ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ45ÖÜ

Ðû²¼Ê±¼ä 2019-11-18

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê11ÔÂ11ÈÕÖÁ17ÈÕ¹²ÊÕ¼Çå¾²Îó²î48¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows OpenType×ÖÌåÆÊÎöCVE-2019-1456Ô¶³ÌÖ´ÐдúÂëÎó²î; eQ-3 Homematic CCU3 testtcl.cgi´úÂëÖ´ÐÐÎó²î£»SAP Diagnostics Agentí§ÒâOSÏÂÁî×¢ÈëÎó²î£»Istio¾Ü¾ø·þÎñÎó²î£»Adobe Illustrator CVE-2019-8248ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍйܷþÎñÉÌSmarterASP.NETÔâÀÕË÷Èí¼þ¹¥»÷£»¶íÂÞ˹з¨°¸Ç¿ÖÆÊÖ»úºÍPCԤװÖñ¾¹úÈí¼þ£»5GÐÂÎó²î¿É¸ú×ٵ绰λÖü°¹ã²¥Ðéα¾¯±¨£»McAfeeɱ¶¾Èí¼þ´úÂëÖ´ÐÐÎó²î(CVE-2019-3648)£»¸ßͨоƬ×éQSEEÎó²î¿ÉÖÂAndroid×°±¸Êý¾Ýй¶¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖС£


>Ö÷ÒªÇå¾²Îó²îÁбí


1. Microsoft Windows OpenType×ÖÌåÆÊÎöCVE-2019-1456Ô¶³ÌÖ´ÐдúÂëÎó²î
Microsoft Windows OpenType×ÖÌåÆÊÎö´¦Öóͷ£Opentype×ÖÌå±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó £¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1456

2. eQ-3 Homematic CCU3 testtcl.cgi´úÂëÖ´ÐÐÎó²î
eQ-3 Homematic CCU3 save.cgi¾ç±¾¿ÉÓÃÀ´ÉÏ´«¾ç±¾²¢±»testtcl.cgi¾ç±¾Ö´ÐÐ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://psytester.github.io/CVE-2019-18938/

3. SAP Diagnostics Agentí§ÒâOSÏÂÁî×¢ÈëÎó²î
SAP Diagnostic Agent±£´æÎ´Ã÷Çå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528880390

4. Istio¾Ü¾ø·þÎñÎó²î
Istio±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓóÌÐòÍ߽⡣
https://github.com/istio/istio/issues/18229

5. Adobe Illustrator CVE-2019-8248ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Illustrator´¦Öóͷ£Îļþ±£´æÄÚ´æÆÆËðÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó £¬¿ÉÖ´ÐÐí§Òâ´úÂë»òÕß¾ÙÐоܾø·þÎñ¹¥»÷¡£
https://helpx.adobe.com/security/products/illustrator/apsb19-36.html


>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÍйܷþÎñÉÌSmarterASP.NETÔâÀÕË÷Èí¼þ¹¥»÷


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


SmarterASP.NETÊÇÒ»¼ÒÓµÓÐÁè¼Ý44Íò¸ö¿Í»§µÄASP.NETÍйܷþÎñÉÌ £¬¸Ã¹«Ë¾ÔÚÖÜÄ©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷¡£Ä¿½ñSmarterASP.NETÌåÏÖÕýÔÚÆð¾¢»Ö¸´¿Í»§µÄ·þÎñÆ÷ £¬µ«²»ÇåÎú¸Ã¹«Ë¾ÊÇÖ§¸¶ÁËÊê½ðÕÕ¾ÉÔÚ´Ó±¸·ÝÖлָ´¡£´Ë´Î¹¥»÷Öв»µ«¿Í»§Êý¾ÝÊܵ½Ó°Ïì £¬²¢ÇÒSmarterASP.NET×Ô¼ºÒàÊÜÓ°Ïì¡£¸Ã¹«Ë¾µÄÍøÕ¾ÔÚÐÇÆÚÁùÈ«Ìì¶¼ÏÂÏß £¬Ö±µ½ÐÇÆÚÌìÔçÉϲÅÖØÐÂÉÏÏß¡£·þÎñÆ÷»Ö¸´ÊÂÇéÏ£Íû»ºÂý £¬Ðí¶à¿Í»§ÈÔÈ»ÎÞ·¨»á¼ûÆäÕË»§ºÍÊý¾Ý £¬°üÀ¨ÍøÕ¾ÎļþºÍºó¶ËÊý¾Ý¿â¡£Æ¾Ö¤ÔÚTwitterÉÏÐû²¼µÄ½ØÍ¼ £¬±»¼ÓÃܵĿͻ§Îļþºó¸½¼ÓÁË¡°.kjhbx¡±À©Õ¹Ãû £¬ÏÖÔÚÑо¿Ö°Ô±ÈÔÔÚÊÔͼȷÈÏÀÕË÷Èí¼þµÄÖÖÀà¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-asp-net-hosting-provider-infected-by-ransomware/

2¡¢¶íÂÞ˹з¨°¸Ç¿ÖÆÊÖ»úºÍPCԤװÖñ¾¹úÈí¼þ


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


¶íÂÞ˹Òé»áÕýÔÚÍÆ¶¯Ò»ÏîÁ¢·¨ £¬¸Ã·¨°¸½«Ç¿ÖÆÒªÇóËùÓÐÔÚ¶íÂÞ˹ÏúÊ۵ĵç×Ó×°±¸£¨°üÀ¨ÖÇÄÜÊÖ»ú¡¢PCºÍÖÇÄܵçÊӵȣ©Ô¤×°Öñ¾¹ú¿Æ¼¼¹«Ë¾µÄÓ¦Óá£Õâ¿ÉÄÜ»á´øÀ´Çå¾²Òþ»¼¡£Á¢·¨ÕßÌåÏָ÷¨°¸ÊÇΪÁ˱£»¤ÍâµØµÄÊÖÒÕÊг¡ÃâÊÜÍâ¹ú£¨¿ÉÄÜÊÇÖ¸ÃÀ¹ú£©µÄ¾ºÕù¡£Õþ¸®½«Õë¶ÔÿÖÖ×°±¸ÀàÐÍÐû²¼Ò»·ÝÈí¼þÁбí £¬×°±¸¹©Ó¦ÉÌÐèÒªÔÚ¶íÂÞ˹ÏúÊÛµÄ×°±¸ÉÏԤװÖÃÕâЩÈí¼þ¡£ÈôÊǹ©Ó¦É̲»×ñÊØ»®¶¨ £¬½«±»´¦ÒÔ×î¸ß20Íò¬²¼£¨Ô¼ºÏ3100ÃÀÔª£©µÄ·£¿î¡£¸Ã·¨°¸»ñµÃÁËËùÓÐÖ÷ÒªÕþµ³µÄÖ§³Ö £¬ÕâÒâζ×ÅËüºÜÓпÉÄܽ«ÔÚ2020Äê7ÔÂ1ÈÕÉúЧ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/phones-and-pcs-sold-in-russia-will-have-to-come-pre-installed-with-russian-apps/

3¡¢5GÐÂÎó²î¿É¸ú×ٵ绰λÖü°¹ã²¥Ðéα¾¯±¨


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


ÆÕ¶É´óѧ£¨Purdue University£©ºÍ°®ºÉ»ª´óѧ£¨University of Iowa£©µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷¿ìÒª12¸ö5GÇå¾²Îó²î £¬Ñо¿Ö°Ô±ÌåÏÖÕâЩÎó²î¿ÉÔÊÐí¹¥»÷Õß»ñȡĿµÄÓû§µç»°µÄÐÂ/¾ÉÔÝÊ±ÍøÂç±êʶ·û £¬´Ó¶ø¸ú×ٵ绰µÄλÖà £¬ÉõÖÁÐ®ÖÆÑ°ºôÐŵÀ¾ÙÐÐÐéαµÄ½ôÆÈ¾¯±¨¹ã²¥¡£ÔÚijЩÇéÐÎÏ £¬ÕâЩÎó²î¿ÉÄܱ»ÓÃÀ´½«·äÎÑÅþÁ¬½µ¼¶Îª²»Ì«Çå¾²µÄ±ê×¼¡£Ò»Ð©ÐµĹ¥»÷Ò²¿ÉÄÜÔÚÏÖÓеÄ4GÍøÂçÉϱ»Ê¹Ó᣼øÓÚÎó²îµÄÐÔ×Ó £¬Ñо¿Ö°Ô±ÌåÏÖËûÃDz»ÍýÏë¹ûÕæÆäPoC´úÂë £¬µ«ËûÃǽ«ÕâЩ·¢Ã÷֪ͨÁËÈ«Çò·äÎÑÍøÂçGSMЭ»á£¨GSMA£©¡£GSMAûÓÐ͸¶ÊÇ·ñ¿ÉÒÔÐÞ¸´Îó²î £¬Ò²Ã»ÓÐ͸¶ÐÞ¸´Ê±¼ä¡£


Ô­ÎÄÁ´½Ó£º

https://finance.yahoo.com/news/5g-flaws-track-phone-locations-163014364.html

4¡¢McAfeeɱ¶¾Èí¼þ´úÂëÖ´ÐÐÎó²î(CVE-2019-3648)

Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


SafeBreach Labs·¢Ã÷McAfee·À²¡¶¾Èí¼þÊÜ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-3648£©µÄÓ°Ïì £¬¹¥»÷Õß¿ÉÈÆ¹ýMcAfeeµÄ×ÔÎÀ»úÖÆ £¬¿ÉÄܵ¼Ö¶ÔÊÜѬȾϵͳµÄ½øÒ»²½¹¥»÷¡£¸ÃÎó²îÊÇÓÉÓÚδÑéÖ¤¼ÓÔØDLLµÄÊðÃûµ¼Ö嵀 £¬¹¥»÷Õ߿ɽ«í§ÒâδÊðÃûµÄDLL¼ÓÔØµ½ÒÔNT AUTHORITY\SYSTEMȨÏÞÔËÐеĶà¸ö·þÎñÖС£¸Ã¹¥»÷»¹¿ÉÒÔÈÆ¹ýÓ¦ÓóÌÐò°×Ãûµ¥±£»¤²¢×èÖ¹±»Çå¾²Èí¼þ¼ì²âµ½¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/mcafee-antivirus-software-impacted-by-code-execution-vulnerability/

5¡¢¸ßͨоƬ×éQSEEÎó²î¿ÉÖÂAndroid×°±¸Êý¾Ýй¶


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


ƾ֤Çå¾²³§ÉÌCheckPointµÄÒ»·Ý±¨¸æ £¬¸ßͨоƬ×éÖеÄÇå¾²Ö´ÐÐÇéÐΣ¨QSEE£©Öб£´æÎó²î£¨CVE-2019-10574£© £¬¿Éµ¼ÖÂAndroid×°±¸ÖеÄСÎÒ˽¼ÒÊý¾Ýй¶¡£QSEEÊÇ»ùÓÚARM TrustZoneÊÖÒÕµÄÊÜÐÅÈÎÖ´ÐÐÇéÐΣ¨TEE£©µÄʵÏÖ £¬ÊÇÖ÷´¦Öóͷ£Æ÷ÉϵÄÒ»¸öÓ²¼þ¸ôÀëµÄÇå¾²ÇøÓò £¬ÆäÖÐͨ³£°üÀ¨×¨ÓüÓÃÜÃÜÔ¿¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍ½è¼Ç¿¨Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£Check PointÑо¿Ö°Ô±ÄæÏòÁ˸Ãϵͳ £¬²¢Ê¹ÓÃÄ£ºý²âÊÔ¶ÔÈýÐÇ¡¢LGºÍĦÍÐÂÞÀ­×°±¸¾ÙÐÐÁ˲âÊÔ¡£×ÜÌå¶øÑÔ £¬Ñо¿Ö°Ô±·¢Ã÷ÈýÐǵÄÊÜÐÅÈδúÂë°üÀ¨ËĸöÎó²î £¬Ä¦ÍÐÂÞÀ­ºÍLG»®·Ö°üÀ¨Ò»¸öÎó²î £¬µ«ËùÓдúÂë¾ùÀ´×Ô¸ßͨ¹«Ë¾¡£ÈýÐÇ¡¢¸ßͨºÍLGÒÑÕë¶ÔÕâЩQSEEÎó²îÐû²¼Á˲¹¶¡¸üС£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/11/qualcomm-android-hacking.html