¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181108

Ðû²¼Ê±¼ä 2018-11-08
1¡¢Ñо¿Ö°Ô±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¶íÂÞ˹Îó²îÑо¿Ö°Ô±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬£¬£¬ £¬¸ÃÎó²îÓ°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬£¬£¬ £¬²¢Ê¹ÓÃÆäËüÊÖÒÕÌáȨÖÁring0¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÏêϸÐÎòÁ˸ÃÎó²î±³ºóµÄ»úÖÆ£¬£¬£¬ £¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓÆµ¡£¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/


2¡¢WordPress²å¼þWooCommerceÐÞ¸´Ò»¸öí§ÒâÎļþɾ³ýÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷WordPress²å¼þWooCommerce±£´æÒ»¸öí§ÒâÎļþɾ³ýÎó²î£¬£¬£¬ £¬¸ÃÎó²î¿ÉÔÊÐí¶ñÒâ¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÕË»§µÄÃÜÂë²¢ÍêÈ«½ÓÊÜÍøÕ¾¡£¡£¡£¡£¡£¡£¡£WooCommerceÊÇWordPressÉÏ×îÊܽӴýµÄµç×ÓÉÌÎñ²å¼þÖ®Ò»£¬£¬£¬ £¬Æä×°ÖôÎÊýÁè¼Ý400Íò£¬£¬£¬ £¬Îª»¥ÁªÍøÉϽü35%µÄµç×ÓÉÌÎñÍøÕ¾Ìṩ֧³Ö¡£¡£¡£¡£¡£¡£¡£WooCommerce¿ª·¢ÍŶÓÒÑÔÚ°æ±¾3.4.6ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html


3¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


˼¿ÆÐû²¼Á˶à¿î²úÆ·µÄ15¸öÇå¾²¸üУ¬£¬£¬ £¬ÆäÖаüÀ¨É¾³ýÁËСÐÍÆóÒµ½»Á÷»úÖеÄÒ»¸öºóÃÅÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâЩºóÃÅÕË»§Îó²î°üÀ¨3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/


4¡¢Ñо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ESETÑо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬ £¬¸Ã¹¥»÷ÊÇͨ¹ýÍøÂçÆÊÎöƽ̨StatCounter¾ÙÐеÄ¡£¡£¡£¡£¡£¡£¡£StatCounterЧÀͱ»Áè¼Ý200Íò¸öÍøÕ¾Ê¹ÓÃÒÔÊÕ¾Û»á¼ûÕßµÄͳ¼ÆÐÅÏ¢£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÔÚStatCounterµÄJS¾ç±¾ÖÐÌí¼Ó¶ñÒâ´úÂ룬£¬£¬ £¬¿ÉÒÔÔÚËùÓеÄÕâÐ©ÍøÕ¾Öж¼×¢Èë¶ñÒâJS´úÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâ´úÂëµÄÆÊÎö£¬£¬£¬ £¬¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioËÆºõÊÇÕâ´Î¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£¡£¡£µ«ÓÉÓÚ¶ñÒâ¾ç±¾»áÒ»Ö±ÌìÉúеıÈÌØ±ÒµØµã£¬£¬£¬ £¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨µÃÖªÏêϸÓм¸¶à×ʽ𱻵Á¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2018/11/06/supply-chain-attack-cryptocurrency-exchange-gate-io/


5¡¢Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀµÄÐéÎ±ÒøÐÐÓ¦ÓÃMovil Secure

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÉÏ·¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓû§µÄ¶ñÒâÒøÐÐÓ¦ÓÃMovil Secure¡£¡£¡£¡£¡£¡£¡£Movil Secureð³äÓëÎ÷°àÑÀ¶ÔÍâÒøÐÐBBVAÓйأ¬£¬£¬ £¬²¢ÇÒ¾ßÓÐרҵµÄÍâ¹ÛºÍϸÄåµÄÓû§½çÃæ¡£¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ÷ÒªÓÃÓÚÍøÂçÓû§µÄÐÅÏ¢£¬£¬£¬ £¬°üÀ¨¶ÌÐź͵绰ºÅÂëµÈ£¬£¬£¬ £¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ¶ÌÐÅ´¹Âڻ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÓ¦ÓÃÔÚ10ÔÂ19ÈÕÐû²¼£¬£¬£¬ £¬²¢ÔÚ6ÌìÄÚÏÂÔØÁËÁè¼Ý100´Î¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹ÔÚͳһ¸ö¿ª·¢Ö°Ô±ÃûÏ·¢Ã÷ÁËÆäËüÈý¸öÀàËÆµÄ¶ñÒâÓ¦Ó㬣¬£¬ £¬ÏÖÔÚÕâЩӦÓÃÒѱ»Googleɾ³ý¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/fake-banking-app-found-on-google-play-used-in-smishing-scheme/


6¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄÎÞÎļþ¶ñÒâÈí¼þ¹¥»÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


CyrenÑо¿Ö°Ô±·¢Ã÷ÒѾ­±£´æÕë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄжñÒâ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ã¿ÄêµÄºÚÎåºÍÊ¥µ®½Úʱ´ú£¬£¬£¬ £¬ÍøÂç´¹ÂÚºÍÕ©Æ­»î¶¯¶¼»áµÖ´ïÒ»¸öá¯Áë¡£¡£¡£¡£¡£¡£¡£½ñÄêµÄÊ¥µ®×¼±¸ÊÂÇéÕýÔÚ¾ÙÐÐÖ®ÖУ¬£¬£¬ £¬¶øÑо¿Ö°Ô±ÒѾ­·¢Ã÷ÁËÒ»ÖÖеÄÎÞÎļþ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ´¹ÂÚÓʼþÒÔÊ¥µ®¶©µ¥ÎªÖ÷Ì⣬£¬£¬ £¬ÓÃÓÚ·Ö·¢NetwiredRCºóÃÅ¡£¡£¡£¡£¡£¡£¡£¸ÃºóÃÅ¿ÉÒÔ¾ÙÐмüÅ̼ͼ¡¢ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ÒÔ¼°µç×ÓÓʼþƾ֤µÈ¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þµÄÕû¸ö×°ÖÃÀú³ÌÊDZ»×¢ÈëÄ¿µÄÀú³Ì£¬£¬£¬ £¬Ã»ÓÐÉúÑĵ½´ÅÅÌÉÏ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.cyren.com/blog/articles/fileless-malware-already-targeting-holiday-suppliers


ÉùÃ÷£º±¾×ÊѶÓÉ¿­·¢k8άËûÃüÇ徲С×é·­ÒëºÍÕûÀí