Docker Image rootÕË»§¿ÕÃÜÂ룻£»ÈýÐÇSmartThingsÔ´Âëй¶£»£»Turla APT

Ðû²¼Ê±¼ä 2019-05-10

1¡¢Alpine LinuxµÄDocker Image±£´ærootÕË»§¿ÕÃÜÂëÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Alpine LinuxµÄ¹Ù·½Docker¾µÏñ±£´ærootÕË»§¿ÕÃÜÂëÎó²î£¨CVE-2019-5021£©¡£¡£¡£¡£¡£¸ÃÎó²îÒѾ­±£´æÁËÁè¼Ý3ÄêµÄʱ¼ä£¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ9.8·Ö¡£¡£¡£¡£¡£¸ÃÎó²î×î³õÓÚ2015Äê·¢Ã÷²¢±»ÐÞ¸´£¬£¬£¬£¬£¬£¬µ«2015Äê12Ô·ݵĸü¸Äµ¼ÖÂÎó²îÔٴηºÆð£¬£¬£¬£¬£¬£¬²¢ÇÒÒ»Ö±±£´æ¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬Óû§ÕË»§µÄÉèÖÃÖÎÀíÎļþ/etc/shadowÖаüÀ¨¿ÕȱµÄsp_pwdp×ֶΣ¬£¬£¬£¬£¬£¬¶ø²»ÊǼÓÃܵÄÃÜÂë¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨Alpine Docker 3.3¡¢3.4¡¢3.5¡¢3.6¡¢3.7¡¢3.8¡¢3.9ºÍAlpine Docker Edge¡£¡£¡£¡£¡£¸ÃÎó²îÒÑÓÚ2019Äê3ÔÂ8ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bug-in-alpine-linux-docker-image-leaves-root-account-unlocked/


2¡¢¹È¸èÐû²¼5ÔÂAndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´15¸öÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¹È¸èÔÚ5Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË15¸öÎó²î£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨4¸öÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬10¸ö¸ßΣÎó²îºÍ1ÆäÖÐΣÎó²î¡£¡£¡£¡£¡£Õâ4¸öÑÏÖØÎó²î£¨CVE-2019-2045£¬£¬£¬£¬£¬£¬CVE-2019-2046£¬£¬£¬£¬£¬£¬CVE-2019-2047ºÍCVE-2019-2044£©¾ùΪԶ³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬ÆäÖÐÈý¸öÓëϵͳ½¹µãÓ¦ÓÃÓйأ¨²¦ºÅÆ÷¡¢µç×ÓÓʼþºÍÏà»ú£©£¬£¬£¬£¬£¬£¬µÚËĸöÓëýÌå¿ò¼Ü×é¼þÓйØ£¬£¬£¬£¬£¬£¬ÏÖÔÚÔÝδÅû¶¸ü¶à²¹¶¡Ï¸½Ú¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹È¸è»¹Ðû²¼ÁËNVIDIA¡¢BroadcomºÍQualcommÆ·¼¶Èý·½¹©Ó¦ÉÌ×é¼þÖеĶà¸öÎó²î²¹¶¡£¬£¬£¬£¬£¬£¬Ê¹µÃÐÞ¸´µÄCVE×ÜÊý´ï30¸ö¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/google-critical-remote-code-execution-flaws-android/144497/


3¡¢ÈýÐÇÒâÍâй¶SmartThingsÔ´Âë¼°¶à¸öÏîÄ¿µÄÄÚ²¿ÃÜÔ¿

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÈýÐǹ¤³ÌʦµÄÒ»¸öGitLabЧÀÍÆ÷±»¹ýʧµØÉèÖÃΪpublic²¢ÇÒδÉèÖÃÃÜÂë±£»£»¤£¬£¬£¬£¬£¬£¬µ¼Ö´ó×ÚÃô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷ÍйÜÔÚÈýÐǵÄÓòÃûVandev LabÉÏ£¬£¬£¬£¬£¬£¬Æ¾Ö¤µÏ°ÝÇå¾²³§ÉÌSpiderSilkÑо¿Ö°Ô±Mossab HusseinµÄ·¢Ã÷£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷й¶ÁËSmartThingsÈí¼þµÄÔ´´úÂëºÍ˽ÓÐÖ¤Ê飬£¬£¬£¬£¬£¬»¹Ð¹Â¶Á˶àÃûÔ±¹¤µÄÃ÷ÎÄ˽ÓÐGitLabÁîÅÆÒÔ¼°Ò»Ð©ÄÚ²¿ÎĵµºÍPPT¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://techcrunch.com/2019/05/08/samsung-source-code-leak/


4¡¢ºÚ¿ÍÍÅ»ïй¶3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÃô¸ÐÊý¾Ý

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ºÚ¿ÍÍÅ»ïLulZSecºÍItaÔÚÍøÉÏÐû²¼ÁË3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬ÆäÖÐÉõÖÁ°üÀ¨ÂÞÂíÊ㤵ÄÊý¾Ý¡£¡£¡£¡£¡£¾Ý±¨µÀºÚ¿ÍÍÅ»ïÇÔÈ¡ÁËÔÚÂíÌ©À­ºÍ¿¨Ì¹ÔúÂÞ×¢²áµÄ״ʦÐÅÏ¢£¬£¬£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨µç×ÓÓʼþÕË»§¡¢Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ»á¼ûPECÕÊ»§µÄÖ¤¾Ý¡£¡£¡£¡£¡£ºÚ¿ÍÍŻﲢûÓжÔÕâЩÊý¾ÝÌá³öÀÕË÷£¬£¬£¬£¬£¬£¬²¢³Æ²»»áʹÓÃÕâЩÊý¾Ý¾ÙÐжñÒâ»î¶¯¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/lulzsec-and-ita-hacktivist-groups-publish-the-personal-data-of-30000-roman-lawyers-6ac94567


5¡¢Turla APTʹÓÃLightNeuronºóÃÅÐ®ÖÆExchangeЧÀÍÆ÷

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤ESETÑо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬£¬×Ô2014ÄêÒÔÀ´¶íÂÞ˹·¸·¨ÍÅ»ïTurla APTÒ»Ö±ÔÚʹÓÃLightNeuronºóÃÅÐ®ÖÆMicrosoft ExchangeÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÊܺ¦×éÖ¯°üÀ¨°ÍÎ÷µÄÒ»¸ö×éÖ¯ºÍ¶«Å·¼°Öж«µÄÍâ½»»ú¹¹¡£¡£¡£¡£¡£LightNeuronÊǵÚÒ»¸öÕë¶ÔExchangeЧÀÍÆ÷µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔÉó²éºÍÐÞ¸Äͨ¹ýÓʼþЧÀÍÆ÷·¢Ë͵ÄÈκεç×ÓÓʼþ¡¢×«Ð´ºÍ·¢ËÍÐÂÓʼþÒÔ¼°×èÖ¹Èκεç×ÓÓʼþ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/turla-threat-actor-group-hijacks-microsoft-exchange-mail-server-using-sophisticated-lightneuron-backdoor-d615cc04


6¡¢US-CERTÐû²¼Lazarus APT¶ñÒ⹤¾ßELECTRICFISHµÄÆÊÎö±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©ºÍÁìÍÁÇå¾²²¿£¨DHS£©Ðû²¼¹ØÓÚ¶ñÒâÈí¼þELECTRICFISHµÄÁªºÏÆÊÎö±¨¸æ£¨MAR£©¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊdz¯ÏÊAPT×éÖ¯LazarusʹÓõŤ¾ß£¬£¬£¬£¬£¬£¬ÓÃÓÚÍøÂçºÍÇÔÈ¡Êܺ¦ÕßµÄÊý¾Ý¡£¡£¡£¡£¡£ELECTRICFISHʵÏÖÁËÒ»ÖÖ×Ô½ç˵ЭÒ飬£¬£¬£¬£¬£¬ÔÊÐíÔÚÔ´ºÍÄ¿µÄIPµØµãÖ®¼ä´«ÊäÁ÷Á¿¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÊðÀíЧÀÍÆ÷/¶Ë¿Ú¾ÙÐÐÉèÖ㬣¬£¬£¬£¬£¬´Ó¶øÈƹýÊÜѬȾϵͳµÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.us-cert.gov/ncas/analysis-reports/AR19-129A