ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ30ÖÜ

Ðû²¼Ê±¼ä 2019-08-05

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê7ÔÂ29ÈÕÖÁ8ÔÂ04ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬ £¬£¬£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇAlcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄÏÂÁî×¢ÈëÎó²î£»£»£»£»Puppet Enterprise PE's express installĬÈÏÃÜÂëÎó²î£»£»£»£»Wind River Systems VxWorks IPÑ¡ÏîÆÊÎö»º³åÇøÒç³öÎó²î£»£»£»£»Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´ÐÐÎó²î£»£»£»£»cPanel SQL×¢ÈëÎó²î¡£¡£ ¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇŦԼͨ¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸£¬£¬ £¬£¬£¬£¬ £¬Êý¾Ýî¿ÏµÔÙ´ÎÉý¼¶£»£»£»£»Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢£¬£¬ £¬£¬£¬£¬ £¬ÏÓÒÉÈËÒѱ»²¶£»£»£»£»VxWorksÐÞ¸´11¸öÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ £¬Ó°ÏìÁè¼Ý20ÒŲ́װ±¸£»£»£»£»Amcrest¼ÒÓÃÉãÏñÍ·ÑÏÖØÎó²î£¬£¬ £¬£¬£¬£¬ £¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§£»£»£»£»ÖÇÀû1430Íò¹«ÃñÐÅϢй¶£¬£¬ £¬£¬£¬£¬ £¬Õ¼ÌìÏÂ×ÜÉú³Ý½ü80%¡£¡£ ¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬£¬£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£ ¡£¡£¡£¡£



> Ö÷ÒªÇå¾²Îó²îÁбí



1. Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄÏÂÁî×¢ÈëÎó²î


Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIP ÃÜÂë¸ü¸Ä½çÃæ¸ü¸ÄÃÜÂë´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬ £¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£ ¡£¡£¡£¡£

https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Alcatel_8008CloudEditionDeskPhone.pdf?_=1559026340

2. Puppet Enterprise PE's express installĬÈÏÃÜÂëÎó²î


Puppet Enterprise PE's express install±£´æÄ¬ÈÏÃÜÂëÎó²î£¬£¬ £¬£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬ £¬¿ÉδÊÚȨ»á¼û¡£¡£ ¡£¡£¡£¡£
https://puppet.com/security/cve/CVE-2019-10694

3. Wind River Systems VxWorks IPÑ¡ÏîÆÊÎö»º³åÇøÒç³öÎó²î


Wind River Systems VxWorks IPÑ¡Ïî´¦Öóͷ£±£´æ»º³åÇøÒç³öÎó²î£¬£¬ £¬£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬ £¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£¡£¡£
https://www.us-cert.gov/ics/advisories/icsa-19-211-01

4. Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´ÐÐÎó²î


Polycom UC SoftwareÉÏ´«Îļþ±£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬ £¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£¡£¡£
https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-0.pdf

5. cPanel SQL×¢ÈëÎó²î


cPanel±£´æSQL×¢ÈëÎó²î£¬£¬ £¬£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬ £¬£¬£¬£¬ £¬²Ù×÷Êý¾Ý¿â£¬£¬ £¬£¬£¬£¬ £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£¡£¡£
https://documentation.cpanel.net/display/CL/58+Change+Log


 > Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢Å¦Ô¼Í¨¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸£¬£¬ £¬£¬£¬£¬ £¬Êý¾Ýî¿ÏµÔÙ´ÎÉý¼¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ŦԼÖÝÖݳ¤Andrew M. Cuomo¿ËÈÕÇ©ÊðÁËÒ»ÏîеÄÊý¾Ýй¶֪ͨ·¨°¸£¬£¬ £¬£¬£¬£¬ £¬¸Ã·¨°¸µÄÃû³ÆÎª¡°×èÖ¹ºÚ¿Í¼°Ë¢Ðµç×ÓÊý¾ÝÇå¾²¡±£¬£¬ £¬£¬£¬£¬ £¬¼´SHIELD·¨°¸£¬£¬ £¬£¬£¬£¬ £¬Ö¼ÔÚ±£»£»£»£»¤Å¦Ô¼¹«ÃñµÄÒþ˽Êý¾Ý²¢ÔöÇ¿¸ÃÖݵÄÊý¾Ýй¶Õþ²ß¡£¡£ ¡£¡£¡£¡£¸Ã·¨°¸À©´óÁËСÎÒ˽¼ÒÐÅÏ¢µÄ¹æÄ££¬£¬ £¬£¬£¬£¬ £¬½«ÉúÎïʶ±ðÐÅÏ¢¡¢µç×ÓÓʼþµØµã¼°ÃÜÂë¡¢Çå¾²ÎÊÌâ¼°ÃÕµ×ÁÐÈëÆäÖС£¡£ ¡£¡£¡£¡£¸Ã·¨°¸»¹ÔöÌíÁËÃñÊ´¦·Ö£¬£¬ £¬£¬£¬£¬ £¬²¢½«Í¨ÖªÒªÇóÓ¦ÓÃÓÚÈκÎÓµÓÐŦԼ¹«ÃñÒþ˽ÐÅÏ¢µÄСÎÒ˽¼Ò»òʵÌ壬£¬ £¬£¬£¬£¬ £¬¶ø²»µ«½öÊÇÔÚŦԼÖÝ¿ªÕ¹ÓªÒµµÄʵÌå¡£¡£ ¡£¡£¡£¡£¸Ã·¨°¸»¹½«ÌṩÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍдÈëÖ´·¨£¬£¬ £¬£¬£¬£¬ £¬ÒªÇóCRAÔÚ±¬·¢Éæ¼°Éç»áÇå¾²ºÅÂëµÄÊý¾Ýй¶ºó±ØÐèÏòÏûºÄÕßÌṩºÏÀíµÄ±£»£»£»£»¤Ð§ÀÍ¡£¡£ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-york-passes-law-to-update-data-breach-notification-requirements/

2¡¢Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢£¬£¬ £¬£¬£¬£¬ £¬ÏÓÒÉÈËÒѱ»²¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Capital OneÈ·ÈÏÆäϵͳÓÚ3ÔÂ22ÈÕÖÁ23ÈÕʱ´úÔâδÊÚȨ»á¼û£¬£¬ £¬£¬£¬£¬ £¬µ¼ÖÂ1.06ÒÚÓû§µÄÐÅϢй¶£¬£¬ £¬£¬£¬£¬ £¬°üÀ¨ÉúÒâÊý¾Ý¡¢ÐÅÓÃÆÀ·Ö¡¢Ö§¸¶ÀúÊ·¡¢Óà¶îÒÔ¼°¹ØÁªµÄÒøÐÐÕË»§ºÍÉç»áÇå¾²ºÅÂë¡£¡£ ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§°üÀ¨1ÒÚÃÀ¹úÈ˺Í600Íò¼ÓÄôóÈË¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤Ïà¹ØÖ¤¾Ý£¬£¬ £¬£¬£¬£¬ £¬FBIÒѾ­¾Ð²¶ÁËÏÓÒÉÈËPaige Thompson¡£¡£ ¡£¡£¡£¡£Capital OneÌåÏÖÓÉÓÚ¿Í»§Í¨Öª¡¢Ãâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡¢Ç徲ˢб¾Ç®ÒÔ¼°Ö´·¨ÓöÈ£¬£¬ £¬£¬£¬£¬ £¬ÕâÒ»ÊÂÎñ½«µ¼ÖÂÔ¼1ÒÚÖÁ1.5ÒÚÃÀÔªµÄ±¾Ç®¡£¡£ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/capital-one-data-breach-affects-106-million-people-suspect-arrested/

3¡¢VxWorksÐÞ¸´11¸öÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ £¬Ó°ÏìÁè¼Ý20ÒŲ́װ±¸


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ArmisÑо¿Ö°Ô±ÔÚVxWorks RTOSÖз¢Ã÷11¸öÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ £¬ÕâЩÎó²îÓ°ÏìÁ˺½¿Õº½Ìì¡¢¹ú·À¡¢¹¤Òµ¡¢Ò½ÁÆ¡¢Æû³µ¡¢ÏûºÄµç×ÓµÈÁìÓòµÄ20¶àÒŲ́װ±¸¡£¡£ ¡£¡£¡£¡£ÕâЩÎó²î±»Í³³ÆÎªURGENT/11£¬£¬ £¬£¬£¬£¬ £¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÈÆ¹ý¹Å°åµÄÇå¾²½â¾ö¼Æ»®²¢ÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄ×°±¸»òÀàËÆÓÀºãÖ®À¶Ò»Ñùµ¼Ö´ó¹æÄ£µÄ×°±¸ÖÐÖ¹£¬£¬ £¬£¬£¬£¬ £¬²¢ÇÒÎÞÐèÓû§½»»¥¡£¡£ ¡£¡£¡£¡£ÕâЩÎó²î±£´æÓÚVxWorks 6.5Ö®ºóµÄTCP/IPЭÒéÕ»ÖУ¬£¬ £¬£¬£¬£¬ £¬Ó°ÏìÁËÒÑÍù13ÄêÀ´Ðû²¼µÄËùÓÐVxWorks°æ±¾¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾ­ÔÚÉϸöÔÂÐû²¼ÁËÐÞ¸´²¹¶¡£¬£¬ £¬£¬£¬£¬ £¬µ«ÕâЩ²¹¶¡Í¨¹ý×°±¸³§É̵ִïÏûºÄÕß¿ÉÄÜ»¹ÐèÒªÒ»¶¨µÄʱ¼ä¡£¡£ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html

4¡¢Amcrest¼ÒÓÃÉãÏñÍ·ÑÏÖØÎó²î£¬£¬ £¬£¬£¬£¬ £¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§



¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²³§ÉÌTenable·¢Ã÷Amcrest IP2M-841B¼ÒÓÃÉãÏñÍ·±£´æÒ»¸öÑÏÖØÎó²î£¬£¬ £¬£¬£¬£¬ £¬¿ÉÔÊÐí¹¥»÷Õßͨ¹ýHTTPÔ¶³Ì¼àÌýÉãÏñÍ·µÄÒôƵÊäÈë¡£¡£ ¡£¡£¡£¡£¸ÃÎó²î±»±ê¼ÇΪCVE-2019-3948£¬£¬ £¬£¬£¬£¬ £¬Ó°ÏìÁËÉãÏñÍ·¹Ì¼þ°æ±¾V2.520.AC00.18.R£¬£¬ £¬£¬£¬£¬ £¬²¢ÇÒÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉʹÓᣡ£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬ £¬¸Ã²úÆ·Ò²Ò×ÊÜÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2017-7927£©¹¥»÷¡£¡£ ¡£¡£¡£¡£AmcrestÒѾ­Ðû²¼Ïà¹ØÐÞ¸´²¹¶¡¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/iot-home-security-camera-allows-hackers-to-listen-in-over-http/

5¡¢ÖÇÀû1430Íò¹«ÃñÐÅϢй¶£¬£¬ £¬£¬£¬£¬ £¬Õ¼ÌìÏÂ×ÜÉú³Ý½ü80%


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


WizcaseÑо¿ÍŶӷ¢Ã÷Ò»¸öElasticsearchÊý¾Ý¿â̻¶ÁËÁè¼Ý1430ÍòÖÇÀû¹«ÃñµÄÑ¡¾ÙÐÅÏ¢£¬£¬ £¬£¬£¬£¬ £¬Õ¼¸Ã¹ú×ÜÉú³ÝµÄ½ü80%¡£¡£ ¡£¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢ÐÔ±ð¡¢ÄêËêºÍÄÉ˰ºÅÂë¡£¡£ ¡£¡£¡£¡£ÖÇÀûÑ¡¾ÙЧÀÍServelµÄ½²»°ÈËÈ·ÈÏÁËÕâЩÊý¾ÝµÄÕæÊµÐÔ£¬£¬ £¬£¬£¬£¬ £¬µ«·ñ¶¨¸ÃЧÀÍÆ÷ÊôÓÚËûÃÇ¡£¡£ ¡£¡£¡£¡£¸Ã½²»°ÈËÌåÏÖÕâЩÐÅÏ¢¶ÔÓ¦ÓÚ2017ÄêµÄÊý¾Ý£¬£¬ £¬£¬£¬£¬ £¬¿ÉÄÜÊǵÚÈý·½´ÓÆäÍøÕ¾ÉÏÍøÂç»ã×ܵÃÀ´¡£¡£ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/voter-records-for-80-of-chiles-population-left-exposed-online/