¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181108

Ðû²¼Ê±¼ä 2018-11-08
1¡¢Ñо¿Ö°Ô±Åû¶VirtualBoxÖеÄÐéÄâ»úÌÓÒÝ0day

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¶íÂÞ˹Îó²îÑо¿Ö°Ô±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬£¬ £¬£¬£¬¸ÃÎó²îÓ°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¡£ ¡£¡£¸ÃÎó²îÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬£¬ £¬£¬£¬²¢Ê¹ÓÃÆäËüÊÖÒÕÌáȨÖÁring0¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÏêϸÐÎòÁ˸ÃÎó²î±³ºóµÄ»úÖÆ£¬£¬ £¬£¬£¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓÆµ¡£¡£ ¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/


2¡¢WordPress²å¼þWooCommerceÐÞ¸´Ò»¸öí§ÒâÎļþɾ³ýÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷WordPress²å¼þWooCommerce±£´æÒ»¸öí§ÒâÎļþɾ³ýÎó²î£¬£¬ £¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¶ñÒâ¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÕË»§µÄÃÜÂë²¢ÍêÈ«½ÓÊÜÍøÕ¾¡£¡£ ¡£¡£WooCommerceÊÇWordPressÉÏ×îÊܽӴýµÄµç×ÓÉÌÎñ²å¼þÖ®Ò»£¬£¬ £¬£¬£¬Æä×°ÖôÎÊýÁè¼Ý400Íò£¬£¬ £¬£¬£¬Îª»¥ÁªÍøÉϽü35%µÄµç×ÓÉÌÎñÍøÕ¾Ìṩ֧³Ö¡£¡£ ¡£¡£WooCommerce¿ª·¢ÍŶÓÒÑÔÚ°æ±¾3.4.6ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html


3¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆÐû²¼Á˶à¿î²úÆ·µÄ15¸öÇå¾²¸üУ¬£¬ £¬£¬£¬ÆäÖаüÀ¨É¾³ýÁËСÐÍÆóÒµ½»Á÷»úÖеÄÒ»¸öºóÃÅÕË»§¡£¡£ ¡£¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£¡£ ¡£¡£ÕâЩºóÃÅÕË»§Îó²î°üÀ¨3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/


4¡¢Ñо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ESETÑо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬ £¬£¬£¬¸Ã¹¥»÷ÊÇͨ¹ýÍøÂçÆÊÎöƽ̨StatCounter¾ÙÐеġ£¡£ ¡£¡£StatCounterЧÀͱ»Áè¼Ý200Íò¸öÍøÕ¾Ê¹ÓÃÒÔÊÕ¾Û»á¼ûÕßµÄͳ¼ÆÐÅÏ¢£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ýÔÚStatCounterµÄJS¾ç±¾ÖÐÌí¼Ó¶ñÒâ´úÂ룬£¬ £¬£¬£¬¿ÉÒÔÔÚËùÓеÄÕâÐ©ÍøÕ¾Öж¼×¢Èë¶ñÒâJS´úÂë¡£¡£ ¡£¡£Æ¾Ö¤¶Ô¶ñÒâ´úÂëµÄÆÊÎö£¬£¬ £¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioËÆºõÊÇÕâ´Î¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£ ¡£¡£µ«ÓÉÓÚ¶ñÒâ¾ç±¾»áÒ»Ö±ÌìÉúеıÈÌØ±ÒµØµã£¬£¬ £¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨µÃÖªÏêϸÓм¸¶à×ʽ𱻵Á¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2018/11/06/supply-chain-attack-cryptocurrency-exchange-gate-io/


5¡¢Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀµÄÐéÎ±ÒøÐÐÓ¦ÓÃMovil Secure

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÉÏ·¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓû§µÄ¶ñÒâÒøÐÐÓ¦ÓÃMovil Secure¡£¡£ ¡£¡£Movil Secureð³äÓëÎ÷°àÑÀ¶ÔÍâÒøÐÐBBVAÓйØ£¬£¬ £¬£¬£¬²¢ÇÒ¾ßÓÐרҵµÄÍâ¹ÛºÍϸÄåµÄÓû§½çÃæ¡£¡£ ¡£¡£¸ÃÓ¦ÓÃÖ÷ÒªÓÃÓÚÍøÂçÓû§µÄÐÅÏ¢£¬£¬ £¬£¬£¬°üÀ¨¶ÌÐź͵绰ºÅÂëµÈ£¬£¬ £¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ¶ÌÐÅ´¹Âڻ¡£¡£ ¡£¡£¸Ã¶ñÒâÓ¦ÓÃÔÚ10ÔÂ19ÈÕÐû²¼£¬£¬ £¬£¬£¬²¢ÔÚ6ÌìÄÚÏÂÔØÁËÁè¼Ý100´Î¡£¡£ ¡£¡£Ñо¿Ö°Ô±»¹ÔÚͳһ¸ö¿ª·¢Ö°Ô±ÃûÏ·¢Ã÷ÁËÆäËüÈý¸öÀàËÆµÄ¶ñÒâÓ¦Ó㬣¬ £¬£¬£¬ÏÖÔÚÕâЩӦÓÃÒѱ»Googleɾ³ý¡£¡£ ¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/fake-banking-app-found-on-google-play-used-in-smishing-scheme/


6¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄÎÞÎļþ¶ñÒâÈí¼þ¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CyrenÑо¿Ö°Ô±·¢Ã÷ÒѾ­±£´æÕë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄжñÒâ¹¥»÷»î¶¯¡£¡£ ¡£¡£Ã¿ÄêµÄºÚÎåºÍÊ¥µ®½Úʱ´ú£¬£¬ £¬£¬£¬ÍøÂç´¹ÂÚºÍÕ©Æ­»î¶¯¶¼»áµÖ´ïÒ»¸öá¯Áë¡£¡£ ¡£¡£½ñÄêµÄÊ¥µ®×¼±¸ÊÂÇéÕýÔÚ¾ÙÐÐÖ®ÖУ¬£¬ £¬£¬£¬¶øÑо¿Ö°Ô±ÒѾ­·¢Ã÷ÁËÒ»ÖÖеÄÎÞÎļþ¹¥»÷¡£¡£ ¡£¡£ÕâÖÖ´¹ÂÚÓʼþÒÔÊ¥µ®¶©µ¥ÎªÖ÷Ì⣬£¬ £¬£¬£¬ÓÃÓÚ·Ö·¢NetwiredRCºóÃÅ¡£¡£ ¡£¡£¸ÃºóÃÅ¿ÉÒÔ¾ÙÐмüÅ̼ͼ¡¢ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ÒÔ¼°µç×ÓÓʼþƾ֤µÈ¡£¡£ ¡£¡£¶ñÒâÈí¼þµÄÕû¸ö×°ÖÃÀú³ÌÊDZ»×¢ÈëÄ¿µÄÀú³Ì£¬£¬ £¬£¬£¬Ã»ÓÐÉúÑĵ½´ÅÅÌÉÏ¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.cyren.com/blog/articles/fileless-malware-already-targeting-holiday-suppliers


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí