¿¨°Í˹»ù2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ£»11¸öRuby¿â±£´æºóÃÅ£»SteamÌáȨ0day

Ðû²¼Ê±¼ä 2019-08-22
1¡¢¿¨°Í˹»ùÐû²¼2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ¾ÙÐе÷ÑÐ £¬ÕûÀí²¢Ðû²¼ÁË¡¶2019Äê¹¤ÒµÍøÂçÇ徲״̬¡·±¨¸æ¡£Æ¾Ö¤¸Ã±¨¸æ £¬È¥ÄêÁè¼ÝÒ»°ë£¨52%£©µÄ¹¤¿ØÇå¾²ÊÂÎñÊÇÓÉÈËΪʧÎóµ¼ÖµÄ¡£ËäÈ»¾ø´ó´ó¶¼¹«Ë¾£¨81£¥£©ÍýÏë¾ÙÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0 £¬µ«·ÖÅÉÁËÍøÂçÇå¾²Ô¤ËãµÄÈ´Éٵöࣨ57£¥£©¡£³ý´ËÖ®Íâ £¬ÕâЩ¹«Ë¾µÄÍøÂçÇå¾²ÊÖÒÕÈÔÈ»ÁîÈ˵£ÐÄ£ºÊÜ·ÃÕßµÄÁ½´óµ£Ðļ¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂçÇ徲ר¼ÒÀ´¹ÜÀí¹¤ÒµÍøÂç £¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±éȱ·¦Çå¾²Òâʶ¡£


Ô­ÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/


2¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Êé

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®ÓÚÉϸöÔ½ÒÏþµÄ¸ùÖ¤Êé £¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£Æäʱ¹þÈø¿Ë˹̹Õþ¸®ÒªÇó¸Ã¹úISPºÏ×÷ £¬Ç¿ÖÆÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£ÏÖÔÚµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ £¬½«×èÖ¹ÅþÁ¬²¢ÏÔʾ¹ýʧÐÅÏ¢¡£¹þÈø¿Ë˹̹Õþ¸®ÒѾ­ÔÚ8Ô³õ×èÖ¹ÁËÕâÒ»ÍýÏë £¬Ò»Ãû¹ÙÔ±ÌåÏÖÕû¸öÍýÏëÖ»ÊÇÕþ¸®µÄÒ»¸ö²âÊÔ¡£µ«ÈÔÓÐÊý°ÙÍò×°±¸ÈÔÔÚʹÓøÃÖ¤Êé¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html


3¡¢Ñо¿Ö°Ô±·¢Ã÷11¸öRuby¿âÖб£´æºóÃÅ´úÂë

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

RubyGemsɾ³ýÁË18¸ö°üÀ¨ºóÃÅ´úÂëµÄRuby¿â¶ñÒâ°æ±¾ £¬ÕâЩ¶ñÒâ°æ±¾ÊôÓÚ11¸ö²î±ðµÄRuby¿â £¬×Ô7ÔÂ8ÈÕÒÔÀ´ £¬ÕâЩ¶ñÒâ°æ±¾ÒѾ­±»ÏÂÔØÁË3584´Î¡£±»Ö²ÈëµÄºóÃÅ´úÂë¿ÉÔÚÆäËûÈ˵ÄRubyÏîÄ¿ÖпªÕ¹ÒþÄäµÄ¶ñÒâÍÚ¿ó»î¶¯¡£ºÉÀ¼¿ª·¢ÕßJan DintelÊ×ÏÈÔÚrest-client¿âÖз¢Ã÷Á˶ñÒâ´úÂë £¬ËüÃÇ»áÍøÂçURLºÍϵͳÇéÐÎÐÅÏ¢²¢·¢ËÍÖÁÎÚ¿ËÀ¼µÄ·þÎñÆ÷¡£¾­ÓÉÊÓ²ìºóRubyGemsÔ±¹¤·¢Ã÷Á˸ü¶à¿âÊܵ½ÎÛȾ £¬Ïêϸ°æ±¾ÁбíÇë²Î¿¼Á´½Ó¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/


4¡¢¶íÂÞ˹·¸·¨ÍÅ»ïSilence½«Ä¿µÄÀ©Õ¹ÖÁÈ«ÇòÒøÐÐ


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


ƾ֤Group-IBÐû²¼µÄ¡¶Silence 2.0£º×ßÏòÈ«Çò¡·±¨¸æ £¬×Ô2018Äê9Ô·ÝÒÔÀ´ £¬Í¨¹ýÔöÌí¹¥»÷ƵÂʵķ½·¨ £¬¸Ã¶íÂÞ˹·¿·¸·¨ÍÅ»ïÒѾ­ÇÔÈ¡Á˽ü350ÍòÃÀÔªµÄ×ʽð¡£ÔÚÒÑÍùÒ»ÄêÖÐ £¬¸ÃÍÅ»ïÖÁÉÙÌᳫÁË16¸öй¥»÷»î¶¯ £¬Ãé×¼ÁË30¸ö¹ú¼ÒµÄÒøÐÐ £¬Ä¿µÄÇøÓòºá¿çÅ·ÖÞ¡¢À­¶¡ÃÀÖÞ¡¢·ÇÖÞºÍÑÇÖÞ¡£ÆäÔì³ÉµÄËðʧÔöÌíÁË5±¶ £¬´Ó80ÍòÃÀÔªÔöÌíÖÁ420ÍòÃÀÔª¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/silence-apt-russian-hackers.html

5¡¢Ñо¿Ö°Ô±Åû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

¶íÂÞ˹Ñо¿Ö°Ô±Vasily KravetsÅû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day £¬¸ÃÎó²îÖ»Ó°ÏìÁËWindows¿Í»§¶Ë £¬Æ¾Ö¤SteamµÄÊý¾Ý £¬Ô¼ÓÐ9600ÍòÓû§ÊÜÓ°Ïì¡£¸ÃEoP/LPEÎó²îÔÊÐí¹¥»÷Õßͨ¹ýBaitAndSwitchÊÖÒÕÌáȨÖÁNT AUTHORITY\SYSTEMȨÏÞÖ´ÐÐí§Òâpayload¡£Kravetsͨ¹ýÊÓÆµÑÝʾÁËÆä¹¥»÷°ì·¨ £¬×èÖ¹ÏÖÔÚVÉçÉÐδ¾ÙÐлØÓ¦¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/

6¡¢Ë¼¿ÆÐÞ¸´UCS×°±¸¼°220½»Á÷»úÖеÄ6¸öÒªº¦Îó²î

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£

˼¿ÆÐÞ¸´ÆäUCS×°±¸¼°220ϵÁÐÆóÒµ½»Á÷»úÖеÄ6¸öÒªº¦Îó²î £¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²î½ÓÊÜÄ¿µÄ×°±¸¡£ÆäÖÐËĸöÎó²î£¨CVE-2019-1938¡¢CVE-2019-1935¡¢CVE-2019-1974ºÍCVE-2019-1937£©µÄCVSSÆÀ·Ö¶¼Îª9.8·Ö £¬ÕâЩÎó²îÓ°ÏìÁËUCS×°±¸¡£ÁíÍâÁ½¸öÎó²î£¨CVE-2019-1913 £¬CVSS 9.8·ÖºÍCVE-2019-1912 £¬CVSS 9.1·Ö£©ÊÇ220½»Á÷»úÖеĻº³åÇøÒç³öÎó²î £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÎó²îÖ´ÐÐí§Òâ´úÂë²¢½ÓÊܽ»Á÷»ú¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/cisco-patches-six-critical-bugs/147585/