ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ39ÖÜ

Ðû²¼Ê±¼ä 2019-10-08

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê9ÔÂ30ÈÕÖÁ10ÔÂ06ÈÕÊÕ¼Çå¾²Îó²î42¸ö£¬£¬£¬£¬ £¬ £¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇExim ¡®string_vformat¡¯º¯Êý»º³åÇøÒç³öÎó²î; Linux kernel cfg80211_mgd_wext_giwessid»º³åÇøÒç³öÎó²î£»£»£»£»£»£»Liferay Portal JSON¸ºÔØ·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Cisco Security Manager Java·´ÐòÁл¯í§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»WhatsApp DDGifSlurpÄÚ´æ¹ýʧÒýÓÃÎó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǺڿÍÇÔÈ¡Áè¼Ý2.18ÒÚWords With FriendsÍæ¼ÒÊý¾Ý£»£»£»£»£»£»µ¤Âó¹«Ë¾DemantÔâµ½ÀÕË÷Èí¼þ¹¥»÷Ëðʧ9500ÍòÃÀÔª£»£»£»£»£»£»eGobblerжñÒâ¹ã¸æ»î¶¯Ð®ÖÆÁè¼Ý10ÒÚÓû§»á»°£»£»£»£»£»£»¶íÂÞ˹Áè¼Ý2000Íò¹«ÃñµÄ˰Êռͼ¼°PIIÔÚÍøÉÏй¶£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶AndroidϵͳÖеÄÐÂLPE 0day¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬ £¬ £¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£

> Ö÷ÒªÇå¾²Îó²îÁбí


1. Exim ¡®string_vformat¡¯º¯Êý»º³åÇøÒç³öÎó²î


Exim ¡®string_vformat¡¯º¯Êý±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬ £¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html

2. Linux kernel cfg80211_mgd_wext_giwessid»º³åÇøÒç³öÎó²î


Linux kernel net/wireless/wext-sme.c cfg80211_mgd_wext_giwessid´¦Öóͷ£³¬³¤SSID IE±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬ £¬£¬£¬¿Éʹϵͳ±ÀÀ£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://marc.info/?l=linux-wireless&m=157018270915487&w=2

3. Liferay Portal JSON¸ºÔØ·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î


Liferay Portal´¦Öóͷ£JSON¸ºÔر£´æ·´ÐòÁл¯Îó²î£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬ £¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://sec.vnpt.vn/2019/09/liferay-deserialization-json-deserialization-part-4/

4. Cisco Security Manager Java·´ÐòÁл¯í§Òâ´úÂëÖ´ÐÐÎó²î


Cisco Security Manager Java·´ÐòÁл¯º¯Êý±£´æÇå¾²Îó²î£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬ £¬£¬£¬¿ÉÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-sm-java-deserial

5. WhatsApp DDGifSlurpÄÚ´æ¹ýʧÒýÓÃÎó²î


WhatsApp decoding.cÖеÄDDGifSlurp±£´æÁ½´ÎÊÍ·ÅÎó²î£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ £¬ £¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.facebook.com/security/advisories/cve-2019-11932


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢ºÚ¿ÍÇÔÈ¡Áè¼Ý2.18ÒÚWords With FriendsÍæ¼ÒÊý¾Ý

MG±ùÇòÍ»ÆÆÊÔÍæ--ÊÖ»ú°æapp¹ÙÍø


ºÚ¿ÍGnosticplayers´ÓÒÆ¶¯Éç½»ÓÎÏ·¹«Ë¾Zynga Inc¿ª·¢µÄWords With FriendsÖÐÇÔÈ¡ÁËÁè¼Ý2.18ÒÚÌõÍæ¼Ò¼Í¼¡£¡£¡£¡£GnosticplayersÔøÔÚ2ÔÂÖÁ4ÔÂʱ´ú³öÊÛÁË´Ó45¼Ò¹«Ë¾ÇÔÈ¡µÄ½ü10ÒÚÌõÓû§ÐÅÏ¢£¬£¬£¬£¬ £¬ £¬£¬£¬ÕâÒ»´ÎËûÃé×¼ÁËÃÀ¹úÉç½»ÓÎÏ·¿ª·¢ÉÌZynga¡£¡£¡£¡£Æ¾Ö¤Gnosticplayers·ÖÏíµÄ¼Í¼£¬£¬£¬£¬ £¬ £¬£¬£¬¸ÃÊý¾Ý¼¯°üÀ¨Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µÇ¼ID¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÃÜÂëÖØÖÃÁîÅÆ¡¢µç»°ºÅÂë¡¢Facebook IDÒÔ¼°ZyngaÕÊ»§ID¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§Îª2019Äê9ÔÂ2ÈÕ֮ǰװÖò¢×¢²á¸ÃÓÎÏ·µÄAndroidºÍiOSÍæ¼Ò¡£¡£¡£¡£ZyngaÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬ £¬ £¬£¬£¬µ«ÌåÏÖûÓвÆÎñÐÅϢй¶¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91850/data-breach/zynga-game-data-breach.html

2¡¢µ¤Âó¹«Ë¾DemantÔâµ½ÀÕË÷Èí¼þ¹¥»÷Ëðʧ9500ÍòÃÀÔª

MG±ùÇòÍ»ÆÆÊÔÍæ--ÊÖ»ú°æapp¹ÙÍø


×÷ΪȫÇò×î´óµÄÖúÌýÆ÷ÖÆÔìÉÌÖ®Ò»£¬£¬£¬£¬ £¬ £¬£¬£¬DemantÔ¤¼Æ±¾Ô³õѬȾÀÕË÷Èí¼þÖ®ºó£¬£¬£¬£¬ £¬ £¬£¬£¬½«ÔâÊܸߴï9500ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£ÆäʱÔÚÆäÍøÕ¾Éϵļò¶ÌÉùÃ÷ÖУ¬£¬£¬£¬ £¬ £¬£¬£¬¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÚ×î³õÐÎòΪ¡°ÑÏÖØÊÂÎñ¡±Ö®ºó£¬£¬£¬£¬ £¬ £¬£¬£¬Ëü½«¹Ø±ÕÆäÕû¸öÄÚ²¿IT»ù´¡ÍøÂç¡£¡£¡£¡£ÆäÖаüÀ¨¸Ã¹«Ë¾µÄERPϵͳ£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÚ²¨À¼µÄÉú²úºÍÏúÊÛÉèÊ©£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÚÄ«Î÷¸çµÄÉú²úºÍЧÀÍÖÐÐÄ£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÚ·¨¹úµÄ¶úÎÏÖ²ÈëÎïÉú²ú»ùµØ£¬£¬£¬£¬ £¬ £¬£¬£¬ÔÚµ¤ÂóµÄ·Å´óÆ÷Éú²ú»ùµØÒÔ¼°Õû¸öÑÇÌ«µØÇøÍøÂç¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-incident-to-cost-danish-company-a-whopping-95-million/

3¡¢eGobblerжñÒâ¹ã¸æ»î¶¯Ð®ÖÆÁè¼Ý10ÒÚÓû§»á»°


MG±ùÇòÍ»ÆÆÊÔÍæ--ÊÖ»ú°æapp¹ÙÍø


Ñо¿Ö°Ô±·¢Ã÷ÁËÓÉÍþв×éÖ¯eGobblerÌᳫµÄÐÂÒ»²¨¹¥»÷»î¶¯£¬£¬£¬£¬ £¬ £¬£¬£¬ÆäÖÐÊܺ¦Õß±»Öض¨Ïòµ½´øÓжñÒâµÄÍøÕ¾¡£¡£¡£¡£Ç徲ר¼ÒÒÔΪ£¬£¬£¬£¬ £¬ £¬£¬£¬eGobblerÊǽñÄ긴Éú½Ú¶à·¢ÐÔ¶ñÒâ¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£¡£¡£Õâ´Î£¬£¬£¬£¬ £¬ £¬£¬£¬Ê¹ÓÃWebkitä¯ÀÀÆ÷ÒýÇæÎó²îÐ®ÖÆÁËÁè¼Ý10ÒÚ¸ö¹ã¸æÕ¹Ê¾¡£¡£¡£¡£×îеĻ»¹Åú×¢£¬£¬£¬£¬ £¬ £¬£¬£¬Õë¶ÔÒÔÇ°ÔøÒÔÒÆ¶¯×°±¸Îª¹¥»÷Ä¿µÄµÄÍþв¼ÓÈëÕߵijÌÐòÓÐËù¸Ä±ä£ºÔÚ´Ëʱ´ú£¬£¬£¬£¬ £¬ £¬£¬£¬eGobbler¶Ǫ̂ʽ»úµÄÆ«ÐÒÖ§³ÖÁËËûÃÇ×îеÄWebKitʹÓᣡ£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/malvertising-attack-hijacks-1b-sessions-with-webkit-exploit/148795/

4¡¢¶íÂÞ˹Áè¼Ý2000Íò¹«ÃñµÄ˰Êռͼ¼°PIIÔÚÍøÉÏй¶

MG±ùÇòÍ»ÆÆÊÔÍæ--ÊÖ»ú°æapp¹ÙÍø


Ñо¿Ö°Ô±Ëµ£¬£¬£¬£¬ £¬ £¬£¬£¬Áè¼Ý2000Íò·ÝÊôÓÚ¶íÂÞ˹¹«ÃñµÄ˰ÊռͼûÓÐÊܵ½±£»£»£»£»£»£»¤£¬£¬£¬£¬ £¬ £¬£¬£¬²¢Í¨¹ýÒ»¸ö¿É¹©¹«ÖÚ»á¼ûµÄÔÚÏßÊý¾Ý¿â¾ÙÐйûÕæ¡£¡£¡£¡£¸ÃЧÀÍÆ÷°üÀ¨ÁË´Ó2009Äêµ½2016ÄêµÄ¸ß¶ÈÃô¸ÐµÄÐÅÏ¢¡£¡£¡£¡£´ó²¿·Ö¼ÍÂ¼ËÆºõÓëÀ´×ÔĪ˹¿Æ¼°¶¼»áÖܱߵØÇøµÄ¹«ÃñÓйء£¡£¡£¡£Êý¾Ý¿â°üÀ¨ÐÕÃû£¬£¬£¬£¬ £¬ £¬£¬£¬µØµã£¬£¬£¬£¬ £¬ £¬£¬£¬ÆÜÉí״̬£¬£¬£¬£¬ £¬ £¬£¬£¬»¤ÕÕºÅÂ룬£¬£¬£¬ £¬ £¬£¬£¬Òƶ¯µç»°£¬£¬£¬£¬ £¬ £¬£¬£¬Ë°ºÅ£¬£¬£¬£¬ £¬ £¬£¬£¬¹ÍÖ÷Ãû³ÆºÍÀο¿µç»°ÒÔ¼°Ë°Öµ¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/plaintext-tax-records-of-20-million-russians-leaked-online/

5¡¢Ñо¿Ö°Ô±Åû¶AndroidϵͳÖеÄÐÂLPE 0day

MG±ùÇòÍ»ÆÆÊÔÍæ--ÊÖ»ú°æapp¹ÙÍø


Ñо¿Ö°Ô±Maddie Stone·¢Ã÷Ò»¸öδÐÞ¸´µÄAndroid 0dayÒѾ­±»Ê¹Ó㬣¬£¬£¬ £¬ £¬£¬£¬¸ÃÎó²î¿ÉÒÔʹÍâµØÌØÈ¨¹¥»÷Õß»òÓ¦ÓóÌÐòÉý¼¶ÆäÌØÈ¨£¬£¬£¬£¬ £¬ £¬£¬£¬ÒÔ»ñµÃ¶ÔÒ×Êܹ¥»÷µÄ×°±¸µÄ¸ù»á¼ûȨÏÞ£¬£¬£¬£¬ £¬ £¬£¬£¬²¢ÓпÉÄÜÍêÈ«¿ØÖƸÃ×°±¸¡£¡£¡£¡£¸ÃÎó²îÔÚÈ¥Äê4ÔÂ֮ǰÐû²¼µÄAndroidÄں˰汾ÖУ¬£¬£¬£¬ £¬ £¬£¬£¬¸Ã²¹¶¡ÒѰüÀ¨ÔÚ2017Äê12ÔÂÐû²¼µÄ4.14 LTS LinuxÄÚºËÖУ¬£¬£¬£¬ £¬ £¬£¬£¬µ«½ö°üÀ¨ÔÚAOSP AndroidÄں˰汾3.18¡¢4.4ºÍ4.9ÖС£¡£¡£¡£Google½«ÔÚδÀ´¼¸ÌìµÄ10Ô¡¶ AndroidÇ徲ͨ¸æ¡·ÖÐÐû²¼´ËÎó²îµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬ £¬ £¬£¬£¬²¢Í¨ÖªOEM¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/10/android-kernel-vulnerability.html