绿盟科技网络安全威胁周报2017.09 请关注MSIE Edge任意代码执行漏洞CVE-2017-0037

绿盟科技发布了本周安全通告,周报编号NSFOCUS-17-09,绿盟科技漏洞库本周新增41条,其中高危16条。本次周报建议大家关注Microsoft Internet Explorer/Edge任意代码执行漏洞 CVE-2017-0037 。攻击者通过精心构造的网页可以达到远程代码执行的目的。目前尚无任何补丁,建议大家暂时停用IE和Edge。

Microsoft Internet Explorer/Edge任意代码执行漏洞

  • NSFOCUS ID 35978
  • CVE ID CVE-2017-0037

受影响版本

  • Microsoft Internet Explorer 11
  • Microsoft Edge

漏洞点评

Microsoft Internet Explorer 11/Microsoft Edge在实现上存在类型混淆漏洞,此漏洞位于mshtml.dll内的Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement函数中。攻击者通过精心构造的网页可以达到远程代码执行的目的。目前尚无任何补丁,建议大家暂时停用IE和Edge。

(数据来源:绿盟科技安全研究部&产品规则组)

互联网安全态势

CVE统计

cve-201709.png

最近一周CVE公告总数与前期相比有所下降。值得关注的高危漏洞如下:

cvss-201709.png

威胁热点信息回顾

  • Cloudflare敏感数据泄露事件 程序员出面解释 但google研究员并不满意

    • 链接:http://securityaffairs.co/wordpress/56617/data-breach/cloudbleed-cloudflare-flaw.html
    • 简述:Cloudflare was leaking a wide range of sensitive information, including authentication cookies and login credentials, the flaw was dubbed Cloudbleed.
  • CVE-2017-0037 – Google Project Zero discloses another unpatched Microsoft Edge and IE Vulnerability

    • 链接:http://securityaffairs.co/wordpress/56716/hacking/cve-2017-0037-microsoft-flaw.html
    • 简述:The researchers at Google’s Project Zero have revealed another flaw, tracked as CVE-2017-0037, that affects Microsoft Edge and IE.
  • 垃圾邮件、勒索软件、DDoS攻击三合一 Necurs僵尸网络正在不断联合壮大自己

    • 链接:http://securityaffairs.co/wordpress/56725/malware/necurs-botnet-ddos.html
    • 简述:The Necurs botnet is evolving and recently the experts at BitSight’s Anubis Labs discovered that it was improved to launch DDoS attacks.
  • Amazon Web Services suffer massive outage taking popular sites down

    • 简述:If you were surfing the Internet about 3 hours ago and couldn’t reach some of your favorite websites, then don’t worry since you were not the only one facing the issue. In fact, users worldwide were unable to reach RunKeeper, Medium, Trello, Imgur, Giphy, Soundcloud, Quora, Business Insider, Coursera, and Time Inc and many other websites.
    • 链接:https://www.hackread.com/amazon-cloud-service-suffers-massive-outage/
  • Unpatched SMB Zero Day Easily Exploitable

    • 简述:In what’s turning out to be the zero day that keeps on giving, researchers are still finding ways to exploit an unpatched denial of service vulnerability that exists in the way Windows implements the Server Message Block protocol.
    • 链接:https://threatpost.com/unpatched-smb-zero-day-easily-exploitable/123963/
  • Critical Flaw in ESET Antivirus Exposes Mac Users to Remote Hacking

    • 简述:What could be more exciting for hackers than exploiting a vulnerability in a widely used software without having to struggle too much?
    • 链接:http://thehackernews.com/2017/02/eset-antivirus-mac.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29
  • AtomBombing内存注入技术有应用了 Dridex银行木马用它成功绕开了防病毒软件 攻击英国银行

    • 简介:Security researchers have discovered a new variant of Dridex – one of the most nefarious banking Trojans actively targeting financial sector – with a new, sophisticated code injection technique and evasive capabilities called “AtomBombing.”
    • 链接:http://thehackernews.com/2017/03/dridex-atombombing-malware.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29
  • Million-Plus WordPress Sites Exposed by Vulnerable Plugin

    • 简介:A popular WordPress gallery plugin with more than one million active installations was recently patched to address a vulnerability exposing website databases to attack.The NextGEN Gallery is a photo gallery management system used by professional photographers and artists upload, sort and group galleries. It’s been downloaded more than 16 million times since it was developed in 2007.
    • 链接:https://threatpost.com/million-plus-wordpress-sites-exposed-by-vulnerable-plugin/123983/
  • 意义重大 云安全公司Zscaler云管理软件出现跨站攻击漏洞 得手后或者伪装诈骗或者DDoS都可以啊

    • 简介:Zscaler has fixed persistent XSS vulnerabilities affecting Zscaler Cloud management software that allow logged attackers to hack coworkers.
    • 链接:http://securityaffairs.co/wordpress/56776/hacking/zscaler-cloud-management-software-flaws.html
  • Yahoo Reveals 32 Million Accounts Were Hacked Using ‘Cookie Forging Attack’

    • 简述:Yahoo has just revealed that around 32 million user accounts were accessed by hackers in the last two years using a sophisticated cookie forging attack without any password.
    • 链接:http://thehackernews.com/2017/03/yahoo-cookie-forging-hack.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29
  • How A Simple Command Typo Took Down Amazon S3 and Big Chunk of the Internet

    • 简述:Amazon on Thursday admitted that an incorrectly typed command during a routine debugging of the company’s billing system caused the 5-hour-long outage of some Amazon Web Services (AWS) servers on Tuesday.
    • 链接:http://thehackernews.com/2017/03/amazon-web-storage.html

(数据来源:绿盟科技 威胁情报与网络安全实验室 收集整理)

绿盟科技漏洞研究

绿盟科技漏洞库新增41条

截止到2017年3月3日,绿盟科技漏洞库已收录总条目达到36017条。本周新增漏洞记录41条,其中高危漏洞数量16条,中危漏洞数量19条,低危漏洞数量6条。

vul-nsf-201709-1.png

vul-nsf-201709-2.png

  • Linux Kernel本地拒绝服务漏洞(CVE-2017-6074)

    • 危险等级:高
    • BID:96310
    • cve编号:CVE-2017-6074
  • Microsoft Internet Explorer/Edge任意代码执行漏洞(CVE-2017-0037)

    • 危险等级:高
    • cve编号:CVE-2017-0037
  • QEMU ‘VIRTIO_GPU_CMD_SET_SCANOUT()’拒绝服务漏洞(CVE-2016-10029)

    • 危险等级:高
    • BID:94978
    • cve编号:CVE-2016-10029
  • QEMU ‘virtio-gpu-3d.c’拒绝服务漏洞(CVE-2016-10028)

    • 危险等级:高
    • BID:94981
    • cve编号:CVE-2016-10028
  • tnef src/mapi_attr.c:mapi_attr_read()安全漏洞(CVE-2017-6307)

    • 危险等级:高
    • cve编号:CVE-2017-6307
  • Linux kernel do_shmat函数安全限制绕过漏洞(CVE-2017-5669)

    • 危险等级:高
    • cve编号:CVE-2017-5669
  • tnef file_add_mapi_attrs()函数类型混淆漏洞(CVE-2017-6310)

    • 危险等级:高
    • cve编号:CVE-2017-6310
  • tnef parse_file()函数类型混淆漏洞(CVE-2017-6309)

    • 危险等级:高
    • cve编号:CVE-2017-6309
  • tnef 整数溢出漏洞(CVE-2017-6308)

    • 危险等级:高
    • cve编号:CVE-2017-6308
  • ImageMagick ReadVICARImage函数远程拒绝服务漏洞(CVE-2015-8903)

    • 危险等级:低
    • cve编号:CVE-2015-8903
  • ImageMagick ReadBlobByte函数远程拒绝服务漏洞(CVE-2015-8902)

    • 危险等级:低
    • cve编号:CVE-2015-8902
  • ImageMagick ReadHDRImage远程拒绝服务漏洞(CVE-2015-8900)

    • 危险等级:低
    • cve编号:CVE-2015-8900
  • ImageMagick 远程拒绝服务漏洞(CVE-2015-8901)

    • 危险等级:低
    • cve编号:CVE-2015-8901
  • Apple macOS/watchOS/iOS远程欺骗漏洞(CVE-2016-7662)

    • 危险等级:高
    • BID:94905
    • cve编号:CVE-2016-7662
  • Apple macOS/iOS远程权限提升漏洞(CVE-2016-7661)

    • 危险等级:高
    • BID:94906
    • cve编号:CVE-2016-7661
  • Apple macOS/watchOS/iOS/tvOS远程权限提升漏洞(CVE-2016-7660)

    • 危险等级:高
    • BID:94905
    • cve编号:CVE-2016-7660
  • Apple macOS/watchOS/iOS/tvOS远程拒绝服务漏洞(CVE-2016-7658)

    • 危险等级:高
    • BID:94905
    • cve编号:CVE-2016-7658
  • Apple macOS/watchOS/iOS/tvOS远程拒绝服务漏洞(CVE-2016-7659)

    • 危险等级:高
    • BID:94905
    • cve编号:CVE-2016-7659
  • Apple macOS/watchOS/iOS/tvOS远程拒绝服务漏洞(CVE-2016-7663)

    • 危险等级:高
    • BID:94905
    • cve编号:CVE-2016-7663
  • Apple iOS信息泄露漏洞(CVE-2016-7664)

    • 危险等级:低
    • BID:94850
    • cve编号:CVE-2016-7664
  • Apple macOS/watchOS/iOS/tvOS远程信息泄露漏洞(CVE-2016-7714)

    • 危险等级:低
    • cve编号:CVE-2016-7714
  • Apple iOS拒绝服务漏洞(CVE-2016-7665)

    • 危险等级:中
    • BID:94850
    • cve编号:CVE-2016-7665
  • Apple Transporter信息泄露漏洞(CVE-2016-7666)

    • 危险等级:中
    • BID:94912
    • cve编号:CVE-2016-7666
  • Apple macOS/watchOS/iOS/tvOS远程拒绝服务漏洞(CVE-2016-7667)

    • 危险等级:高
    • cve编号:CVE-2016-7667
  • Linux kernel ip_cmsg_recv_checksum拒绝服务漏洞(CVE-2017-6347)

    • 危险等级:中
    • cve编号:CVE-2017-6347
  • Linux kernel net/sctp/socket.c拒绝服务漏洞(CVE-2017-6353)

    • 危险等级:中
    • cve编号:CVE-2017-6353
  • Linux kernel hashbin_delete拒绝服务漏洞(CVE-2017-6348)

    • 危险等级:中
    • cve编号:CVE-2017-6348
  • Linux kernel LLC子系统拒绝服务漏洞(CVE-2017-6345)

    • 危险等级:中
    • cve编号:CVE-2017-6345
  • Linux kernel net/packet/af_packet.c拒绝服务漏洞(CVE-2017-6346)

    • 危险等级:中
    • cve编号:CVE-2017-6346
  • GNU C Library iconv拒绝服务漏洞(CVE-2016-10228)

    • 危险等级:中
    • cve编号:CVE-2016-10228
  • ImageMagick 安全限制绕过漏洞(CVE-2016-10060)

    • 危险等级:中
    • BID:95208
    • cve编号:CVE-2016-10060
  • ImageMagick 拒绝服务漏洞(CVE-2016-10063)

    • 危险等级:中
    • BID:95210
    • cve编号:CVE-2016-10063
  • ImageMagick 安全限制绕过漏洞(CVE-2016-10062)

    • 危险等级:中
    • BID:95209
    • cve编号:CVE-2016-10062
  • ImageMagick 拒绝服务漏洞(CVE-2016-10071)

    • 危险等级:中
    • BID:95222
    • cve编号:CVE-2016-10071
  • ImageMagick 安全限制绕过漏洞(CVE-2016-10069)

    • 危险等级:中
    • BID:95216
    • cve编号:CVE-2016-10069
  • ImageMagick 拒绝服务漏洞(CVE-2016-10068)

    • 危险等级:中
    • BID:95219
    • cve编号:CVE-2016-10068
  • ImageMagick 拒绝服务漏洞(CVE-2016-10067)

    • 危险等级:中
    • BID:95220
    • cve编号:CVE-2016-10067
  • ImageMagick 拒绝服务漏洞(CVE-2016-10064)

    • 危险等级:中
    • BID:95211
    • cve编号:CVE-2016-10064
  • WordPress Mobile App Native插件远程文件上传漏洞(CVE-2017-6104)

    • 危险等级:中
    • cve编号:CVE-2017-6104
  • WordPress AnyVar 跨站脚本攻击漏洞(CVE-2017-6103)

    • 危险等级:中
    • cve编号:CVE-2017-6103
  • WordPress rockhoist-badges跨站脚本攻击漏洞(CVE-2017-6102)

    • 危险等级:中
    • cve编号:CVE-2017-6102

(数据来源:绿盟科技安全研究部&产品规则组)



原文发布时间:2017年3月24日 

本文由:绿盟科技发布,版权归属于原作者

原文链接:http://toutiao.secjia.com/nsfocus-internet-security-threats-weekly-201709

本文来自云栖社区合作伙伴安全加,了解相关信息可以关注安全加网站

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值