PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼£»£»£»£»LinuxÎó²î£¨CVE-2019-14899£©¿Éµ¼Ö¹¥»÷ÕßÐ®ÖÆVPN
Ðû²¼Ê±¼ä 2019-12-06
1.OpenBSDÍŶÓÐÞ¸´4¸öÉí·ÝÑéÖ¤ÈÆ¹ý/ÌáȨÎó²î
OpenBSDÍŶÓÐÞ¸´ÁË4¸ö¿Éµ¼ÖÂÌØÈ¨Éý¼¶ºÍÉí·ÝÑéÖ¤ÈÆ¹ýµÄÇå¾²Îó²î£¬£¬£¬£¬£¬Qualys Research LabsÔÚ±¾ÖÜÔçЩʱ¼ä·¢Ã÷²¢±¨¸æÁËÕâЩÎó²î£¬£¬£¬£¬£¬OpenBSD¿ª·¢ÍŶÓÔÚ40¸öСʱ֮ÄÚÐû²¼ÁËÕë¶ÔOpenBSD 6.5ºÍOpenBSD 6.6µÄÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£Îó²î¹æÄ£°üÀ¨Éí·ÝÑéÖ¤ÈÆ¹ý£¨CVE-2019-19521£©ºÍÌØÈ¨Éý¼¶£¨CVE-2019-19519¡¢CVE-2019-19520ºÍCVE-2019-19520£©¡£¡£¡£¡£¡£QualysÑо¿Ö°Ô±»¹ÔÚÿ¸öÎó²îµÄ×Éѯͨ¸æÖÐÐû²¼ÁËÏà¹ØPoCʹÓᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/openbsd-patches-severe-authentication-bypass-privilege-escalation-vulnerabilities/
2.UbuntuÐû²¼Intel΢Âë¸üУ¬£¬£¬£¬£¬ÐÞ¸´CPU¹ÒÆðÎÊÌâ
CanonicalΪUbuntuÐû²¼ÁËеÄLinux Intel΢´úÂë¸üУ¬£¬£¬£¬£¬¸Ã¸üÐÂÐÞ¸´Á˵¼ÖÂIntel Skylake CPUÔÚÈÈÖØÆôºó¹ÒÆðµÄÎÊÌâ¡£¡£¡£¡£¡£Ö®Ç°11ÔÂ12ÈÕµÄIntel΢´úÂë¸üÐÂÖлº½âÁËÊÂÎñͬ²½À©Õ¹£¨TSX£©¹¦Ð§ÖеÄÎó²îºÍÖÁÇ¿´¦Öóͷ£Æ÷ÖеÄDoSÎó²î£¬£¬£¬£¬£¬µ«¸Ã¸üе¼ÖÂÁËÒ»¸ö»Ø¹éÎó²î£ºIntel Skylake´¦Öóͷ£Æ÷ÔÚÈÈÖØÆôºó¹ÒÆð¡£¡£¡£¡£¡£Îª½â¾ö´ËÎÊÌ⣬£¬£¬£¬£¬UbuntuÍŶÓÐû²¼ÁËеÄintel-microcode-3.20191115.1ubuntu0¸üУ¬£¬£¬£¬£¬¸Ã¸üпɻ¹ÔSkylake´¦Öóͷ£Æ÷µÄ΢´úÂ룬£¬£¬£¬£¬Ê¹Æä²»ÔÙ¹ÒÆð¡£¡£¡£¡£¡£UbuntuÓû§¿ÉÒÔÔËÐÐSoftware Updater³ÌÐòÀ´¼ì²é²¢×°ÖÃ×îиüС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/linux/ubuntu-linux-gets-intel-microcode-update-to-fix-cpu-hangs/
3.ÃÀ¹úÊý¾ÝÖÐÐÄÕÛÎñÉÌCyrusOneÊÜÀÕË÷Èí¼þ¹¥»÷
ÃÀ¹úÊý¾ÝÖÐÐÄÕÛÎñÉÌCyrusOneÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¸Ã¹«Ë¾½²»°ÈËÔÚÒ»·âµç×ÓÓʼþÖÐ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬²¢ÌåÏÖËûÃÇÏÖÔÚÕýÔÚÓëÖ´·¨»ú¹¹ºÍ·¨Ö¤¹«Ë¾ÏàÖú¾ÙÐÐÊÓ²ìÒÔ¼¿ÕÊÖú¿Í»§»Ö¸´ÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£¡£CyrusOneÌåÏÖÓÉÓÚÀÕË÷Èí¼þ¶ÔÍøÂçÖеÄijЩװ±¸¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬µ¼ÖÂλÓÚŦԼÊý¾ÝÖÐÐĵÄÁù¸öÍйÜЧÀͿͻ§Óöµ½ÁË¿ÉÓÃÐÔÎÊÌ⣬£¬£¬£¬£¬ÆäÖаüÀ¨½ðÈں;¼Í¹«Ë¾FIA Tech¡£¡£¡£¡£¡£Æ¾Ö¤ZDNetÊÕµ½µÄÐÂÎÅ£¬£¬£¬£¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ12ÔÂ4ºÅ£¬£¬£¬£¬£¬²¢ÇÒÊÇÓÉÀÕË÷Èí¼þREvil£¨Sodinokibi£©ÒýÆðµÄ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-attack-hits-major-us-data-center-provider/
4.ÒÁÀÊAPT×é֯ʹÓÃÊý¾Ý²Á³ýÆ÷ZeroCleareÃé×¼Öж«
IBMÑо¿Ö°Ô±·¢Ã÷Ò»¸öÐÂµÄÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þZeroCleare£¬£¬£¬£¬£¬¸ÃÈí¼þ±»¹ú¼Ò×ÊÖúµÄºÚ¿Í×éÖ¯ÔÚÒ°ÍâÓÃÓÚÕë¶ÔÖж«µÄÄÜÔ´ºÍ¹¤Òµ×éÖ¯¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆZeroCleareÓëÁ½¸öÒÁÀÊAPT×éÖ¯Óйأ¬£¬£¬£¬£¬Ò»¸öÊÇAPT34£¨Ò²±»³ÆÎªITG13ºÍOilrig£©£¬£¬£¬£¬£¬ÁíÒ»¸öÊÇHive0081£¨Ò²±»³ÆÎªxHunt£©¡£¡£¡£¡£¡£ZeroCleareÊǶà½×¶Î¹¥»÷ÖеÄ×îÖÕpayload£¬£¬£¬£¬£¬ËüÓÐÁ½¸ö±äÌ壬£¬£¬£¬£¬»®·ÖÕë¶Ô32λºÍ64λµÄWindowsϵͳ¡£¡£¡£¡£¡£µ«Ñо¿Ö°Ô±ÌåÏÖÖ»ÓÐ32λµÄ°æ±¾¿ÉÓ㬣¬£¬£¬£¬ÓÉÓÚ64λ°æ±¾ÔÚÏÖʵ×îÏȲÁ³ýÊý¾Ý֮ǰ»áÍ߽⡣¡£¡£¡£¡£Ñо¿Ö°Ô±»¹³ÆZeroCleare¹¥»÷ÊÇÕë¶ÔÌØ¶¨²¿·ÖºÍ×éÖ¯µÄÕë¶ÔÐÔÐж¯¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-iranian-zerocleare-data-wiper-malware-used-in-targeted-attacks/
5.PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼
PCIÇå¾²±ê׼ίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£¡£¡£¡£¡£¸Ã±ê×¼ÔÊÐí´øÓÐNFCµÄCOTSÒÆ¶¯×°±¸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£¡£¡£¡£¡£PCI CPoC±ê×¼ÊǸÃίԱ»áΪ½â¾öÒÆ¶¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö±ê×¼¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬PCI CPoC±ê×¼»®¶¨Á˹©Ó¦ÉÌÔÚ±£»£»£»£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¼Æ»®·½ÃæµÄһЩÇå¾²ÉϵÄÒªÇ󡣡£¡£¡£¡£±ê×¼µÄCPoC½â¾ö¼Æ»®°üÀ¨¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTS×°±¸¡¢ÂÄÀúÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°×ÔÁ¦ÓÚCOTS×°±¸µÄºó¶Ëϵͳ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1
6.LinuxÎó²î£¨CVE-2019-14899£©¿Éµ¼Ö¹¥»÷ÕßÐ®ÖÆVPN
Çå¾²Ñо¿Ö°Ô±Åû¶ÁËÒ»¸öÓ°Ïì*NIX×°±¸µÄÇå¾²Îó²î£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßÐá̽¡¢Ð®Öƺ͸͝VPNËíµÀÅþÁ¬£¬£¬£¬£¬£¬²¢½«í§ÒâÓÐÓÃÔØºÉ×¢ÈëIPv4ºÍIPv6µÄTCPÊý¾ÝÁ÷ÖС£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-14899£©Î»ÓÚ»ùÓÚUnix²Ù×÷ϵͳµÄÍøÂç¿ÍÕ»ÖУ¬£¬£¬£¬£¬¸üÏêϸµØËµ£¬£¬£¬£¬£¬ÔÚ²Ù×÷ϵͳ¶ÔÒâÍâµÄÍøÂçÊý¾Ý°ü̽²â¾ÙÐÐÏìÓ¦µÄÀú³ÌÖС£¡£¡£¡£¡£ÒÑÖª¸ÃÎó²î»áÓ°Ïì´ó´ó¶¼Linux¿¯ÐаæºÍÀàUnix²Ù×÷ϵͳ£¬£¬£¬£¬£¬°üÀ¨FreeBSD¡¢OpenBSD¡¢macOS¡¢iOSºÍAndroid¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ´Ë¹¥»÷¿ÉÕë¶ÔOpenVPN¡¢WireGuardºÍIKEv2/IPSecµÈVPNÊÖÒÕ£¬£¬£¬£¬£¬µ«ÈÔÔÚ²âÊÔÆäÕë¶ÔTorµÄ¿ÉÐÐÐÔ¡£¡£¡£¡£¡£Ð§ÀÍÆ÷ÖÎÀíÔ±¿ÉÒÔ½ÓÄɵĻº½â²½·¥°üÀ¨·¿ª·´Ïò·¾¶¹ýÂË¡¢Ê¹ÓÃbogon¹ýÂËÐéαIPµØµã»òʹÓüÓÃܵÄÊý¾Ý°ü¾ÞϸºÍ׼ʱµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/