PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼£»£»£»£»£»£»£»LinuxÎó²î£¨CVE-2019-14899£©¿Éµ¼Ö¹¥»÷ÕßÐ®ÖÆVPN
Ðû²¼Ê±¼ä 2019-12-06
1.OpenBSDÍŶÓÐÞ¸´4¸öÉí·ÝÑéÖ¤ÈÆ¹ý/ÌáȨÎó²î
OpenBSDÍŶÓÐÞ¸´ÁË4¸ö¿Éµ¼ÖÂÌØÈ¨Éý¼¶ºÍÉí·ÝÑéÖ¤ÈÆ¹ýµÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬Qualys Research LabsÔÚ±¾ÖÜÔçЩʱ¼ä·¢Ã÷²¢±¨¸æÁËÕâЩÎó²î£¬£¬£¬£¬£¬£¬£¬£¬OpenBSD¿ª·¢ÍŶÓÔÚ40¸öСʱ֮ÄÚÐû²¼ÁËÕë¶ÔOpenBSD 6.5ºÍOpenBSD 6.6µÄÐÞ¸´²¹¶¡¡£¡£¡£¡£Îó²î¹æÄ£°üÀ¨Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2019-19521£©ºÍÌØÈ¨Éý¼¶£¨CVE-2019-19519¡¢CVE-2019-19520ºÍCVE-2019-19520£©¡£¡£¡£¡£QualysÑо¿Ö°Ô±»¹ÔÚÿ¸öÎó²îµÄ×Éѯͨ¸æÖÐÐû²¼ÁËÏà¹ØPoCʹÓᣡ£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/openbsd-patches-severe-authentication-bypass-privilege-escalation-vulnerabilities/
2.UbuntuÐû²¼Intel΢Âë¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´CPU¹ÒÆðÎÊÌâ
CanonicalΪUbuntuÐû²¼ÁËеÄLinux Intel΢´úÂë¸üУ¬£¬£¬£¬£¬£¬£¬£¬¸Ã¸üÐÂÐÞ¸´Á˵¼ÖÂIntel Skylake CPUÔÚÈÈÖØÆôºó¹ÒÆðµÄÎÊÌâ¡£¡£¡£¡£Ö®Ç°11ÔÂ12ÈÕµÄIntel΢´úÂë¸üÐÂÖлº½âÁËÊÂÎñͬ²½À©Õ¹£¨TSX£©¹¦Ð§ÖеÄÎó²îºÍÖÁÇ¿´¦Öóͷ£Æ÷ÖеÄDoSÎó²î£¬£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¸üе¼ÖÂÁËÒ»¸ö»Ø¹éÎó²î£ºIntel Skylake´¦Öóͷ£Æ÷ÔÚÈÈÖØÆôºó¹ÒÆð¡£¡£¡£¡£Îª½â¾ö´ËÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬UbuntuÍŶÓÐû²¼ÁËеÄintel-microcode-3.20191115.1ubuntu0¸üУ¬£¬£¬£¬£¬£¬£¬£¬¸Ã¸üпɻ¹ÔSkylake´¦Öóͷ£Æ÷µÄ΢´úÂ룬£¬£¬£¬£¬£¬£¬£¬Ê¹Æä²»ÔÙ¹ÒÆð¡£¡£¡£¡£UbuntuÓû§¿ÉÒÔÔËÐÐSoftware Updater³ÌÐòÀ´¼ì²é²¢×°ÖÃ×îиüС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/linux/ubuntu-linux-gets-intel-microcode-update-to-fix-cpu-hangs/
3.ÃÀ¹úÊý¾ÝÖÐÐÄÕÛÎñÉÌCyrusOneÊÜÀÕË÷Èí¼þ¹¥»÷
ÃÀ¹úÊý¾ÝÖÐÐÄÕÛÎñÉÌCyrusOneÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾½²»°ÈËÔÚÒ»·âµç×ÓÓʼþÖÐ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖËûÃÇÏÖÔÚÕýÔÚÓëÖ´·¨»ú¹¹ºÍ·¨Ö¤¹«Ë¾ÏàÖú¾ÙÐÐÊÓ²ìÒÔ¼¿ÕÊÖú¿Í»§»Ö¸´ÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£CyrusOneÌåÏÖÓÉÓÚÀÕË÷Èí¼þ¶ÔÍøÂçÖеÄijЩװ±¸¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂλÓÚŦԼÊý¾ÝÖÐÐĵÄÁù¸öÍйÜЧÀͿͻ§Óöµ½ÁË¿ÉÓÃÐÔÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨½ðÈں;¼Í¹«Ë¾FIA Tech¡£¡£¡£¡£Æ¾Ö¤ZDNetÊÕµ½µÄÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ12ÔÂ4ºÅ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÊÇÓÉÀÕË÷Èí¼þREvil£¨Sodinokibi£©ÒýÆðµÄ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-attack-hits-major-us-data-center-provider/
4.ÒÁÀÊAPT×é֯ʹÓÃÊý¾Ý²Á³ýÆ÷ZeroCleareÃé×¼Öж«
IBMÑо¿Ö°Ô±·¢Ã÷Ò»¸öÐÂµÄÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þZeroCleare£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ±»¹ú¼Ò×ÊÖúµÄºÚ¿Í×éÖ¯ÔÚÒ°ÍâÓÃÓÚÕë¶ÔÖж«µÄÄÜÔ´ºÍ¹¤Òµ×éÖ¯¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆZeroCleareÓëÁ½¸öÒÁÀÊAPT×éÖ¯Óйأ¬£¬£¬£¬£¬£¬£¬£¬Ò»¸öÊÇAPT34£¨Ò²±»³ÆÎªITG13ºÍOilrig£©£¬£¬£¬£¬£¬£¬£¬£¬ÁíÒ»¸öÊÇHive0081£¨Ò²±»³ÆÎªxHunt£©¡£¡£¡£¡£ZeroCleareÊǶà½×¶Î¹¥»÷ÖеÄ×îÖÕpayload£¬£¬£¬£¬£¬£¬£¬£¬ËüÓÐÁ½¸ö±äÌ壬£¬£¬£¬£¬£¬£¬£¬»®·ÖÕë¶Ô32λºÍ64λµÄWindowsϵͳ¡£¡£¡£¡£µ«Ñо¿Ö°Ô±ÌåÏÖÖ»ÓÐ32λµÄ°æ±¾¿ÉÓ㬣¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ64λ°æ±¾ÔÚÏÖʵ×îÏȲÁ³ýÊý¾Ý֮ǰ»áÍ߽⡣¡£¡£¡£Ñо¿Ö°Ô±»¹³ÆZeroCleare¹¥»÷ÊÇÕë¶ÔÌØ¶¨²¿·ÖºÍ×éÖ¯µÄÕë¶ÔÐÔÐж¯¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-iranian-zerocleare-data-wiper-malware-used-in-targeted-attacks/
5.PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼
PCIÇå¾²±ê׼ίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£¡£¡£¡£¸Ã±ê×¼ÔÊÐí´øÓÐNFCµÄCOTSÒÆ¶¯×°±¸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£¡£¡£¡£PCI CPoC±ê×¼ÊǸÃίԱ»áΪ½â¾öÒÆ¶¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö±ê×¼¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬£¬£¬PCI CPoC±ê×¼»®¶¨Á˹©Ó¦ÉÌÔÚ±£»£»£»£»£»£»£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¼Æ»®·½ÃæµÄһЩÇå¾²ÉϵÄÒªÇ󡣡£¡£¡£±ê×¼µÄCPoC½â¾ö¼Æ»®°üÀ¨¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTS×°±¸¡¢ÂÄÀúÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°×ÔÁ¦ÓÚCOTS×°±¸µÄºó¶Ëϵͳ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1
6.LinuxÎó²î£¨CVE-2019-14899£©¿Éµ¼Ö¹¥»÷ÕßÐ®ÖÆVPN
Çå¾²Ñо¿Ö°Ô±Åû¶ÁËÒ»¸öÓ°Ïì*NIX×°±¸µÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßÐá̽¡¢Ð®Öƺ͸͝VPNËíµÀÅþÁ¬£¬£¬£¬£¬£¬£¬£¬£¬²¢½«í§ÒâÓÐÓÃÔØºÉ×¢ÈëIPv4ºÍIPv6µÄTCPÊý¾ÝÁ÷ÖС£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-14899£©Î»ÓÚ»ùÓÚUnix²Ù×÷ϵͳµÄÍøÂç¿ÍÕ»ÖУ¬£¬£¬£¬£¬£¬£¬£¬¸üÏêϸµØËµ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ²Ù×÷ϵͳ¶ÔÒâÍâµÄÍøÂçÊý¾Ý°ü̽²â¾ÙÐÐÏìÓ¦µÄÀú³ÌÖС£¡£¡£¡£ÒÑÖª¸ÃÎó²î»áÓ°Ïì´ó´ó¶¼Linux¿¯ÐаæºÍÀàUnix²Ù×÷ϵͳ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨FreeBSD¡¢OpenBSD¡¢macOS¡¢iOSºÍAndroid¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ´Ë¹¥»÷¿ÉÕë¶ÔOpenVPN¡¢WireGuardºÍIKEv2/IPSecµÈVPNÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÈÔÔÚ²âÊÔÆäÕë¶ÔTorµÄ¿ÉÐÐÐÔ¡£¡£¡£¡£Ð§ÀÍÆ÷ÖÎÀíÔ±¿ÉÒÔ½ÓÄɵĻº½â²½·¥°üÀ¨·¿ª·´Ïò·¾¶¹ýÂË¡¢Ê¹ÓÃbogon¹ýÂËÐéαIPµØµã»òʹÓüÓÃܵÄÊý¾Ý°ü¾ÞϸºÍ׼ʱµÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/


¾©¹«Íø°²±¸11010802024551ºÅ