ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ29ÖÜ
Ðû²¼Ê±¼ä 2018-07-23Ò»¡¢±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2018Äê07ÔÂ16ÈÕÖÁ22ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´44¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇPivotal Spring FrameworkÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Cisco IP Phone 6800¡¢7800ºÍ8800ϵÁÐÃüÁî×¢Èë©¶´£»ManageEngine Exchange Reporter Plus ¡®ADSHACluster¡¯Ô¶³Ì´úÂëÖ´ÐЩ¶´£»Adobe Flash Player CVE-2018-5007ÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´£»Dasan GPONÃüÁî×¢Èë©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÒøÐÐľÂíDorkbot¾íÍÁÖØÀ´£¬Õ¼ÒøÐжñÒâÈí¼þÊг¡µÄ25%£»¶íÂÞ˹ÔÚÊÀ½ç±ÆÚ¼äÔâµ½Ô¼2500Íò´ÎÍøÂç¹¥»÷£»Telefonica¹ÙÍøÂ©¶´¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄ¸öÈËÐÅϢй¶£»ÃÀѪҺ¼ì²âʵÑéÊÒLabCorpÔâºÚ¿ÍÈëÇÖ£¬Êý°ÙÍòÓû§ÒÉÊÜÓ°Ï죻¶íÂÞ˹PIRÒøÐÐÔâºÚ¿Í¹¥»÷£¬ËðʧԼ100ÍòÃÀÔª¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
¶þ¡¢ÖØÒªÄþ¾²Â©¶´Áбí
1¡¢Pivotal Spring FrameworkÔ¶³Ì´úÂëÖ´ÐЩ¶´
Spring FrameworkʹÓÃspring-messagingÄ£¿éÀ´ÊµÏÖSTOMPÊðÀíʱ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÏûÏ¢£¬¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://www.exploit-db.com/exploits/44796/
2¡¢Cisco IP Phone 6800¡¢7800ºÍ8800ϵÁÐÃüÁî×¢Èë©¶´
Cisco IP Phone 6800¡¢7800ºÍ8800ϵÁÐWEB UI´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó£¬×¢ÈëÈÎÒâSHELLÃüÁî²¢Ö´ÐС£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject
3¡¢ManageEngine Exchange Reporter Plus ¡®ADSHACluster¡¯Ô¶³Ì´úÂëÖ´ÐЩ¶´
ManageEngine Exchange Reporter Plus Java servlet ¡®ADSHACluster¡¯ÔÚÖ´ÐС®bcp.exe¡¯Îļþ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâ¡®BCP_EXE¡¯²ÎÊýÇëÇó£¬Ö´ÐÐÈÎÒâ´úÂë¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://www.manageengine.com/products/exchange-reports/release-notes.html
4¡¢Adobe Flash Player CVE-2018-5007ÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´
Adobe Flash Player´¦ÖÃSWFÎļþ´æÔÚÀàÐÍ»ìÏý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://helpx.adobe.com/security/products/flash-player/apsb18-24.html
5¡¢Dasan GPONÃüÁî×¢Èë©¶´
Dasan GPON GponForm/diag_Form URI´æÔÚÉè¼ÆÂ©¶´£¬ÔÊÐí¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄ'dest_host¡¯²ÎÊýµÄdiag_action=pingÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/
Èý¡¢ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢ÒøÐÐľÂíDorkbot¾íÍÁÖØÀ´£¬Õ¼ÒøÐжñÒâÈí¼þÊг¡µÄ25%

ƾ¾ÝCheck PointµÄ×îÐÂÊý¾Ý£¬ÒøÐÐľÂíDorkbotÔÚ2018Äê¾íÍÁÖØÀ´£¬³ÉΪһ¸öÑÏÖØµÄÍþв¡£Dorkbot×îÔç¿ÉÒÔ×·Ëݵ½2012Ä꣬ÆäÖ÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄÒøÐеǼƾ¾Ý¡£ÔÚ2018ÄêÉϰëÄ꣬ȫÇòÒøÐжñÒâÈí¼þÊг¡Õ¼¾ÝǰÈýλµÄ·Ö±ðÊÇRamnit£¨27£¥£©¡¢Dorkbot£¨25£¥£©ºÍZeus£¨13£¥£©¡£DorkbotÒѳÉΪ2018ÄêµÚ¶þ´óÁîÈËÍ·ÌÛµÄÒøÐжñÒâÈí¼þ¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/threatlist-6-year-old-dorkbot-banking-malware-resurfaces-as-big-threat/133898/
2¡¢¶íÂÞ˹ÔÚÊÀ½ç±ÆÚ¼äÔâµ½Ô¼2500Íò´ÎÍøÂç¹¥»÷

Ī˹¿ÆÊ±±¨±¨µÀ³Æ£¬¶íÂÞ˹×ÜͳÆÕ¾©¸ß¶ÈÔÞÑïÁ˸ùúµÄÍøÂçÄþ¾²²¿ÃÅ£¬¸Ã²¿ÃÅÔÚÊÀ½ç±ÆÚ¼ä¹²×èÖ¹ÁËÔ¼2500Íò´ÎÍøÂç¹¥»÷ºÍÆäËü·¸×ï»î¶¯£¬È·±£Á˽ÇÖðµÄÄþ¾²¡£FireEyeÄÏÅ·¼¼Êõ×ܼàDavid GroutÌåÏÖËäÈ»ÕâÒ»Êý×ֺܸߣ¬µ«²¢²»³öÈËÒâÁÏ¡£ÕâЩ¹¥»÷¿ÉÄܰüÂÞÔÚ½ÇÖðǰ¼¸ÖܾͿªÊ¼µÄÍøÂçµöÓã¹¥»÷£¬ÀýÈçµÍ¼Û»úƱ¡¢Ó®µÃ¶íÂÞ˹֮ÂÃÒÔ¼°ÓëÊÀ½ç±Ö÷ÌâÏà¹ØµÄ´ÙÏú»î¶¯£¨Èç¹ú¼Ò¶ÓÇòÒ£©µÈ¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/russia-fends-off-25-million-world/
3¡¢Telefonica¹ÙÍøÂ©¶´¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄ¸öÈËÐÅϢй¶

Î÷°àÑÀµçÐŹ«Ë¾TelefonicaµÄ¹Ì»°¡¢¿í´ø¼°¸¶·ÑµçÊÓÒµÎñMovistarµÄ¹ÙÍø´æÔÚ©¶´£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄ¸öÈËÐÅϢй¶¡£Movistar¹ÙÍøÉÏÓÃÓÚ¼ì²ì·¢Æ±µÄÒ³ÃæµÄURLÖаüÂÞÁË·¢Æ±µÄID£¬ÈκÎÓû§¶¼¿ÉÒÔͨ¹ýÐ޸ĴËIDÀ´¼ì²ìÆäËüÕË»§µÄÊý¾Ý¡£Æ¾¾ÝеÄGDPR¹æ¶¨£¬¸Ã¹«Ë¾¿ÉÄÜÃæÁÙ1000Íò~2000ÍòÅ·Ôª»òÏ൱ÓÚÆäÄêÓªÒµ¶î2%~4%µÄ·£¿î¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/telefonica-spain-exposed-the-personal-details-of-millions-of-customers/
4¡¢ÃÀѪҺ¼ì²âʵÑéÊÒLabCorpÔâºÚ¿ÍÈëÇÖ£¬Êý°ÙÍòÓû§ÒÉÊÜÓ°Ïì

±¾ÖÜÒ»ÃÀ¹ú×î´óµÄѪҺ¼ì²âʵÑéÊÒLabCorpÐû²¼ÆäÔÚÖÜÄ©ÆÚ¼äÔâµ½ºÚ¿ÍÈëÇÖ¡£LabCorp¹Ø±ÕÁ˲¿ÃÅϵͳÒÔ¿ØÖƸÃÈëÇֻ£¬Ä¿Ç°¸÷ϵͳ¹¦Ð§ÕýÔÚ»Ö¸´ÖС£¸Ã¹«Ë¾ÌåÏÖûÓÐÖ¤¾Ý±íÃ÷·¢ÉúÁ˶ÔÊý¾ÝµÄδÊÚȨ·ÃÎÊ£¬µ«Ã»ÓÐÅû¶¸ü¶àÏà¹ØÏ¸½Ú¡£ÓйØÕþ¸®ÕýÔÚ½øÐÐÊÓ²ìÖ®ÖС£LabCorpÔÚÈ«ÇòÓµÓнü6ÍòÃûÔ±¹¤£¬ÆäÿÖܲâÊԵϼÕßÑù±¾Áè¼Ý250Íò¸ö£¬Òò´ËÊý¾Ýй¶µÄDZÔÚºó¹û¿ÉÄÜÊǾ޴óµÄ£¬Êý°ÙÍòÓû§µÄÃô¸ÐÐÅÏ¢¿ÉÄÜÃæÁÙ·çÏÕ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-breach-network-of-labcorp-us-biggest-blood-testing-laboratories/
5¡¢¶íÂÞ˹PIRÒøÐÐÔâºÚ¿Í¹¥»÷£¬ËðʧԼ100ÍòÃÀÔª

ƾ¾Ý¶íÂÞ˹Äþ¾²³§ÉÌGroup-IBµÄ³ÂËߣ¬ºÚ¿ÍÍÅ»ïMoneyTakerͨ¹ý·ÓÉÆ÷ÈëÇÖÁ˶íÂÞ˹PIRÒøÐеÄÍøÂ磬²¢ÇÔÈ¡ÁËÔ¼100ÍòÃÀÔªµÄ×ʽð¡£Group-IBÈ·ÈϹ¥»÷ʼÓÚ2018Äê5ÔÂÏÂÑ®£¬¹¥»÷ÕßµÄÈë¿ÚÊǹýʱµÄ·ÓÉÆ÷£¬¸Ã·ÓÉÆ÷ÓÐËíµÀ£¬¿ÉÔÊÐí¹¥»÷ÕßÖ±½Ó·ÃÎÊÒøÐеĵ±µØÍøÂç¡£¹¥»÷·¢ÉúÔÚ7ÔÂ3ÈÕ£¬PIRÒøÐеÄÔ±¹¤ÔÚÒ»ÌìºóµÄ7ÔÂ4ÈÕ·¢ÏÖÁË´ó±ÊδÊÚȨµÄ½»Ò×£¬µ«ÎªÊ±ÒÑÍí¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-breach-russian-bank-and-steal-1-million-due-to-outdated-router/