绿盟科技发布了本周安全通告,周报编号NSFOCUS-17-29,绿盟科技漏洞库本周新增64条,其中高危30条。本次周报建议大家关注 VMWare虚拟机逃逸漏洞 。目前,此漏洞的利用工具已经公开,可能会被大范围利用,请用户及时下载补丁修复更新。。
焦点漏洞
VMWare虚拟机逃逸漏洞
- NSFOCUS ID 37211
- CVE ID CVE-2017-4901
受影响版本
- VMware Workstation Pro / Player
- VMware Fusion Pro / Fusion
漏洞点评
VMware 是一款功能强大的桌面虚拟计算机软件。VMware Workstation和Fusion中的拖放(DnD)功能被发现含有内存越界访问漏洞。通过利用此漏洞,即使攻击者是在VMware Workstation或Fusion的虚拟机中运行恶意代码,最终也可在宿主机的操作系统上执行代码,实现虚拟机逃逸。目前,此漏洞的利用工具已经公开,可能会被大范围利用,请用户及时下载补丁修复更新。
(数据来源:绿盟科技安全研究部&产品规则组)
互联网安全态势
CVE统计
最近一周CVE公告总数与前期相比数量回落。值得关注的高危漏洞如下:
威胁信息回顾
标题: AlphaBay Shut Down After Police Raid
- 时间:2017-07-17
- 摘要:AlphaBay Market — one of the largest Dark Web marketplaces for drugs, guns, and other illegal goods — that mysteriously went dark earlier this month without any explanation from its admins has reportedly been shut down by the international authorities.
- 链接:http://thehackernews.com/2017/07/alphabay-darkweb-alexandre-cazes.html
标题: Critical RCE Vulnerability Found in Cisco WebEx Extensions, Again — Patch Now!
- 时间:2017-07-17
- 摘要:A highly critical vulnerability has been discovered in the Cisco Systems’ WebEx browser extension for Chrome and Firefox, for the second time in this year, which could allow attackers to remotely execute malicious code on a victim’s computer.
- 链接:http://thehackernews.com/2017/07/cisco-webex-vulnerability.html
标题:Ashley Madison to Pay $11.2 Million to Data Breach Victims
- 时间:2017-07-17
- 摘要:Ashley Madison, an American most prominent dating website that helps people cheat on their spouses has been hacked, has agreed to an $11.2 Million settlement for roughly 37 million users whose personal details were exposed in a massive data breach two years ago.
- 链接:http://thehackernews.com/2017/07/ashley-madison-data-breach.html
标题:Hacker Uses A Simple Trick to Steal $7 Million Worth of Ethereum Within 3 Minutes
- 时间:2017-07-18
- 摘要:All it took was just 3 minutes and ‘a simple trick’ for a hacker to steal more than $7 Million worth of Ethereum in a recent blow to the crypto currency market.
- 链接:http://thehackernews.com/2017/07/ethereum-cryptocurrency-heist.html
标题:Hackers Could Easily Take Remote Control of Your Segway Hoverboards
- 时间:2017-07-19
- 摘要:Thomas Kilbride, a security researcher from security firm IOActive, have discovered several critical vulnerabilities in Segway Ninebot miniPRO that could be exploited by hackers to remotely take “full control” over the hoverboard within range and leave riders out-of-control.
- 链接:http://thehackernews.com/2017/07/segway-hoverboard-hacking.html
标题: New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices
- 时间:2017-07-18
- 摘要:Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines.
- 链接:http://thehackernews.com/2017/07/linux-malware-sambacry.html
标题: Modified Versions of Nukebot in Wild Since Source Code Leak
- 时间:2017-07-19
- 摘要:Some opportunistic criminals have put the leaked source code for the Nukebot banking Trojan to use, targeting banks in the United States and France with variants of the malware, while another group has adapted it to steal mail client and browser passwords.
- 链接:https://threatpost.com/modified-versions-of-nukebot-in-wild-since-source-code-leak/126920/
标题:Tor Launches Bug Bounty Program — Get Paid for Hacking!
- 时间:2017-07-20
- 摘要:With the growing number of cyber attacks and breaches, a significant number of companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded.
- 链接:http://thehackernews.com/2017/07/tor-bug-bounty-program.html
标题:Critical Code Injection Flaw In Gnome File Manager Leaves Linux Users Open to Hacking
- 时间:2017-07-19
- 摘要:A security researcher has discovered a code injection vulnerability in the thumbnail handler component of GNOME Files file manager that could allow hackers to execute malicious code on targeted Linux machines.
- 链接:http://thehackernews.com/2017/07/linux-gnome-vulnerability.html
标题:Chrome Final removal of trust in WoSign and StartCom Certificates
- 时间:2017-07-20
- 摘要:As previously announced, Chrome has been in the process of removing trust from certificates issued by the CA WoSign and its subsidiary StartCom, as a result of several incidents not in keeping with the high standards expected of CAs.
- 链接:https://security.googleblog.com/2017/07/final-removal-of-trust-in-wosign-and.html
标题: 18个WebKit内存损坏漏洞 攻击者可以执行任意代码或远程DoS攻击
- 时间:2017-07-21
- 摘要:WebKit被爆18个WebKit内存损坏漏洞 ,涉及CVE-2017-7018到CVE-2017-7061之前的18个ID,漏洞影响苹果大面积产品的多个版本,包括Apple tvOS、Apple Safari、Apple Mac OS X及server版本、Apple iTunes、Apple iPod Touch、Apple iPhone、Apple iPad 、Apple iOS 、Apple iCloud。
- 链接:http://toutiao.secjia.com/webkit-multiple-memory-corruption
标题: VMware内存访问越界漏洞CVE-2016-7461 Vmware虚拟机逃逸技术
- 时间:2017-07-20
- 摘要:安全研究员分析深入分析了VMware虚拟机逃逸技术,验证了VMware内存访问越界漏洞CVE-2016-7461,并公开了分析过程及PoC
- 链接:http://toutiao.secjia.com/vmware-escape-cve-2016-7461
标题: 百度网盘用户数据泄露
- 时间:2017-07-20
- 摘要:7月18日,有微信公众号发文称,在百度网盘看到大量私人信息,甚至包括企事业单位内部通讯录。百度网盘虽不自带搜索功能,但通过第三方网盘搜索引擎可查询到百度网盘用户的大量照片、通讯录,甚至不乏政府、高校及公司内部文件等隐私内容。昨天上午,百度网盘在官方微博回应称,将采取更多手段保护用户隐私。
- 链接:http://toutiao.secjia.com/baidu-pan-databreach
标题: Devil’s Ivy 0Day漏洞危及数百万物理网设备
- 时间:2017-07-19
- 摘要:安全公司Senrio周二透露,gSOAP中存在被称为Devil’s Ivy的零日漏洞,导致数百万采用该工具包的物联网设备,面临零日攻击风险。Senrio调查Axis安全摄像头时在gSOAP的通信层发现了这一漏洞。
- 链接:http://toutiao.secjia.com/gsoap-devil-ivy-rce
标题:Ubuntu Linux for Windows 10 Released
- 时间:2017-07-17
- 摘要:Windows and Linux in the same line? Yes, you heard that right… and that too, on the same computer and within the same operating system.
- 链接:http://thehackernews.com/2017/07/windows-10-ubuntu-linux.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29
标题: Organizations Slow to Patch Critical Memcached Flaws
- 时间:2017-07-18
- 摘要:Tens of Thousands of Internet-Exposed Memcached Servers Are Vulnerable to Attacks
- 链接:http://www.securityweek.com/organizations-slow-patch-critical-memcached-flaws
(数据来源:绿盟科技 威胁情报与网络安全实验室 收集整理)
绿盟科技漏洞研究
绿盟科技漏洞库新增64条
截止到2017年7月21日,绿盟科技漏洞库已收录总条目达到37210条。本周新增漏洞记录64条,其中高危漏洞数量30条,中危漏洞数量12条,低危漏洞数量22条。
- Apache HTTP Server 内存破坏漏洞(CVE-2017-9788)
- 危险等级:高
- BID:99569
- cve编号:CVE-2017-9788
- Heimdal 中间人安全限制绕过漏洞(CVE-2017-11103)
- 危险等级:高
- BID:99551
- cve编号:CVE-2017-11103
- Apache OpenMeetings 拒绝服务漏洞(CVE-2017-7684)
- 危险等级:中
- BID:99584
- cve编号:CVE-2017-7684
- Apache OpenMeetings 安全限制绕过漏洞(CVE-2017-7673)
- 危险等级:中
- BID:99587
- cve编号:CVE-2017-7673
- Apache OpenMeetings 安全限制绕过漏洞(CVE-2017-7688)
- 危险等级:中
- BID:99586
- cve编号:CVE-2017-7688
- GE Communicator堆缓冲区溢出漏洞(CVE-2017-7908)
- 危险等级:中
- BID:99580
- cve编号:CVE-2017-7908
- Cisco WebEx Browser Extension 远程代码执行漏洞(CVE-2017-6753)
- 危险等级:高
- BID:99614
- cve编号:CVE-2017-6753
- Apache Struts Spring AOP 拒绝服务漏洞(CVE-2017-9787)
- 危险等级:中
- BID:99562
- cve编号:CVE-2017-9787
- QEMU 拒绝服务漏洞(CVE-2017-8112)
- 危险等级:低
- BID:98015
- cve编号:CVE-2017-8112
- QEMU 堆缓冲区溢出漏洞(CVE-2017-9603)
- 危险等级:低
- BID:96893
- cve编号:CVE-2017-9603
- QEMU 拒绝服务漏洞(CVE-2017-8086)
- 危险等级:低
- BID:98012
- cve编号:CVE-2017-8086
- QEMU ‘hw/9pfs/9p-local.c’权限提升漏洞(CVE-2017-7471)
- 危险等级:低
- BID:97970
- cve编号:CVE-2017-7471
- QEMU 拒绝服务漏洞(CVE-2017-8309)
- 危险等级:低
- BID:98302
- cve编号:CVE-2017-8309
- QEMU ‘hw/usb/hcd-xhci.c’拒绝服务漏洞(CVE-2017-5973)
- 危险等级:低
- BID:96220
- cve编号:CVE-2017-5973
- QEMU 权限提升漏洞(CVE-2016-9602)
- 危险等级:低
- BID:95461
- cve编号:CVE-2016-9602
- QEMU 拒绝服务漏洞(CVE-2017-5579)
- 危险等级:低
- BID:95780
- cve编号:CVE-2017-5579
- Oracle Java SE安全漏洞(CVE-2017-10102)
- 危险等级:高
- BID:99712
- cve编号:CVE-2017-10102
- Oracle Java SE远程安全漏洞(CVE-2017-10096)
- 危险等级:高
- BID:99670
- cve编号:CVE-2017-10096
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10041)
- 危险等级:中
- BID:99742
- cve编号:CVE-2017-10041
- Oracle Database Server 远程安全漏洞(CVE-2017-10202)
- 危险等级:高
- BID:99865
- cve编号:CVE-2017-10202
- Oracle Database Server 本地安全漏洞(CVE-2017-10120)
- 危险等级:低
- BID:99867
- cve编号:CVE-2017-10120
- Oracle WebCenter Content 远程安全漏洞(CVE-2017-10075)
- 危险等级:高
- BID:99807
- cve编号:CVE-2017-10075
- Oracle WebCenter Content 远程安全漏洞(CVE-2017-10040)
- 危险等级:高
- BID:99801
- cve编号:CVE-2017-10040
- Oracle Outside In Technology 远程安全漏洞(CVE-2017-10196)
- 危险等级:高
- BID:99794
- cve编号:CVE-2017-10196
- Oracle Outside In Technology 远程安全漏洞(CVE-2017-10141)
- 危险等级:高
- BID:99785
- cve编号:CVE-2017-10141
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10035)
- 危险等级:高
- BID:99741
- cve编号:CVE-2017-10035
- Oracle Enterprise Repository远程安全漏洞(CVE-2017-10048)
- 危险等级:高
- BID:99771
- cve编号:CVE-2017-10048
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10030)
- 危险等级:高
- BID:99740
- cve编号:CVE-2017-10030
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10029)
- 危险等级:高
- BID:99738
- cve编号:CVE-2017-10029
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10028)
- 危险等级:高
- BID:99724
- cve编号:CVE-2017-10028
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10024)
- 危险等级:高
- BID:99723
- cve编号:CVE-2017-10024
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10156)
- 危险等级:高
- BID:99682
- cve编号:CVE-2017-10156
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10043)
- 危险等级:高
- BID:99696
- cve编号:CVE-2017-10043
- Oracle WebLogic Server 远程安全漏洞(CVE-2017-10147)
- 危险等级:高
- BID:99651
- cve编号:CVE-2017-10147
- Oracle BI Publisher 远程安全漏洞(CVE-2017-10025)
- 危险等级:高
- BID:99697
- cve编号:CVE-2017-10025
- Oracle FLEXCUBE Universal Banking远程安全漏洞(CVE-2017-10071)
- 危险等级:低
- BID:99866
- cve编号:CVE-2017-10071
- Oracle FLEXCUBE Private Banking远程安全漏洞(CVE-2017-10022)
- 危险等级:低
- BID:99864
- cve编号:CVE-2017-10022
- Oracle WebLogic Server 远程安全漏洞(CVE-2017-10137)
- 危险等级:高
- BID:99634
- cve编号:CVE-2017-10137
- D-Link DIR-615 未授权访问漏洞(CVE-2017-11436)
- 危险等级:中
- cve编号:CVE-2017-11436
- ImageMagick coders/jpeg.c拒绝服务漏洞(CVE-2017-11450)
- 危险等级:低
- cve编号:CVE-2017-11450
- ImageMagick ReadJPEGImage 敏感信息泄露漏洞(CVE-2017-11448)
- 危险等级:低
- cve编号:CVE-2017-11448
- ImageMagick ReadSCREENSHOTImage 拒绝服务漏洞(CVE-2017-11447)
- 危险等级:低
- cve编号:CVE-2017-11447
- ImageMagick ReadPESImage 拒绝服务漏洞(CVE-2017-11446)
- 危险等级:低
- cve编号:CVE-2017-11446
- Cisco AsyncOS Software命令注入漏洞(CVE-2017-6746)
- 危险等级:中
- BID:99877
- cve编号:CVE-2017-6746
- Oracle Java SE远程安全漏洞(CVE-2017-10114)
- 危险等级:高
- BID:99726
- cve编号:CVE-2017-10114
- Oracle Java SE远程安全漏洞(CVE-2017-10074)
- 危险等级:高
- BID:99731
- cve编号:CVE-2017-10074
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10116)
- 危险等级:高
- BID:99734
- cve编号:CVE-2017-10116
- Schneider Electric PowerSCADA Anywhere/Citect Anywhere证书过期验证漏洞(CVE-2017-7971)
- 危险等级:低
- cve编号:CVE-2017-7971
- Schneider Electric PowerSCADA Anywhere/Citect Anywhere安全漏洞(CVE-2017-7972)
- 危险等级:低
- cve编号:CVE-2017-7972
- Schneider Electric PowerSCADA Anywhere/Citect Anywhere跨站请求伪造漏洞(CVE-2017-7969)
- 危险等级:中
- cve编号:CVE-2017-7969
- Schneider Electric PowerSCADA Anywhere/Citect Anywhere信息泄露漏洞(CVE-2017-7970)
- 危险等级:低
- cve编号:CVE-2017-7970
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10115)
- 危险等级:高
- BID:99774
- cve编号:CVE-2017-10115
- Oracle Java SE远程安全漏洞(CVE-2017-10078)
- 危险等级:高
- BID:99752
- cve编号:CVE-2017-10078
- Oracle Java SE远程安全漏洞(CVE-2017-10067)
- 危险等级:高
- BID:99756
- cve编号:CVE-2017-10067
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10081)
- 危险等级:低
- BID:99853
- cve编号:CVE-2017-10081
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10193)
- 危险等级:低
- BID:99854
- cve编号:CVE-2017-10193
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10108)
- 危险等级:低
- BID:99846
- cve编号:CVE-2017-10108
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10109)
- 危险等级:低
- BID:99847
- cve编号:CVE-2017-10109
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10053)
- 危险等级:中
- BID:99842
- cve编号:CVE-2017-10053
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10135)
- 危险等级:中
- BID:99839
- cve编号:CVE-2017-10135
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10243)
- 危险等级:中
- BID:99827
- cve编号:CVE-2017-10243
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10198)
- 危险等级:高
- BID:99818
- cve编号:CVE-2017-10198
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10176)
- 危险等级:高
- BID:99788
- cve编号:CVE-2017-10176
- Oracle Java SE/JRockit 远程安全漏洞(CVE-2017-10118)
- 危险等级:高
- BID:99782
- cve编号:CVE-2017-10118
(数据来源:绿盟科技安全研究部&产品规则组)
原文发布时间:2017年7月24日
本文由:绿盟科技发布,版权归属于原作者
原文链接:http://toutiao.secjia.com/nsfocus-internet-security-threats-weekly-201729
本文来自云栖社区合作伙伴安全加,了解相关信息可以关注安全加网站