿îÎ÷ÃÅ×ÓÒ½ÁÆ×°±¸Ò×ÊÜWindows RDPЧÀÍBlueKeepÎó²îµÄÓ°Ï죬£¬ £¬°üÀ¨MagicLinkA¡¢MagicViewµÈÈí¼þ²úÆ·£¬£¬ £¬System ACOM¡¢SensisµÈ¸ß¼¶ÖÎÁƲúÆ·£¬£¬ £¬Axiom¡¢MobilettµÈXÉäÏß×°±¸ÒÔ¼°Atellica¡¢AptioµÈʵÑéÊÒÕï¶Ï²úÆ·¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÒªÇó¿Í»§×°ÖÃ΢ÈíµÄÐÞ¸´²¹¶¡£¬£¬ £¬µ«²»¿É°ü¹Ü²¹¶¡µÄ¼æÈÝÐÔ£¬£¬ £¬¸Ã¹«Ë¾½¨ÒéÓû§½ÓÄɽûÓÃRDP¡¢×èÖ¹TCP¶Ë¿Ú3389µÈ»º½â²½·¥¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86222/security/siemens-healthineers-bluekeep.html

4¡¢DockerδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬£¬ £¬Ó°ÏìËùÓÐDocker°æ±¾


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Åû¶DockerÖÐδÐÞ¸´µÄ¾ºÕùÌõ¼þÎó²î£¬£¬ £¬¸ÃÎó²îÓ°ÏìÁËËùÓеÄDocker°æ±¾¡£¡£¡£¡£¸ÃÎó²îÀàËÆÓÚCVE-2018-15664£¬£¬ £¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÖ¸¶¨µÄ³ÌÐò¶Ô×ÊÔ´¾ÙÐвÙ×÷֮ǰÐÞ¸Ä×ÊԴ·¾¶£¬£¬ £¬´Ó¶ø¿ÉÄÜ»ñµÃí§ÒâÎļþµÄ¶Áд»á¼ûȨÏÞ£¬£¬ £¬Õâ±»³ÆÎªTOCTOUÀàÐ͵Äbug¡£¡£¡£¡£¸ÃÎó²îµÄ½¹µãÔ´ÓÚFollowSymlinkInScope¹¦Ð§Ò×ÊÜTOCTOU¹¥»÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÒѾ­Ðû²¼ÁËPoC´úÂë¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/unpatched-flaw-affects-all-docker-versions-exploits-ready/

5¡¢¹È¸èÑо¿Ö°Ô±ÔÚWindows¼Çʱ¾Öз¢Ã÷´úÂëÖ´ÐÐÎó²î


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Google Project ZeroÑо¿Ô±Tavis OrmandyÔÚ΢ÈíµÄWindows¼Çʱ¾Öз¢Ã÷Ò»¸ö´úÂëÖ´ÐÐÎó²î£¬£¬ £¬OrmandyÒÑÏò΢Èí±¨¸æÁ˸ÃÎÊÌâ¡£¡£¡£¡£Îó²îµÄϸ½ÚÉÐδÅû¶£¬£¬ £¬µ«OrmandyÔ¤¼Æ¸ÃÎó²îÊÇÒ»¸öÄÚ´æËð»µÎó²î£¬£¬ £¬ËûÔÚTwitterÉÏ·ÖÏíµÄͼƬÑÝʾÁËÔõÑùÔÚ¼Çʱ¾Öе¯³öshell¡£¡£¡£¡£Æ¾Ö¤¹È¸èµÄÎó²îÅû¶Õþ²ß£¬£¬ £¬Ormandy½«ÔÚ90Ììºó»ò΢ÈíÐû²¼ÐÞ¸´²¹¶¡ºóÅû¶¸ü¶àÎó²îϸ½Ú¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html