¿¨°Í˹»ù2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ£»11¸öRuby¿â±£´æºóÃÅ£»SteamÌáȨ0day

Ðû²¼Ê±¼ä 2019-08-22
1¡¢¿¨°Í˹»ùÐû²¼2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ¾ÙÐе÷ÑÐ £¬ÕûÀí²¢Ðû²¼ÁË¡¶2019Äê¹¤ÒµÍøÂçÇ徲״̬¡·±¨¸æ ¡£Æ¾Ö¤¸Ã±¨¸æ £¬È¥ÄêÁè¼ÝÒ»°ë£¨52%£©µÄ¹¤¿ØÇå¾²ÊÂÎñÊÇÓÉÈËΪʧÎóµ¼ÖµÄ ¡£ËäÈ»¾ø´ó´ó¶¼¹«Ë¾£¨81£¥£©ÍýÏë¾ÙÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0 £¬µ«·ÖÅÉÁËÍøÂçÇå¾²Ô¤ËãµÄÈ´Éٵöࣨ57£¥£© ¡£³ý´ËÖ®Íâ £¬ÕâЩ¹«Ë¾µÄÍøÂçÇå¾²ÊÖÒÕÈÔÈ»ÁîÈ˵£ÐÄ£ºÊÜ·ÃÕßµÄÁ½´óµ£Ðļ¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂçÇ徲ר¼ÒÀ´¹ÜÀí¹¤ÒµÍøÂç £¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±éȱ·¦Çå¾²Òâʶ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/


2¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Êé

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®ÓÚÉϸöÔ½ÒÏþµÄ¸ùÖ¤Êé £¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿ ¡£Æäʱ¹þÈø¿Ë˹̹Õþ¸®ÒªÇó¸Ã¹úISPºÏ×÷ £¬Ç¿ÖÆÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé ¡£ÏÖÔÚµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ £¬½«×èÖ¹ÅþÁ¬²¢ÏÔʾ¹ýʧÐÅÏ¢ ¡£¹þÈø¿Ë˹̹Õþ¸®ÒѾ­ÔÚ8Ô³õ×èÖ¹ÁËÕâÒ»ÍýÏë £¬Ò»Ãû¹ÙÔ±ÌåÏÖÕû¸öÍýÏëÖ»ÊÇÕþ¸®µÄÒ»¸ö²âÊÔ ¡£µ«ÈÔÓÐÊý°ÙÍò×°±¸ÈÔÔÚʹÓøÃÖ¤Êé ¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html


3¡¢Ñо¿Ö°Ô±·¢Ã÷11¸öRuby¿âÖб£´æºóÃÅ´úÂë

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

RubyGemsɾ³ýÁË18¸ö°üÀ¨ºóÃÅ´úÂëµÄRuby¿â¶ñÒâ°æ±¾ £¬ÕâЩ¶ñÒâ°æ±¾ÊôÓÚ11¸ö²î±ðµÄRuby¿â £¬×Ô7ÔÂ8ÈÕÒÔÀ´ £¬ÕâЩ¶ñÒâ°æ±¾ÒѾ­±»ÏÂÔØÁË3584´Î ¡£±»Ö²ÈëµÄºóÃÅ´úÂë¿ÉÔÚÆäËûÈ˵ÄRubyÏîÄ¿ÖпªÕ¹ÒþÄäµÄ¶ñÒâÍÚ¿óÔ˶¯ ¡£ºÉÀ¼¿ª·¢ÕßJan DintelÊ×ÏÈÔÚrest-client¿âÖз¢Ã÷Á˶ñÒâ´úÂë £¬ËüÃÇ»áÍøÂçURLºÍϵͳÇéÐÎÐÅÏ¢²¢·¢ËÍÖÁÎÚ¿ËÀ¼µÄ·þÎñÆ÷ ¡£¾­ÓÉÊÓ²ìºóRubyGemsÔ±¹¤·¢Ã÷Á˸ü¶à¿âÊܵ½ÎÛȾ £¬Ïêϸ°æ±¾ÁбíÇë²Î¿¼Á´½Ó ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/


4¡¢¶íÂÞ˹·¸·¨ÍÅ»ïSilence½«Ä¿µÄÀ©Õ¹ÖÁÈ«ÇòÒøÐÐ


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ƾ֤Group-IBÐû²¼µÄ¡¶Silence 2.0£º×ßÏòÈ«Çò¡·±¨¸æ £¬×Ô2018Äê9Ô·ÝÒÔÀ´ £¬Í¨¹ýÔöÌí¹¥»÷ƵÂʵķ½·¨ £¬¸Ã¶íÂÞ˹·¿·¸·¨ÍÅ»ïÒѾ­ÇÔÈ¡Á˽ü350ÍòÃÀÔªµÄ×ʽð ¡£ÔÚÒÑÍùÒ»ÄêÖÐ £¬¸ÃÍÅ»ïÖÁÉÙÌᳫÁË16¸öй¥»÷Ô˶¯ £¬Ãé×¼ÁË30¸ö¹ú¼ÒµÄÒøÐÐ £¬Ä¿µÄÇøÓòºá¿çÅ·ÖÞ¡¢À­¶¡ÃÀÖÞ¡¢·ÇÖÞºÍÑÇÖÞ ¡£ÆäÔì³ÉµÄËðʧÔöÌíÁË5±¶ £¬´Ó80ÍòÃÀÔªÔöÌíÖÁ420ÍòÃÀÔª ¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/silence-apt-russian-hackers.html

5¡¢Ñо¿Ö°Ô±Åû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

¶íÂÞ˹Ñо¿Ö°Ô±Vasily KravetsÅû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day £¬¸ÃÎó²îÖ»Ó°ÏìÁËWindows¿Í»§¶Ë £¬Æ¾Ö¤SteamµÄÊý¾Ý £¬Ô¼ÓÐ9600ÍòÓû§ÊÜÓ°Ïì ¡£¸ÃEoP/LPEÎó²îÔÊÐí¹¥»÷Õßͨ¹ýBaitAndSwitchÊÖÒÕÌáȨÖÁNT AUTHORITY\SYSTEMȨÏÞÖ´ÐÐí§Òâpayload ¡£Kravetsͨ¹ýÊÓÆµÑÝʾÁËÆä¹¥»÷°ì·¨ £¬×èÖ¹ÏÖÔÚVÉçÉÐδ¾ÙÐлØÓ¦ ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/

6¡¢Ë¼¿ÆÐÞ¸´UCS×°±¸¼°220½»Á÷»úÖеÄ6¸öÒªº¦Îó²î

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

˼¿ÆÐÞ¸´ÆäUCS×°±¸¼°220ϵÁÐÆóÒµ½»Á÷»úÖеÄ6¸öÒªº¦Îó²î £¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²î½ÓÊÜÄ¿µÄ×°±¸ ¡£ÆäÖÐËĸöÎó²î£¨CVE-2019-1938¡¢CVE-2019-1935¡¢CVE-2019-1974ºÍCVE-2019-1937£©µÄCVSSÆÀ·Ö¶¼Îª9.8·Ö £¬ÕâЩÎó²îÓ°ÏìÁËUCS×°±¸ ¡£ÁíÍâÁ½¸öÎó²î£¨CVE-2019-1913 £¬CVSS 9.8·ÖºÍCVE-2019-1912 £¬CVSS 9.1·Ö£©ÊÇ220½»Á÷»úÖеĻº³åÇøÒç³öÎó²î £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÎó²îÖ´ÐÐí§Òâ´úÂë²¢½ÓÊܽ»Á÷»ú ¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/cisco-patches-six-critical-bugs/147585/