¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181018
Ðû²¼Ê±¼ä 2018-10-221£¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy

ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAPT×éÖ¯GreyEnergy£¬£¬£¬£¬£¬£¬£¬¸ÃAPT×éÖ¯±»ÒÔΪÊÇBlackEnergyµÄ¼ÌÐøÕß¡£¡£¡£¡£ÔÚÒÑÍùÈýÄêÄÚ£¬£¬£¬£¬£¬£¬£¬GreyEnergyÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼µÄÄÜÔ´¹«Ë¾µÈ¸ß¼ÛֵĿµÄ¡£¡£¡£¡£GreyEnergyµÄ¶ñÒâÈí¼þ¿ò¼ÜÓëBlackEnergy¾ßÓÐÐí¶àÏàËÆÖ®´¦¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Ã»ÓÐÊӲ쵽רÃÅÕë¶ÔICSµÄ¶ñÒâÈí¼þÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬µ«GreyEnergyµÄ¹¥»÷Õ½ÂÔÒ»Ö±ÊÇÕë¶ÔÒªº¦»ù´¡ÉèÊ©ÖеÄSCADAÊÂÇéÕ¾ºÍЧÀÍÆ÷µÈ¡£¡£¡£¡£
https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/
2£¬£¬£¬£¬£¬£¬£¬OracleÐû²¼µÚÈý¼¾¶ÈÖ÷Òª²¹¶¡¸üУ¬£¬£¬£¬£¬£¬£¬¹²ÐÞ¸´301¸öÎó²î

OracleÇå¾²ÍŶÓÐû²¼2018ÄêµÚÈý¼¾¶ÈµÄÖ÷Òª²¹¶¡¸üУ¨CPU£©£¬£¬£¬£¬£¬£¬£¬¹²ÐÞ¸´301¸öÎó²î¡£¡£¡£¡£ÆäÖÐ48¸öÎó²îµÄCVSSÆÀ·ÖΪ9.8·Ö£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÒ»¸öÎó²îµÄÆÀ·ÖΪÂú·Ö10·Ö¡£¡£¡£¡£Õâ¸öÎó²îÊÇOracle GoldenGateµÄMonitoring Manager×é¼þÖеÄÕ»»º³åÇøÒç³öÎó²î£¨CVE-2018-2913£©£¬£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý¶ñÒâGGSCIÖ¸Áî´¥·¢¸ÃÎó²î¡£¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¸ÃCPUÒ²ÊÇOracle2018ÄêµÄ×îºóÒ»¸öCPU¡£¡£¡£¡£
https://www.zdnet.com/article/oracle-patches-301-vulnerabilities-including-46-with-a-9-8-severity-rating/
3£¬£¬£¬£¬£¬£¬£¬LibsshÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-10933£©
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/10/libssh-ssh-protocol-library.html4£¬£¬£¬£¬£¬£¬£¬VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´í§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2018-6974£©

VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÆäSVGAÐéÄâÏÔ¿¨ÖеÄÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-6974£©Ó°ÏìÁËVMware ESXi¡¢FusionºÍWorkstation²úÆ·¡£¡£¡£¡£ZDIÔÚ6ÔÂÖÐÑ®ÏòVMware±¨¸æÁ˸ÃÎó²î¡£¡£¡£¡£Æ¾Ö¤ZDIµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÊÇÒ»¸ö¶Ñ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÁ¬ÏµÆäËüÎó²îÔÚÖ÷»úϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://securityaffairs.co/wordpress/77176/security/vmware-code-execution-flaws-2.html
5£¬£¬£¬£¬£¬£¬£¬Ë¼¿ÆTalosÅû¶Linksys EϵÁзÓÉÆ÷ÖеĶà¸öÇå¾²Îó²î

˼¿ÆTalosÍŶӷ¢Ã÷Linksys EϵÁзÓÉÆ÷Öб£´æ¶à¸ö¿ÉʹÓõÄOSÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£EϵÁзÓÉÆ÷Ö÷ÒªÊÊÓÃÓÚ¼ÒÍ¥»òСÐͰ칫ÊÒ£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÅþÁ¬µçÄÔ¡¢µçÊÓ¡¢ÊÖ»úºÍÓÎÏ·»úµÈ×°±¸¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýHTTPÇëÇóʹÓÃÕâЩÎó²î£¨CVE-2018-3953¡¢CVE-2018-3954ºÍCVE-2018-3955£©²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£½¨ÒéÓû§½«¸Ã·ÓÉÆ÷µÄ¹Ì¼þ¸üÐÂÖÁ×îа汾¡£¡£¡£¡£
https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-linksys-eseries.html
6£¬£¬£¬£¬£¬£¬£¬Ë¼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ15¸öÇå¾²Îó²î

˼¿ÆÐÞ¸´¶à¿î²úÆ·ÖеÄ15¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ5¸öÎó²î£¨CVE-2018-0443¡¢CVE-2018-0456¡¢CVE-2018-0378¡¢CVE-2018-0395ºÍCVE-2018-0441£©¿Éµ¼Ö¾ܾøÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬2¸öÎó²î£¨CVE-2018-0417ºÍCVE-2018-0443£©¿Éµ¼ÖÂÌáȨºÍÐÅϢй¶£¬£¬£¬£¬£¬£¬£¬ÆäËüÎó²î»¹°üÀ¨Ä¿Â¼±éÀú¡¢XSSºÍCSRFµÈ¡£¡£¡£¡£Ë¼¿ÆµÄ²úÆ·Çå¾²ÊÂÎñÏìӦС×飨PSIRT£©³ÆÃ»Óз¢Ã÷ÕâЩÎó²î±»Ò°ÍâʹÓõļ£Ï󡣡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/cisco-patches-remotely-exploitable-high-risk-security-bugs-in-multiple-products-523295.shtmlÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí