ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ11ÖÜ
Ðû²¼Ê±¼ä 2020-03-16> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê03ÔÂ09ÈÕÖÁ15ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´67¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Server Message BlockѹËõËã·¨´úÂëÖ´ÐЩ¶´; Apache ShardingSphere unmarshalÊý¾Ý´¦ÖôúÂëÖ´ÐЩ¶´£»SAP Solution ManagerÑéÖ¤Èƹý©¶´£»Johnson Controls Kantech EntraPass SmartService API·þÎñÑ¡Ïî´úÂëÖ´ÐЩ¶´£»Barracuda Load Balancer ADC LDAP·þÎñÅäÖ鶴¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇ΢ÈíÐû²¼Õë¶ÔSMBv3©¶´µÄKB4551762Äþ¾²¸üУ»WhisperÊý¾Ý¿â¿É¹ûÈ»·ÃÎÊ£¬Ð¹Â¶Ô¼9ÒÚÌõ¼Ç¼£»Å·ÖÞµçÁ¦ÔËÓªÉÌÁªÃËENTSO-E°ì¹«ÍøÂçÔâºÚ¿ÍÈëÇÖ£»ÎÒ¹ú8ÏîÍøÂçÄþ¾²¹ú¼Ò³ß¶È»ñÅúÐû²¼£»Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬Ó°ÏìZen¼Ü¹¹¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
>ÖØÒªÄþ¾²Â©¶´Áбí
1. Microsoft Server Message BlockѹËõËã·¨´úÂëÖ´ÐЩ¶´
Microsoft Server Message Block SMBv3ÐÒéÔÚ´¦ÖöñÒâѹËõÊý¾Ý°ü´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔϵͳÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/CVE-2020-0796
2. Apache ShardingSphere unmarshalÊý¾Ý´¦ÖôúÂëÖ´ÐЩ¶´
Apache ShardingSphere WEB¿ØÖÆ̨SnakeYAML½âÎöÊý¾Ý´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E
3. SAP Solution ManagerÑéÖ¤Èƹý©¶´
SAP Solution ManagerÑéÖ¤¼ì²é´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Í¨¹ýSMDAgentsδÊÚȨ·ÃÎÊ¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
4. Johnson Controls Kantech EntraPass SmartService API·þÎñÑ¡Ïî´úÂëÖ´ÐЩ¶´
Johnson Controls Kantech EntraPass SmartService API·þÎñÑ¡Ïî´æÔÚ´úÂëÉÏ´«Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÉÏ´«ÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.us-cert.gov/ics/advisories/icsa-20-070-04
5. Barracuda Load Balancer ADC LDAP·þÎñÅäÖ鶴
Barracuda Load Balancer ADC LDAP·þÎñÅäÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊLDAP·þÎñ¡£
https://blog.rapid7.com/2020/03/05/r7-2019-39-cve-2019-5648-ldap-credential-exposure-in-barracuda-load-balancer-adc-fixed/
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢Î¢ÈíÐû²¼Õë¶ÔSMBv3©¶´µÄKB4551762Äþ¾²¸üÐÂ
΢Èí½ñÌìÔçЩʱºòÐû²¼ÁËÕë¶ÔSMBv3 RCE©¶´£¨CVE-2020-0796£©µÄ²¹¶¡¸üУ¨KB4551762£©£¬Óû§¿ÉÒÔͨ¹ýWindows Update¼ì²é¸üлò´Ó΢Èí²¹¶¡Ä¿Â¼£¨https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762£©ÉÏÊÖ¶¯ÏÂÔØÊʺÏ×Ô¼ºWindows°æ±¾µÄKB4551762¡£Î¢ÈíÌåÏÖËäȻûÓз¢ÏÖÀûÓôË©¶´µÄ¹¥»÷£¬µ«½¨ÒéÓû§ÓÅÏÈ°²×°´Ë¸üС£´Ë©¶´Ò²±»³ÆΪSMBGhost»òEternalDarkness£¬½öÓ°ÏìÔËÐÐWindows 10°æ±¾1903ºÍ1909ÒÔ¼°Windows Server Server Core°²×°°æ±¾1903ºÍ1909µÄÉ豸¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-releases-kb4551762-security-update-for-smbv3-vulnerability/
2¡¢WhisperÊý¾Ý¿â¿É¹ûÈ»·ÃÎÊ£¬Ð¹Â¶Ô¼9ÒÚÌõ¼Ç¼
¾Ý¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨µÀ£¬ÄäÃûÃØÃܹ²ÏíÓ¦ÓÃWhisperÓÉÓÚÊý¾Ý¿â¿É¹ûÈ»·ÃÎÊ£¬µ¼ÖÂÔ¼9ÒÚÌõ¼Ç¼й¶¡£Ñо¿ÈËÔ±Matthew PorterºÍDan Ehrlich·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖд洢µÄÊý¾ÝÊÇ´Ó2012Äê¸ÃAPPÐû²¼Ò»Ö±µ½ÏÖÔÚµÄËùÓÐÊý¾Ý¡£¾¡¹Ü¼Ç¼Öв»°üÂÞÓû§Ãû£¬µ«ÆäÖаüÂÞêdzơ¢ÄêÁä¡¢ÖÖ×å¡¢ÐԱ𡢼ÒÏç¡¢ÍÅÌå³ÉÔ±¹ØϵÒÔ¼°Óë·¢ÌûÏà¹ØµÄλÖÃÊý¾Ý¡£ÕâЩλÖÃÐÅÏ¢°üÂÞÀ´×ÔÓû§×î½ü·¢ÌûµÄ×ø±ê£¬ÀýÈçÌض¨µÄѧУ¡¢ÊÂÇ鳡ËùºÍ¾ÓÃñÇø¡£WhisperÔÚ½Óµ½Í¨ÖªºóÈ¡ÏûÁ˸ÃÊý¾Ý¿âµÄ·ÃÎÊȨÏÞ£¬²¢Í¨ÖªÁËÁª°îÖ´·¨»ú¹¹¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private/
3¡¢Å·ÖÞµçÁ¦ÔËÓªÉÌÁªÃËENTSO-E°ì¹«ÍøÂçÔâºÚ¿ÍÈëÇÖ
Å·ÖÞµçÁ¦ÔËÓªÉÌÁªÃË£¨ENTSO-E£©ÔÚÒ»·Ý¼ò¶ÌµÄÉùÃ÷ÖÐÌåÏÖ£¬½üÆÚÆä°ì¹«ÍøÂçÔâµ½ºÚ¿ÍÈëÇÖ¡£ÓÉÓڸð칫ÍøÂ粢δÁ¬½Óµ½ÈκÎÔËÓªÖеĵçÁ¦´«Êäϵͳ£¬ÕâÒâζ׏¥»÷½öÏÞÓÚITϵͳ£¬Ã»ÓÐÓ°ÏìÒªº¦¿ØÖÆϵͳ¡£ENTSO-E×ܲ¿Î»ÓÚ²¼Â³Èû¶û£¬ÓÉ35¸öÅ·ÖÞ¹ú¼ÒµÄ42¼ÒµçÍøÔËÓªÉÌ×é³É¡£ENTSO-EÌåÏÖÒѾ½øÐÐÁË·çÏÕÆÀ¹ÀºÍÖƶ¨ÁËÓ¦¼±¼Æ»®£¬ÒÔ¼õÉÙ½øÒ»²½¹¥»÷µÄ·çÏÕºÍÓ°Ï죬µ«Ã»ÓÐ͸¶ÓëÈëÇÖºÎʱ¿ªÊ¼ÒÔ¼°Ë¿ÉÄܶԹ¥»÷ÂôÁ¦ÓйصÄÏêϸÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/european-entso-breach-fingrid/
4¡¢ÎÒ¹ú8ÏîÍøÂçÄþ¾²¹ú¼Ò³ß¶È»ñÅúÐû²¼
ƾ¾Ý2020Äê3ÔÂ6ÈÕ¹ú¼ÒÊг¡¼à¶½¹ÜÀí×ܾ֡¢¹ú¼Ò³ß¶È»¯¹ÜÀíίԱ»áÐû²¼µÄÖлªÈËÃñ¹²ºÍ¹ú¹ú¼Ò³ß¶Èͨ¸æ£¨2020ÄêµÚ1ºÅ£©£¬È«¹úÐÅÏ¢Äþ¾²³ß¶È»¯¼¼ÊõίԱ»á¹é¿ÚµÄGB/T 35273-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ ¸öÈËÐÅÏ¢Äþ¾²¹æ·¶¡·µÈ8Ïî¹ú¼Ò³ß¶ÈÕýʽÐû²¼¡£¾ßÌåÇåµ¥°üÂÞGB/T 17901.1-2020¡¶ÐÅÏ¢¼¼Êõ Äþ¾²¼¼Êõ ÃØÔ¿¹ÜÀí µÚ1²¿ÃÅ£º¿ò¼Ü¡·¡¢GB/T 38540-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ Äþ¾²µç×ÓÇ©ÕÂÃÜÂë¼¼Êõ¹æ·¶¡·¡¢GB/T 38541-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ µç×ÓÎļþÃÜÂëÓ¦ÓÃÖ¸ÄÏ¡·¡¢GB/T 38543-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ »ùÓÚÉúÎïÌØÕ÷ʶ´ËÍâÒƶ¯ÖÇÄÜÖÕ¶ËÉí·Ý¼ø±ð¼¼Êõ¿ò¼Ü¡·¡¢GB/T 38556-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ ¶¯Ì¬¿ÚÁîÃÜÂëÓ¦Óü¼Êõ¹æ·¶¡·¡¢GB/T 338558-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ °ì¹«É豸Äþ¾²²âÊÔÒªÁì¡·ÒÔ¼°GB/T 38561-2020¡¶ÐÅÏ¢Äþ¾²¼¼Êõ ÍøÂçÄþ¾²¹ÜÀíÖ§³Åϵͳ¼¼ÊõÒªÇó¡·¡£ËùÓÐ8Ïî³ß¶ÈµÄʵʩÈÕÆÚ¶¼ÊÇ2020-10-01¡£
ÔÎÄÁ´½Ó£º
https://www.tc260.org.cn/front/postDetail.html?id=20200307152229
5¡¢Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬Ó°ÏìZen¼Ü¹¹
¸ñÀ´Ä¼¼Êõ´óѧÐû²¼µÄһƪÐÂÂÛÎÄÏêϸ½éÉÜÁËÁ½ÖÖеÄAMD CPU²àÐŵÀ¹¥»÷£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬¹¥»÷Õß¿Éͨ¹ýÀûÓÃL1D»º´æÔ¤²â±äÁ¿À´Ð¹Â©AMD´¦ÖÃÆ÷µÄ»úÃÜÊý¾Ý¡£Ñо¿ÈËÔ±³Æ¸Ã©¶´Ó°ÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦ÖÃÆ÷£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò»¨Üµ½Ó°Ïì¡£¸Ã´óѧÌåÏÖËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩ©¶´£¬µ«AMDÉÐδÐû²¼Î¢´úÂë¸üУ¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚÍƲâµÄ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/