¿¨°Í˹»ù2019Äê¹¤ÒµÍøÂçÇ徲״̬±¨¸æ£»£»£»£»£»11¸öRuby¿â±£´æºóÃÅ£»£»£»£»£»SteamÌáȨ0day
Ðû²¼Ê±¼ä 2019-08-22
¿¨°Í˹»ù¶Ô282¼ÒÔËÐÐOT/ICSϵͳµÄÆóÒµ¾ÙÐе÷ÑУ¬£¬£¬£¬£¬£¬ÕûÀí²¢Ðû²¼ÁË¡¶2019Äê¹¤ÒµÍøÂçÇ徲״̬¡·±¨¸æ¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬£¬£¬£¬£¬È¥ÄêÁè¼ÝÒ»°ë£¨52%£©µÄ¹¤¿ØÇå¾²ÊÂÎñÊÇÓÉÈËΪʧÎóµ¼Öµġ£¡£¡£¡£ËäÈ»¾ø´ó´ó¶¼¹«Ë¾£¨81£¥£©ÍýÏë¾ÙÐÐÍøÂçÊý×Ö»¯ÔËÓªÒÔÍÆ¶¯¹¤Òµ4.0£¬£¬£¬£¬£¬£¬µ«·ÖÅÉÁËÍøÂçÇå¾²Ô¤ËãµÄÈ´Éٵöࣨ57£¥£©¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬ÕâЩ¹«Ë¾µÄÍøÂçÇå¾²ÊÖÒÕÈÔÈ»ÁîÈ˵£ÐÄ£ºÊÜ·ÃÕßµÄÁ½´óµ£Ðļ¯ÖÐÔÚûÓÐ×ã¹»µÄÍøÂçÇ徲ר¼ÒÀ´ÖÎÀí¹¤ÒµÍøÂ磬£¬£¬£¬£¬£¬ÒÔ¼°OT/ICS²Ù×÷Ô±ÆÕ±éȱ·¦Çå¾²Òâʶ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://ics.kaspersky.com/the-state-of-industrial-cybersecurity-2019/
2¡¢¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®½ÒÏþµÄ¸ùÖ¤Êé
¹È¸è¡¢Mozilla¼°Æ»¹û½ûÓùþÈø¿Ë˹̹Õþ¸®ÓÚÉϸöÔ½ÒÏþµÄ¸ùÖ¤Ê飬£¬£¬£¬£¬£¬¸ÃÖ¤ÊéÓÃÓÚ¼à¿Ø¹«ÃñµÄÉÏÍøÁ÷Á¿¡£¡£¡£¡£Æäʱ¹þÈø¿Ë˹̹Õþ¸®ÒªÇó¸Ã¹úISPÏàÖú£¬£¬£¬£¬£¬£¬Ç¿ÖÆÔÚËùÓÐÍøÂçÓû§ÖÐ×°ÖøøùÖ¤Êé¡£¡£¡£¡£ÏÖÔÚµ±Chrome¡¢Firefox¼°Safari¼ì²âµ½¸Ã¸ùÖ¤Êéʱ£¬£¬£¬£¬£¬£¬½«×èÖ¹ÅþÁ¬²¢ÏÔʾ¹ýʧÐÅÏ¢¡£¡£¡£¡£¹þÈø¿Ë˹̹Õþ¸®ÒѾÔÚ8Ô³õ×èÖ¹ÁËÕâÒ»ÍýÏ룬£¬£¬£¬£¬£¬Ò»Ãû¹ÙÔ±ÌåÏÖÕû¸öÍýÏëÖ»ÊÇÕþ¸®µÄÒ»¸ö²âÊÔ¡£¡£¡£¡£µ«ÈÔÓÐÊý°ÙÍò×°±¸ÈÔÔÚʹÓøÃÖ¤Êé¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kazakhstan-root-certificate.html
3¡¢Ñо¿Ö°Ô±·¢Ã÷11¸öRuby¿âÖб£´æºóÃÅ´úÂë
RubyGemsɾ³ýÁË18¸ö°üÀ¨ºóÃÅ´úÂëµÄRuby¿â¶ñÒâ°æ±¾£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâ°æ±¾ÊôÓÚ11¸ö²î±ðµÄRuby¿â£¬£¬£¬£¬£¬£¬×Ô7ÔÂ8ÈÕÒÔÀ´£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâ°æ±¾ÒѾ±»ÏÂÔØÁË3584´Î¡£¡£¡£¡£±»Ö²ÈëµÄºóÃÅ´úÂë¿ÉÔÚÆäËûÈ˵ÄRubyÏîÄ¿ÖпªÕ¹ÒþÄäµÄ¶ñÒâÍÚ¿ó»î¶¯¡£¡£¡£¡£ºÉÀ¼¿ª·¢ÕßJan DintelÊ×ÏÈÔÚrest-client¿âÖз¢Ã÷Á˶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ËüÃÇ»áÍøÂçURLºÍϵͳÇéÐÎÐÅÏ¢²¢·¢ËÍÖÁÎÚ¿ËÀ¼µÄЧÀÍÆ÷¡£¡£¡£¡£¾ÓÉÊÓ²ìºóRubyGemsÔ±¹¤·¢Ã÷Á˸ü¶à¿âÊܵ½ÎÛȾ£¬£¬£¬£¬£¬£¬Ïêϸ°æ±¾ÁбíÇë²Î¿¼Á´½Ó¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/
4¡¢¶íÂÞ˹·¸·¨ÍÅ»ïSilence½«Ä¿µÄÀ©Õ¹ÖÁÈ«ÇòÒøÐÐ
ƾ֤Group-IBÐû²¼µÄ¡¶Silence 2.0£º×ßÏòÈ«Çò¡·±¨¸æ£¬£¬£¬£¬£¬£¬×Ô2018Äê9Ô·ÝÒÔÀ´£¬£¬£¬£¬£¬£¬Í¨¹ýÔöÌí¹¥»÷ƵÂʵķ½·¨£¬£¬£¬£¬£¬£¬¸Ã¶íÂÞ˹·¿·¸·¨ÍÅ»ïÒѾÇÔÈ¡Á˽ü350ÍòÃÀÔªµÄ×ʽ𡣡£¡£¡£ÔÚÒÑÍùÒ»ÄêÖУ¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÖÁÉÙÌᳫÁË16¸öй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ãé×¼ÁË30¸ö¹ú¼ÒµÄÒøÐУ¬£¬£¬£¬£¬£¬Ä¿µÄÇøÓòºá¿çÅ·ÖÞ¡¢À¶¡ÃÀÖÞ¡¢·ÇÖÞºÍÑÇÖÞ¡£¡£¡£¡£ÆäÔì³ÉµÄËðʧÔöÌíÁË5±¶£¬£¬£¬£¬£¬£¬´Ó80ÍòÃÀÔªÔöÌíÖÁ420ÍòÃÀÔª¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/silence-apt-russian-hackers.html
5¡¢Ñо¿Ö°Ô±Åû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day
¶íÂÞ˹Ñо¿Ö°Ô±Vasily KravetsÅû¶Steam¿Í»§¶ËÖеĵڶþ¸öÌáȨ0day£¬£¬£¬£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÁËWindows¿Í»§¶Ë£¬£¬£¬£¬£¬£¬Æ¾Ö¤SteamµÄÊý¾Ý£¬£¬£¬£¬£¬£¬Ô¼ÓÐ9600ÍòÓû§ÊÜÓ°Ïì¡£¡£¡£¡£¸ÃEoP/LPEÎó²îÔÊÐí¹¥»÷Õßͨ¹ýBaitAndSwitchÊÖÒÕÌáȨÖÁNT AUTHORITY\SYSTEMȨÏÞÖ´ÐÐí§Òâpayload¡£¡£¡£¡£Kravetsͨ¹ýÊÓÆµÑÝʾÁËÆä¹¥»÷°ì·¨£¬£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚVÉçÉÐδ¾ÙÐлØÓ¦¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/researcher-publishes-second-steam-zero-day-after-getting-banned-on-valves-bug-bounty-program/
6¡¢Ë¼¿ÆÐÞ¸´UCS×°±¸¼°220½»Á÷»úÖеÄ6¸öÒªº¦Îó²î

˼¿ÆÐÞ¸´ÆäUCS×°±¸¼°220ϵÁÐÆóÒµ½»Á÷»úÖеÄ6¸öÒªº¦Îó²î£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²î½ÓÊÜÄ¿µÄ×°±¸¡£¡£¡£¡£ÆäÖÐËĸöÎó²î£¨CVE-2019-1938¡¢CVE-2019-1935¡¢CVE-2019-1974ºÍCVE-2019-1937£©µÄCVSSÆÀ·Ö¶¼Îª9.8·Ö£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁËUCS×°±¸¡£¡£¡£¡£ÁíÍâÁ½¸öÎó²î£¨CVE-2019-1913£¬£¬£¬£¬£¬£¬CVSS 9.8·ÖºÍCVE-2019-1912£¬£¬£¬£¬£¬£¬CVSS 9.1·Ö£©ÊÇ220½»Á÷»úÖеĻº³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÎó²îÖ´ÐÐí§Òâ´úÂë²¢½ÓÊܽ»Á÷»ú¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/cisco-patches-six-critical-bugs/147585/


¾©¹«Íø°²±¸11010802024551ºÅ