¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190109

Ðû²¼Ê±¼ä 2019-01-09
1¡¢Î¢ÈíÐû²¼2019Äê1ÔÂÇå¾²¸üУ¬£¬ £¬£¬ £¬£¬£¬ÐÞ¸´51¸öÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

2019ÄêµÄµÚÒ»¸öWindowsÇå¾²¸üй²ÐÞ¸´ÁË51¸öÎó²î£¬£¬ £¬£¬ £¬£¬£¬Ö÷ÒªµÄÎó²î°üÀ¨£ºDHCP¿Í»§¶Ëí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0547£©¡¢Hyper-VÐéÄâ»úÌÓÒÝÎó²î£¨CVE-2019-0550ºÍCVE-2019-0551£©¡¢Skype for AndroidÖеÄËøÆÁÃÜÂëÈÆ¹ýÎó²î£¨CVE-2019-0622£©ÒÔ¼°Êý¾Ý¿âÒýÇæJetÖеÄRCEÎó²î£¨CVE-2019-0579£©µÈ¡£¡£¡£¡£ ¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2019-patch-tuesday-includes-51-security-updates/


2¡¢Î¢ÈíÐû²¼GitHubÃâÓöȻ§ÏÖ¿ÉÎÞÏÞ½¨Éè˽Óд洢¿â

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


΢ÈíÐû²¼GitHubÃâÓöȻ§ÏÖÔÚ¿ÉÒÔ½¨ÉèÎÞÏÞÁ¿µÄ˽ÈË´æ´¢¿â£¬£¬ £¬£¬ £¬£¬£¬ÔÚ´Ë֮ǰ£¬£¬ £¬£¬ £¬£¬£¬ÈôÊÇÄãÏ뽨Éè˽ÈË´æ´¢¿â£¬£¬ £¬£¬ £¬£¬£¬ÄÇôÿÔÂ×îÉÙÐèÒªÖ§¸¶7ÃÀÔªµÄÓöÈ¡£¡£¡£¡£ ¡£ÏÖÔÚGitHubÃâÓöȻ§½¨ÉèµÄ˽ÈË´æ´¢¿â×î¶à¿ÉÒÔÓµÓÐ3ÃûЭ×÷Õߣ¬£¬ £¬£¬ £¬£¬£¬ÈôÊÇÄãÏëÌí¼Ó¸ü¶àµÄЭ×÷Õߣ¬£¬ £¬£¬ £¬£¬£¬ÄÇôÿÔÂÐèÒªÖ§¸¶7ÃÀÔªÉý¼¶µ½¸ß¼¶ÕË»§¡£¡£¡£¡£ ¡£ÈôÊÇÄã֮ǰÒѾ­Ö§¸¶7ÃÀÔª£¬£¬ £¬£¬ £¬£¬£¬ÄÇôÄã¿ÉÒÔÆ¾Ö¤×ÔÉíÐèÇó½µ¼¶ÎªÃâÓöȻ§£¬£¬ £¬£¬ £¬£¬£¬Í¬Ê±Ë½Óд洢¿âµÄÄÚÈݾùÒѱ£´æ¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-unlimited-private-repos-for-github-free/


3¡¢ÃÀ¹ú³ø·¿ÓþßÖÆÔìÉÌoxo.comÔâµ½MageCart¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÃÀ¹ú³ø·¿ÓþßÖÆÔìÉÌOXO InternationalÔâµ½ºÚ¿Í¹¥»÷£¬£¬ £¬£¬ £¬£¬£¬¿Í»§µÄ¸¶¿îÐÅÏ¢±»ÇÔ¡£¡£¡£¡£ ¡£Æ¾Ö¤OXOµÄÊý¾Ýй¶֪ͨ£¬£¬ £¬£¬ £¬£¬£¬ÔÚ2017Äê6ÔÂ9ÈÕ-2017Äê11ÔÂ28ÈÕ¡¢2018Äê6ÔÂ8ÈÕ-2018Äê6ÔÂ9ÈÕºÍ2018Äê7ÔÂ20ÈÕ-2018Äê10ÔÂ16ÈÕʱ´ú£¬£¬ £¬£¬ £¬£¬£¬¿Í»§ÔÚÆäÍøÕ¾www.oxo.comÉÏÊäÈëµÄ¶©µ¥Ö§¸¶ÐÅÏ¢Êܵ½Ë𺦣¬£¬ £¬£¬ £¬£¬£¬°üÀ¨ÐÅÓÿ¨ÐÅÏ¢¡¢Õ˵¥µØµã¡¢µç×ÓÓʼþµØµãºÍµç»°ºÅÂë¡£¡£¡£¡£ ¡£BleepingComputerµÄ½øÒ»²½Ñо¿Åú×¢ÖÁÉÙÓÐÒ»´Î¹¥»÷ÊÇMageCart¹¥»÷¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/oxo-discloses-magecart-attack-that-targeted-customer-data-on-oxocom/


4¡¢ºÚ¿ÍÇÔÈ¡Titan Distributors¹«Ë¾½üÒ»ÄêµÄ¿Í»§Ö§¸¶Êý¾Ý

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Titan Distributors¹«Ë¾Ôâµ½ºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬ £¬£¬£¬²¿·Ö¿Í»§µÄÖ§¸¶Êý¾Ý±»ÇÔ¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬ £¬£¬£¬2017Äê11ÔÂ23ÈÕÖÁ2018Äê10ÔÂ25ÈÕʱ´úÆäÔÚÏßÊÐËÁ±»Ö²Èë¶ñÒâ´úÂ룬£¬ £¬£¬ £¬£¬£¬ÕâЩ´úÂëÓÃÓÚÇÔÈ¡Óû§µÄÖ§¸¶ÐÅÏ¢£¬£¬ £¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢Õ˵¥µØµã¡¢µç»°ºÅÂë¡¢ÐÅÓÿ¨ºÅÂë¡¢µ½ÆÚÈÕÆÚºÍÑéÖ¤Âë¡£¡£¡£¡£ ¡£Æ¾Ö¤TitanÖ´·¨ÕÕÁÏButler£¦SnowÏò»ªÊ¢¶ÙÖÝÉó²é³¤·¢³öµÄÒ»·âÐÅ£¬£¬ £¬£¬ £¬£¬£¬ÊÜÓ°ÏìµÄÓû§ÊýĿΪ1838ÈË¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/79595/hacking/titan-manufacturing-security-breach.html


5¡¢Ó¡¶ÈÁè¼Ý1.1ÍòÁ¾¹«¹²Æû³µµÄʵʱGPS×ø±êÔÚÆØ¹â

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Çå¾²Ñо¿Ô±Justin Paine·¢Ã÷Ò»¸öδÉèÃÜÂëµÄElasticSearchЧÀÍÆ÷£¬£¬ £¬£¬ £¬£¬£¬¸ÃЧÀÍÆ÷°üÀ¨À´×Ô27¼ÒÓ¡¶È¹úÓÐÔËÊä»ú¹¹µÄÊý¾Ý£¬£¬ £¬£¬ £¬£¬£¬ÆäÖаüÀ¨Áè¼Ý1.1ÍòÁ¾¹«¹²Æû³µµÄʵʱGPS×ø±êºÍõè¾¶ÐÅÏ¢¡£¡£¡£¡£ ¡£²î±ðÔËÊä»ú¹¹µÄÊý¾Ý²¢²»Ïàͬ£¬£¬ £¬£¬ £¬£¬£¬ÔÚijЩ°¸ÀýÖУ¬£¬ £¬£¬ £¬£¬£¬»¹°üÀ¨Âÿ͵ÄÓû§ÃûºÍµç×ÓÓʼþµØµã¡£¡£¡£¡£ ¡£¸ÃЧÀÍÆ÷ÖÁÉÙÒÑÔÚ»¥ÁªÍøÉÏÆØ¹âÁËÈýÖܵÄʱ¼ä¡£¡£¡£¡£ ¡£ÔÚPaine֪ͨӡ¶ÈCERTºó£¬£¬ £¬£¬ £¬£¬£¬¸ÃЧÀÍÆ÷»ñµÃ±£»£» £»£»£»£»¤£¬£¬ £¬£¬ £¬£¬£¬µ«CERT¾Ü¾øÍ¸Â¶¸ÃЧÀÍÆ÷µÄËùÓÐÕß¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/real-time-location-data-for-over-11000-indian-buses-left-exposed-online/


6¡¢Ê®¶à¿îiOSÓÎÏ·±»·¢Ã÷ÏòGolduckµÄC&CЧÀÍÆ÷·¢ËÍÐÅÏ¢

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿ÍŶÓWandera·¢Ã÷App StoreÉϵÄ14¿îÓÎÏ·Ïò¶ñÒâÈí¼þGolduck LoaderµÄÒÑÖªC&CЧÀÍÆ÷·¢ËÍÊý¾Ý¡£¡£¡£¡£ ¡£GolduckÊÇÒ»¸ö¹ã¸æÈí¼þ·Ö·¢Æ½Ì¨£¬£¬ £¬£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÕâÊ®¶à¿îiOSÓÎÏ·ÌåÏÖ³öÓëѬȾÁËGolduckµÄAndroidÓ¦ÓÃÏàËÆµÄÐÐΪ£¬£¬ £¬£¬ £¬£¬£¬¼´ÔÚÓ¦ÓóÌÐòÖ÷ÆÁÄ»µÄ¶à¸öÇøÓò×¢Èë¹ã¸æ¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬£¬ÕâЩÓÎÏ·»¹ÏòGolduckµÄC£¦CЧÀÍÆ÷·¢ËÍ´ó×ÚÐÅϢƬ¶Ï£¬£¬ £¬£¬ £¬£¬£¬°üÀ¨IPµØµã¡¢Î»ÖÃÊý¾Ý¡¢×°±¸ÀàÐͺÍ×°±¸ÉÏÏÔʾµÄ¹ã¸æÊýÄ¿µÈ¡£¡£¡£¡£ ¡£App StoreÒѾ­Ï¼ÜÁËÕâЩÓꦵÄÓ¦Óᣡ£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/apple-ios-games-found-talking-to-golduck-malware-candc-servers/


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí