{"id":93525,"date":"2018-10-18T01:45:26","date_gmt":"2018-10-18T08:45:26","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=93525"},"modified":"2018-10-16T21:51:45","modified_gmt":"2018-10-17T04:51:45","slug":"unit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/10\/unit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway\/?lang=zh-hant","title":{"rendered":"\u5a01\u8105\u7c21\u5831\uff1a\u6211\u5011\u7d93\u5e38\u4f7f\u7528\u7684 Office \u6587\u4ef6\u53ef\u80fd\u5f88\u5371\u96aa"},"content":{"rendered":"<p>\u5e7e\u4e4e\u6240\u6709\u4eba\u90fd\u6703\u4f7f\u7528 Microsoft Office \u6587\u4ef6\u3002\u7121\u8ad6\u662f\u5de5\u4f5c\u6587\u4ef6\u3001\u96fb\u5b50\u6536\u64da\uff0c\u9084\u662f\u65b0\u516c\u5bd3\u7684\u79df\u7d04\uff0cOffice \u6587\u4ef6\u5c0d\u65bc\u6211\u5011\u6240\u6709\u4eba\u800c\u8a00\u90fd\u76f8\u7576\u5be6\u7528\uff0c\u4e5f\u56e0\u6b64\uff0c\u6211\u5011\u5f88\u53ef\u80fd\u958b\u555f\u6536\u5230\u7684\u96fb\u5b50\u90f5\u4ef6\u4e2d\u9644\u52a0\u7684 Office \u6587\u4ef6\u3002\u7531\u65bc\u653b\u64ca\u8005\u77e5\u9053\u8a31\u591a\u4eba\u5e7e\u4e4e\u90fd\u6703\u958b\u555f\u4efb\u4f55\u6587\u4ef6\uff0c\u5373\u4f7f\u6587\u4ef6\u662f\u4f86\u81ea\u4e0d\u53d7\u4fe1\u4efb\u7684\u4f86\u6e90\uff0c\u56e0\u6b64\u653b\u64ca\u8005\u901a\u5e38\u6703\u5728\u653b\u64ca\u4e2d\u9078\u64c7\u9019\u4e9b\u6a94\u6848\u4f86\u5165\u4fb5\u7cfb\u7d71\u3002<\/p>\n<p>\u5728\u9019\u500b\u5a01\u8105\u7c21\u5831\u4e2d\uff0c\u6211\u5011\u6703\u5c55\u793a Office \u6587\u4ef6\u5982\u4f55\u88ab\u7834\u58de\u548c\u6feb\u7528\uff0c\u7528\u4f86\u653b\u64ca\u548c\u5371\u5bb3 Windows \u7aef\u9ede\u7684\u4e94\u7a2e\u4e0d\u540c\u65b9\u5f0f\uff0c\u5176\u4e2d\u6709\u4e9b\u5148\u524d\u66fe\u7d93\u767c\u4f48\uff0c\u6709\u4e9b\u5247\u662f\u65b0\u5167\u5bb9\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u5de8\u96c6<\/strong><\/p>\n<p>\u5de8\u96c6\u662f\u653b\u64ca\u8005\u5c07 Office \u6587\u4ef6\u6b66\u5668\u5316\u4f86\u767c\u52d5\u653b\u64ca\u7684\u6700\u76f4\u63a5\u65b9\u5f0f\u3002Office \u61c9\u7528\u7a0b\u5f0f\u6709\u53ef\u4ee5\u57f7\u884c VBA (Visual Basic for Applications) \u6307\u4ee4\u78bc\u7684\u5167\u5efa\u6307\u4ee4\u78bc\u5f15\u64ce\u3002\u9019\u4e9b\u6307\u4ee4\u78bc\u6703\u5728\u6587\u4ef6\u958b\u555f\u6642\u7acb\u5373\u57f7\u884c\uff0c\u5b8c\u5168\u4e0d\u9700\u8981\u4efb\u4f55\u4f7f\u7528\u8005\u4e92\u52d5 (\u5047\u8a2d\u4f7f\u7528\u8005\u5148\u524d\u5df2\u555f\u7528\u5de8\u96c6)\uff0c\u800c\u4e14\u6703\u5728\u7cfb\u7d71\u4e0a\u57f7\u884c\u60e1\u610f\u7a0b\u5f0f\u78bc\u3002\u5982\u679c\u4f7f\u7528\u8005\u672a\u555f\u7528\u5de8\u96c6\uff0c\u5247\u6703\u51fa\u73fe\u5feb\u986f\u8996\u7a97\uff0c\u8981\u6c42\u4f7f\u7528\u8005\u6309\u4e00\u4e0b\u4f86\u57f7\u884c\u5de8\u96c6\u3002\u5feb\u986f\u8996\u7a97\u662f Microsoft \u65b0\u589e\u7684\u5e7e\u7a2e\u5b89\u5168\u6a5f\u5236\u4e4b\u4e00\uff0c\u53ef\u964d\u4f4e\u5de8\u96c6\u9020\u6210\u7684\u5b89\u5168\u98a8\u96aa\u3002Microsoft \u4e5f\u6703\u5f37\u5236\u4f7f\u7528\u4e0d\u540c\u7684\u6a94\u6848\u526f\u6a94\u540d (\u5c0d\u65bc\u5305\u542b\u5de8\u96c6\u7684\u65b0\u6587\u4ef6\uff0c\u662f .docm \u800c\u975e .docx)\u3002\u5373\u4f7f\u63a1\u53d6\u9019\u4e9b\u63aa\u65bd\uff0c\u4f7f\u7528\u8005\u4ecd\u7136\u53ef\u4ee5\u9078\u64c7\u958b\u555f\u9019\u4e9b\u6a94\u6848\u4e26\u555f\u7528\u5176\u4e2d\u7684\u5167\u5bb9\uff0c\u56e0\u6b64\u5de8\u96c6\u4ecd\u7136\u662f\u5e38\u898b\u7684\u653b\u64ca\u9014\u5f91\uff0c\u7121\u8ad6\u662f\u5927\u898f\u6a21\u653b\u64ca\u9084\u662f\u7c21\u55ae\u7684\u653b\u64ca\uff0c\u53ef\u7528\u65bc\u50b3\u905e <a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Emotet\">Emotet<\/a> \u4e4b\u985e\u7684\u52d2\u7d22\u8edf\u9ad4\uff0c\u4e26\u767c\u52d5 <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/unit42-sofacy-attacks-multiple-government-entities\/\">Sofacy \u653b\u64ca\u6d3b\u52d5<\/a>\u4e4b\u985e\u7684\u8907\u96dc\u653b\u64ca\u3002<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:97%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-83645 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-500x485.png\" alt=\"\" width=\"500\" height=\"485\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-500x485.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-230x223.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-768x745.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-309x300.png 309w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-41x40.png 41w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-32x32.png 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1-50x50.png 50w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_1.png 837w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\">\u5716 1.\u555f\u7528\u5167\u5bb9\u524d\u5f8c\u7684 Sofacy \u6587\u4ef6<\/p>\n<p>\u6b63\u5982\u6b64\u7bc4\u4f8b\u6240\u793a\uff0c\u653b\u64ca\u8005\u6703\u5229\u7528\u793e\u4ea4\u5de5\u7a0b\u8a66\u5716\u8aaa\u670d\u4f7f\u7528\u8005\u505c\u7528 Microsoft \u65b0\u589e\u7684\u5b89\u5168\u6a5f\u5236\uff0c\u8aaa\u670d\u4f7f\u7528\u8005\u5fc5\u9808\u555f\u7528\u5167\u5bb9\u624d\u80fd\u770b\u898b\u5b8c\u6574\u7684\u6587\u4ef6\u3002\u5728 Sofacy \u7bc4\u4f8b\u4e2d\uff0c\u653b\u64ca\u8005\u53ea\u662f\u5c07\u5b57\u9ad4\u984f\u8272\u8a2d\u5b9a\u70ba\u767d\u8272\uff0c\u56e0\u6b64\u6587\u5b57\u5728\u4f7f\u7528\u8005\u555f\u7528\u5de8\u96c6\u4e4b\u524d\u5c31\u5df2\u5b58\u5728\uff0c\u53ea\u662f\u4e0d\u6e05\u6670\u53ef\u898b\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u5d4c\u5165\u5f0f Flash \u6a94\u6848<\/strong><\/p>\n<p>\u9664\u4e86\u5de8\u96c6\u4e4b\u985e\u7684\u5167\u5efa\u529f\u80fd\u4e4b\u5916\uff0cOffice \u6587\u4ef6\u4e5f\u53ef\u4ee5\u5d4c\u5165\u5916\u90e8\u7269\u4ef6\uff0c\u4f8b\u5982 Adobe Flash \u6a94\u6848\u3002\u9019\u4e9b\u7269\u4ef6\u6703\u50b3\u905e\u5230\u9069\u7576\u7684\u8edf\u9ad4\u9032\u884c\u8655\u7406\uff0c\u56e0\u6b64\uff0c\u4e5f\u53ef\u4ee5\u5c07\u9019\u4e9b\u7269\u4ef6\u5d4c\u5165\u65bc Office \u6587\u4ef6\u7684 Adobe Flash \u5167\u5bb9\u4f86\u5229\u7528\u8edf\u9ad4\u7684\u4efb\u4f55\u5f31\u9ede\u3002\u653b\u64ca\u8005\u5229\u7528\u9019\u7a2e\u653b\u64ca\u9014\u5f91\u7684\u5176\u4e2d\u4e00\u4f8b\u662f <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/unit42-traps-prevents-adobe-flash-player-zero-day\/\">CVE-2018-4878<\/a><\/u>\uff0c\u9019\u6703\u5728 Excel \u6587\u4ef6\u4e2d\u5d4c\u5165\u60e1\u610f SWF \u6a94\u6848\uff0c\u5c0d Adobe Flash Player \u767c\u52d5\u96f6\u6642\u5dee\u653b\u64ca\u3002\u5728\u9019\u4e9b\u985e\u578b\u7684\u653b\u64ca\u4e2d\uff0c\u60e1\u610f Excel \u5305\u542b\u5d4c\u5165\u5f0f Adobe Flash \u5167\u5bb9\uff0c\u9019\u6703\u89f8\u767c Flash \u5f31\u9ede\u4e26\u57f7\u884c\u5d4c\u5165\u7684 shellcode\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Microsoft \u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668<\/strong><\/p>\n<p>\u4ee5\u5c07 Adobe Flash \u6a94\u6848\u5d4c\u5165\u5230 Office \u6587\u4ef6\u7684\u985e\u4f3c\u65b9\u5f0f\uff0c\u60a8\u4e5f\u53ef\u4ee5\u5c07\u65b9\u7a0b\u5f0f\u5d4c\u5165\u5230\u5c07\u7531 Microsoft \u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668\u5256\u6790\u7684\u6587\u4ef6\u4e2d\uff0c\u9019\u500b\u7a0b\u5e8f\u53ef\u4ee5\u8b93\u60a8\u8f15\u9b06\u64b0\u5beb\u6578\u5b78\u65b9\u7a0b\u5f0f\uff1a<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:53%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-83606 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-500x265.png\" alt=\"\" width=\"500\" height=\"265\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-500x265.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-230x122.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-768x408.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-510x271.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-75x40.png 75w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2-565x300.png 565w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_2.png 893w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\">\u5716 2.Microsoft \u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668<\/p>\n<p>\u8207\u524d\u9762\u7684\u7bc4\u4f8b\u4e00\u6a23\uff0c\u53ef\u4ee5\u900f\u904e\u60e1\u610f Office \u6587\u4ef6\u4f86\u5165\u4fb5\u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668\u4e2d\u7684\u5f31\u9ede\u3002\u6211\u5011\u6700\u8fd1\u767c\u73fe\u9019\u65b9\u9762\u7684\u5be6\u4f8b\uff0c<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/12\/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild\/\">CVE-2017-11882<\/a><\/u> \u906d\u5230\u5927\u8086\u5165\u4fb5\uff0c\u4f7f <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-traps-prevents-microsoft-office-equation-editor-zero-day-cve-2017-11882\/\">CVD-2018-0802<\/a><\/u> \u7b49\u5f31\u9ede\u5f97\u4ee5\u906d\u5230\u5165\u4fb5\uff0c\u9019\u5169\u500b\u5165\u4fb5\u6703\u5229\u7528\u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668\u4e2d\u7684\u932f\u8aa4\uff0c\u653b\u64ca\u8005\u80fd\u5920\u85c9\u6b64\u900f\u904e\u6253\u958b Office \u6587\u4ef6\u7684\u4f7f\u7528\u8005\u5b8c\u6210\u9060\u7aef\u7a0b\u5f0f\u78bc\u57f7\u884c\u3002Unit 42 \u7684\u7814\u7a76\u4eba\u54e1\u9084\u78ba\u8a8d\u4e86 <u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0807\" rel=\"nofollow,noopener\" >CVE-2018-0807<\/a><\/u> \u548c <u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0798\" rel=\"nofollow,noopener\" >CVE-2018-0798<\/a><\/u> \u7b49\u985e\u4f3c\u7684 Microsoft \u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668\u5f31\u9ede\uff0c\u53ea\u662f\u5c1a\u672a\u767c\u73fe\u9019\u4e9b\u5f31\u9ede\u906d\u5230\u5165\u4fb5\u3002<\/p>\n<p>\u8acb\u6ce8\u610f\uff0c\u7531\u65bc Microsoft \u65b9\u7a0b\u5f0f\u7de8\u8f2f\u5668\u4f7f\u7528\u672c\u8eab\u7684\u7a0b\u5e8f (eqnedt32.exe) \u57f7\u884c\uff0c\u56e0\u6b64\u5728\u9810\u8a2d\u60c5\u6cc1\u4e0b\uff0cMicrosoft Office \u7684\u7279\u5b9a\u4fdd\u8b77 (\u4f8b\u5982 EMET \u548c Windows Defender \u60e1\u610f\u63a2\u7d22\u9632\u8b77) \u5c07\u5931\u6548\uff0c\u56e0\u70ba\u5b83\u5011\u53ea\u6703\u4fdd\u8b77 Microsoft Office \u7a0b\u5e8f (\u4f8b\u5982 winword.exe)\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>OLE \u7269\u4ef6\u548c HTA \u8655\u7406\u7a0b\u5e8f<\/strong><\/p>\n<p>OLE \u7269\u4ef6\u548c HTA \u8655\u7406\u7a0b\u5e8f\u662f Office \u6587\u4ef6\u9032\u884c\u53c3\u7167\u800c\u5728\u5176\u5167\u5bb9\u4e2d\u5305\u542b\u5176\u4ed6\u6587\u4ef6\u6240\u7528\u7684\u6a5f\u5236\u3002\u5b83\u5011\u53ef\u7528\u65bc\u85c9\u7531\u4e0b\u5217\u65b9\u5f0f\u5371\u5bb3\u7aef\u9ede\uff1a<\/p>\n<ul>\n<li>Microsoft Word \u6587\u4ef6\u5df2\u5d4c\u5165 OLE2 \u5d4c\u5165\u5f0f\u9023\u7d50\u7269\u4ef6<\/li>\n<li>\u958b\u555f\u6587\u4ef6\u5f8c\uff0cWord \u7a0b\u5e8f (winword.exe) \u6703\u5c07 HTTP \u8981\u6c42\u767c\u9001\u5230\u9060\u7aef\u4f3a\u670d\u5668\uff0c\u4ee5\u64f7\u53d6\u6709\u60e1\u610f\u6307\u4ee4\u78bc\u7684 HTA \u6a94\u6848<\/li>\n<li>\u7136\u5f8c\uff0cwinword.exe \u5c07\u900f\u904e COM \u7269\u4ef6\u641c\u5c0b\u61c9\u7528\u7a0b\u5f0f\/hta \u7684\u6a94\u6848\u8655\u7406\u7a0b\u5e8f\uff0c\u9019\u6703\u5c0e\u81f4 Microsoft HTA \u61c9\u7528\u7a0b\u5f0f (mshta.exe) \u8f09\u5165\u4e26\u57f7\u884c\u60e1\u610f\u6307\u4ee4\u78bc<\/li>\n<\/ul>\n<p>\u900f\u904e\u5165\u4fb5 <u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0199\" rel=\"nofollow,noopener\" >CVE-2017-0199<\/a><\/u> (Microsoft \u65bc 2017 \u5e74 9 \u6708\u4fee\u88dc\u7684 Microsoft Office\/WordPad \u9060\u7aef\u7a0b\u5f0f\u78bc\u57f7\u884c (RCE) \u5f31\u9ede) \u53ef\u5229\u7528\u6b64\u529f\u80fd\uff0c\u800c\u4e14\u53ef\u5728\u591a\u500b\u653b\u64ca\u6d3b\u52d5 (\u4f8b\u5982\u9019\u500b <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/10\/unit42-oilrig-group-steps-attacks-new-delivery-documents-new-injector-trojan\/\">OilRig \u653b\u64ca\u6d3b\u52d5<\/a>) \u4e2d\u767c\u63ee\u4f5c\u7528\u3002<\/p>\n<p><div style=\"max-width:100%\" data-width=\"337\"><span class=\"ar-custom\" style=\"padding-bottom:40.06%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-83567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_3.png\" alt=\"\" width=\"337\" height=\"135\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_3.png 337w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_3-230x92.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/Threat-Brief_3-100x40.png 100w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\">\u5716 3.RTF \u6a94\u6848\u770b\u8d77\u4f86\u8207\u4e00\u822c\u7684 Word \u6587\u4ef6\u5b8c\u5168\u76f8\u540c<\/p>\n<p>\u9664\u4e86\u5148\u524d\u7684 OLE \u548c HTA \u5165\u4fb5\u4e4b\u5916\uff0c\u653b\u64ca\u8005\u767c\u73fe RTF \u6a94\u6848\u4e5f\u53ef\u4ee5\u4f7f\u7528 MSHTML \u57f7\u884c\u300ctext\/html\u300dmime \u985e\u578b OLE \u7269\u4ef6\u3002\u9019\u8868\u793a RTF \u6587\u4ef6\u66b4\u9732\u51fa\u8207 Internet Explorer \u76f8\u540c\u7684\u653b\u64ca\u7bc4\u570d\uff01<\/p>\n<p>\u5229\u7528\u7a31\u70ba <u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8174\" rel=\"nofollow,noopener\" >CVE-2018-8174<\/a><\/u> \u7684\u9019\u500b\u908f\u8f2f\u5f31\u9ede\uff0c\u653b\u64ca\u8005\u5373\u53ef\u57f7\u884c\u4efb\u610f HTML\/JavaScript\/VBScript\u3002\u96d6\u7136\u4ee5\u9019\u7a2e\u65b9\u5f0f\u57f7\u884c\u7684\u7a0b\u5f0f\u78bc\u7d93\u904e\u300c\u6c99\u7bb1\u300d\u8655\u7406 (\u7121\u6cd5\u57f7\u884c\u65b0\u7a0b\u5e8f\u6216\u5beb\u5165\u5230\u6a94\u6848\u7cfb\u7d71\u7b49\u7b49)\uff0c\u4e0d\u904e\uff0c\u548c\u5f9e Internet Explorer \u57f7\u884c\u7684\u5176\u4ed6\u7a0b\u5f0f\u78bc\u4e00\u6a23\uff0c\u6b64\u932f\u8aa4\u53ef\u7528\u65bc\u5229\u7528\u5176\u4ed6\u5f31\u9ede\uff0c\u4f8b\u5982 VBScript \u5f15\u64ce\u4e2d\u7684\u8a18\u61b6\u9ad4\u640d\u6bc0 UAF \u5f31\u9ede\uff0c\u5728 Word \u61c9\u7528\u7a0b\u5f0f (winword.exe) \u7684\u8108\u7d61\u4e2d\u7372\u5f97\u4efb\u610f\u7a0b\u5f0f\u78bc\u57f7\u884c\u7684\u6b0a\u9650\uff0c\u85c9\u4ee5\u63a7\u5236\u7cfb\u7d71\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u7d50\u8a9e<\/strong><\/p>\n<p>\u96d6\u7136\u6587\u4ef6\u5f0f\u653b\u64ca\u5341\u591a\u5e74\u4f86\u4e00\u76f4\u662f\u5f88\u5e38\u898b\u7684\u653b\u64ca\u9014\u5f91\uff0c\u4f46\u662f\u6211\u5011\u6700\u8fd1\u767c\u73fe\u9019\u500b\u9014\u5f91\u7684\u53d7\u6b61\u8fce\u7a0b\u5ea6\u548c\u8907\u96dc\u7a0b\u5ea6\u90fd\u5728\u63d0\u5347\u3002\u9019\u4e00\u7d50\u679c\u7684\u51fa\u73fe\u53ef\u80fd\u662f\u7531\u65bc\u700f\u89bd\u5668\u958b\u767c\u4eba\u54e1\u4e0d\u65b7\u9032\u884c\u5f37\u5316\uff0c\u4f7f\u700f\u89bd\u5668\u5165\u4fb5\u8b8a\u5f97\u66f4\u52a0\u56f0\u96e3\u3002\u7121\u8ad6\u539f\u56e0\u70ba\u4f55\uff0c\u7d44\u7e54\u90fd\u5fc5\u9808\u77e5\u9053\u5982\u4f55\u9632\u7bc4\u9019\u4e9b\u5e38\u898b\u7684\u6280\u8853\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u9632\u79a6<\/strong><\/p>\n<p>Palo Alto Networks Traps advanced endpoint protection \u63d0\u4f9b\u591a\u7a2e\u60e1\u610f\u8edf\u9ad4\u548c\u5165\u4fb5\u7684\u9632\u79a6\u65b9\u6cd5\uff0c\u53ef\u9632\u7bc4\u4e0b\u5217\u5a01\u8105\uff1a<\/p>\n<ul>\n<li>\u5de8\u96c6\u6aa2\u67e5 - Traps \u5229\u7528 WildFire \u5a01\u8105\u60c5\u5831\u96f2\u4ee5\u53ca\u672c\u6a5f\u6a5f\u5668\u5b78\u7fd2\u7684\u529f\u80fd\uff0c\u6aa2\u67e5\u6bcf\u500b Office \u6a94\u6848\u4e2d\u662f\u5426\u5b58\u5728\u60e1\u610f\u5de8\u96c6\uff0c\u800c\u4e14\u53ef\u4ee5\u9632\u6b62\u4f7f\u7528\u8005\u958b\u555f\u60e1\u610f\u7684\u6a94\u6848\u3002<\/li>\n<li>\u5165\u4fb5\u9632\u79a6 - Traps \u5ee3\u6cdb\u7684\u5165\u4fb5\u9632\u79a6\u529f\u80fd\u53ef\u4ee5\u963b\u6b62\u4efb\u4f55\u9019\u4e9b\u5165\u4fb5\u5617\u8a66\u5728\u53d7\u653b\u64ca\u7684\u7aef\u9ede\u4e0a\u6210\u529f\u57f7\u884c\u60e1\u610f shellcode\u3002<\/li>\n<li>Traps \u6703\u6301\u7e8c\u76e3\u8996 Office \u61c9\u7528\u7a0b\u5f0f\uff0c\u78ba\u4fdd\u4e0d\u6703\u5c07\u5408\u6cd5\u7684\u5167\u5efa\u7a0b\u5e8f\u7528\u65bc\u60e1\u610f\u6d41\u91cf\u3002<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u5e7e\u4e4e\u6240\u6709\u4eba\u90fd\u6703\u4f7f\u7528 Microsoft Office \u6587\u4ef6\u3002\u7121\u8ad6\u662f\u5de5\u4f5c\u6587\u4ef6\u3001\u96fb\u5b50\u6536\u64da\uff0c\u9084\u662f\u65b0\u516c\u5bd3\u7684\u79df\u7d04\uff0cOffice \u6587\u4ef6\u5c0d\u65bc\u6211\u5011\u6240\u6709\u4eba\u800c\u8a00\u90fd\u76f8\u7576\u5be6\u7528\uff0c\u4e5f\u56e0\u6b64\uff0c\u6211\u5011\u5f88\u53ef\u80fd\u958b\u555f\u6536\u5230\u7684\u96fb\u5b50\u90f5\u4ef6\u4e2d\u9644\u52a0\u7684 Office \u6587\u4ef6\u3002\u7531\u65bc\u653b\u64ca\u8005\u77e5\u9053\u8a31\u591a\u4eba\u5e7e\u4e4e\u90fd\u6703\u958b\u555f\u4efb\u4f55\u6587\u4ef6\uff0c\u5373\u4f7f\u6587\u4ef6\u662f\u4f86\u81ea\u4e0d\u53d7\u4fe1\u4efb\u7684\u4f86\u6e90\uff0c\u56e0\u6b64\u653b\u64ca\u8005\u901a\u5e38\u6703\u5728\u653b\u64ca\u4e2d\u9078\u64c7\u9019\u4e9b\u6a94\u6848\u4f86\u5165\u4fb5\u7cfb\u7d71\u3002 \u5728\u9019\u500b\u5a01\u8105\u7c21\u5831\u4e2d\uff0c\u6211\u5011\u6703\u5c55\u793a Office \u6587\u4ef6\u5982\u4f55\u88ab\u7834\u58de\u548c\u6feb\u7528\uff0c\u7528\u4f86\u653b\u64ca\u548c\u5371\u5bb3 Windows \u7aef\u9ede\u7684\u4e94\u7a2e\u4e0d\u540c\u65b9\u5f0f\uff0c\u5176\u4e2d\u6709\u4e9b\u5148\u524d\u66fe\u7d93\u767c\u4f48\uff0c\u6709\u4e9b\u5247\u662f\u65b0\u5167\u5bb9\u3002 &nbsp; \u5de8\u96c6 \u5de8\u96c6\u662f\u653b\u64ca\u8005\u5c07 Office \u6587\u4ef6\u6b66\u5668\u5316\u4f86\u767c\u52d5\u653b\u64ca\u7684\u6700\u76f4\u63a5\u65b9\u5f0f\u3002Office \u61c9\u7528\u7a0b\u5f0f\u6709\u53ef\u4ee5\u57f7\u884c VBA (Visual Basic for Applications) \u6307\u4ee4\u78bc\u7684\u5167\u5efa\u6307\u4ee4\u78bc\u5f15\u64ce\u3002\u9019\u4e9b\u6307\u4ee4\u78bc\u6703\u5728\u6587\u4ef6\u958b\u555f\u6642\u7acb\u5373\u57f7\u884c\uff0c\u5b8c\u5168\u4e0d\u9700\u8981\u4efb\u4f55\u4f7f\u7528\u8005\u4e92\u52d5 (\u5047\u8a2d\u4f7f\u7528\u8005\u5148\u524d\u5df2\u555f\u7528\u5de8\u96c6)\uff0c\u800c\u4e14\u6703\u5728\u7cfb\u7d71\u4e0a\u57f7\u884c\u60e1\u610f\u7a0b\u5f0f\u78bc\u3002\u5982\u679c\u4f7f\u7528\u8005\u672a\u555f\u7528\u5de8\u96c6\uff0c\u5247\u6703\u51fa\u73fe\u5feb\u986f\u8996\u7a97\uff0c\u8981\u6c42\u4f7f\u7528\u8005\u6309\u4e00\u4e0b\u4f86\u57f7\u884c\u5de8\u96c6\u3002\u5feb\u986f\u8996\u7a97\u662f Microsoft \u65b0\u589e\u7684\u5e7e\u7a2e\u5b89\u5168\u6a5f\u5236\u4e4b\u4e00\uff0c\u53ef\u964d\u4f4e\u5de8\u96c6\u9020\u6210\u7684\u5b89\u5168\u98a8\u96aa\u3002Microsoft \u4e5f\u6703\u5f37\u5236\u4f7f\u7528\u4e0d\u540c\u7684\u6a94\u6848\u526f\u6a94\u540d (\u5c0d\u65bc\u5305\u542b\u5de8\u96c6\u7684\u65b0\u6587\u4ef6\uff0c\u662f .docm \u800c\u975e .docx)\u3002\u5373\u4f7f\u63a1\u53d6\u9019\u4e9b\u63aa\u65bd\uff0c\u4f7f\u7528\u8005\u4ecd\u7136\u53ef\u4ee5\u9078\u64c7\u958b\u555f\u9019\u4e9b\u6a94\u6848\u4e26\u555f\u7528\u5176\u4e2d\u7684\u5167\u5bb9\uff0c\u56e0\u6b64\u5de8\u96c6\u4ecd\u7136\u662f\u5e38\u898b\u7684\u653b\u64ca\u9014\u5f91\uff0c\u7121\u8ad6\u662f\u5927\u898f\u6a21\u653b\u64ca\u9084\u662f\u7c21\u55ae\u7684\u653b\u64ca\uff0c\u53ef\u7528\u65bc\u50b3\u905e &hellip;<\/p>\n","protected":false},"author":575,"featured_media":35275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3543],"tags":[],"coauthors":[6203],"class_list":["post-93525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3543"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Linkedin.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/93525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/575"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=93525"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/93525\/revisions"}],"predecessor-version":[{"id":93540,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/93525\/revisions\/93540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/35275"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=93525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=93525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=93525"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=93525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}