ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ31ÖÜ

Ðû²¼Ê±¼ä 2019-08-12

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬£¬£¬£¬ £¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Enterprise NFV Infrastructure Software OSÏÂÁî×¢ÈëÎó²î£»£»£»£»£»MicroDigital N-series cameras´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç³öÎó²î£»£»£»£»£»MongoDB ServerȨÏÞÌáÉýÎó²î£»£»£»£»£»Android Qualcomm HLOS×é¼þȨÏÞÌáÉýÎó²î¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǸßͨоƬ±£´æQualPwnÎó²î£¬£¬£¬£¬ £¬£¬£¬²¨¼°æçÁú855µÈ¶à¿îSoC;¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ;Ñо¿Ö°Ô±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÇå¾²Îó²î;Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬ £¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS;GoogleºÍNASAÒòJiraЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬ £¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí



1. Cisco Enterprise NFV Infrastructure Software OSÏÂÁî×¢ÈëÎó²î


Cisco Enterprise NFV Infrastructure Software WebÃÅ»§¿ò¼Ü±£´æÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬£¬£¬ÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj


2. MicroDigital N-series cameras´úÂëÖ´ÐÐÎó²î


MicroDigital N-series cameras ¡®action¡¯²ÎÊý´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£

https://pastebin.com/PSyqqs1g


3. Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç³öÎó²î


Cisco Small Business 220 Series Smart Switches WEB½çÃæ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬ £¬£¬£¬ÔÊÐí¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬£¬£¬¿Éʹװ±¸±ÀÀ£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce


4. MongoDB ServerȨÏÞÌáÉýÎó²î


MongoDB Server±£´æ»á»°ÖØÓÃÎó²î£¬£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬£¬£¬¿ÉÖØÓÃÒѽ¨ÉèµÄ»á»°£¬£¬£¬£¬ £¬£¬£¬Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£

https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829


5. Android Qualcomm HLOS×é¼þȨÏÞÌáÉýÎó²î


Android Qualcomm HLOS×é¼þ±£´æÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://source.android.com/security/bulletin/2019-08-01.html


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¸ßͨоƬ±£´æQualPwnÎó²î£¬£¬£¬£¬ £¬£¬£¬²¨¼°æçÁú855µÈ¶à¿îSoC

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

¸ßͨ¶à¿îSoCÊܵ½Á½¸öÎó²îµÄÓ°Ï죬£¬£¬£¬ £¬£¬£¬ÕâÁ½¸öÎó²î±»³ÆÎªQualPwn£¬£¬£¬£¬ £¬£¬£¬»®·ÖÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç³öÎó²î£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç³öÎó²î£¨CVE-2019-10540£©¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸ßͨÐû²¼µÄÇ徲ͨ¸æ£¬£¬£¬£¬ £¬£¬£¬ºóÕßÓ°ÏìµÄ²úÆ·°üÀ¨SD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¡£¡£¡£¡£¡£¡£¸ßͨºÍAndroidÍŶÓÒѾ­Ðû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/

2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤¿¨°Í˹»ùµÄ2019ÄêQ2 DDoS¹¥»÷±¨¸æ£¬£¬£¬£¬ £¬£¬£¬±¾¼¾¶ÈµÄDDoS¹¥»÷ÊýÄ¿±ÈÉÏÒ»¼¾¶ÈÉٵöà¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÇå¾²¿ÉÄÜÊÇÓÉÓÚÏÄÈÕÍøÂç·¸·¨»î¶¯µÄ¹Å°åÐÔïÔÌ­ËùÖ£¬£¬£¬£¬ £¬£¬£¬Óë2018ÄêQ2Ïà±È£¬£¬£¬£¬ £¬£¬£¬¹¥»÷×ÜÊýÏÖʵÉÏÔöÌíÁË18¸ö°Ù·Öµã£¬£¬£¬£¬ £¬£¬£¬ÕâÒâζ×Å×Ô2019ÄêÍ·ÒÔÀ´ÊӲ쵽µÄDDoSÔöÌíÇ÷ÊÆÈÔÈ»±£´æ¡£¡£¡£¡£¡£¡£¡£±¾¼¾¶ÈÖйúÕÕ¾ÉDDoS¹¥»÷ÊýÄ¿×î¶àµÄµØÇø£¨63.80£¥£©£¬£¬£¬£¬ £¬£¬£¬Æä´ÎÊÇÃÀ¹ú£¨17.57£¥£©¡£¡£¡£¡£¡£¡£¡£±¾¼¾¶ÈÒ»Á¬Ê±¼ä×µÄ¹¥»÷´ï509¸öСʱ£¬£¬£¬£¬ £¬£¬£¬´´ÏÂÁËеÄÀúÊ·¼Í¼¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-q2-2019/91934/

3¡¢Ñо¿Ö°Ô±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÇå¾²Îó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


IOActiveÑо¿Ö°Ô±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓë·É»úµÄ³ÉÔ±ÐÅϢЧÀÍ/ά»¤ÏµÍ³£¨CIS/MS£©Óйأ¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏò·É»úµÄÒªº¦Ç徲ϵͳ£¨ÀýÈçÒýÇæ¡¢Öƶ¯ÏµÍ³¡¢´«¸ÐÆ÷£©·¢ËͶñÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇ×°±¸¼°ÎÞÏßͨѶÇþµÀÏòά»¤¹¤³ÌʦÌṩ¹ýʧµÄϵͳÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£²¨ÒôÉù³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв£¬£¬£¬£¬ £¬£¬£¬ÓÉÓÚÆä·À»¤²½·¥¿ÉÒÔ×èÖ¹´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true

4¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬ £¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¹¤¿ØÇå¾²³§ÉÌDragosÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬ £¬£¬£¬±¨¸æÖÐÆÊÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸·¨ÍŻ¡£¡£¡£¡£¡£¡£ÆäÖÐ5¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔʯÓͺÍ×ÔÈ»Æø¹«Ë¾£¬£¬£¬£¬ £¬£¬£¬°üÀ¨HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬£¬£¬£¬ £¬£¬£¬ÆäÓà4¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔÄÜÔ´²¿·Ö£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬£¬£¬£¬ £¬£¬£¬Ê¯ÓͺÍ×ÔÈ»Æø²¿·ÖÈÔÈ»ÃæÁÙÆÆËðÐÔÍøÂç¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf

5¡¢GoogleºÍNASAÒòJiraЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


JiraÊÇÒ»¸öÊ¢ÐеÄÏîÄ¿ÖÎÃ÷È·¾ö¼Æ»®£¬£¬£¬£¬ £¬£¬£¬Çå¾²Ñо¿Ô±Avinash Jain·¢Ã÷µ±ÔÚJira CloudÖн¨ÉèеÄfilterºÍdashboardʱ£¬£¬£¬£¬ £¬£¬£¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓС±£¬£¬£¬£¬ £¬£¬£¬ÕâºÜÈÝÒ×±»Ã÷ȷΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«ÏÖʵÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÉèÖùýʧʹµÃÐí¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢ÆØ¹â£¬£¬£¬£¬ £¬£¬£¬°üÀ¨Google¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°Õþ¸®»ú¹¹µÈ¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/