¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190122

Ðû²¼Ê±¼ä 2019-01-22
1¡¢Æ¾Ö¤GDPRÌõÀý £¬£¬£¬£¬ £¬·¨¹úÊý¾Ýî¿Ïµ»ú¹¹¶ÔGoogle·£¿£¿£¿î5000ÍòÅ·Ôª

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤ŷÃËÓÚ2018Äê5ÔÂÉúЧµÄGDPRÌõÀý £¬£¬£¬£¬ £¬·¨¹úÊý¾Ý±£»£»£»£»£»¤î¿Ïµ»ú¹¹CNIL¶ÔGoogle·¢³öÁË5000ÍòÅ·Ôª£¨Ô¼ºÏ5700ÍòÃÀÔª£©µÄ·£µ¥¡£¡£CNIL³ÆÕâ±Ê·£¿£¿£¿îµÄÔµ¹ÊÔ­ÓÉÊÇGoogle¹«Ë¾¡°È±·¦Í¸Ã÷¶È¡¢ÐÅÏ¢²î³Ø³ÆÒÔ¼°ÔÚ¸öÐÔ»¯¹ã¸æ·½ÃæÃ»ÓлñµÃÓû§µÄÓÐÓÃÔ޳ɡ±¡£¡£ÕâÊÇCNILÒÀ¾ÝGDPR¿ª³öµÄÊ×ÕÅ·£µ¥¡£¡£Google»ØÓ¦³Æ¡°ÎÒÃǺÜÊÇÖÂÁ¦ÓÚÖª×ãÈËÃǶÔÊý¾Ý͸Ã÷¶ÈµÄÆÚÍûºÍGDPRµÄÒªÇó £¬£¬£¬£¬ £¬ÎÒÃÇÕýÔÚÑо¿¾öÒéÎÒÃǽÓÏÂÀ´µÄ°ì·¨¡£¡£¡±¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/google-privacy-gdpr-fine.html


2¡¢ÃÀ¹úÃñÖ÷µ³³ÆÖÐÆÚÑ¡¾ÙÖ®ºóÔâµ½¶íÂÞ˹ºÚ¿Í´¹ÂÚ¹¥»÷

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



ƾ֤1ÔÂ17ÈÕÃÀ¹úÃñÖ÷µ³ÌìÏÂίԱ»á£¨DNC£©Ìá½»µÄÎļþ £¬£¬£¬£¬ £¬ÔÚ2018ÄêÖÐÆÚÑ¡¾ÙÖ®ºóDNCÔÙ´ÎÔâµ½¶íÂÞ˹ºÚ¿ÍµÄ´¹ÂÚ¹¥»÷¡£¡£ÔÚÕâЩÎļþÖÐ £¬£¬£¬£¬ £¬DNCÌåÏÖ£º¡°2018Äê11ÔÂ14ÈÕÊýÊ®¸öDNCµç×ÓÓʼþµØµã³ÉΪÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷µÄÄ¿µÄ £¬£¬£¬£¬ £¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢ÕâЩ¹¥»÷»ñµÃÁËÀֳɡ±¡£¡£DNC͸¶³ÆÕâÐ©ÍøÂç´¹ÂÚ¹¥»÷±³ºóµÄ¹¥»÷ÕßÓë¶íÂÞ˹ºÚ¿Í×éÖ¯Cozy Bear£¨APT29£©±£´æ¹ØÁª¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-attack-allegedly-targeted-us-dnc-after-2018-midterms/


3¡¢MySQLÉè¼ÆÈ±ÏÝÔÊÐí¶ñÒâЧÀÍÆ÷´Ó¿Í»§¶ËÇÔÈ¡Îļþ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤Çå¾²Ñо¿Ö°Ô±Willem de GrootÔÚRedditÉϵÄÌÖÂÛÌû £¬£¬£¬£¬ £¬2018Äê10ÔÂMagecartÏò¹ºÎïÍøÕ¾×¢Èë¶ñÒâ´úÂëÊÇʹÓÃÁËAdminer£¨Ò»¸öÖÎÀíPostgreSQLºÍMySQLÊý¾Ý¿âµÄ¹¤¾ß£©ÖеÄÎó²î £¬£¬£¬£¬ £¬»ù´¡Ôµ¹ÊÔ­ÓÉÊÇMySQLЭÒéÉè¼ÆÖеÄȱÏÝ¡£¡£¶ñÒâµÄMySQLЧÀÍÆ÷¿ÉÒÔʹÓÃLOAD DATA LOCALÏÂÁîÀ´¶ÁÈ¡MYSQL¿Í»§¶ËµÄí§ÒâÎļþ¡£¡£Õâ¸öȱÏÝÊǸöÓÉÀ´ÒѾõÄÎÊÌâ £¬£¬£¬£¬ £¬GitHubÉϾÍÓжñÒâMySQLЧÀÍÆ÷µÄ´úÂë¡£¡£Adminer°æ±¾4.3.1µ½4.6.2Êܵ½¸ÃÎó²îµÄÓ°Ïì £¬£¬£¬£¬ £¬½¨ÒéÓû§¸üÐÂÖÁAdminer4.6.3Ö®ºóµÄ°æ±¾¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mysql-design-flaw-allows-malicious-servers-to-steal-files-from-clients/


4¡¢ÈÕ±¾Omron¹«Ë¾ÐÞ¸´HMI²úÆ·ÖеÄDoSºÍRCEÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÈÕ±¾Å·Ä·Áú£¨Omron£©¹«Ë¾Ðû²¼CX-Supervisor²úÆ·µÄÇå¾²¸üР£¬£¬£¬£¬ £¬ÐÞ¸´¿Éµ¼ÖÂDoSºÍRCEµÄ¶à¸öÇå¾²Îó²î¡£¡£CX-SupervisorÊÇSCADAϵͳµÄHMI¿ØÖÆÆ÷ £¬£¬£¬£¬ £¬Æ¾Ö¤ICS-CERTµÄ±¨¸æ £¬£¬£¬£¬ £¬¸Ã¹¤¾ß±»ÆÕ±éÓÃÓÚÈ«ÇòµÄÄÜÔ´ÁìÓò¡£¡£Source InciteµÄÑо¿Ô±Esteban Ruiz·¢Ã÷ÁËÕâЩÎó²î £¬£¬£¬£¬ £¬Îó²î¹æÄ£°üÀ¨use-after-free¡¢Óû§ÊäÈëȱ·¦ÑéÖ¤ÒÔ¼°¿Éµ¼ÖÂí§Òâ´úÂë/ÏÂÁîÖ´ÐеÄÀàÐÍ»ìÏýÎÊÌâ¡£¡£Å·Ä·ÁúÔÚCX-Supervisor 3.5.0.11ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/flaws-omron-hmi-product-exploitable-malicious-project-files


5¡¢iOS 12.1.2Îó²î¿É»ñÈ¡rootȨÏÞ £¬£¬£¬£¬ £¬Ó°ÏìiPhone XSµÈÐÂÒ»´úÊÖ»ú

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Á½Î»Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËiOS 12.1.2ÖеÄÇå¾²Îó²î £¬£¬£¬£¬ £¬ËùÓÐÐÂÒ»´úµÄiPhone¶¼Êܵ½Ó°Ïì £¬£¬£¬£¬ £¬°üÀ¨iPhone XS¡¢iPhone XS MaxºÍiPhone XR¡£¡£Ñо¿Ö°Ô±Í¨¹ýPort-Oriented Programming£¨POP£©¹¥»÷»ñµÃÁËiPhoneÉϵÄrootȨÏÞ £¬£¬£¬£¬ £¬²¢ÈƹýÁËPACϵͳ¡£¡£Ñо¿Ö°Ô±ÔÚTwitterÉÏÐû²¼ÁËËûÃǵÄÑо¿Ð§¹û¡£¡£ËäÈ»ÈÆ¹ýPACʹµÃiOS 12.1.2Ô½Óü±äµÃÔ½·¢ÈÝÒ× £¬£¬£¬£¬ £¬µ«ÓÉÓÚûÓйûÕæ¿ÉÓõÄexploit £¬£¬£¬£¬ £¬ÕâÒ²Ðí²¢²»»áºÜ¿ì±¬·¢¡£¡£


Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/security-exploit-in-ios-12-1-2-on-iphone-xs-discovered-524621.shtml


6¡¢Ë¼¿ÆSMB½»Á÷»ú±£´æÉÐδÐÞ¸´µÄÇå¾²Îó²î £¬£¬£¬£¬ £¬¿Éµ¼ÖÂ×°±¸±»½ÓÊÜ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



˼¿ÆSMB£¨ÖÐСÐÍÆóÒµ£©½»Á÷»úÖб£´æÒ»¸öÉÐδÐÞ¸´µÄÇå¾²Îó²î £¬£¬£¬£¬ £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²î»ñµÃ×°±¸µÄÍêÕû¿ØÖÆÈ¨¡£¡£¸ÃÎó²î£¨CVE-2018-15439£©µÄCVSSÆÀ·ÖΪ9.8·Ö £¬£¬£¬£¬ £¬Æ¾Ö¤Ë¼¿ÆµÄÇ徲ת´ï £¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄ×°±¸ÔÚÌØ¶¨ÇéÐÎÏ»áÆôÓÃÌØÈ¨ÕË»§ £¬£¬£¬£¬ £¬²¢ÇÒ²»»á֪ͨϵͳÖÎÀíÔ± £¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓôËÕË»§µÇ¼ºÍ½ÓÊÜ×°±¸¡£¡£¸ÃÎó²îÄ¿½ñ»¹Ã»ÓÐÐÞ¸´²¹¶¡ £¬£¬£¬£¬ £¬µ«ÖÎÀíÔ±¿ÉÔÚ×°±¸ÉèÖÃÖÐÌí¼Óuser IDΪadminµÄÕË»§²¢½«È¨ÏÞÉèÖÃΪ15À´½ûÓôËÌØÈ¨ÕË»§¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/80114/security/cve-2018-15439-cisco-soho.html


ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí