Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î£»£»£»£»£»£»Î¢ÈíOAuthÑéÖ¤Àú³Ì±£´æÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂAzureÕÊ»§±»½ÓÊÜ
Ðû²¼Ê±¼ä 2019-12-041.Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î
SafeBreach LabsÑо¿Ö°Ô±Åû¶Autodesk¡¢Ç÷ÊÆ¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLLÐ®ÖÆÎó²î¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Çå¾²Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚcoreServiceShell.exe×é¼þÖС£¡£¡£¡£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬£¬Òò´Ë¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐí§ÒâDLL£¬£¬£¬£¬£¬£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³¤ÆÚÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£¡£¡£¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²»®·ÖÊܵ½ÀàËÆµÄÎó²îCVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/
2.΢ÈíOAuthÑéÖ¤Àú³Ì±£´æÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂAzureÕÊ»§±»½ÓÊÜ
CyberArkÇå¾²Ñо¿Ô±Omer Tsarfati·¢Ã÷΢ÈíµÄÓ¦ÓóÌÐòʹÓÃOAuth¾ÙÐеÚÈý·½Éí·ÝÑéÖ¤µÄ·½·¨Öб£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¿ÉÄÜʹ¹¥»÷Õß½ÓÊÜÓû§µÄAzureÔÆÕÊ»§¡£¡£¡£¡£OAuthÊÇÒ»ÖÖÉí·ÝÑéÖ¤ÐÒ飬£¬£¬£¬£¬£¬ÔÊÐíÓ¦ÓóÌÐòÓëµÚÈý·½ÍøÕ¾»òÈí¼þ¹²ÏíÓû§ÕË»§Êý¾Ý¡£¡£¡£¡£ÔÚ΢ÈíµÄOAuthÊÚȨÁ÷³ÌÖУ¬£¬£¬£¬£¬£¬µÚÈý·½½«ÊǾÓÉ΢ÈíÅú×¼µÄ°×Ãûµ¥URL¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩ±»ÐÅÈεİ×Ãûµ¥URLÖаüÀ¨Ò»Ð©Î´ÔÚAzureÃÅ»§ÖÐ×¢²áµÄURL£¬£¬£¬£¬£¬£¬ÀýÈç.cloudapp.net¡¢.azurewebsites.netºÍ.{vm_region}.cloudapp.azure.com¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÖÁÉÙÓÐ54¸öÀàËÆµÄ×ÓÓòδÔÚδÔÚAzureÃÅ»§ÖÐ×¢²á£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý×¢²áÕâЩÓòÀ´»á¼û΢ÈíÓû§µÄÊý¾Ý¡£¡£¡£¡£Î¢ÈíÔÚ11ÔÂ19ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/
3.¹È¸èÐû²¼12ÔÂAndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬ ÐÞ¸´¶à¸öÎó²î
¹È¸èµÄ12ÔÂAndroidÇå¾²¸üÐÂÓÉ2019-12-01ºÍ2019-12-05Á½¸öÇå¾²²¹¶¡³ÌÐò¼¶±ð×é³É£¬£¬£¬£¬£¬£¬ÆäÖÐ2019-12-01²¹¶¡°üÖÐÐÞ¸´ÁË15¸öÎó²î¡£¡£¡£¡£×îÑÏÖØµÄÎó²îÊÇFramework×é¼þÖеÄDoSÎó²îCVE-2019-2232£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËAndroid°æ±¾8.0¡¢8.1¡¢9ºÍ10£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÐÂÎŵ¼ÖÂÓÀÊÀ¾Ü¾øÐ§ÀÍ¡£¡£¡£¡£ÆäËüÑÏÖØµÄÎó²î»¹°üÀ¨Media¿ò¼ÜÖеÄÒªº¦Îó²îCVE-2019-2222ºÍCVE-2019-2223£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÌØÈ¨Àú³ÌµÄÉÏÏÂÎÄÖÐÖ´ÐдúÂë¡£¡£¡£¡£±¾´ÎÇå¾²¸üÐÂÖиßͨ±ÕÔ´×é¼þÐÞ¸´ÁË22¸öÎó²î£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ×é¼þ°üÀ¨¶àģʽºô½Ð´¦Öóͷ£Æ÷¡¢¿í´øÂë·Ö¶àÖ·ºÍµ÷ÖÆ½âµ÷Æ÷µÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://source.android.com/security/bulletin/2019-12-01
4.ÃÀ¹úÇ¹Ö§ÖÆÔìÉÌSmith£¦WessonÔâMageCart¹¥»÷
ÃÀ¹úÇ¹Ö§ÖÆÔìÉÌSmith£¦WessonµÄÔÚÏßÊÐËÁÔâµ½Magecart¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§Ö§¸¶ÐÅÏ¢¿ÉÄܱ»ÇÔ¡£¡£¡£¡£Æ¾Ö¤Sanguine SecurityµÄÑо¿Ö°Ô±Willem de GrootµÄ˵·¨£¬£¬£¬£¬£¬£¬Smith£¦WessonµÄÍøÕ¾ÔÚÐþÉ«ÐÇÆÚÎå֮ǰÒѾ±»ÈëÇÖ£¬£¬£¬£¬£¬£¬²¢ÇÒÖ»Õë¶ÔÃÀ¹úIPµØµãµÄ¿Í»§¡£¡£¡£¡£Í¨Ë׿ͻ§ÔÚ»á¼û¸ÃÍøÕ¾Ê±Ö»»áÏÂÔØÒ»¸ö11KBµÄÕý³£JavaScript¾ç±¾£¬£¬£¬£¬£¬£¬µ«ÃÀ¹úIPµÄ¿Í»§ÔÚ»á¼ûʱÔò»áÏÂÔØÒ»¸ö20KBµÄ¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬£¬²¢ÏÔʾαÔìµÄÖ§¸¶Ò³Ãæ¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/smith-and-wesson-web-site-hacked-to-steal-customer-payment-info/
5.°Ä´óÀûÑÇMonash IVFÔ±¹¤ÓÊÏä±»ºÚ¿ÍÈëÇÖ
°Ä´óÀûÑÇ×î´óµÄÊÔ¹ÜÓ¤¶ùЧÀÍÉÌMonash IVFÖÒÑÔ»¼Õ߯ä¶àÃûÔ±¹¤µÄµç×ÓÓÊÏäÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡£¡£¡£¡£¸Ã¹«Ë¾µÄÊ×ϯִÐйÙMichael KnaapÓÚ11ÔÂ6ÈÕÈ·ÈÏ£¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˶àÃûÔ±¹¤µÄµç×ÓÓʼþ¡¢ÓÊÏ䵨µãºÍͨѶ¼£¬£¬£¬£¬£¬£¬ÆäÖÐһЩÓʼþÖпÉÄܰüÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÀýÈçÐÕÃûºÍÁªÏµ·½·¨¡¢ÅäżÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢Ö°Òµ¡¢²ÆÎñÊý¾Ý¡¢Ò½Áưü¹ÜÐÅÏ¢¡¢¼à¿ØÐÅÏ¢¡¢¼ÝÕÕ»ò»¤ÕÕID¼°²¡ÀúµÈ¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾ֪ͨÁ˰ĴóÀûÑÇÐÅϢרԱ°ì¹«ÊҺͰĴóÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©£¬£¬£¬£¬£¬£¬²¢¶Ô´ËÊÂÎñÕö¿ªÊӲ졣¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.smh.com.au/national/fears-over-patient-data-breach-after-cyber-attack-on-monash-ivf-20191203-p53gj0.html
6.Tuft£¦NeedleÒâÍâй¶23.6Íò¸ö¿Í»§¿ìµÝ±êÇ©
´²ÉÏÓÃÆ·¹«Ë¾Tuft£¦NeedleÒâÍ⽫236400¸ö¿Í»§µÄ¿ìµÝ±êÇ©ÒÅÁôÔڿɹûÕæ»á¼ûµÄAWS´æ´¢Í°ÖУ¬£¬£¬£¬£¬£¬Ê¹µÃÈκÎÈ˶¼¿É»á¼û¿Í»§µÄÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈÐÅÏ¢¡£¡£¡£¡£ÕâЩ±êÇ©ÊÇÔڸù«Ë¾ÓÚ2014ÄêÖÁ2017ÄêÖ®¼ä½¨ÉèµÄ¡£¡£¡£¡£×ܲ¿Î»ÓÚÓ¢¹úµÄÇå¾²³§ÉÌFidus Information Security·¢Ã÷ÁË̻¶µÄÊý¾Ý²¢¾ÙÐÐÁËÑéÖ¤¡£¡£¡£¡£Tuft£¦NeedleÔÚ½Óµ½±¨¸æºóѸËٹرÕÁ˸ô洢ͰµÄ»á¼ûȨÏÞ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2019/12/02/tuft-and-needle-exposed-shipping-labels/


¾©¹«Íø°²±¸11010802024551ºÅ