ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ05ÖÜ

Ðû²¼Ê±¼ä 2020-02-05

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê01ÔÂ27ÈÕÖÁ2ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇDrayTek VigorϵÁÐí§ÒâÏÂÁîÖ´ÐÐÎó²î; Adobe Illustrator CC CVE-2020-3710ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»OpenSMTPD smtp_mailaddrí§ÒâÏÂÁîÖ´ÐÐÎó²î£»£»£»£»£»£»£»Adobe Acrobat/ReaderÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»IBM Security Access Manager Appliance XXE×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇOpenSMTPD¿âRCEÎó²îÓ°Ïì¶à¸öBSDºÍLinux¿¯Ðаæ£»£»£»£»£»£»£»2019Äê½©Ê¬ÍøÂçC2ЧÀÍÆ÷ÊýĿͬ±ÈÔöÌí71%£»£»£»£»£»£»£»ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÐû²¼Óйػº½âÔÆÎó²îµÄÇå¾²Ö¸ÄÏ£»£»£»£»£»£»£»Î¢ÈíÐû²¼AzureÇå¾²»ù×¼£¬£¬£¬Ìṩ90¶àÖÖÇ徲ʵ¼ù½¨Ò飻£»£»£»£»£»£»Å¦Ô¼Ð·¨°¸ÌáÒéեȡÊÐÕþÕþ¸®Ö§¸¶ÀÕË÷Èí¼þÊê½ð¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí


1. DrayTek VigorϵÁÐí§ÒâÏÂÁîÖ´ÐÐÎó²î


DrayTek Vigor300B cgi-bin/mainfunction.cgi URI²»×¼È·´¦Öóͷ£SHELL×Ö·û£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£


https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html


2. Adobe Illustrator CC CVE-2020-3710ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Adobe Illustrator CC´¦Öóͷ£Îļþ±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£


https://helpx.adobe.com/security/products/illustrator/apsb20-03.html


3. OpenSMTPD smtp_mailaddrí§ÒâÏÂÁîÖ´ÐÐÎó²î


OpenSMTPD smtp_session.c smtp_mailaddr±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄMAIL FROM×Ö¶ÎÇëÇ󣬣¬£¬¿ÉÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£


http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html


4. Adobe Acrobat/ReaderÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î


Adobe Acrobat and Reader´¦Öóͷ£Îļþ±£´æÀàÐÍ»ìÏýÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£


https://helpx.adobe.com/security/products/acrobat/apsb19-02.html


5. IBM Security Access Manager Appliance XXE×¢ÈëÎó²î


IBM Security Access Manager Appliance´¦Öóͷ£XMLÊý¾Ý±£´æXXE¹¥»÷Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄXMLÇëÇ󣬣¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»ò¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://exchange.xforce.ibmcloud.com/vulnerabilities/172018


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢OpenSMTPD¿âRCEÎó²îÓ°Ïì¶à¸öBSDºÍLinux¿¯Ðаæ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±ÒѾ­ÔÚÐí¶àBSDºÍLinux¿¯ÐаæËùʹÓõÄÓëµç×ÓÓʼþÏà¹ØµÄ½¹µã¿âÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬Îó²î¸ú×ÙΪCVE-2020-7247£¬£¬£¬Ó°ÏìЧÀÍÆ÷¶ËSMTPЭÒéµÄ¿ªÔ´ÊµÏÖOpenSMTPD¡£¡£¡£¡£¡£¡£¡£¸Ã¿¯ÐаæÖÐͨ³£°üÀ¨¸Ã¿â£¬£¬£¬ÕâЩ¿¯ÐаæÖ¼ÔÚÔÚЧÀÍÆ÷ÉÏÔËÐУ¬£¬£¬´Ó¶øÊ¹Ð§ÀÍÆ÷¿ÉÒÔ´¦Öóͷ£ÓëSMTPÏà¹ØµÄµç×ÓÓʼþºÍÁ÷Á¿¡£¡£¡£¡£¡£¡£¡£OpenSMTPD¿â×î³õÊÇΪOpenBSD²Ù×÷ϵͳ¿ª·¢µÄ£¬£¬£¬µ«¸Ã¿âÊÇ¿ªÔ´µÄ£¬£¬£¬Æä¡°±ãЯʽ°æ±¾¡±Ò²ÒѺϲ¢µ½ÆäËûOSÖУ¬£¬£¬ÀýÈçFreeBSD£¬£¬£¬NetBSDºÍһЩLinux¿¯Ðаæ£¬£¬£¬ÀýÈçDebian£¬£¬£¬Fedora £¬£¬£¬Alpine LinuxµÈ¡£¡£¡£¡£¡£¡£¡£OpenSMTPD¿ª·¢Ö°Ô±ÒÑÈ·ÈÏ´ËÎó²î£¬£¬£¬²¢ÓÚ½ñÌìÔçЩʱ¼äÐû²¼Á˲¹¶¡-OpenSMTPD°æ±¾6.6.2p1¡£¡£¡£¡£¡£¡£¡£½¨ÒéÒѽ«ÆäBSDºÍLinuxЧÀÍÆ÷ÉèÖÃΪʹÓÃOpenSMTPD¿Í»§¶ËµÄϵͳÖÎÀíÔ±¾¡¿ìÓ¦ÓôËÐÞ²¹³ÌÐò¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/rce-in-opensmtpd-library-impacts-bsd-and-linux-distros/


2¡¢2019Äê½©Ê¬ÍøÂçC2ЧÀÍÆ÷ÊýĿͬ±ÈÔöÌí71%


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Spamhaus³ÆÓë2018ÄêÏà±ÈÈ«ÇòÓÃÓÚ¿ØÖÆÊܶñÒâÈí¼þѬȾµÄϵͳµÄЧÀÍÆ÷Ô¾ÉýÁË71£¥ÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£Ò»Á¬Á½ÄêÈ«Çò¹¥»÷ÕßÓÃÀ´¿ØÖÆÊܶñÒâÈí¼þѬȾµÄϵͳµÄЧÀÍÆ÷ÊýÄ¿¼±¾çÔöÌí¡£¡£¡£¡£¡£¡£¡£SpamhausÏîÄ¿¸ú×ÙÍþв¼ÓÈëÕßÓÃÓÚÍйܽ©Ê¬ÍøÂçÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¨C2£©µÄÓòÃûºÍIPµØµã£¬£¬£¬¸ÃÏîĿȷ¶¨ÁË2019ÄêÈ«Çò¹²ÓÐ1210¸ö²î±ðÍøÂçÍйܵÄ17602¸ö´ËÀàЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Õâ¸öÊý×Ö±ÈSpamhausÔÚ2018Äê¼ì²âµ½µÄ10263̨½©Ê¬ÍøÂçC2ЧÀÍÆ÷ÔöÌíÁË71.5£¥£¬£¬£¬±È2018ÄêµÄ9500̨½©Ê¬ÍøÂçÊýÄ¿ÔöÌíÁ˽üÒ»±¶¡£¡£¡£¡£¡£¡£¡£ÏÖʵÉÏ£¬£¬£¬½©Ê¬ÍøÂçC2Õ¼ËùÓÐÁбíÖеÄ41£¥¡£¡£¡£¡£¡£¡£¡£SpamhausÔÚ2019ÄêµÄºÚÃûµ¥ÖУ¬£¬£¬¶ø2017Äê½öΪ15£¥£¬£¬£¬È¥ÄêΪ25£¥¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/number-of-botnet-command-and-control-servers-soared-in-2019/d/d-id/1336914


3¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÐû²¼Óйػº½âÔÆÎó²îµÄÇå¾²Ö¸ÄÏ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÒ»·ÝÐÅÏ¢±í£¬£¬£¬ÆäÖаüÀ¨Óйػº½âÔÆÎó²îµÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¡£NSA»áÈ·¶¨ÔÆÇå¾²×é¼þ£¬£¬£¬²¢ÌÖÂÛÍþвÒòËØ£¬£¬£¬ÔÆÎó²îºÍDZÔڵĻº½â²½·¥¡£¡£¡£¡£¡£¡£¡£¸ÃÎĵµ½«ÔÆÎó²î·ÖΪËÄÀࣨÉèÖùýʧ£¬£¬£¬»á¼û¿ØÖƲ£¬£¬¹²Ïí×â»§Îó²îºÍ¹©Ó¦Á´Îó²î£©£¬£¬£¬ÕâЩÎó²îº­¸ÇÁË´ó´ó¶¼ÒÑÖªÎó²î¡£¡£¡£¡£¡£¡£¡£ÌṩÿÖÖÎó²îÀà´ËÐÎ״òÒÔ¼°×îÓÐÓõĻº½â²½·¥¡£¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÖ¸³ö£¬£¬£¬¸ÃÖ¸ÄϽö¹©×éÖ¯Ïòµ¼ºÍÊÖÒÕְԱʹÓᣡ£¡£¡£¡£¡£¡£¡°×éÖ¯Ïòµ¼¿ÉÒԲο¼¡°ÔÆ×é¼þ¡±²¿·Ö£¬£¬£¬¡°ÔÆÍþв¼ÓÈëÕß¡±²¿·ÖÒÔ¼°¡°ÔÆÎó²î»ººÍ½â²½·¥¡±¸ÅÊö£¬£¬£¬ÒÔ»ñÈ¡¶ÔÔÆÇå¾²Ô­ÔòµÄ¿´·¨¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕºÍÇ徲רҵְԱӦ·¢Ã÷¸ÃÎĵµÓÐÖúÓÚ½â¾öÔÆÐ§ÀÍʱ´úºÍÖ®ºóµÄÔÆÇå¾²×¢ÖØÊÂÏî²É¹º¡±¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securitymagazine.com/articles/91618-national-security-agency-releases-guide-on-mitigating-cloud-vulnerabilities


4¡¢Î¢ÈíÐû²¼AzureÇå¾²»ù×¼£¬£¬£¬Ìṩ90¶àÖÖÇ徲ʵ¼ù½¨Òé


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


΢Èí±¾ÖÜÐû²¼ÁËAzureÇå¾²»ù×¼v1£¨ASB£©µÄ¿ÉÓÃÐÔ£¬£¬£¬ÕâÊÇÕë¶ÔAzure¿Í»§µÄ90¶àÖÖÇå¾²×î¼Ñʵ¼ù½¨ÒéµÄÜöÝÍ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬ASBÖ¼ÔÚͨ¹ý½¨Éè°üÀ¨ÏàͬÃûÌõÄAzureЧÀÍËùÓн¨ÒéµÄ¿ò¼ÜÀ´Ìá¸ßAzureЧÀÍÇå¾²ÎĵµµÄÒ»ÖÂÐÔ¡£¡£¡£¡£¡£¡£¡£ASBÖ¼ÔÚ×ÊÖú×éÖ¯Ìá¸ßAzureÖÐÊÂÇé¸ºÔØµÄÕûÌåÇå¾²ÐԺͺϹæÐÔ£¬£¬£¬ÆäÖаüÀ¨11¸öÊÜInternetÇå¾²ÖÐÐÄ£¨CIS£©7.1¿ØÖÆ¿ò¼ÜÆô·¢²¢Ó³Éäµ½ÆäÖеÄÇå¾²¿ØÖÆ¡£¡£¡£¡£¡£¡£¡£ASBÖаüÀ¨µÄ¿Ø¼þÕë¶ÔÍøÂçÇå¾²£¬£¬£¬ÈÕÖ¾¼Í¼ºÍ¼àÊÓ£¬£¬£¬Éí·ÝºÍ»á¼û¿ØÖÆ£¬£¬£¬Êý¾Ý±£»£»£»£»£»£»£»¤£¬£¬£¬Îó²îÖÎÀí£¬£¬£¬¿â´æºÍ×ʲúÖÎÀí£¬£¬£¬Çå¾²ÉèÖ㬣¬£¬¶ñÒâÈí¼þ·ÀÓù£¬£¬£¬Êý¾Ý»Ö¸´£¬£¬£¬ÊÂÎñÏìÓ¦ÒÔ¼°ÉøÍ¸²âÊԺͺìÉ«ÍŶÓѵÁ·¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/microsoft-releases-azure-security-benchmark


5¡¢Å¦Ô¼Ð·¨°¸ÌáÒéեȡÊÐÕþÕþ¸®Ö§¸¶ÀÕË÷Èí¼þÊê½ð


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¹ú¼Ò²ÎÒéÔ±Phil Boyle£¬£¬£¬George M. BorrelloºÍSue Serino ÓÚ±¾Ô³õÌá³öÁ˲ÎÒéÔº·¨°¸S7246£¬£¬£¬ÒÔÓ¦¶ÔÕë¶ÔÌìϸ÷µØÕþ¸®»ú¹¹ºÍÊÐÕþʵÌåµÄÍøÂç¹¥»÷À˳±¡£¡£¡£¡£¡£¡£¡£ÔÚijЩµ÷½â²½·¥ÖУ¬£¬£¬ÆäÖÐһЩ£¨ÀýÈçÀïά°£À­º£Ì²ºÍ·ðÂÞÀï´ïÖݵĺþ³Ç£©ÒÑÖ§¸¶ÁËÊê½ð¡£¡£¡£¡£¡£¡£¡£ÆäËûµÄ£¬£¬£¬ÀýÈçÂíÈøÖîÈûÖݵÄб´µÂ¸£µÂºÍÑÇÌØÀ¼´óÊУ¬£¬£¬ÔòûÓÐÖ§¸¶ÈκÎÊê½ð¡£¡£¡£¡£¡£¡£¡£ÔÚºóÒ»ÖÖÇéÐÎÏ£¬£¬£¬¸ÃÊÐ×îÖÕÆÆ·ÑÁË260ÍòÃÀÔª ͨ¹ýÊÂÎñÏìÓ¦ºÍÊý×Öȡ֤µÄÖ§³ö£¬£¬£¬ÌØÁíÍâÖ°Ô±Å䱸ºÍMicrosoft Cloud»ù´¡¼Ü¹¹×¨ÒµÖªÊ¶À´»Ö¸´¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÍøÂçÇ徲ר¼ÒÖ¸³ö£¬£¬£¬¸¶·ÑÕվɲ»¸¶·ÑµÄ¾öÒéÊÇÒ»¸öÖØ´óµÄ¾öÒ飬£¬£¬È¡¾öÓÚСÎÒ˽¼ÒÇéÐΣ¬£¬£¬Ô¤ËãºÍÊý¾ÝΣº¦¡£¡£¡£¡£¡£¡£¡£SB S7246ºÅ·¨°¸ÔÚŦԼÖÝÌá³öÁËÒ»Ïî×ÜÀ¨ÐÔÕþ²ß¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/new-york-ban-cities-paying-ransomware/152233/