Nagios XIÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-20197£© £» £»£»£»Õë¶ÔFPGA-CPU»ìÏýƽ̨µÄJackHammer¹¥»÷

Ðû²¼Ê±¼ä 2020-01-03


1.È«Çò8.15ÒÚÖÇÄÜÑïÉùÆ÷ÖÐÓÐÒ»°ëʹÓû§ÒþË½ÃæÁÙΣº¦


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¹ú¼ÊÊý¾Ý¹«Ë¾£¨IDC£©¾ÙÐеÄÒ»ÏîÊÓ²ìÏÔʾ£¬£¬£¬ £¬£¬ÔÚÈ«ÇòÔËÓªµÄ8.15ÒÚ¸öÖÇÄÜÑïÉùÆ÷ÖУ¬£¬£¬ £¬£¬ÏÕЩÓÐÒ»°ëÕýÔÚÍþвÓû§µÄÒþ˽¡£¡£¡£¡£ÕâÊÇIDC¶ÔÈ«Çò8.15ÒÚ¸öÖÇÄÜÑïÉùÆ÷¡¢¼à¿ØÉãÏñÍ·ÒÔ¼°ÆäËûÖÇÄÜ×°±¸£¨ÀýÈçÖÇÄܵçÊÓ£©¾ÙÐÐÑо¿Ê±·¢Ã÷µÄ¡£¡£¡£¡£Ò»¸ö¸üÓÐȤµÄ·¢Ã÷ÊÇ£¬£¬£¬ £¬£¬ÕâЩװ±¸´ó´ó¶¼¶¼ÊÇ×÷ΪÀñÎï³öÊ۵ġ£¡£¡£¡£ÈôÊÇÓû§ÍýÏëʹÓÃÕâЩװ±¸£¬£¬£¬ £¬£¬½¨ÒéËûÃǰ´°ì·¨²Ù×÷ÒÔ×îºéÁ÷ƽµØ½µµÍÆäÇÔÌýÄÜÁ¦¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×°±¸ÀàÐÍ¿ÉÄܰüÀ¨ÖÇÄÜÑïÉùÆ÷»òÖÇÄÜÊÖ±í¡¢Çå¾²ÉãÏñÍ·»ò±£Ä·ÉãÏñÍ·¡¢ÖÇÄÜÃÅËø¡¢ÖÇÄܵçÊÓÒÔ¼°ÖÇÄÜÍæ¾ß¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cybersecurity-insiders.com/half-of-the-global-815-million-smart-speakers-are-putting-users-privacy-at-risk/


2.Ñо¿Ö°Ô±ÑÝʾÕë¶ÔFPGA-CPU»ìÏýƽ̨µÄJackHammer¹¥»÷


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔÚ2019Äê12ÔÂ31ÈÕÐû²¼µÄһƪÐÂÂÛÎÄÖУ¬£¬£¬ £¬£¬Ò»ÈºÃÀ¹úºÍµÂ¹úѧÕßÑÝʾÁËÔõÑùʹÓÃÏÖ³¡¿É±à³ÌÃÅÕóÁУ¨FPGA£©¿¨À´Ìᳫ¸ü¿ìºÍ¸ü¿É¿¿µÄJackHammer¹¥»÷¡£¡£¡£¡£FPGAÊÇ¿ÉÒÔÌí¼Óµ½ÅÌËã»úϵͳ£¨Ì¨Ê½»ú»òЧÀÍÆ÷£©µÄ¸½¼Ó¿¨£¬£¬£¬ £¬£¬½üÄêÀ´FPGAÒѾ­³ÉÎªÔÆÅÌËãÇéÐÎÖеÄÒ»ÖÖ³£¼û²úÆ·£¬£¬£¬ £¬£¬°¢ÀïÔÆºÍAWS¾ù¿ÉΪ¿Í»§Ìṩ»ùÓÚFPGAµÄЧÀÍÆ÷ʵÀý£¬£¬£¬ £¬£¬Î¢Èí»¹ÖÂÁ¦ÓÚÔÚAzureÄÚ²¿¼¯³É»ùÓÚFPGAµÄÊÖÒÕ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µ±´ÓÓû§ÉèÖõÄFPGAÖÐÆô¶¯¹¥»÷´úÂëʱ£¬£¬£¬ £¬£¬Óë´ÓCPU¹¥»÷Ïà±È¿ÉÒÔ¸üÓÐÓõØÒýÆðλ·­×ª²¢ÒÔ¸ü¿ìµÄËÙÂʾÙÐвÙ×÷£¬£¬£¬ £¬£¬ÕâÊÇÓÉÓÚFPGA¿¨Ö±½ÓÅþÁ¬Ëæ´¦Öóͷ£Æ÷µÄ×ÜÏߣ¬£¬£¬ £¬£¬´Ó¶ø¿ÉÒÔÖ±½Ó²»ÊÜÏÞÖÆµØ»á¼ûCPU»º´æºÍRAM´æ´¢Æ÷£¬£¬£¬ £¬£¬±ðµÄFPGA²»±Ø´¦Öóͷ£¹Ì¼þºÍOSÈí¼þ£¬£¬£¬ £¬£¬´Ó¶øÊ¹ÆäÔËÐдúÂëµÄËÙÂʱÈͨË×CPU¸ü¿ì¡£¡£¡£¡£WolfSSLÔÚ12ÔÂ20ÈÕÐû²¼µÄ4.3.0°æ±¾ÖаüÀ¨ÁËÒ»¸öÎó²î£¨CVE-2019-19962£©µÄÐÞ¸´³ÌÐò£¬£¬£¬ £¬£¬ÓÃÓÚ±ÜÃ⻺ºÍ½âJackHammer¹¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fpga-cards-can-be-abused-for-faster-and-more-reliable-rowhammer-attacks/


3.²ÍÒûÓéÀÖ¹«Ë¾LandryѬȾ¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬¿Í»§Ö§¸¶ÐÅϢй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÃÀ¹ú²ÍÒû¡¢×¡ËÞ¼°ÓéÀÖ¹«Ë¾Landry֪ͨ¿Í»§ÆäÖ§¸¶¿¨Êý¾Ý¿ÉÄÜÔÚÇå¾²ÊÂÎñÖÐй¶¡£¡£¡£¡£Æ¾Ö¤ÆäÍøÕ¾ÉÏÐû²¼µÄ֪ͨ£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÌåÏÖ¶ñÒâÈí¼þÖ÷Òª´ÓÆä¾Æ°ÉºÍ·¹µêÍøÂçÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê3ÔÂ13ÈÕµ½2019Äê10ÔÂ17ÈÕʱ´ú£¬£¬£¬ £¬£¬ÓÐ63¸ö¾Æ°ÉºÍ²ÍÌüÆ·ÅÆÊܵ½Ó°Ïì¡£¡£¡£¡£LandryÌåÏÖÔÚ2016Ä걬·¢Ö§¸¶¿¨Ð¹Â¶ÊÂÎñÖ®ºó£¬£¬£¬ £¬£¬ËûÃÇʵÑéÁËÒ»ÖÖÇå¾²½â¾ö¼Æ»®£¬£¬£¬ £¬£¬Í¨¹ý¶Ëµ½¶Ë¼ÓÃÜÀ´Òþ²Ø¿Í»§µÄÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£µ«¸ÃÇå¾²¹¦Ð§½öÊÊÓÃÓÚPoSÖÕ¶Ë£¬£¬£¬ £¬£¬¶Ô¾Æ°ÉºÍ²ÍÌüµÄ¶©µ¥ÊäÈëϵͳûÓÐÓ°Ïì¡£¡£¡£¡£LandryÌåÏÖÊÂÎñµÄÔµ¹ÊÔ­ÓÉ¿ÉÄÜÊÇЧÀÍÔ±¹ýʧµØÔÚ¶©µ¥ÊäÈëϵͳÉÏË¢Á˿ͻ§µÄÖ§¸¶¿¨£¬£¬£¬ £¬£¬Òò´Ë¸Ã¹«Ë¾ÒÔΪֻÓÐÉÙÊýÓû§Êܵ½Ó°Ïì¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/landrys-notifies-customers-of-payment-card-incident/


4.¿ÆÂÞÀ­¶àÖݰÂÂÞÀ­ÊÐË®Îñ²¿·Öй¶²¿·Ö¿Í»§Òþ˽ÐÅÏ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¿ÆÂÞÀ­¶àÖݰÂÂÞÀ­ÊÐË®Îñ²¿·Ö³Æ²¿·Ö¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒòÊý¾Ýй¶¶øÊܵ½Ë𺦣¬£¬£¬ £¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2019Äê8ÔÂ30ÈÕÖÁ10ÔÂ14ÈÕʱ´úʹÓÃClick2GovÖ§¸¶ÏµÍ³¾ÙÐÐÒ»´ÎÐÔ¸¶¿î»òÉèÖð´ÆÚ¸¶¿îµÄ¿Í»§¡£¡£¡£¡£Æ¾Ö¤¸ÃÊеÄÊӲ죬£¬£¬ £¬£¬Î´¾­ÊÚȨµÄ¹¥»÷ÕßÐÞ¸ÄÁËClick2GovÈí¼þµÄÒ»¶ÎÅÌËã»ú´úÂ룬£¬£¬ £¬£¬ÓÃÓÚÇÔÈ¡ÐÕÃû¡¢Õ˵¥µØµã¡¢Ö§¸¶¿¨ÀàÐÍ¡¢Ö§¸¶¿¨ºÅ¡¢ÑéÖ¤ÂëÒÔ¼°µ½ÆÚÈÕÆÚµÈÐÅÏ¢£¬£¬£¬ £¬£¬µ«²»°üÀ¨Éç»áÇå¾²ºÅÂë»òÕþ¸®½ÒÏþµÄIDºÅÂë¡£¡£¡£¡£¸ÃÊÐË®Îñ²¿·ÖÒѾ­ÆôÓÃÁËÒ»¸öÃûΪPaymentusµÄÐÂÖ§¸¶ÏµÍ³²¢ÕýÔÚÍêÈ«¹ý¶Éµ½¸ÃÐÂϵͳ£¬£¬£¬ £¬£¬¸ÃϵͳûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.9news.com/article/news/local/aurora-water-data-breach/73-4a717e74-9827-4a05-bab9-25782737dda6


5.Big Monitoring FabricÐû²¼Çå¾²¸üУ¬£¬£¬ £¬£¬ÐÞ¸´Á½¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Big Monitoring FabricÓ¦ÓóÌÐòÐÞ¸´ÁËÁ½¸ö¸ßΣÎó²î£¬£¬£¬ £¬£¬°üÀ¨XSSÎó²î£¨CVE-2019-19632£©ºÍÃô¸ÐÐÅϢй¶Îó²î£¨CVE-2019-19631£©¡£¡£¡£¡£ÓÉBig Switch Networks¿ª·¢µÄBig Monitoring FabricÊÇÒ»ÖÖ»ìÏýµÄÔÆ¿É¼ûÐÔºÍÇå¾²ÐÔ½â¾ö¼Æ»®£¬£¬£¬ £¬£¬Ö¼ÔÚΪ¿Í»§Ìṩͨ¹ýµ¥¸öÒDZí°å¼àÊÓÎïÀí¡¢ÐéÄâºÍÔÆÇéÐεÄÄÜÁ¦¡£¡£¡£¡£µÚÒ»¸öXSSÎó²îλÓÚ/loginÒ³ÃæÖУ¬£¬£¬ £¬£¬ËüÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔڵǼÀú³ÌÖÐÌá½»JavaScript XSSÓÐÓÃÄÚÈÝ×÷ΪÓû§Ãû£¬£¬£¬ £¬£¬´Ó¶ø»ñµÃ¶ÔBig Monitoring FabricÓ¦ÓóÌÐòµÄÖÎÆÊÎö¼ûÒÔ¼°¶ÔÊÜÓ°ÏìϵͳµÄSSH¿ØÖÆÌ¨»á¼û¡£¡£¡£¡£µÚ¶þ¸öÎó²îÔÊÐíµÍȨÏÞÖ»¶ÁÓû§»ñµÃÖÎÀíȨÏÞ£¬£¬£¬ £¬£¬²¢Í¨¹ýSSH¿ØÖÆÌ¨»á¼ûÊÜÓ°ÏìµÄϵͳ£¬£¬£¬ £¬£¬ÏêϸÀ´Ëµ£¬£¬£¬ £¬£¬Ö»¶Á»òÖÎÀíÔ±×éÖеÄÓû§¿ÉÒÔͨ¹ýAPI /api/v1/export»á¼ûSSH RSA˽ԿºÍÓÐÓõÄÓû§»á»°cookie£¨°üÀ¨ÖÎÀíÔ±µÄcookie£©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/high-risk-vulnerabilities-addressed-big-monitoring-fabric


6.Nagios XIÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-20197£©


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Nagios XIÊÇÃÀ¹úNagios¹«Ë¾µÄÒ»Ì×IT»ù´¡ÉèÊ©¼à¿Ø½â¾ö¼Æ»®¡£¡£¡£¡£¸Ã¼Æ»®Ö§³Ö¶ÔÓ¦Óá¢Ð§ÀÍ¡¢²Ù×÷ϵͳµÈ¾ÙÐÐ¼à¿ØºÍÔ¤¾¯¡£¡£¡£¡£@Cody SixteenÔÚTwitterÐû²¼ÁËÓйØNagios XIÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-20197£©µÄÏà¹ØÐÅÏ¢£¬£¬£¬ £¬£¬¸ÃÎó²îÓ°ÏìÁËNagios XI 5.6.9°æ±¾£¬£¬£¬ £¬£¬¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§¿ÉÒÔͨ¹ýÏòschedulereport.phpÎļþ·¢ËÍ´øÓÐshellÔª×Ö·ûµÄ¡®id¡¯²ÎÊý£¬£¬£¬ £¬£¬ÔÚWebЧÀÍÆ÷Óû§ÕÊ»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ²Ù×÷ϵͳÏÂÁî¡£¡£¡£¡£ÏÖÔÚ³§ÉÌÔÝδÐû²¼ÐÞ¸´²½·¥¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201912-1534