Windows¼ÓÃÜ¿âSymCryptËÀËøÎó²î£¬£¬£¬£¬¿Éͨ¹ý¶ñÒâÖ¤Êé´¥·¢DoS£»£»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬²¿·Ö¹¤³§ÒѹرÕ
Ðû²¼Ê±¼ä 2019-06-13
΢ÈíÔÚ6ÔµÄWindowsÇå¾²¸üÐÂÖÐÐÞ¸´ÁË88¸öÎó²î£¬£¬£¬£¬ÆäÖаüÀ¨SandboxEscaper֮ǰÅû¶µÄ4¸ö¹ûÕæµÄ0day£¨Windows InstallerÌáȨÎó²îCVE-2019-0973¡¢Windows ShellÌáȨÎó²îCVE-2019-1053¡¢CVE-2019-0841µÄ²¹¶¡ÈƹýÌáȨÎó²îCVE-2019-1064ÒÔ¼°ÍýÏëʹÃüÌáȨÎó²îCVE-2019-1069£©¡£¡£¡£±ðµÄ£¬£¬£¬£¬Î¢Èí»¹Ðû²¼ÁËÕë¶ÔµÚÈý·½Èí¼þÓ²¼þÎó²îÐÞ¸´µÄËÄÌõÇ徲ͨ¸æºÍÕë¶ÔExchange ServerµÄÉî¶ÈÇå¾²¸üС£¡£¡£ÍêÕû²¹¶¡ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/microsoft/microsofts-june-2019-patch-tuesday-fixes-88-vulnerabilities/
2¡¢Ó¢ÌضûÐû²¼NUCÌ×¼þ¼°RWC3Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¸öÑÏÖØÎó²î
Ó¢ÌØ¶ûÐÞ¸´ÃÔÄãPC NUCÌ×¼þ¼°Windows RAID Web¿ØÖÆÌ¨£¨RWC3£©ÖеĶà¸öÇå¾²Îó²î¡£¡£¡£ÆäÖÐRAIDÈí¼þÖÐÐÞ¸´µÄµ¥¸öÎó²îÑÏÖØÐÔ×î¸ß£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-11119£©µÄCVSSÆÀ·ÖΪ8.9·Ö£¬£¬£¬£¬¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¾ÙÐÐÌáȨ¡£¡£¡£¸ÃÎó²îÓëЧÀÍAPIÖÐȱ·¦»á»°ÑéÖ¤Óйأ¬£¬£¬£¬Ó°ÏìÁË4.186¼°¸üÔçµÄ°æ±¾¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ó¢ÌضûÔÚNUCÌ×¼þµÄ¹Ì¼þ¸üÐÂÖÐÐÞ¸´Á˶à¸ö¿Éµ¼ÖÂÌáȨ¡¢DoS¼°ÐÅϢй¶µÄÎó²î£¬£¬£¬£¬²¨¼°39¸ö²úÆ·¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/intel-updates-nuc-bios-raid-soft-to-patch-high-severity-bugs/
3¡¢Windows¼ÓÃÜ¿âSymCryptËÀËøÎó²î£¬£¬£¬£¬¿Éͨ¹ý¶ñÒâÖ¤Êé´¥·¢DoS
¹È¸èÑо¿Ö°Ô±Tavis OrmandyÔÚWindowsÖ÷Òª¼ÓÃÜ¿âSymCryptÖз¢Ã÷Ò»¸öÎó²î£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßÔÚWin 8¼°¸ü¸ß°æ±¾µÄЧÀÍÆ÷ÉÏ´¥·¢DoS¡£¡£¡£OrmandyʹÓÃÌØÖÆµÄX.509Êý×ÖÖ¤Êé²âÊÔÁ˸ÃÎó²î£¬£¬£¬£¬¸ÃÖ¤ÊéÎÞ·¨Íê³ÉÑéÖ¤Àú³Ì£¬£¬£¬£¬²¢»áÔÚЧÀÍÆ÷ÉÏ´¥·¢ËÀËø¡£¡£¡£OrmandyÌåÏÖÔÚʹÓÃbcryptprimitives!SymCryptFdefModInvGenericÅÌËãÌØ¶¨Î»Ä£Ê½µÄÄ£ÄæÔªÊ±£¬£¬£¬£¬½«µ¼ÖÂËÀÑ»·¡£¡£¡£¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßÔÚÈκÎWindowsЧÀÍÆ÷£¨ÈçIPsec¡¢IISºÍExchange Server£©ÉÏ´¥·¢DoS¡£¡£¡£Î¢ÈíδÄÜÔÚ90ÌìÄÚÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±Åû¶Á˸ÃÎó²îµÄÏà¹ØÏ¸½Ú¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bad-cert-vulnerability-can-bring-down-any-windows-server/
4¡¢ÃÀDHSÖÒÑÔʹÓÃDICOMҽѧӰÏñÎļþÒþ²Ø¶ñÒâ´úÂëµÄ¹¥»÷»î¶¯
6ÔÂ11ÈÕÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©ÖÒÑÔ³ÆDICOMҽѧӰÏñÎļþ¿É±»ÓÃÓÚÒþ²Ø¶ñÒâÈí¼þ¡£¡£¡£DICOMÊÇÒ»ÖÖÆÕ±éʹÓõĹú¼Ê±ê×¼£¬£¬£¬£¬ÓÃÓÚ´æ´¢¡¢´«Êä¡¢¼ìË÷¡¢´¦Öóͷ£ºÍÏÔʾҽѧӰÏñÐÅÏ¢£¬£¬£¬£¬¸Ã±ê×¼±»ÓÃÓÚÈ«ÇòÒ½ÔºµÄ³ÉÏñ×°±¸£¨CT¡¢MR¡¢³¬Éù²¨£©¡¢³ÉÏñÐÅϢϵͳ£¨HIS¡¢RIS¡¢PACS£©ºÍÍâΧװ±¸£¨ÊÂÇéÕ¾ºÍ3D´òÓ¡»ú£©Ö®ÖС£¡£¡£CyleraÑо¿Ö°Ô±·¢Ã÷DICOMÎļþÍ·µÄÒ»¸ö128×Ö½Úǰµ¼Âë¿ÉÓÃÓÚÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬²¢Ðû²¼Á˸ÃÎó²î£¨CVE-2019-11687£©µÄÏêϸÐÅÏ¢ºÍPoC´úÂë¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/malware-can-be-hidden-dicom-medical-imaging-files-dhs-warns
5¡¢Lake CityÔâÀÕË÷Èí¼þTriple Threat¹¥»÷£¬£¬£¬£¬ÊÐÕþЧÀÍÒÑÖÐÖ¹
ƾ֤Lake City¾¯·½Í¸Â¶µÄÐÂÎÅ£¬£¬£¬£¬¸ÃÊÐÓÚ5ÔÂ10ÈÕÔâµ½ÀÕË÷Èí¼þTriple Threat¹¥»÷£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÈýÖÖ²î±ðµÄ¹¥»÷ÒªÁìÕë¶Ô¸ÃÊеÄÍøÂçϵͳ£¬£¬£¬£¬µ¼Ö¸ÃÊеĵç×ÓÓʼþϵͳ¡¢Àο¿µç»°ºÍÐÅÓÿ¨Ð§Àͱ»ÆÈ¹Ø±Õ¡£¡£¡£¾¯·½ÌåÏÖ°üÀ¨¾¯Ô±ºÍ»ðÔÖÔÚÄÚµÄËùÓнôÆÈЧÀͶ¼²»Êܴ˴ι¥»÷ÊÂÎñµÄÓ°Ï죬£¬£¬£¬¹«¹²Çå¾²ÍøÂçÒ²Òѱ»¸ôÀë²¢ÊܼÓÃܱ£»£»¤¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúÊÇ·ñÓÐÈκÎÃô¸ÐÊý¾Ý±»ÀÄÓûòй¶£¬£¬£¬£¬µ«¶¼»áÐÅÏ¢ÊÖÒÕ×ܼàBrian Hawkins³ÆÃ»ÓÐÖ§¸¶Êý¾ÝÊܵ½Ó°Ï죬£¬£¬£¬ÓÉÓÚÕâЩÊý¾Ý¶¼ÊÇÓɵÚÈý·½¹©Ó¦ÉÌ´æ´¢ÔÚÒìµØ¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/triple-threat-ransomware-attack-cripples-email-systems-and-services-of-lake-city-729e1f23
6¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬²¿·Ö¹¤³§ÒѹرÕ
¾Ý±ÈÀûʱýÌ屨µÀ£¬£¬£¬£¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þѬȾ£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ×èÖ¹ÁËËĸö¹ú¼ÒµÄ¹¤³§Éú²ú¡£¡£¡£¸ÃѬȾÊÂÎñ±¬·¢ÔÚ6ÔÂ7ÈÕÐÇÆÚÎ壬£¬£¬£¬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§£¬£¬£¬£¬µ«ASCOÒ²¹Ø±ÕÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¡£¡£¾Ý±¨µÀÍ£»£»úʱ¼äÔ¤¼ÆÎªÒ»ÖÜ£¬£¬£¬£¬°üÀ¨¼´½«µ½À´µÄÖÜÄ©¡£¡£¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶¸ü¶àÐÅÏ¢£¬£¬£¬£¬ÏÖÔÚÒ²²»ÖªµÀÀÕË÷Èí¼þµÄÃû³Æ¡£¡£¡£ASCOÊÇÌìÏÂÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò»£¬£¬£¬£¬Æä¿Í»§°üÀ¨¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/


¾©¹«Íø°²±¸11010802024551ºÅ