¿¨°Í˹»ù2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ£»£»£»£»11¸öRuby¿â±£´æºóÃÅ£»£»£»£»SteamÌáȨ0day
Ðû²¼Ê±¼ä 2019-08-22
¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ¾ÙÐе÷ÑУ¬£¬£¬£¬ÕûÀí²¢Ðû²¼ÁË¡¶2019Äê¹¤ÒµÍøÂçÇ徲״̬¡·±¨¸æ¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬£¬£¬È¥ÄêÁè¼ÝÒ»°ë£¨52%£©µÄ¹¤¿ØÇå¾²ÊÂÎñÊÇÓÉÈËΪʧÎóµ¼Öµġ£¡£¡£ËäÈ»¾ø´ó´ó¶¼¹«Ë¾£¨81£¥£©ÍýÏë¾ÙÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0£¬£¬£¬£¬µ«·ÖÅÉÁËÍøÂçÇå¾²Ô¤ËãµÄÈ´Éٵöࣨ57£¥£©¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬ÕâЩ¹«Ë¾µÄÍøÂçÇå¾²ÊÖÒÕÈÔÈ»ÁîÈ˵£ÐÄ£ºÊÜ·ÃÕßµÄÁ½´óµ£Ðļ¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂçÇ徲ר¼ÒÀ´ÖÎÀí¹¤ÒµÍøÂ磬£¬£¬£¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±éȱ·¦Çå¾²Òâʶ¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/
2¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Êé
¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®ÓÚÉϸöÔ½ÒÏþµÄ¸ùÖ¤Ê飬£¬£¬£¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£¡£¡£Æäʱ¹þÈø¿Ë˹̹Õþ¸®ÒªÇó¸Ã¹úISPÏàÖú£¬£¬£¬£¬Ç¿ÖÆÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£¡£¡£ÏÖÔÚµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ£¬£¬£¬£¬½«×èÖ¹ÅþÁ¬²¢ÏÔʾ¹ýʧÐÅÏ¢¡£¡£¡£¹þÈø¿Ë˹̹Õþ¸®ÒѾÔÚ8Ô³õ×èÖ¹ÁËÕâÒ»ÍýÏ룬£¬£¬£¬Ò»Ãû¹ÙÔ±ÌåÏÖÕû¸öÍýÏëÖ»ÊÇÕþ¸®µÄÒ»¸ö²âÊÔ¡£¡£¡£µ«ÈÔÓÐÊý°ÙÍò×°±¸ÈÔÔÚʹÓøÃÖ¤Êé¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html
3¡¢Ñо¿Ö°Ô±·¢Ã÷11¸öRuby¿âÖб£´æºóÃÅ´úÂë
RubyGemsɾ³ýÁË18¸ö°üÀ¨ºóÃÅ´úÂëµÄRuby¿â¶ñÒâ°æ±¾£¬£¬£¬£¬ÕâЩ¶ñÒâ°æ±¾ÊôÓÚ11¸ö²î±ðµÄRuby¿â£¬£¬£¬£¬×Ô7ÔÂ8ÈÕÒÔÀ´£¬£¬£¬£¬ÕâЩ¶ñÒâ°æ±¾ÒѾ±»ÏÂÔØÁË3584´Î¡£¡£¡£±»Ö²ÈëµÄºóÃÅ´úÂë¿ÉÔÚÆäËûÈ˵ÄRubyÏîÄ¿ÖпªÕ¹ÒþÄäµÄ¶ñÒâÍÚ¿ó»î¶¯¡£¡£¡£ºÉÀ¼¿ª·¢ÕßJan DintelÊ×ÏÈÔÚrest-client¿âÖз¢Ã÷Á˶ñÒâ´úÂ룬£¬£¬£¬ËüÃÇ»áÍøÂçURLºÍϵͳÇéÐÎÐÅÏ¢²¢·¢ËÍÖÁÎÚ¿ËÀ¼µÄЧÀÍÆ÷¡£¡£¡£¾ÓÉÊÓ²ìºóRubyGemsÔ±¹¤·¢Ã÷Á˸ü¶à¿âÊܵ½ÎÛȾ£¬£¬£¬£¬Ïêϸ°æ±¾ÁбíÇë²Î¿¼Á´½Ó¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/
4¡¢¶íÂÞ˹·¸·¨ÍÅ»ïSilence½«Ä¿µÄÀ©Õ¹ÖÁÈ«ÇòÒøÐÐ
ƾ֤Group-IBÐû²¼µÄ¡¶Silence 2.0£º×ßÏòÈ«Çò¡·±¨¸æ£¬£¬£¬£¬×Ô2018Äê9Ô·ÝÒÔÀ´£¬£¬£¬£¬Í¨¹ýÔöÌí¹¥»÷ƵÂʵķ½·¨£¬£¬£¬£¬¸Ã¶íÂÞ˹·¿·¸·¨ÍÅ»ïÒѾÇÔÈ¡Á˽ü350ÍòÃÀÔªµÄ×ʽ𡣡£¡£ÔÚÒÑÍùÒ»ÄêÖУ¬£¬£¬£¬¸ÃÍÅ»ïÖÁÉÙÌᳫÁË16¸öй¥»÷»î¶¯£¬£¬£¬£¬Ãé×¼ÁË30¸ö¹ú¼ÒµÄÒøÐУ¬£¬£¬£¬Ä¿µÄÇøÓòºá¿çÅ·ÖÞ¡¢À¶¡ÃÀÖÞ¡¢·ÇÖÞºÍÑÇÖÞ¡£¡£¡£ÆäÔì³ÉµÄËðʧÔöÌíÁË5±¶£¬£¬£¬£¬´Ó80ÍòÃÀÔªÔöÌíÖÁ420ÍòÃÀÔª¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/silence-apt-russian-hackers.html
5¡¢Ñо¿Ö°Ô±Åû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day
¶íÂÞ˹Ñо¿Ö°Ô±Vasily KravetsÅû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day£¬£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÁËWindows¿Í»§¶Ë£¬£¬£¬£¬Æ¾Ö¤SteamµÄÊý¾Ý£¬£¬£¬£¬Ô¼ÓÐ9600ÍòÓû§ÊÜÓ°Ïì¡£¡£¡£¸ÃEoP/LPEÎó²îÔÊÐí¹¥»÷Õßͨ¹ýBaitAndSwitchÊÖÒÕÌáȨÖÁNT AUTHORITY\SYSTEMȨÏÞÖ´ÐÐí§Òâpayload¡£¡£¡£Kravetsͨ¹ýÊÓÆµÑÝʾÁËÆä¹¥»÷°ì·¨£¬£¬£¬£¬×èÖ¹ÏÖÔÚVÉçÉÐδ¾ÙÐлØÓ¦¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/
6¡¢Ë¼¿ÆÐÞ¸´UCS×°±¸¼°220½»Á÷»úÖеÄ6¸öÒªº¦Îó²î

˼¿ÆÐÞ¸´ÆäUCS×°±¸¼°220ϵÁÐÆóÒµ½»Á÷»úÖеÄ6¸öÒªº¦Îó²î£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²î½ÓÊÜÄ¿µÄ×°±¸¡£¡£¡£ÆäÖÐËĸöÎó²î£¨CVE-2019-1938¡¢CVE-2019-1935¡¢CVE-2019-1974ºÍCVE-2019-1937£©µÄCVSSÆÀ·Ö¶¼Îª9.8·Ö£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁËUCS×°±¸¡£¡£¡£ÁíÍâÁ½¸öÎó²î£¨CVE-2019-1913£¬£¬£¬£¬CVSS 9.8·ÖºÍCVE-2019-1912£¬£¬£¬£¬CVSS 9.1·Ö£©ÊÇ220½»Á÷»úÖеĻº³åÇøÒç³öÎó²î£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÎó²îÖ´ÐÐí§Òâ´úÂë²¢½ÓÊܽ»Á÷»ú¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/cisco-patches-six-critical-bugs/147585/


¾©¹«Íø°²±¸11010802024551ºÅ