ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ32ÖÜ

Ðû²¼Ê±¼ä 2019-08-19

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ12ÈÕÖÁ18ÈÕ¹²ÊÕ¼Çå¾²Îó²î55¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Remote Desktop Services CVE-2019-1181ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»Microsoft Bluetooth Driver BR/EDRÃÜԿЭÉÌÎó²î£»£»£»Adobe Photoshop CC¶à¸ö¶ÑÒç³öÎó²î£»£»£»SAS Web Infrastructure Platform·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»Apache httpd mod_http2ÄÚ´æ¹ýʧӦÓþܾøÐ§ÀÍÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ΢Èí¶à¸ö¹©Ó¦É̵Ä40¶à¸öÇý¶¯³ÌÐò±£´æÌáȨÎó²î£»£»£»Sweet ChatÒâÍâй¶½ü1000ÍòÓû§µÄÕÕÆ¬¼°Ì¸ÌìÄÚÈÝ£»£»£»Î¢ÈíÐÞ¸´RDPЧÀÍÖеÄÐÂÈ䳿¼¶Îó²î£»£»£»HTTP/2ÆØ³ö8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷£»£»£»¿¨°Í˹»ùɱÈíÖеÄÎó²î¿ÉÔÊÐí¿çÕ¾µã¸ú×ÙÓû§¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£



> Ö÷ÒªÇå¾²Îó²îÁбí



1. Microsoft Windows Remote Desktop Services CVE-2019-1181ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Microsoft Windows Remote Desktop Services±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1181

2. Microsoft Bluetooth Driver BR/EDRÃÜԿЭÉÌÎó²î


Microsoft Bluetooth Driver BR/EDRÃÜԿЭÉ̱£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬½«×î´ó16×Ö½Ú³¤¶ÈµÄÃÜԿЭÉ̽µµ½1×Ö½ÚìØ£¬£¬£¬£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-9506

3. Adobe Photoshop CC¶à¸ö¶ÑÒç³öÎó²î


Adobe Photoshop CC´¦Öóͷ£Îļþ±£´æ¶ÑÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://helpx.adobe.com/security/products/photoshop/apsb19-44.html

4. SAS Web Infrastructure Platform·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î


SAS Web Infrastructure Platform±£´æ·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
http://support.sas.com/kb/63/391.html

5. Apache httpd mod_http2ÄÚ´æ¹ýʧӦÓþܾøÐ§ÀÍÎó²î


Apache httpd mod_http2 HTTP/2»á»°´¦Öóͷ£±£´æÄÚ´æ¹ýʧÒýÓÃÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£
http://httpd.apache.org/security/vulnerabilities_24.html


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢Î¢Èí¶à¸ö¹©Ó¦É̵Ä40¶à¸öÇý¶¯³ÌÐò±£´æÌáȨÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


EclypsiumÑо¿Ö°Ô±Åû¶Áè¼Ý20¼Ò΢Èí¹©Ó¦ÉÌÌṩµÄ40¶à¸öWindowsÇý¶¯³ÌÐò±£´æÌáȨÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᱻºÚ¿ÍʹÓᣡ£¡£¡£¡£ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨×ÅÃûBIOS³§É̼°¸÷´óÓ²¼þ¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬£¬ÀýÈ绪˶¡¢¶«Ö¥¡¢Intel¡¢¼¼¼Î¡¢Nvidia¡¢»ªÎªµÈ¡£¡£¡£¡£¡£ÓÉÓÚÕâЩÇý¶¯¶¼¾­ÓÉÁË΢ÈíÈÏÖ¤£¬£¬£¬£¬£¬£¬£¬Òò´Ë¶ñÒâ³ÌÐò¿ÉÒÔʹÓÃËüÃÇ´ÓÓû§¿Õ¼ä£¨Ring3£©ÌáȨÖÁÄÚºËȨÏÞ£¨Ring0£©¡£¡£¡£¡£¡£EclypsiumÌåÏÖÕâЩÇý¶¯Ó°ÏìÁËËùÓа汾µÄWindows£¬£¬£¬£¬£¬£¬£¬ÕâÒâζ×ÅÖÁÉÙÊý°ÙÍòÓû§ÃæÁÙΣº¦¡£¡£¡£¡£¡£IntelºÍ»ªÎªµÈÒѾ­Ðû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/over-40-windows-hardware-drivers-vulnerable-to-privilege-escalation/

2¡¢Sweet ChatÒâÍâй¶½ü1000ÍòÓû§µÄÕÕÆ¬¼°Ì¸ÌìÄÚÈÝ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ô±Darryl Burke·¢Ã÷̸ÌìÓ¦ÓÃSweet ChatµÄÒ»¸ö²»Çå¾²µÄЧÀÍÆ÷̻¶ÁËÁè¼Ý1000ÍòÓû§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨ÊµÊ±Ì¸ÌìÄÚÈÝÒÔ¼°Ë½ÈËÕÕÆ¬µÈ¡£¡£¡£¡£¡£BurkeÌåÏÖÈκÎÓµÓÐMQTT¹¥»÷¹¤¾ßµÄÈ˶¼¿ÉÒÔÔÚÏßÉó²éÕâЩÐÅÏ¢¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ7ÔÂ21ÈÕ֪ͨÁ˸ù«Ë¾£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Ö±ÖÁ8ÔÂ12ÈղŶԸÃЧÀÍÆ÷¾ÙÐÐÁËÔÝʱÐÞ¸´¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.burke-consulting.net/sweet-chat/

3¡¢Î¢ÈíÐÞ¸´RDPЧÀÍÖеÄÐÂÈ䳿¼¶Îó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


΢ÈíÔÚ8Ô·ݵÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË94¸öÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨4¸öеÄRDPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1181¡¢CVE-2019-1182¡¢CVE-2019-1222¡¢CVE-2019-1226£©¡£¡£¡£¡£¡£ÆäÖÐCVE-2019-1181ºÍCVE-2019-1182Óë5ÔÂ·ÝÆØ³öµÄBlueKeepÎó²î£¨CVE-2019-0708£©ÀàËÆ£¬£¬£¬£¬£¬£¬£¬¿ÉʵÏÖÈ䳿»¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄϵͳ°æ±¾°üÀ¨win 7 SP1¡¢win 8.1¡¢win 10ÒÔ¼°windows server 2008 R2 SP1¡¢2012¡¢2012 R2¡¢2016¼°2019µÈ¡£¡£¡£¡£¡£XP¡¢windows server 2003¼°2008²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷ÕâЩÎó²îÔÚÒ°ÍⱻʹÓ㬣¬£¬£¬£¬£¬£¬µ«Î¢ÈíÇ¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üÐÂÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-fixes-critical-windows-10-wormable-remote-desktop-flaws/

4¡¢HTTP/2ÆØ³ö8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫDoS¹¥»÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ñо¿Ö°Ô±Åû¶HTTP/2ЭÒéʵÏÖÖеÄ8¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏòδÐÞ²¹µÄЧÀÍÆ÷Ìᳫ¾Ü¾øÐ§À͹¥»÷¡£¡£¡£¡£¡£ÕâЩÎó²î£¨CVE-2019-9511~CVE-2019-9518£©ÊÇÓÉNetflixÑо¿Ô±Jonathan LooneyÒÔ¼°GoogleÑо¿Ô±Piotr Sikora·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ´¥·¢Ð§ÀÍÆ÷µÄ×ÊÔ´ºÄ¾¡£¬£¬£¬£¬£¬£¬£¬µ«²»¿ÉÓÃÓÚÈëÇÖЧÀÍÆ÷¡£¡£¡£¡£¡£Æ¾Ö¤CERTÐû²¼µÄͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨NGINX¡¢Apache¡¢H2O¡¢Nghttp2¡¢Microsoft(IIS)¡¢Cloudflare¡¢Akamai¡¢Apple(SwiftNIO)¡¢Amazon¡¢Facebook(Proxygen)¡¢Node.jsÒÔ¼°Envoy proxy£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼³§É̶¼ÒѾ­Ðû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/http2-dos-vulnerability.html

5¡¢¿¨°Í˹»ùɱÈíÖеÄÎó²î¿ÉÔÊÐí¿çÕ¾µã¸ú×ÙÓû§

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ô±Ronald Eikenberg·¢Ã÷¿¨°Í˹»ùµÄɱ¶¾Èí¼þ±£´æÒ»¸öÎó²î£¨CVE-2019-8286£©£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¶ñÒâÕ¾µã»òµÚÈý·½Ð§ÀÍ¿çÕ¾µã¸ú×ÙÓû§¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÒ»¸öÃûΪKaspersky URL AdvisorµÄ꿅წÃèÄ£¿£¿£¿£¿£¿£¿éÖУ¬£¬£¬£¬£¬£¬£¬¸ÃÄ£¿£¿£¿£¿£¿£¿éÔÚÓû§ä¯ÀÀµÄÍøÒ³ÖÐ×¢ÈëUUIDÀ´±ê¼ÇÓû§£¬£¬£¬£¬£¬£¬£¬µ«¶ñÒâÍøÕ¾¿É»ñÈ¡¸ÃUUID²¢¸ú×ÙÓû§¡£¡£¡£¡£¡£ÔÚ½Óµ½±¨¸æºó£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ù½«¸ÃUUID¸ü¸ÄΪһ¸ö³£Á¿¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kaspersky-antivirus-online-tracking.html