ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ19ÖÜ
Ðû²¼Ê±¼ä 2018-05-14
Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2018Äê05ÔÂ07ÈÕÖÁ13ÈÕÊÕ¼Çå¾²Îó²î58¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Edge¾ç±¾ÒýÇæCVE-2018-8128Ô¶³ÌÄÚ´æÆÆËðÎó²î£»£»£»£»£»£»£»£»Microsoft Exchange Server Outlook Web AccessÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»Adobe Flash PlayerÀàÐÍ»ìÏýÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»Microsoft Office CVE-2018-8158Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»£»Lantech IDS CVE-2018-8865í§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÅ·ÖÞÖÐÑëÒøÐÐÐû²¼TIBER-EU¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ×ÊÖú²âÊÔ½ðÈÚÐÐÒµµÄÍøÂç·ÀÓùÄÜÁ¦£»£»£»£»£»£»£»£»Android P½«¶ÔÓ¦ÓÃ¼à¿Ø×°±¸ÍøÂç»î¶¯µÄÐÐΪ¾ÙÐÐÏÞÖÆ£»£»£»£»£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷pythonÄ£¿£¿£¿£¿£¿£¿£¿éssh-decorate±»Ö²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬¿ÉÍøÂçÓû§SSHƾ֤£»£»£»£»£»£»£»£»ºÚ¿ÍÏ®»÷¸ç±¾¹þ¸ùÊеĹ«¹²×ÔÐгµÏµÍ³£¬£¬£¬£¬£¬£¬£¬Ô¼1860Á¾×ÔÐгµÊܵ½Ó°Ï죻£»£»£»£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷macOSÖеļÓÃÜͨѶAPP SignalµÄÒÑɾÐÂÎſɱ»»Ö¸´¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢Microsoft Edge¾ç±¾ÒýÇæCVE-2018-8128Ô¶³ÌÄÚ´æÆÆËðÎó²î
Microsoft Edge´¦Öóͷ£Äڴ湤¾ß±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌØÊâµÄWEBÒ³£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8128
2¡¢Microsoft Exchange Server Outlook Web AccessÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Microsoft Exchange Server Outlook Web Access (OWA)´¦Öóͷ£WEBÇëÇó±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8152
3¡¢Adobe Flash PlayerÀàÐÍ»ìÏýÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Adobe Flash Player´¦Öóͷ£¶ñÒâÎļþ±£´æÀàÐÍ»ìÏýÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌØÊâµÄSWFÎļþ£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://helpx.adobe.com/security/products/flash-player/apsb18-16.html
4¡¢Microsoft Office CVE-2018-8158Ô¶³Ì´úÂëÖ´ÐÐÎó²î
Microsoft Office´¦Öóͷ£Äڴ湤¾ß±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²î¹¹½¨ÌØÊâµÄÎļþ£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8158
5¡¢Lantech IDS CVE-2018-8865í§Òâ´úÂëÖ´ÐÐÎó²î
Lantech IDS±£´æÕ»»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttp://www.lantechcom.tw/global/eng/IDS-2102A.html
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Å·ÖÞÖÐÑëÒøÐÐÐû²¼TIBER-EU¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ×ÊÖú²âÊÔ½ðÈÚÐÐÒµµÄÍøÂç·ÀÓùÄÜÁ¦

Å·ÖÞÖÐÑëÒøÐУ¨ECB£©Ðû²¼»ùÓÚÍþвÇ鱨µÄTIBER-EU¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬¸Ã¿ò¼ÜÊÇÊ׸ö¹æÄ£ÎªÅ·ÖÞµÄÕë¶Ô½ðÈÚÊг¡µÄÊܿغͶ¨ÖÆÍøÂç¹¥»÷µÄ²âÊÔ¿ò¼Ü¡£¡£¡£¡£¡£¡£¡£ÕâÒ»Ðж¯ÊǶÔÒÑÍù¼¸ÄêÄÚÕë¶Ô½ðÈÚÐÐÒµµÄ¶àÆðÍøÂç¹¥»÷µÄ»ØÓ¦¡£¡£¡£¡£¡£¡£¡£¸Ã¿ò¼Ü°üÀ¨Ò»¸öÄ£ÄâÕæÕýºÚ¿ÍµÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòµÄºì·½ÍŶӣ¬£¬£¬£¬£¬£¬£¬À´¼ÓÈë½ðÈÚÐÐÒµÖеĹ«Ë¾ÏµÍ³µÄÎó²îÆÀ¹ÀºÍÉøÍ¸²âÊÔ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72176/hacking/european-central-bank-framework-cyber.html
2¡¢Android P½«¶ÔÓ¦ÓÃ¼à¿Ø×°±¸ÍøÂç»î¶¯µÄÐÐΪ¾ÙÐÐÏÞÖÆ

ƾ֤Android¿ªÔ´ÏîÄ¿£¨AOSP£©ÖеÄ×îдúÂë¸ü¸Ä£¬£¬£¬£¬£¬£¬£¬XDA¿ª·¢Ö°Ô±·¢Ã÷ÔÚÏÂÒ»´úAndroidϵͳAndroid PÖУ¬£¬£¬£¬£¬£¬£¬ÈκÎÓ¦Óö¼½«²»¿É¼ì²âÉè±¹ØÁ¬ÄÆäËüÓ¦ÓÃÊÇ·ñÔÚÅþÁ¬»¥ÁªÍø¡£¡£¡£¡£¡£¡£¡£XDA¿ª·¢Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬AndroidÒýÈëµÄÕâÒ»ÐÂת±äËÆºõºÜС£¬£¬£¬£¬£¬£¬£¬µ«¶ÔÓû§Òþ˽µÄÓ°Ï콫ÊÇÖØ´óµÄ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/05/android-p-network-activity.html
3¡¢Ñо¿Ö°Ô±·¢Ã÷pythonÄ£¿£¿£¿£¿£¿£¿£¿éssh-decorate±»Ö²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬¿ÉÍøÂçÓû§SSHƾ֤

PythonÄ£¿£¿£¿£¿£¿£¿£¿éSSH Decorator£¨ssh-decorate£©ÊÇÓÉÒÔÉ«Áпª·¢Ö°Ô±Uri Goren¿ª·¢µÄÒ»¸öÓÃÓÚ´¦Öóͷ£sshÅþÁ¬µÄ¿â¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ssh-decorateµÄ¶à¸ö°æ±¾ÖаüÀ¨ÍøÂçÓû§sshƾ֤µÄ´úÂ룬£¬£¬£¬£¬£¬£¬×îºóÒ»¸öÇå¾²µÄ°æ±¾Îª0.27£¬£¬£¬£¬£¬£¬£¬Ö®ºóµÄ0.28µ½0.31¶¼°üÀ¨¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£Goren³ÆºóÃÅÊDZ»ºÚ¿ÍÖ²ÈëµÄ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚGorenÒÑÔÚgithubºÍPyPIÉÑþ³ØýÁ˸ÿ⡣¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoored-python-library-caught-stealing-ssh-credentials/
4¡¢ºÚ¿ÍÏ®»÷¸ç±¾¹þ¸ùÊеĹ«¹²×ÔÐгµÏµÍ³£¬£¬£¬£¬£¬£¬£¬Ô¼1860Á¾×ÔÐгµÊܵ½Ó°Ïì

¸ç±¾¹þ¸ùÊеͼ»á¹«ÓÃ×ÔÐгµÏµÍ³BycyklenÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Õû¸öÊý¾Ý¿â±»É¾³ý£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂËùÓеÄÔ¼1860Á©¹«ÓÃ×ÔÐгµÎÞ·¨½âËø¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ5ÔÂ4ÈÕÒ¹Íí¡£¡£¡£¡£¡£¡£¡£Bycyklen³Æ½â¾ö¸ÃÎÊÌâÐèÒª¶ÔËùÓеÄ×ÔÐгµ¾ÙÐÐÊÖ¶¯¸üУ¬£¬£¬£¬£¬£¬£¬ÆäÔ±¹¤ÔÚÉÏÖÜÁùÒѻָ´ÁË200Á¾×ÔÐгµ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-shuts-down-copenhagen-s-public-city-bikes-system/
5¡¢Ñо¿Ö°Ô±·¢Ã÷macOSÖеļÓÃÜͨѶAPP SignalµÄÒÑɾÐÂÎſɱ»»Ö¸´

Çå¾²Ñо¿Ö°Ô±Alec Muffett·¢Ã÷macOSÖж˵½¶Ë¼ÓÃÜͨѶAPP SignalµÄÒÑɾ³ýÐÂÎſɱ»»Ö¸´£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃÓû§µÄÃô¸ÐÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£¡£ÆäÔµ¹ÊÔÓÉÊÇmacOS»áÔÚ֪ͨÖÐÐĵÄÊý¾Ý¿âÖб¸·ÝÐÂÎÅÄÚÈÝ£¨Í¨³£ÎªÍêÕûÐÂÎŵÄǰ1-1.5ÐУ©£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÏòÓû§ÏÔʾÐÂÎÅ֪ͨ¡£¡£¡£¡£¡£¡£¡£×ÝÈ»ÔÚSignalÖÐɾ³ýÁ˸ÃÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬ÕâЩ±»½ØÈ¡µÄÐÅÏ¢ÈÔ¿ÉÒÔͨ¹ý¸ÃÊý¾Ý¿â¾ÙÐлá¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/05/signal-secure-messaging.html


¾©¹«Íø°²±¸11010802024551ºÅ