> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê7ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇProFTPD SITE CPFR/CPTOí§Òâ¶ÁдÎó²î£»£»£»£»£»Apple Webkit ¶à¸öÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Zeroshell http²ÎÊýÏÂÁî×¢ÈëÎó²î£»£»£»£»£»Apache Storm·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»£»£»£»£»McAfee Data Loss Prevention Endpoint ePOÀ©Õ¹ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǶíÂÞ˹Áª°îÇå¾²¾Ö³Ð°üÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÉñÃØÏîÄ¿ÆØ¹â£»£»£»£»£»ProFTPD RCEÎó²î£¬£¬£¬£¬£¬£¬£¬Áè¼Ý100Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ï죻£»£»£»£»Ó¡¶ÈС¶îÐÅ´ûÒøÐÐJana CashÒâÍâй¶260ÍòÓû§ÉúÒâÐÅÏ¢£»£»£»£»£»RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬£¬£¬£¬£¬£¬£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª£»£»£»£»£»Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1. ProFTPD SITE CPFR/CPTOí§Òâ¶ÁдÎó²î
ProFTPD SITE CPFR/CPTOûÓÐ׼ȷ´¦Öóͷ£ºÍÉèÖ㬣¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ¶Áд²Ù×÷¡£¡£¡£¡£¡£
http://bugs.proftpd.org/show_bug.cgi?id=4372
2. Apple Webkit CVE-2019-8644ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Apple iOS°üÀ¨µÄWebKit±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://support.apple.com/zh-cn/HT210356
3. Zeroshell http²ÎÊýÏÂÁî×¢ÈëÎó²î
Zeroshell´¦Öóͷ£http²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://www.tarlogic.com/advisories/zeroshell-rce-root.txt
4. Apache Storm·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
Apache Storm´¦Öóͷ£²»¿ÉÐÅÊý¾Ý±£´æ·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E
5. McAfee Data Loss Prevention Endpoint ePOÀ©Õ¹ÏÂÁî×¢ÈëÎó²î
McAfee Data Loss Prevention Endpoint ePOÀ©Õ¹±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£
https://kc.mcafee.com/corporate/index?page=content&id=SB10289
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢¶íÂÞ˹Áª°îÇå¾²¾Ö³Ð°üÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÉñÃØÏîÄ¿ÆØ¹â
¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©µÄ³Ð°üÉÌSyTechÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÎªFSB¿ª·¢µÄÉñÃØÏîÄ¿±»ÆØ¹â¡£¡£¡£¡£¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ7ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ï0v1ru$ÈëÇÖÁËSyTechµÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË7.5TBµÄÊý¾Ý¡£¡£¡£¡£¡£ÕâЩÊý¾ÝËæºó±»·ÖÏí¸øºÚ¿ÍÍÅ»ïDigitalRevolution£¬£¬£¬£¬£¬£¬£¬ºóÕßÏòýÌå¾ÙÐÐÁËÆØ¹â¡£¡£¡£¡£¡£ÕâЩÉñÃØÏîÄ¿°üÀ¨Ö¼ÔÚ¸ôÀë¶íÂÞ˹»¥ÁªÍøµÄNadezhdaÏîÄ¿¡¢Ö¼ÔÚÍøÂçÉ罻ýÌåÓû§ÐÅÏ¢µÄNautilusÏîÄ¿ÒÔ¼°Ö¼ÔÚ¶ÔTorÍøÂçÓû§¾ÙÐÐÈ¥ÄäÃû»¯µÄNautilus-SÏîÄ¿µÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/russian-fsb-intel-agency-contractor-hacked-secret-projects-exposed/
2¡¢ProFTPD RCEÎó²î£¬£¬£¬£¬£¬£¬£¬Áè¼Ý100Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ïì
ProFTPDÐû²¼Ð°汾1.3.6£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ò»¸ö¿Éµ¼ÖÂRCEµÄÎó²î¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019- 12815£©ÓëProFTPDµÄmod_copyÄ£¿£¿£¿£¿éÓйأ¬£¬£¬£¬£¬£¬£¬Îó²îÔµ¹ÊÔÓÉÊÇmod_copyÄ£¿£¿£¿£¿éµÄ×Ô½ç˵SITE CPFRºÍSITE CPTOÏÂÁîûÓа´Ô¤ÆÚÉèÖÃÊÂÇé¡£¡£¡£¡£¡£ÖÎÀíÔ±¿Éͨ¹ý½ûÓÃmod_copyÄ£¿£¿£¿£¿éÀ´»º½â¸ÃÎó²î¡£¡£¡£¡£¡£Æ¾Ö¤ShodanµÄËÑË÷Ч¹û£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÓÐÁè¼Ý100Íò¸öProFTPdЧÀÍÆ÷ÉÐδÉý¼¶ÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£µÂ¹úCERT-BundÒ²Õë¶Ô¸ÃÎó²îÏòÓû§·¢³ö¾¯±¨¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/proftpd-remote-code-execution-bug-exposes-over-1-million-servers/
3¡¢Ó¡¶ÈС¶îÐÅ´ûÒøÐÐJana CashÒâÍâй¶260ÍòÓû§ÉúÒâÐÅÏ¢
Ñо¿Ö°Ô±·¢Ã÷Ó¡¶ÈС¶îÐÅ´ûÒøÐÐJana CashµÄÒ»¸öÊý¾Ý¿âδÊÜÃÜÂë±£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍòÓû§µÄÉúÒâÐÅÏ¢¿É±»¹ûÕæ»á¼û¡£¡£¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢°üÀ¨260ÍòÓû§µÄÉúÒâ¼Í¼£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ËûÃǵÄKYC PIIÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÀýÈçÇ®°üID¡¢Óû§Ãû¡¢µç×ÓÓʼþ¡¢IPµØµãºÍ¶Ë¿ÚºÅµÈ¡£¡£¡£¡£¡£ÔÚÑо¿Ö°Ô±×ª´ï¸Ã¹«Ë¾ºó£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒѶÔElasticÊý¾Ý¿â¾ÙÐб£»£»£»£»£»¤¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼äÒÔ¼°ÊÇ·ñÒѱ»ÆäËûÈË»á¼û¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securitydiscovery.com/jana-bank-data-leak/
4¡¢RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬£¬£¬£¬£¬£¬£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª
ƾ֤RiskIQµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬È¥ÄêÍøÂç·¸·¨·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬£¬£¬£¬£¬£¬£¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£ÆäËüÊý¾Ý°üÀ¨£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»£»£»£»£»´¹ÂÚ¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»£»£»£»£»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ±¾Ç®ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»£»£»£»£»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»£»£»£»£»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâÖØ¶¨ÏòΪ7¸öµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/
5¡¢Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯
ǰÎ÷ÃÅ×ÓÌõÔ¼¹¤David TinleyÈÏ¿ÉÔÚΪ¹«Ë¾½¨ÉèµÄµç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯£¬£¬£¬£¬£¬£¬£¬Ëû½«ÃæÁÙ×î¸ß10ÄêµÄî¿ÏµÒÔ¼°25ÍòÃÀÔªµÄ·£¿£¿£¿£¿î¡£¡£¡£¡£¡£Æ¾Ö¤Ïà¹Ø·¨Í¥Îļþ£¬£¬£¬£¬£¬£¬£¬TinleyΪÎ÷ÃÅ×ÓµÄMonroeville PAЧÀÍ´¦ÌṩÁ˽üÊ®ÄêµÄÈí¼þЧÀÍ£¬£¬£¬£¬£¬£¬£¬ËûÔÚ¸ø¹«Ë¾½¨ÉèÓÃÓÚÖÎÀí×°±¸¶©µ¥µÄµç×Ó±í¸ñʱֲÈëÁËÂß¼Õ¨µ¯£¬£¬£¬£¬£¬£¬£¬ÕâЩըµ¯»áÔÚÌØ¶¨ÈÕÆÚ´¥·¢£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÎļþÍ߽⡣¡£¡£¡£¡£Ã¿´ÎÍß½âʱTinley¶¼»áÊÕÈ¡ÓöÈÀ´ÐÞ¸´¸ÃÎļþ£¬£¬£¬£¬£¬£¬£¬Ö±µ½Á½ÄêºóÎ÷ÃÅ×Ó·¢Ã÷ÁËÂß¼Õ¨µ¯²¢Ìá³öÁËÖ¸¿Ø¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/