ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ42ÖÜ

Ðû²¼Ê±¼ä 2019-10-28

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê10ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼Çå¾²Îó²î43¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇRittal Chiller SK 3232-SeriesδÊÚȨ»á¼ûÎó²î; Xiaomi Mi WiFi R3GÏÂÁî×¢ÈëÎó²î£»£»£»£»£»Google Chrome Blink CVE-2019-13700»º³åÇøÒç³öÎó²î£»£»£»£»£»PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Fortinet FortiMail web console²»×¼È·»á¼û¿ØÖÆÎó²î¡£¡£¡£ ¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±Åû¶±£´æ4ÄêµÄLinux Wi-Fi»º³åÇøÒç³öÎó²î£»£»£»£»£»AvastÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻£»£»£»£»Ç÷ÊÆ¿Æ¼¼ATTK¹¤¾ß°ü±£´æí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»CyberXÐû²¼È«ÇòÎïÁªÍø/ICSΣº¦±¨¸æ£¨2020°æ£©£»£»£»£»£»Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ±£´æDLLÐ®ÖÆÎó²î¡£¡£¡£ ¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£ ¡£¡£¡£¡£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí



1. Rittal Chiller SK 3232-SeriesδÊÚȨ»á¼ûÎó²î
Rittal Chiller SK 3232-Series WEB½Ó¿Ú±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬Î´ÊÚȨ¸ü¸ÄÉèÖ㬣¬£¬£¬£¬£¬£¬·­¿ª»ò¹Ø±ÕÖÆÀä×°±¸¡£¡£¡£ ¡£¡£¡£¡£¡£
https://www.us-cert.gov/ics/advisories/icsa-19-297-01

2. Xiaomi Mi WiFi R3GÏÂÁî×¢ÈëÎó²î
Xiaomi Mi WiFi R3G±¸·ÝÎļþÉÏ´«´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£ ¡£¡£¡£¡£¡£
https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py

3. Google Chrome Blink CVE-2019-13700»º³åÇøÒç³öÎó²î
Google Chrome Blink±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»òÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£¡£¡£
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html

4. PHP fpm_main.c env_path_infoÏÂÒçÔ¶³Ì´úÂëÖ´ÐÐÎó²î
ÔÚʹÓÃNginx + php-fpmЧÀÍÆ÷ʱ£¬£¬£¬£¬£¬£¬£¬fastcgi_split_path_info´¦Öóͷ£%0aʱÓöµ½»»Ðзû \n µ¼ÖÂPATH_INFOΪ¿Õ¡£¡£¡£ ¡£¡£¡£¡£¡£¶øphp-fpmÔÚ´¦Öóͷ£ PATH_INFOΪ¿ÕµÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬±£´æÂß¼­È±ÏÝ£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£¡£¡£
https://lab.wallarm.com/php-remote-code-execution-0-day-discovered-in-real-world-ctf-exercise/

5. Fortinet FortiMail web console²»×¼È·»á¼û¿ØÖÆÎó²î
Fortinet FortiMail web console±£´æ²»×¼È·»á¼û¿ØÖÆÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÌáÉýȨÏÞ¡£¡£¡£ ¡£¡£¡£¡£¡£
https://fortiguard.com/psirt/FG-IR-19-237


>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢Ñо¿Ö°Ô±Åû¶±£´æ4ÄêµÄLinux Wi-Fi»º³åÇøÒç³öÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


GithubÊ×ϯÇå¾²¹¤³ÌʦNico Waisman·¢Ã÷Linux rtlwifiÇý¶¯³ÌÐòÖб£´æÒ»¸ö¾ßÓÐ4ÄêÀúÊ·µÄÑÏÖØÎó²î£¨CVE-2019-17666£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÈëÇÖÒ×Êܹ¥»÷µÄϵͳ¡£¡£¡£ ¡£¡£¡£¡£¡£rtlwifiÇý¶¯³ÌÐòÓÃÓÚÔÊÐíRealtek Wi-FiÄ£¿£¿£¿ £¿£¿éÓëLinuxϵͳ¾ÙÐÐͨѶ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓó¤¶È²»×¼È·µÄÊý¾Ý°ü´¥·¢»º³åÇøÒç³ö£¬£¬£¬£¬£¬£¬£¬Ê¹µÃLinuxÍ߽⻣»£»£»£»òÊÇÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£ ¡£¡£¡£¡£¡£¾Ý³Æ¸ÃÎó²îÓ°ÏìÁËLinux°æ±¾5.3.6£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâ×Ô´Ó2015ÄêÒÔÀ´¾ÍÒ»Ö±±£´æ¡£¡£¡£ ¡£¡£¡£¡£¡£LinuxÄÚºËÍŶÓÒѾ­¿ª·¢ÁËÒ»¸öÕýÔÚÐÞ¶©µÄÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬£¬£¬µ«¸Ã²¹¶¡ÉÐδ°üÀ¨ÔÚLinuxÄÚºËÖС£¡£¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/critical-linux-wi-fi-bug-system-compromise/149325/

2¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£¡£¡£ ¡£¡£¡£¡£¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÔÝʱVPNÕË»§»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬£¬£¬£¬£¬£¬£¬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬£¬£¬µ«ºÚ¿ÍÀֳɾÙÐÐÁËÌáȨ¡£¡£¡£ ¡£¡£¡£¡£¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´»á¼ûÄÚÍø¡£¡£¡£ ¡£¡£¡£¡£¡£Avast¶Ô¹¥»÷»î¶¯¾ÙÐÐÁË¼à¿Ø£¬£¬£¬£¬£¬£¬£¬Ö±µ½10ÔÂ15ÈղŹرոÃÔÝʱVPNÕË»§¡£¡£¡£ ¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Ä걬·¢µÄ¹¥»÷±£´æ¹ØÁª¡£¡£¡£ ¡£¡£¡£¡£¡£AvastÔÚ¶ÔCCleaner¾ÙÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üС£¡£¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

3¡¢Ç÷ÊÆ¿Æ¼¼ATTK¹¤¾ß°ü±£´æí§Òâ´úÂëÖ´ÐÐÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊÆ¿Æ¼¼·ÀÍþв¹¤¾ß°ü£¨ATTK£©±£´æÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-9491£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚÄ¿µÄWindowsϵͳÉÏÔËÐжñÒâÈí¼þ¡£¡£¡£ ¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼Ðû²¼µÄÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÈôÊǶñÒâÈí¼þ×÷Õß´ÕÇɽ«¶ñÒâÈí¼þÃüÃûΪcmd.exe»òregedit.exe£¬£¬£¬£¬£¬£¬£¬ÄÇôATTK½«»á¼ÓÔØ²¢ÔËÐиÃexeÎļþ¡£¡£¡£ ¡£¡£¡£¡£¡£ÓÉÓÚATTKÊÇÓɾ­ÓÉÑéÖ¤µÄ¿¯Ðз½ÊðÃûµÄ£¬£¬£¬£¬£¬£¬£¬Òò´Ë¿ÉÈÆ¹ýÈκÎMOTWÇå¾²ÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÉõÖÁ¿ÉÒÔ½«ATTK×÷ΪһÖÖ³¤ÆÚÐÔ»úÖÆ¡£¡£¡£ ¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼ÏÖÒѽ«ËùÓÐATTK ¸üÐÂÖÁ1.62.0.1223°æ±¾£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδÐû²¼ÊÖÒÕϸ½Ú¡£¡£¡£ ¡£¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92818/hacking/trend-micro-anti-threat-toolkit-flaw.html

4¡¢CyberXÐû²¼È«ÇòÎïÁªÍø/ICSΣº¦±¨¸æ£¨2020°æ£©


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤CyberXµÄ¡¶È«ÇòÎïÁªÍø/ICSΣº¦±¨¸æ¡·2020°æ£¬£¬£¬£¬£¬£¬£¬Ðí¶à¹¤ÒµÆóÒµÖÐÈÔÈ»±£´æ¹ýʱµÄ²Ù×÷ϵͳ£¬£¬£¬£¬£¬£¬£¬Õâ´øÀ´ÁËÑÏÖØµÄΣº¦¡£¡£¡£ ¡£¡£¡£¡£¡£¸Ã±¨¸æÊÇ»ùÓÚÈ«Çò1800¶à¸ö¹¤ÒµÆóÒµÇéÐÎÖдÓ2018Äê10ÔÂÖÁ2019Äê10ÔÂÖ®¼äÍøÂçµÄÊý¾Ý¡£¡£¡£ ¡£¡£¡£¡£¡£ÊӲ칤¾ßÖÐÓÐ62%µÄ×°±¸ÔËÐеÄÊǹýʱÇÒ²»ÊÜÖ§³ÖµÄWindows°æ±¾£¨ÀýÈçWindows XPºÍ2000£©£¬£¬£¬£¬£¬£¬£¬ÈôÊǰѼ´½«ÔÚ2020Äê1ÔÂ×èÖ¹Ö§³ÖµÄWindows 7ÅÌËãÔÚÄÚ£¬£¬£¬£¬£¬£¬£¬ÔòÕâÒ»Êý×ÖÉÏÉýÖÁ71£¥¡£¡£¡£ ¡£¡£¡£¡£¡£CyberX»¹·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÔÚ64£¥µÄÇéÐÎÏÂÆóÒµÔÚÍøÂç´«ÊäÖÐδ¶ÔÃÜÂë¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃ¹¥»÷Õ߸üÈÝÒ׽ػñÃÜÂë¡£¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/outdated-oss-still-present-many-industrial-organizations-report

5¡¢Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ±£´æDLLÐ®ÖÆÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


SafeBreach LabsÇå¾²Ñо¿Ö°Ô±·¢Ã÷Avast¡¢AVGºÍAviraɱ¶¾Èí¼þ±£´æDLLÐ®ÖÆÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß¼ÓÔØ¶ñÒâDLLÎļþÒÔÈÆ¹ý¼ì²âºÍÌáȨ¡£¡£¡£ ¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-17093£©Ó°ÏìÁ˰汾19.8ÒÔϵÄËùÓÐAvastºÍAVGɱ¶¾Èí¼þ£¬£¬£¬£¬£¬£¬£¬Îó²îÔµ¹ÊÔ­ÓÉÊÇAVGSvc.exeÊÔͼÔÚÆô¶¯Ê±¼ÓÔØDLL£¬£¬£¬£¬£¬£¬£¬µ«ËüÔÚ¹ýʧµÄÎļþ¼ÐÖÐËÑË÷Îļþ£¨ÀýÈçC£º\Program Files\System32\£©£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Õß¿ÉÒÔ½«Í¬ÃûDLL·ÅÈë¸ÃÎļþ¼ÐÖдӶøµ¼Ö¸ÃDLL±»ÒÔSYSTEMÌØÈ¨¼ÓÔØ¡£¡£¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚAvira Antivirus 2019Öз¢Ã÷ÁËÀàËÆµÄÎÊÌ⣨CVE-2019-17449£©¡£¡£¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/avast-avira-products-vulnerable-dll-hijacking