ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ51ÖÜ

Ðû²¼Ê±¼ä 2019-12-30

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´43¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇPalo Alto Networks PA-7080 ROOTȨÏÞ»ñȡ©¶´; Mozilla Network Security Services»º³åÇøÒç³ö©¶´£»Docker docker-credential-secretserviceÄÚ´æ´íÎóÓ¦ÓÃȨÏÞÌáÉý©¶´£»TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´ÐЩ¶´£»D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢£»CitrixËùÓвúÎï´æÔÚ´úÂëÖ´ÐЩ¶´£¨CVE-2019-19781£©£»¶íÂÞ˹Õþ¸®Ðû²¼ÀֳɽøÐл¥ÁªÍø¶Ï¿ª²âÊÔ£»P2P½©Ê¬ÍøÂçMoziÖ÷ÒªÕë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷£»°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§£¬¹È¸èÆ»¹û½ô¼±Ï¼Ü¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Palo Alto Networks PA-7080 ROOTȨÏÞ»ñȡ©¶´


Palo Alto Networks PA-7080ûÓÐÕýÈ·ÏÞÖƶÔLog Forwarding CardͨÐŵÄÏÞÖÆ£¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɻñÈ¡rootȨÏÞ¡£

https://nvd.nist.gov/vuln/detail/CVE-2019-17440


2. Mozilla Network Security Services»º³åÇøÒç³ö©¶´


Mozilla Network Security Services cryptographic primitives³¤¶È´¦ÖôæÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴¹¹½¨¶ñÒâWEBÒ³£¬ÓÕʹÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://access.redhat.com/security/cve/cve-2019-17006


3. Docker docker-credential-secretserviceÄÚ´æ´íÎóÓ¦ÓÃȨÏÞÌáÉý©¶´


Docker docker-credential-secretservice´æÔÚÁ½´ÎÊÍ·Å©¶´£¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ²¢Ö´ÐдúÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-19-1030/


4. TigerVNC ZlibInStreamÔ¶³Ì´úÂëÖ´ÐЩ¶´


TigerVNC ZlibInStream´æÔÚÄÚ´æÆÆ»µÂ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄ·þÎñÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÕßÖ´ÐÐÈÎÒâ´úÂë¡£

https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40


5. D-Link DCS-960L HNAP SOAPActionÕ»Òç³ö´úÂëÖ´ÐЩ¶´


D-Link DCS-960L HNAP SOAPAction´æÔÚÕ»Òç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-19-1031/


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢ÓÎÏ·¿ª·¢ÉÌZyngaй¶½ü1.73ÒÚÓû§ÕË»§ÐÅÏ¢


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ÓÎÏ·¿ª·¢ÉÌZyngaÔÚ9Ô·ÝÔâµ½ºÚ¿ÍÈëÇÖ£¬½ü1.73ÒÚ¸öÓû§ÃûºÍÃÜÂëй¶¡£ËäÈ»ZyngaÓÚ9Ôµ×ÈÏ¿ÉÁËÕâһʼþ£¬µ«Êý¾Ýй¶֪ͨÍøÕ¾HaveIBeenPwnedÏÖÔÚÊÕ¼¯µ½ÁËÓйØÊÜÓ°ÏìÕË»§ÊýÁ¿µÄ¹Ù·½Êý×Ö¡£Æ¾¾Ý¸ÃÍøÕ¾µÄ¸üУ¬¹²ÓÐ1.729ÒÚ¸ö²îÒìµÄµç×ÓÓʼþµØÖ·ÒÔ¼°Óû§ÃûºÍÃÜÂëÔڴ˴ι¥»÷ÖÐй¶£¬ºÃÏûÏ¢ÊÇÕâЩÃÜÂëÒÔ¼ÓÑεÄSHA-1É¢ÁÐÐÎʽ´æ´¢£¬Ê¹ÆäÄÑÒÔ±»Æƽâ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/zynga-breach-hit-173-million/


2¡¢CitrixËùÓвúÎï´æÔÚ´úÂëÖ´ÐЩ¶´£¨CVE-2019-19781£©


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Äþ¾²×¨¼ÒMikhail KlyuchnikovÔÚCitrix Application Delivery ControllerºÍCitrix Gateway²úÎïÖз¢ÏÖÒ»¸öÑÏÖصĴúÂëÖ´ÐЩ¶´£¬¸Ã©¶´£¨CVE-2019-19781£©Ê¹158¸ö¹ú¼ÒµÄÁè¼Ý8Íò¼Ò¹«Ë¾ÃæÁÙ·çÏÕ¡£ÓÉÓÚÀûÓø鶴µÄ¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿É·ÃÎʹ«Ë¾µÄÄÚ²¿ÍøÂ磬Òò´Ë¸Ã©¶´ÓÈÆäΣÏÕ¡£ÀÖ³ÉÀûÓø鶴¿Éµ¼ÖÂÈÎÒâ´úÂëÖ´ÐС£Æ¾¾ÝCitrix£¬¸Ã©¶´Ó°ÏìÁËËùÓÐÊÜÖ§³ÖµÄ²úÎï°æ±¾ºÍƽ̨£¬¾¡¹ÜCitrixÉÐδÐû²¼Ð¹̼þÀ´½â¾ö¸ÃÎÊÌ⣬µ«¸Ã¹«Ë¾ÒÑÐû²¼ÁËÒ»Ì×Õë¶Ô¶ÀÁ¢ÏµÍ³ºÍ¼¯ÈºµÄ»º½â´ëÊ©£¬²¢Ç¿ÁÒ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§½ÓÄÉËüÃÇ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-citrix-flaw-may-expose-thousands-of-firms-to-attacks/


3¡¢¶íÂÞ˹Õþ¸®Ðû²¼ÀֳɽøÐл¥ÁªÍø¶Ï¿ª²âÊÔ


×ðÁú¶¶È¦ - Ϊdu¶øÉú


¶íÂÞ˹Õþ¸®ÖÜÒ»Ðû²¼ÀֳɽøÐл¥ÁªÍø¶Ï¿ª²âÊÔ¡£¸ÃÏî²âÊÔ´ÓÉÏÖÜ¿ªÊ¼½øÐУ¬Á¬ÐøÁ˶àÌ죬Éæ¼°¶íÂÞ˹Õþ¸®»ú¹¹¡¢µ±µØ»¥ÁªÍø·þÎñÌṩÉ̺ͶíÂÞ˹µ±µØ»¥ÁªÍø¹«Ë¾¡£ÊµÑéµÄÄ¿µÄÊDzâÊԸùú¼ÒµÄ»¥ÁªÍø»ù´¡ÉèÊ©£¨ÔÚ¶íÂÞ˹ÄÚ²¿³ÆΪRuNet£©ÊÇ·ñ¿ÉÒÔÔÚ²»·ÃÎÊÈ«ÇòDNSϵͳºÍÍⲿ»¥ÁªÍøµÄÇé¿öÏÂÔËÐС£»¥ÁªÍøÁ÷Á¿ÔÚ¶íÂÞ˹ÄÚ²¿½øÐÐÁËÖØзÓÉ£¬ÓÐЧµØʹ¶íÂÞ˹µÄRuNet³ÉΪÊÀ½çÉÏ×î´óµÄÄÚÁªÍø¡£Õþ¸®Ã»ÓÐ͸¶ÓйزâÊÔ¼°Æä×é¼þµÄÈκμ¼Êõϸ½Ú£¬Ö»ÊDZíÃ÷Õþ¸®²âÊÔÁ˼¸ÖֶϿªÁ¬½ÓµÄ³¡¾°£¬°üÂÞÄ£Äâ¹úÍâÍøÂç¹¥»÷µÄ³¡¾°¡£Õþ¸®ÔÚÐû²¼»áÉÏÌåÏÖ¸ÃʵÑé»ñµÃÁËÀֳɡ£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russia-successfully-disconnected-from-the-internet/


4¡¢P2P½©Ê¬ÍøÂçMoziÖ÷ÒªÕë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªÂ·ÓÉÆ÷


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Ñо¿ÈËÔ±·¢ÏÖÐÂP2P½©Ê¬ÍøÂçMoziÕýÔÚ»ý¼«Õë¶ÔÍø¼þ¡¢D-LinkºÍ»ªÎªµÄ·ÓÉÆ÷¡£¸Ã½©Ê¬ÍøÂçÓë¶ñÒâÈí¼þGafgytÓйØ£¬ÒòΪËüÖØÓÃÁ˺óÕߵIJ¿ÃÅ´úÂë¡£MoziµÄÖ÷ҪĿµÄÊÇÓÃÓÚDDoS¹¥»÷¡£Ñо¿ÈËÔ±·¢Ïָý©Ê¬ÍøÂçʹÓÃÒ»ÖÖ¶¨ÖƵÄÀ©Õ¹ÂþÑÜʽ¹þÏ£±í£¨DHT£©Ð­ÒéÀ´ÊµÏÖ£¬¸ÃЭÒéͨ³£±»torrent¿Í»§¶ËºÍÆäËûP2Pƽ̨ÓÃÓÚ´æ´¢½ÚµãÁªÏµÐÅÏ¢¡£Mozi»¹Ê¹ÓÃECDSA384ºÍXORËã·¨À´È·±£½©Ê¬ÍøÂç×é¼þºÍP2PÍøÂçµÄÍêÕûÐÔºÍÄþ¾²ÐÔ¡£MoziÖ÷Ҫͨ¹ýtelnetÀûÓÃÈõÃÜÂë·ÃÎÊÒ×Êܹ¥»÷µÄÉ豸£¬²¢ÔÚ¼ÓÔضñÒâÈí¼þºóËÑË÷ºÍѬȾÆäËüÒ×Êܹ¥»÷µÄÉ豸¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-mozi-p2p-botnet-takes-over-netgear-d-link-huawei-routers/


5¡¢°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§£¬¹È¸èÆ»¹û½ô¼±Ï¼Ü


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ƾ¾Ý¡¶Å¦Ô¼Ê±±¨¡·±¨µÀ£¬°¢ÁªÇõÕþ¸®Ê¹ÓÃÁ÷ÐеÄͨѶӦÓÃToTok×÷Ϊ¼àÊÓ¹¤¾ß£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¸ÃAPPÄ¿Ç°Òѱ»AppleºÍGoogleÔÚÏßÉ̵êϼÜ¡£ToTokµÄÓû§°üÂÞ°¢ÁªÇõºÍÖж«ÆäËû¹ú¼ÒµÄÊý°ÙÍòÃñÖÚ¡£¸Ã³ÂË߳ƣ¬ÃÀ¹úÇ鱨¹ÙÔ±ºÍÄþ¾²Ñо¿ÈËԱȷ¶¨°¢ÁªÇõÕþ¸®ÕýÔÚʹÓøÃAPP½øÐмàÊӻ¡£ToTok·ñÈÏÁËÓëÕþ¸®¼à¿Ø¼Æ»®ÓйØ£¬²¢ÌåÏÖ¸ÃÓ¦Óñ»Ï¼ÜÊÇÓÉÓÚ¡°¼¼ÊõÎÊÌ⡱¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html