Docker Image rootÕË»§¿ÕÃÜÂ룻£»£»ÈýÐÇSmartThingsÔ´Âëй¶£»£»£»Turla APT
Ðû²¼Ê±¼ä 2019-05-10
1¡¢Alpine LinuxµÄDocker Image±£´ærootÕË»§¿ÕÃÜÂëÎó²î

Alpine LinuxµÄ¹Ù·½Docker¾µÏñ±£´ærootÕË»§¿ÕÃÜÂëÎó²î£¨CVE-2019-5021£©¡£¡£¸ÃÎó²îÒѾ±£´æÁËÁè¼Ý3ÄêµÄʱ¼ä£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ9.8·Ö¡£¡£¸ÃÎó²î×î³õÓÚ2015Äê·¢Ã÷²¢±»ÐÞ¸´£¬£¬£¬£¬µ«2015Äê12Ô·ݵĸü¸Äµ¼ÖÂÎó²îÔٴηºÆð£¬£¬£¬£¬²¢ÇÒÒ»Ö±±£´æ¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬Óû§ÕË»§µÄÉèÖÃÖÎÀíÎļþ/etc/shadowÖаüÀ¨¿ÕȱµÄsp_pwdp×ֶΣ¬£¬£¬£¬¶ø²»ÊǼÓÃܵÄÃÜÂë¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨Alpine Docker 3.3¡¢3.4¡¢3.5¡¢3.6¡¢3.7¡¢3.8¡¢3.9ºÍAlpine Docker Edge¡£¡£¸ÃÎó²îÒÑÓÚ2019Äê3ÔÂ8ÈÕ±»ÐÞ¸´¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bug-in-alpine-linux-docker-image-leaves-root-account-unlocked/
2¡¢¹È¸èÐû²¼5ÔÂAndroidÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´15¸öÎó²î

¹È¸èÔÚ5Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË15¸öÎó²î£¬£¬£¬£¬ÆäÖаüÀ¨4¸öÑÏÖØÎó²î£¬£¬£¬£¬10¸ö¸ßΣÎó²îºÍ1ÆäÖÐΣÎó²î¡£¡£Õâ4¸öÑÏÖØÎó²î£¨CVE-2019-2045£¬£¬£¬£¬CVE-2019-2046£¬£¬£¬£¬CVE-2019-2047ºÍCVE-2019-2044£©¾ùΪԶ³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬ÆäÖÐÈý¸öÓëϵͳ½¹µãÓ¦ÓÃÓйأ¨²¦ºÅÆ÷¡¢µç×ÓÓʼþºÍÏà»ú£©£¬£¬£¬£¬µÚËĸöÓëýÌå¿ò¼Ü×é¼þÓйأ¬£¬£¬£¬ÏÖÔÚÔÝδÅû¶¸ü¶à²¹¶¡Ï¸½Ú¡£¡£±ðµÄ£¬£¬£¬£¬¹È¸è»¹Ðû²¼ÁËNVIDIA¡¢BroadcomºÍQualcommÆ·¼¶Èý·½¹©Ó¦ÉÌ×é¼þÖеĶà¸öÎó²î²¹¶¡£¬£¬£¬£¬Ê¹µÃÐÞ¸´µÄCVE×ÜÊý´ï30¸ö¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/google-critical-remote-code-execution-flaws-android/144497/
3¡¢ÈýÐÇÒâÍâй¶SmartThingsÔ´Âë¼°¶à¸öÏîÄ¿µÄÄÚ²¿ÃÜÔ¿
ÈýÐǹ¤³ÌʦµÄÒ»¸öGitLabЧÀÍÆ÷±»¹ýʧµØÉèÖÃΪpublic²¢ÇÒδÉèÖÃÃÜÂë±£»£»£»¤£¬£¬£¬£¬µ¼Ö´ó×ÚÃô¸ÐÐÅϢй¶¡£¡£¸ÃЧÀÍÆ÷ÍйÜÔÚÈýÐǵÄÓòÃûVandev LabÉÏ£¬£¬£¬£¬Æ¾Ö¤µÏ°ÝÇå¾²³§ÉÌSpiderSilkÑо¿Ö°Ô±Mossab HusseinµÄ·¢Ã÷£¬£¬£¬£¬¸ÃЧÀÍÆ÷й¶ÁËSmartThingsÈí¼þµÄÔ´´úÂëºÍ˽ÓÐÖ¤Ê飬£¬£¬£¬»¹Ð¹Â¶Á˶àÃûÔ±¹¤µÄÃ÷ÎÄ˽ÓÐGitLabÁîÅÆÒÔ¼°Ò»Ð©ÄÚ²¿ÎĵµºÍPPT¡£¡£
ÔÎÄÁ´½Ó£ºhttps://techcrunch.com/2019/05/08/samsung-source-code-leak/
4¡¢ºÚ¿ÍÍÅ»ïй¶3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÃô¸ÐÊý¾Ý
ºÚ¿ÍÍÅ»ïLulZSecºÍItaÔÚÍøÉÏÐû²¼ÁË3ÍòÃûÂÞÂí״ʦµÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬ÆäÖÐÉõÖÁ°üÀ¨ÂÞÂíÊ㤵ÄÊý¾Ý¡£¡£¾Ý±¨µÀºÚ¿ÍÍÅ»ïÇÔÈ¡ÁËÔÚÂíÌ©ÀºÍ¿¨Ì¹ÔúÂÞ×¢²áµÄ״ʦÐÅÏ¢£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨µç×ÓÓʼþÕË»§¡¢Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ»á¼ûPECÕÊ»§µÄÖ¤¾Ý¡£¡£ºÚ¿ÍÍŻﲢûÓжÔÕâЩÊý¾ÝÌá³öÀÕË÷£¬£¬£¬£¬²¢³Æ²»»áʹÓÃÕâЩÊý¾Ý¾ÙÐжñÒâ»î¶¯¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/lulzsec-and-ita-hacktivist-groups-publish-the-personal-data-of-30000-roman-lawyers-6ac94567
5¡¢Turla APTʹÓÃLightNeuronºóÃÅÐ®ÖÆExchangeЧÀÍÆ÷

ƾ֤ESETÑо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬×Ô2014ÄêÒÔÀ´¶íÂÞ˹·¸·¨ÍÅ»ïTurla APTÒ»Ö±ÔÚʹÓÃLightNeuronºóÃÅÐ®ÖÆMicrosoft ExchangeÓʼþЧÀÍÆ÷¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÊܺ¦×éÖ¯°üÀ¨°ÍÎ÷µÄÒ»¸ö×éÖ¯ºÍ¶«Å·¼°Öж«µÄÍâ½»»ú¹¹¡£¡£LightNeuronÊǵÚÒ»¸öÕë¶ÔExchangeЧÀÍÆ÷µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬Ëü¿ÉÒÔÉó²éºÍÐÞ¸Äͨ¹ýÓʼþЧÀÍÆ÷·¢Ë͵ÄÈκεç×ÓÓʼþ¡¢×«Ð´ºÍ·¢ËÍÐÂÓʼþÒÔ¼°×èÖ¹Èκεç×ÓÓʼþ¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/turla-threat-actor-group-hijacks-microsoft-exchange-mail-server-using-sophisticated-lightneuron-backdoor-d615cc04
6¡¢US-CERTÐû²¼Lazarus APT¶ñÒ⹤¾ßELECTRICFISHµÄÆÊÎö±¨¸æ
ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©ºÍÁìÍÁÇå¾²²¿£¨DHS£©Ðû²¼¹ØÓÚ¶ñÒâÈí¼þELECTRICFISHµÄÁªºÏÆÊÎö±¨¸æ£¨MAR£©¡£¡£¸Ã¶ñÒâÈí¼þÊdz¯ÏÊAPT×éÖ¯LazarusʹÓõŤ¾ß£¬£¬£¬£¬ÓÃÓÚÍøÂçºÍÇÔÈ¡Êܺ¦ÕßµÄÊý¾Ý¡£¡£ELECTRICFISHʵÏÖÁËÒ»ÖÖ×Ô½ç˵ÐÒ飬£¬£¬£¬ÔÊÐíÔÚÔ´ºÍÄ¿µÄIPµØµãÖ®¼ä´«ÊäÁ÷Á¿¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÊðÀíЧÀÍÆ÷/¶Ë¿Ú¾ÙÐÐÉèÖ㬣¬£¬£¬´Ó¶øÈƹýÊÜѬȾϵͳµÄÉí·ÝÑéÖ¤¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.us-cert.gov/ncas/analysis-reports/AR19-129A


¾©¹«Íø°²±¸11010802024551ºÅ