Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î£» £»Î¢ÈíOAuthÑéÖ¤Àú³Ì±£´æÎó²î£¬ £¬£¬£¬¿Éµ¼ÖÂAzureÕÊ»§±»½ÓÊÜ

Ðû²¼Ê±¼ä 2019-12-04

1.Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


SafeBreach LabsÑо¿Ö°Ô±Åû¶Autodesk¡¢Ç÷ÊÆ¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLLÐ®ÖÆÎó²î¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Çå¾²Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬 £¬£¬£¬¸ÃÎó²î±£´æÓÚcoreServiceShell.exe×é¼þÖС£¡£¡£¡£¡£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû¾ÙÐÐÑéÖ¤£¬ £¬£¬£¬Òò´Ë¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐí§ÒâDLL£¬ £¬£¬£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³¤ÆÚÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£¡£¡£¡£¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²»®·ÖÊܵ½ÀàËÆµÄÎó²îCVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/


2.΢ÈíOAuthÑéÖ¤Àú³Ì±£´æÎó²î£¬ £¬£¬£¬¿Éµ¼ÖÂAzureÕÊ»§±»½ÓÊÜ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


CyberArkÇå¾²Ñо¿Ô±Omer Tsarfati·¢Ã÷΢ÈíµÄÓ¦ÓóÌÐòʹÓÃOAuth¾ÙÐеÚÈý·½Éí·ÝÑéÖ¤µÄ·½·¨Öб£´æÇå¾²Îó²î£¬ £¬£¬£¬¿ÉÄÜʹ¹¥»÷Õß½ÓÊÜÓû§µÄAzureÔÆÕÊ»§¡£¡£¡£¡£¡£OAuthÊÇÒ»ÖÖÉí·ÝÑé֤ЭÒ飬 £¬£¬£¬ÔÊÐíÓ¦ÓóÌÐòÓëµÚÈý·½ÍøÕ¾»òÈí¼þ¹²ÏíÓû§ÕË»§Êý¾Ý¡£¡£¡£¡£¡£ÔÚ΢ÈíµÄOAuthÊÚȨÁ÷³ÌÖУ¬ £¬£¬£¬µÚÈý·½½«ÊǾ­ÓÉ΢ÈíÅú×¼µÄ°×Ãûµ¥URL¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩ±»ÐÅÈεİ×Ãûµ¥URLÖаüÀ¨Ò»Ð©Î´ÔÚAzureÃÅ»§ÖÐ×¢²áµÄURL£¬ £¬£¬£¬ÀýÈç.cloudapp.net¡¢.azurewebsites.netºÍ.{vm_region}.cloudapp.azure.com¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÖÁÉÙÓÐ54¸öÀàËÆµÄ×ÓÓòδÔÚδÔÚAzureÃÅ»§ÖÐ×¢²á£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý×¢²áÕâЩÓòÀ´»á¼û΢ÈíÓû§µÄÊý¾Ý¡£¡£¡£¡£¡£Î¢ÈíÔÚ11ÔÂ19ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/


3.¹È¸èÐû²¼12ÔÂAndroidÇå¾²¸üУ¬ £¬£¬£¬ ÐÞ¸´¶à¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¹È¸èµÄ12ÔÂAndroidÇå¾²¸üÐÂÓÉ2019-12-01ºÍ2019-12-05Á½¸öÇå¾²²¹¶¡³ÌÐò¼¶±ð×é³É£¬ £¬£¬£¬ÆäÖÐ2019-12-01²¹¶¡°üÖÐÐÞ¸´ÁË15¸öÎó²î¡£¡£¡£¡£¡£×îÑÏÖØµÄÎó²îÊÇFramework×é¼þÖеÄDoSÎó²îCVE-2019-2232£¬ £¬£¬£¬¸ÃÎó²îÓ°ÏìÁËAndroid°æ±¾8.0¡¢8.1¡¢9ºÍ10£¬ £¬£¬£¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÐÂÎŵ¼ÖÂÓÀÊÀ¾Ü¾øÐ§ÀÍ¡£¡£¡£¡£¡£ÆäËüÑÏÖØµÄÎó²î»¹°üÀ¨Media¿ò¼ÜÖеÄÒªº¦Îó²îCVE-2019-2222ºÍCVE-2019-2223£¬ £¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÌØÈ¨Àú³ÌµÄÉÏÏÂÎÄÖÐÖ´ÐдúÂë¡£¡£¡£¡£¡£±¾´ÎÇå¾²¸üÐÂÖиßͨ±ÕÔ´×é¼þÐÞ¸´ÁË22¸öÎó²î£¬ £¬£¬£¬ÊÜÓ°ÏìµÄ×é¼þ°üÀ¨¶àģʽºô½Ð´¦Öóͷ£Æ÷¡¢¿í´øÂë·Ö¶àÖ·ºÍµ÷ÖÆ½âµ÷Æ÷µÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://source.android.com/security/bulletin/2019-12-01


4.ÃÀ¹úÇ¹Ö§ÖÆÔìÉÌSmith£¦WessonÔâMageCart¹¥»÷


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÃÀ¹úÇ¹Ö§ÖÆÔìÉÌSmith£¦WessonµÄÔÚÏßÊÐËÁÔâµ½Magecart¹¥»÷£¬ £¬£¬£¬¿Í»§Ö§¸¶ÐÅÏ¢¿ÉÄܱ»ÇÔ¡£¡£¡£¡£¡£Æ¾Ö¤Sanguine SecurityµÄÑо¿Ö°Ô±Willem de GrootµÄ˵·¨£¬ £¬£¬£¬Smith£¦WessonµÄÍøÕ¾ÔÚÐþÉ«ÐÇÆÚÎå֮ǰÒѾ­±»ÈëÇÖ£¬ £¬£¬£¬²¢ÇÒÖ»Õë¶ÔÃÀ¹úIPµØµãµÄ¿Í»§¡£¡£¡£¡£¡£Í¨Ë׿ͻ§ÔÚ»á¼û¸ÃÍøÕ¾Ê±Ö»»áÏÂÔØÒ»¸ö11KBµÄÕý³£JavaScript¾ç±¾£¬ £¬£¬£¬µ«ÃÀ¹úIPµÄ¿Í»§ÔÚ»á¼ûʱÔò»áÏÂÔØÒ»¸ö20KBµÄ¶ñÒâ¾ç±¾£¬ £¬£¬£¬²¢ÏÔʾαÔìµÄÖ§¸¶Ò³Ãæ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/smith-and-wesson-web-site-hacked-to-steal-customer-payment-info/


5.°Ä´óÀûÑÇMonash IVFÔ±¹¤ÓÊÏä±»ºÚ¿ÍÈëÇÖ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


°Ä´óÀûÑÇ×î´óµÄÊÔ¹ÜÓ¤¶ùЧÀÍÉÌMonash IVFÖÒÑÔ»¼Õ߯ä¶àÃûÔ±¹¤µÄµç×ÓÓÊÏäÔâµ½´¹ÂÚ¹¥»÷£¬ £¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄÊ×ϯִÐйÙMichael KnaapÓÚ11ÔÂ6ÈÕÈ·ÈÏ£¬ £¬£¬£¬ºÚ¿Í»á¼ûÁ˶àÃûÔ±¹¤µÄµç×ÓÓʼþ¡¢ÓÊÏ䵨µãºÍͨѶ¼£¬ £¬£¬£¬ÆäÖÐһЩÓʼþÖпÉÄܰüÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬£¬ÀýÈçÐÕÃûºÍÁªÏµ·½·¨¡¢ÅäżÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢Ö°Òµ¡¢²ÆÎñÊý¾Ý¡¢Ò½Áưü¹ÜÐÅÏ¢¡¢¼à¿ØÐÅÏ¢¡¢¼ÝÕÕ»ò»¤ÕÕID¼°²¡ÀúµÈ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾ­Í¨ÖªÁ˰ĴóÀûÑÇÐÅϢרԱ°ì¹«ÊҺͰĴóÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©£¬ £¬£¬£¬²¢¶Ô´ËÊÂÎñÕö¿ªÊӲ졣¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.smh.com.au/national/fears-over-patient-data-breach-after-cyber-attack-on-monash-ivf-20191203-p53gj0.html


6.Tuft£¦NeedleÒâÍâй¶23.6Íò¸ö¿Í»§¿ìµÝ±êÇ©


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


´²ÉÏÓÃÆ·¹«Ë¾Tuft£¦NeedleÒâÍ⽫236400¸ö¿Í»§µÄ¿ìµÝ±êÇ©ÒÅÁôÔڿɹûÕæ»á¼ûµÄAWS´æ´¢Í°ÖУ¬ £¬£¬£¬Ê¹µÃÈκÎÈ˶¼¿É»á¼û¿Í»§µÄÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£ÕâЩ±êÇ©ÊÇÔڸù«Ë¾ÓÚ2014ÄêÖÁ2017ÄêÖ®¼ä½¨ÉèµÄ¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚÓ¢¹úµÄÇå¾²³§ÉÌFidus Information Security·¢Ã÷ÁË̻¶µÄÊý¾Ý²¢¾ÙÐÐÁËÑéÖ¤¡£¡£¡£¡£¡£Tuft£¦NeedleÔÚ½Óµ½±¨¸æºóѸËٹرÕÁ˸ô洢ͰµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/12/02/tuft-and-needle-exposed-shipping-labels/