{"id":13261,"date":"2015-07-12T12:06:05","date_gmt":"2015-07-12T04:06:05","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=13261"},"modified":"2015-07-13T17:49:32","modified_gmt":"2015-07-13T09:49:32","slug":"%e5%8f%88%e4%be%86%e4%ba%86-hacking-team-%e8%b3%87%e6%96%99%e5%a4%96%e6%b4%a9%e6%b7%bb%e6%96%b0%e7%9a%84-adobe-flash-%e9%9b%b6%e6%99%82%e5%b7%ae%e6%bc%8f%e6%b4%9e-cve-2015-5123","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=13261","title":{"rendered":"\u53c8\u4f86\u4e86!! Hacking Team \u8cc7\u6599\u5916\u6d29\u6dfb\u65b0\u7684 Adobe Flash \u96f6\u6642\u5dee\u6f0f\u6d1e (CVE-2015-5123)"},"content":{"rendered":"<blockquote><p>\u4ee5\u5354\u52a9\u57f7\u884c\u76e3\u63a7\u4efb\u52d9,\u51fa\u552e\u9593\u8adc\u7a0b\u5f0f\u7d66\u5404\u570b\u653f\u5e9c\u8207\u57f7\u6cd5\u55ae\u4f4d\u800c\u5099\u53d7\u722d\u8b70\u7684Hacking Team\u516c\u53f8,\u8fd1\u65e5<a href=\"https:\/\/www.csoonline.com\/article\/2943968\/data-breach\/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html\">\u906d\u5230\u653b\u64ca<\/a>\uff0c\u7e3d\u91cf\u8fd1400GB\u7684\u516c\u53f8\u5167\u90e8\u6587\u4ef6,\u6a94\u6848\u7a0b\u5f0f\u7b49\u8cc7\u6599\u88ab\u516c\u958b\u3002\u5728\u6b64\u6b21\u6d29\u9732\u7684\u6587\u4ef6\u4e2d\uff0c\u5305\u542b\u4e86Hacking Team\u7684\u5ba2\u6236\u8cc7\u6599\u3001\u8ca1\u52d9\u6587\u4ef6\u3001\u5408\u7d04\u3001\u5167\u90e8E-mail\u90f5\u4ef6,\u6839\u64da<a href=\"https:\/\/www.ithome.com.tw\/news\/97348\">\u5831\u5c0e<\/a>\u7dad\u57fa\u89e3\u5bc6\uff08WikiLeaks\uff09<a href=\"https:\/\/wikileaks.org\/hackingteam\/emails\/?q=north+korea&amp;mfrom=&amp;mto=&amp;title=&amp;notitle=&amp;date=&amp;nofrom=&amp;noto=&amp;count=50&amp;sort=0#searchresult\" target=\"_blank\">\u516c\u5e03<\/a>\u4e86Hacking Team\u5167\u90e8\u8d85\u904e100\u842c\u7b46\u96fb\u5b50\u90f5\u4ef6\uff0c\u4e26\u63d0\u4f9b\u4e86\u641c\u5c0b\u6a5f\u5236\u3002\u5176\u4e2d\u5305\u542b\u4e86601\u7b46\u8207\u53f0\u7063\u76f8\u95dc\u8cc7\u6599\u3002<\/p><\/blockquote>\n<p>\u5728\u9023\u7e8c\u5169\u500b Adobe Flash Player \u96f6\u6642\u5dee\u6f0f\u6d1e\u56e0<a href=\"https:\/\/blog.trendmicro.com.tw\/?s=hacking\"> Hacking Team \u8cc7\u6599\u5916\u6d29<\/a>\u4e8b\u4ef6\u800c\u66dd\u5149\u4e4b\u5f8c\uff0c<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u53c8\u767c\u73fe\u4e86\u53e6\u4e00\u500b Adobe Flash Player \u96f6\u6642\u5dee\u6f0f\u6d1e (CVE-2015-5123)\u3002Adobe \u5728\u63a5\u7372\u6211\u5011\u901a\u5831\u4e4b\u5f8c\u5df2\u767c\u5e03\u4e86\u4e00\u9805<a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsa15-04.html\">\u5b89\u5168\u516c\u544a<\/a>\u3002\u6b64\u6f0f\u6d1e\u7684\u5206\u985e\u70ba\u91cd\u5927\u6f0f\u6d1e\uff0c\u56e0\u70ba\u99ed\u5ba2\u4e00\u65e6\u653b\u64ca\u6210\u529f\uff0c\u5c31\u53ef\u80fd\u53d6\u5f97\u7cfb\u7d71\u7684\u638c\u63a7\u6b0a\u3002\u6b64\u6f0f\u6d1e\u7684\u5f71\u97ff\u5c64\u9762\u6db5\u84cb Windows\u3001Mac \u548c Linux \u5e73\u53f0\u4e0a\u7684\u6240\u6709 Adobe Flash \u7248\u672c\u3002<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/07\/Attack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13262\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/07\/Attack.jpg\" alt=\"Attack \u653b\u64ca\" width=\"800\" height=\"600\" \/><\/a><\/p>\n<p><strong><em>\u554f\u984c\u6839\u6e90\u5206\u6790<\/em><\/strong><\/p>\n<p>\u6839\u64da<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u7684\u5206\u6790\uff0c\u6b64\u6f0f\u6d1e\u4e00\u6a23\u662f<em>valueOf \u6280\u5de7<\/em>\u6240\u5c0e\u81f4\u7684\u554f\u984c\u3002\u4e0d\u904e\u6709\u5225\u65bc\u524d\u5169\u500b Flash \u96f6\u6642\u5dee\u6f0f\u6d1e\u7684\u662f\uff0c\u5b83\u5229\u7528\u7684\u662f <em>BitmapData<\/em> \u7269\u4ef6\uff0c\u800c\u975e <em>TextLine<\/em> \u548c <em>ByteArray<\/em>\u3002<\/p>\n<p>\u4ee5\u4e0b\u662f\u89f8\u767c\u8a72\u6f0f\u6d1e\u7684\u6b65\u9a5f\uff1a<\/p>\n<ol>\n<li>\u5efa\u7acb\u4e00\u500b\u65b0\u7684 <em>BitmapData<\/em> \u7269\u4ef6\uff0c\u6e96\u5099\u597d\u5169\u500b <em>Array<\/em> \u7269\u4ef6\uff0c\u7522\u751f\u5169\u500b\u65b0\u7684 <em>MyClass<\/em> \u7269\u4ef6\uff0c\u7136\u5f8c\u5c07 <em>MyClass<\/em> \u7269\u4ef6\u5206\u5225\u6307\u6d3e\u81f3\u524d\u9762\u5169\u500b <em>Array<\/em> \u7269\u4ef6\u3002<\/li>\n<li>\u8986\u5beb <em>MyClass <\/em>\u7269\u4ef6\u7684 <em>valueOf<\/em> \u51fd\u5f0f\uff0c\u7136\u5f8c\u547c\u53eb <em>paletteMap<\/em> \u4e26\u50b3\u5165\u524d\u8ff0\u5169\u500b <em>Array<\/em> \u7576\u6210\u53c3\u6578\u3002<em>BitmapData.paletteMap<\/em> \u5c07\u89f8\u767c <em>valueOf<\/em> \u51fd\u5f0f\u3002<\/li>\n<li>\u5728 valueOf \u51fd\u5f0f\u4e2d\u547c\u53eb <em>dispose()<\/em> \u4f86\u91cb\u653e <em>BitmapData<\/em> \u7269\u4ef6\u7684\u8a18\u61b6\u9ad4\uff0c\u5c0e\u81f4 Flash Player \u7576\u6389\u3002<\/li>\n<\/ol>\n<p>\u76ee\u524d<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u6b63\u5bc6\u5207\u76e3\u63a7\u662f\u5426\u6709\u4efb\u4f55\u99ed\u5ba2\u653b\u64ca\u904b\u7528\u5230\u9019\u9805\u6982\u5ff5\u9a57\u8b49 (POC) \u6f0f\u6d1e\u3002\u4e00\u6709\u6700\u65b0\u6d88\u606f\u6216\u65b0\u7684\u767c\u73fe\uff0c\u6211\u5011\u6703\u7acb\u5373\u66f4\u65b0\u9019\u7bc7\u6587\u7ae0\u3002\u7531\u65bc<a href=\"https:\/\/blog.trendmicro.com.tw\/?s=hacking\"> Hacking Team \u8cc7\u6599\u5916\u6d29<\/a>\u4e8b\u4ef6\u5df2\u7d93\u5ee3\u70ba\u516c\u958b\uff0c\u56e0\u6b64\u4f7f\u7528\u8005\u5df2\u6709\u906d\u5230\u653b\u64ca\u7684\u5371\u96aa\u3002\u6240\u4ee5\uff0c\u5efa\u8b70\u4f7f\u7528\u8005\u66ab\u6642\u5148\u505c\u7528 Adobe Flash Player\uff0c\u76f4\u5230 Adobe \u91cb\u51fa\u4fee\u88dc\u7a0b\u5f0f\u70ba\u6b62\u3002<!--more--><\/p>\n<p>\u8da8\u52e2\u79d1\u6280\u7684<a href=\"https:\/\/t.rend.tw\/?i=MzcxNw\">\u8da8\u52e2\u79d1\u6280Deep Discovery<\/a>\u5df2\u80fd\u5229\u7528\u6c99\u76d2\u6a21\u64ec\u5206\u6790\u4e26\u642d\u914d\u7a0b\u5e8f\u78bc (Script) \u5206\u6790\u5f15\u64ce\u4f86\u4e3b\u52d5\u9632\u7bc4\u9019\u9805\u5a01\u8105\uff0c\u56e0\u6b64\u4f7f\u7528\u8005\u5927\u53ef\u5b89\u5fc3\u3002\u5b83\u80fd\u900f\u904e\u884c\u70ba\u4f86\u5075\u6e2c\u9019\u9805\u5a01\u8105\uff0c\u4e0d\u9700\u4efb\u4f55\u66f4\u65b0\u3002<a href=\"https:\/\/www.trendmicro.tw\/tw\/enterprise\/cloud-solutions\/deep-security\/index.html\">\u8da8\u52e2\u79d1\u6280Deep Security<\/a>\u00a0\u53ef\u5229\u7528\u4e0b\u5217\u6df1\u5c64\u5c01\u5305\u6aa2\u67e5 (DPI) \u898f\u5247\u4f86\u9632\u7bc4\u4f7f\u7528\u8005\u96fb\u8166\u906d\u5230\u6b64\u6f0f\u6d1e\u5a01\u8105\uff1a<\/p>\n<ul>\n<li>1006859 \u2013 Adobe Flash Player BitmapData Remote Code Execution Vulnerability (Adobe Flash Player BitmapData \u9060\u7aef\u6307\u4ee4\u57f7\u884c\u6f0f\u6d1e)(CVE-2015-5123)<\/li>\n<\/ul>\n<p>Hacking Team \u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u7576\u4e2d\u66dd\u5149\u7684\u76f8\u95dc\u6f0f\u6d1e\u8cbc\u6587\uff1a<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=13251\">Hacking Team \u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u53c8\u4e00\u500bAdobe Flash Player \u6f0f\u6d1e\u96f6\u6642\u5dee\u6f0f\u6d1e\u66dd\u5149<\/a><\/li>\n<li style=\"font-style: inherit; font-weight: inherit;\"><a style=\"font-style: inherit; font-weight: inherit;\" href=\"https:\/\/blog.trendmicro.com.tw\/?p=13211\">\u7576\u5fc3\u52d2\u7d22\u8edf\u9ad4\u5229\u7528Hacking Team \u5916\u6d29\u7684 Adobe Flash\u6f0f\u6d1e\u767c\u52d5\u653b\u64ca<\/a><\/li>\n<li style=\"font-style: inherit; font-weight: inherit;\"><a style=\"font-style: inherit; font-weight: inherit;\" href=\"https:\/\/blog.trendmicro.com.tw\/?p=13202\">Hacking Team \u7684 Flash \u96f6\u6642\u5dee\u6f0f\u6d1e\u653b\u64ca,\u5df2\u88ab\u6536\u9304\u5230\u6f0f\u6d1e\u653b\u64ca\u5957\u4ef6!<\/a><\/li>\n<\/ul>\n<ul>\n<li><a style=\"font-style: inherit; font-weight: inherit;\" href=\"https:\/\/blog.trendmicro.com.tw\/?p=13185\">\u5099\u6536\u722d\u8b70\u7684 Hacking Team \u88ab\u99ed ! \u6d41\u51fa\u8cc7\u6599\u4e2d\u767c\u73fe Flash\u96f6\u6642\u5dee\u6f0f\u6d1e\u653b\u64ca\u7a0b\u5f0f<\/a><\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/hacking-team-flash-zero-day-tied-to-attacks-in-korea-and-japan-on-july-1\/\">Hacking Team \u7684 Flash \u96f6\u6642\u5dee\u6f0f\u6d1e\u6d89\u53ca 7 \u6708 1 \u65e5\u97d3\u570b\u548c\u65e5\u672c\u6240\u906d\u5230\u7684\u653b\u64ca (Hacking Team Flash Zero-Day Tied To Attacks In Korea and Japan\u2026 on July 1)<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak\/\">Hacking Team \u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u53c8\u4e00\u500b\u65b0\u7684 Adobe Flash \u96f6\u6642\u5dee\u6f0f\u6d1e (CVE-2015-5123) \u66dd\u5149 (New Zero-Day Vulnerability [CVE-2015-5123] in Adobe Flash Emerges from Hacking Team Leak)<\/a><\/p>\n<p>| \u00a0\u00a0\u00a0\u4f5c\u8005\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/author\/peterpi\/\">Peter Pi (\u5a01\u8105\u5206\u6790\u5e2b)<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>\u60f3\u4e86\u89e3\u66f4\u591a\u95dc\u65bc\u7db2\u8def\u5b89\u5168\u7684\u79d8\u8a23\u548c\u5efa\u8b70\uff0c\u53ea\u8981\u5230<a href=\"https:\/\/www.facebook.com\/trendmicrotaiwan\">\u8da8\u52e2\u79d1\u6280\u7c89\u7d72\u7db2\u9801<\/a> \u6216\u4e0b\u9762\u7684\u6309\u9215\u6309\u8b9a<\/p>\n<p><iframe loading=\"lazy\" style=\"border: none; overflow: hidden; width: 350px; height: 62px;\" src=\"https:\/\/www.facebook.com\/plugins\/likebox.php?id=255176705131&amp;width=350&amp;connections=0&amp;stream=false&amp;header=false&amp;height=62\" width=\"300\" height=\"150\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/t.rend.tw\/?i=MzcxOQ\"><br \/>\n\u3010\u63a8\u85a6\u3011\u9632\u6bd2\u8edf\u9ad4\u5927\u8a55\u6bd4: \u60e1\u610f\u7a0b\u5f0f\u9632\u79a6\u529b PC- cillin\u96f2\u7aef\u7248\u69ae\u7372\u7b2c\u4e00\u540d!<\/a><\/p>\n<p><a href=\"https:\/\/t.rend.tw\/?i=MzcyMA\">\u3010\u63a8\u85a6\u3011PC-cillin \u96f2\u7aef\u7248 \u69ae\u7372\u4e16\u754c\u8457\u540d\u9632\u6bd2\u8a55\u9451\u6a5f\u69cb\u9ad8\u5ea6\u8a55\u6bd4<\/a><\/p>\n<p><a href=\" https:\/\/t.rend.tw\/?i=MzM3OA \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2013\/07\/PCCfans540.gif\" alt=\"\u9632\u6bd2\u8edf\u9ad4\u63a8\u85a6\u514d\u8cbb\u4e0b\u8f09,\u4e2d\u6bd2\u4e86\u55ce?\u8d95\u7dca\u6383\u6bd2! Av test \u9632\u6bd2\u8edf\u9ad4\u8a55\u6bd4\u6392\u540d\u7b2c\u4e00,\u8da8\u52e2\u79d1\u6280 PC-cillin 2015\u96f2\u7aef\u7248\" width=\"540\" height=\"90\" \/><\/a><\/p>\n<p><a href=\" https:\/\/t.rend.tw\/?i=MzM3OA\">\u8da8\u52e2\u79d1\u6280PC-cillin\u96f2\u7aef\u7248<\/a> \uff0c\u69ae\u7372 AV-TEST \u300c\u6700\u4f73\u9632\u8b77\u300d\u734e,\u9818\u514828 \u6b3e\u5bb6\u7528\u8cc7\u5b89\u7522\u54c1\u9632\u6bd2\u8edf\u9ad4 ,\u53ef\u8de8\u5e73\u53f0\u540c\u6642\u652f\u63f4\u5b89\u88dd\u65bcWindows\u3001Mac\u96fb\u8166\u53caAndroid\u3001iOS \u667a\u6167\u578b\u624b\u6a5f\u8207\u5e73\u677f\u96fb\u8166\uff0c\u63a1\u7528\u5168\u7403\u7368\u5bb6\u8da8\u52e2\u79d1\u6280\u300c\u4e3b\u52d5\u5f0f\u96f2\u7aef\u622a\u6bd2\u6280\u8853\u300d\uff0c\u4ee5\u9818\u5148\u696d\u754c\u5e73\u5747 50 \u500d\u7684\u901f\u5ea6\u9632\u79a6\u60e1\u610f\u5a01\u8105\uff01\u5373\u523b<a href=\" https:\/\/t.rend.tw\/?i=MzM3OA\">\u514d\u8cbb\u4e0b\u8f09<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4ee5\u5354\u52a9\u57f7\u884c\u76e3\u63a7\u4efb\u52d9,\u51fa\u552e\u9593\u8adc\u7a0b\u5f0f\u7d66\u5404\u570b\u653f\u5e9c\u8207\u57f7\u6cd5\u55ae\u4f4d\u800c\u5099\u53d7\u722d\u8b70\u7684Hacking Team\u516c\u53f8,\u8fd1\u65e5\u906d\u5230\u653b\u64ca\uff0c\u7e3d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1922,1385,185,2197,1518,156,8,179],"tags":[1036,2187,107,871],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/13261"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13261"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/13261\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}