ÈýÐÇ¡¢»ªÎªµÈÊÖ»úÒ×ÊÜOMA CP¶ÌÐÅÖ¸ÁîÓÕÆ­¹¥»÷£»£»£»£»AndroidÌáȨ0day£¬£¬£¬ £¬£¬ £¬£¬Î´ÔÚ9ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´

Ðû²¼Ê±¼ä 2019-09-05

1.ÈýÐÇ¡¢»ªÎªµÈÊÖ»úÒ×ÊÜOMA CP¶ÌÐÅÖ¸ÁîÓÕÆ­¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Check PointÑо¿Ö°Ô±·¢Ã÷ËļÒÖÇÄÜÊÖ»úÖÆÔìÉÌ£¨°üÀ¨ÈýÐÇ¡¢»ªÎª¡¢LGºÍË÷ÄᣩδÔÚÆä×°±¸ÉÏʵÑéÇå¾²µÄOMA CPÖ¸Áî±ê×¼£¬£¬£¬ £¬£¬ £¬£¬Ê¹µÃ¹¥»÷Õß¿ÉÒÔͨ¹ýαÔìOMA CP¶ÌÐÅÖ¸ÁîÓÕÆ­Óû§ÐÞ¸Ä×°±¸ÉèÖ㬣¬£¬ £¬£¬ £¬£¬´Ó¶ø×èµ²Æäµç×ÓÓʼþ»òÍøÂçÁ÷Á¿¡£ ¡£¡£¡£¡£¡£OMA CP´ú±í¿ª·ÅÒÆ¶¯Í¬Ã˿ͻ§¶ËÉèÖ㬣¬£¬ £¬£¬ £¬£¬ËüÖ¸µÄÊÇÒÆ¶¯ÔËÓªÉÌ¿Éͨ¹ýÌØ¶¨¶ÌÐŽ«ÍøÂçÉèÖ÷¢Ë͵½Óû§×°±¸µÄÒ»ÖÖ±ê×¼¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÈýÐǵÄÊÖ»ú×î²»Çå¾²£¬£¬£¬ £¬£¬ £¬£¬ÓÉÓÚËü¿ÉÒÔ½ÓÊÜÈκÎÀàÐ͵ÄOMA CPÐÂÎŲ¢ÇÒûÓÐÈÏÖ¤»òÑéÖ¤»úÖÆ¡£ ¡£¡£¡£¡£¡£ÈýÐǺÍLG»®·ÖÓÚ5Ô·ݺÍ7Ô·ÝÐû²¼ÁËÐÞ¸´²¹¶¡£¬£¬£¬ £¬£¬ £¬£¬»ªÎªÌåÏÖ½«ÔÚÏÂÒ»´úMate»òPϵÁÐÊÖ»úÖмÓÈëÐÞ¸´²¹¶¡£¬£¬£¬ £¬£¬ £¬£¬µ«Ë÷Äá¾Ü¾øÈϿɸÃÎó²î¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages/


2.Foxit PDF¹«Ë¾È·ÈÏÁè¼Ý32.8ÍòÓû§ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Foxit PDF¹«Ë¾È·ÈÏÉÏÖܵÄÊý¾Ýй¶ÊÂÎñÓ°ÏìÁË328549ÃûÓû§¡£ ¡£¡£¡£¡£¡£¸ÃÊÂÎñÓëÆäMy AccountЧÀÍÔâδÊÚȨ»á¼ûÓйØ£¬£¬£¬ £¬£¬ £¬£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢µç»°ºÅÂë¡¢¹«Ë¾Ãû³ÆºÍIPµØµã£¬£¬£¬ £¬£¬ £¬£¬µ«²»°üÀ¨Ö§¸¶ÐÅÏ¢¡£ ¡£¡£¡£¡£¡£FoxitÒÑִ֪ͨ·¨»ú¹¹ºÍÊý¾Ý±£»£»£»£»¤²¿·Ö²¢¾ÙÐÐÏàÖúÊӲ졣 ¡£¡£¡£¡£¡£¸Ã¹«Ë¾»¹ÌåÏÖÒÑÖØÖÃÊÜÓ°ÏìÓû§ÕË»§µÄÃÜÂ룬£¬£¬ £¬£¬ £¬£¬²¢½¨ÒéÓû§Ð¡ÐÄ¿ÉÄܵÄÉí·ÝµÁÓúÍڲƭ¹¥»÷¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/over-328000-users-hit-foxit-data-breach


3.жñÒ⹤¾ß°üDomen¿ÉÍÆËÍ30ÖÖÓïÑÔµÄÐéαFlash¸üÐÂ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MalwarebytesÑо¿Ö°Ô±J¨¦r?me Segura·¢Ã÷ÐÂÉç½»¹¤³Ì¹¥»÷¹¤¾ß°üDomen£¬£¬£¬ £¬£¬ £¬£¬ËüÔÚÊÜѬȾµÄÕ¾µãÉÏͨ¹ýµ¯³öÐéαµÄä¯ÀÀÆ÷ºÍFlash Player¸üÐÂÀ´Èö²¥Ô¶¿ØÄ¾ÂíºÍ¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£¡£DomenµÄÖØ´óÐԺͶ¨ÖÆ»¯Ë®Æ½½Ï¸ß£¬£¬£¬ £¬£¬ £¬£¬Ëü¿ÉÒÔ˳Ӧ²î±ðµÄ¿Í»§¶Ë¡¢ä¯ÀÀÆ÷ºÍ»á¼ûÕß¡£ ¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬ £¬£¬ £¬£¬DomenÖ§³Ö30ÖÖ²î±ðµÄÓïÑÔ£¬£¬£¬ £¬£¬ £¬£¬²¢ÇÒרΪ×ÀÃæºÍÒÆ¶¯»á¼ûÕßÉè¼Æ£¬£¬£¬ £¬£¬ £¬£¬ÕâʹµÃÆä¹¥»÷¹æÄ£Ï൱ÆÕ±é¡£ ¡£¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúÓм¸¶àÍøÕ¾Êܵ½Ñ¬È¾£¬£¬£¬ £¬£¬ £¬£¬µ«DomenÐéαÖÒÑԵĻá¼ûÕßÊýĿΪ11.1Íò¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-toolkit-pushes-malware-via-fake-program-update-alerts-in-30-languages/


4.ÀÕË÷Èí¼þNemtyÆð¾¢Ê¹ÓÃRIG EK¾ÙÐзַ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿Ö°Ô±Mol69·¢Ã÷ÀÕË÷Èí¼þNemtyÏÖÔÚ³ÉΪRIGÎó²îʹÓù¤¾ß°ü¶ñÒâ»î¶¯µÄpayload¡£ ¡£¡£¡£¡£¡£NemtyÔÚ8ÔÂβ·ºÆð£¬£¬£¬ £¬£¬ £¬£¬Æä1.0°æ±¾ÖеĴúÂë°üÀ¨¶Ô¶íÂÞ˹×ÜͳºÍ·´²¡¶¾Èí¼þµÄÁôÑÔ¡£ ¡£¡£¡£¡£¡£Ëü¼ÓÃÜÎļþºóµÄÊê½ðÒªÇóԼΪ¼ÛÖµ1000ÃÀÔªµÄ±ÈÌØ±Ò£¬£¬£¬ £¬£¬ £¬£¬µ«ÏÖÔÚûÓпÉÓõÄÃ⺬»ìÃܹ¤¾ß¡£ ¡£¡£¡£¡£¡£Ô­Ê¼µÄNemtyÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.nemtyÀ©Õ¹Ãû£¬£¬£¬ £¬£¬ £¬£¬µ«Mol69ÊӲ쵽µÄ±äÌåÔÚÎļþºó¸½¼Ó._NEMTY_Lct5F3C_À©Õ¹Ãû¡£ ¡£¡£¡£¡£¡£ÆäÀÕË÷Ʊ¾ÝÖаüÀ¨½âÃÜÃÜÔ¿µÄ¼ÓÃܰ汾£¬£¬£¬ £¬£¬ £¬£¬ÐèÖ§¸¶Êê½ðÒÔ»ñµÃ½âÃÜÃÜÔ¿¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nemty-ransomware-gets-distribution-from-rig-exploit-kit/


5.AstarothľÂí±äÖÖͨ¹ýCloudflare Workersƽ̨Èö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Check Point·¢Ã÷Ò»¸öеĶñÒâ¹¥»÷»î¶¯Ê¹ÓÃCloudflare WorkersÎÞЧÀÍÆ÷ÅÌËãÆ½Ì¨À´Æð¾¢·Ö·¢AstarothľÂíбäÌ壬£¬£¬ £¬£¬ £¬£¬ÒÔÌӱܼì²âºÍ×èÖ¹×Ô¶¯ÆÊÎö¡£ ¡£¡£¡£¡£¡£Cloudflare WorkersÊÇÖ¸Óû§¿ÉÒÔ´Ó90¸ö¹ú¼ÒµÄ193¸ö¶¼»áµÄCloudflareЧÀÍÆ÷ÉÏÔËÐÐJavaScript¾ç±¾£¬£¬£¬ £¬£¬ £¬£¬´Ó¶øÎÞÐèµ£ÐÄ»ù´¡ÉèÊ©µÄά»¤¡£ ¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Marcel Afrahim·¢Ã÷Astaroth¹¥»÷ÕßʹÓÃCloudflare WorkersʵÑéÈý½×¶ÎѬȾÀú³Ì£¬£¬£¬ £¬£¬ £¬£¬°üÀ¨Ê×ÏÈͨ¹ý´¹ÂÚÓʼþ·Ö·¢Ö¸ÏòCloudflare»ù´¡¼Ü¹¹ÓòÃûµÄÁ´½Ó£¬£¬£¬ £¬£¬ £¬£¬È»ºóÁ´½ÓÖеÄJSONÎļþ×Ô¶¯ÏÂÔØZIP´æµµ²¢½«Ä¿µÄת»»ÎªÖض¨Ïòµ½Ê¹ÓÃCloudflare WorkersÒDZí°å¾ç±¾±à¼­Æ÷½¨ÉèµÄ¾ç±¾URL£¬£¬£¬ £¬£¬ £¬£¬×îºóʹÓÃDLL Side-loadingÊÖÒÕÖÐÖ¹Õýµ±Àú³Ì²¢¼ÓÔØ¶ñÒâDLL¡£ ¡£¡£¡£¡£¡£¶ñÒâDLLÓë¹¥»÷Õß¿ØÖƵÄYouTubeºÍFacebookÉèÖÃÎļþͨѶ£¬£¬£¬ £¬£¬ £¬£¬ÒÔ»ñµÃAstaroth±äÖÖ¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/astaroth-trojan-uses-cloudflare-workers-to-bypass-av-software/


6.ZDIÅû¶AndroidÌáȨ0day£¬£¬£¬ £¬£¬ £¬£¬Î´ÔÚ9ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ZDIÑо¿Ö°Ô±ÖÒÑÔAndroidϵͳÖеĸßΣÌáȨ0day£¬£¬£¬ £¬£¬ £¬£¬¸ÃÎó²îδÔڹȸèÐû²¼9ÔÂAndroidÇå¾²¸üÐÂÖÐÐÞ¸´¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆAndroid v4l2£¨Video4Linux 2£©Çý¶¯³ÌÐòÖб£´æÎó²î£¬£¬£¬ £¬£¬ £¬£¬µ±±»Ê¹ÓÃʱ£¬£¬£¬ £¬£¬ £¬£¬v4l2ÖеÄÒ»¸ö×é¼þÔÚ¶Ô¹¤¾ßÖ´ÐвÙ×÷֮ǰûÓÐÑéÖ¤¹¤¾ßµÄ±£´æ£¬£¬£¬ £¬£¬ £¬£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉʹÓøÃÎó²îÌáȨÖÁRing0¡£ ¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.8·Ö¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ3ÔÂ13ÈÕ·¢Ã÷²¢±¨¸æÁËÎó²î£¬£¬£¬ £¬£¬ £¬£¬¹È¸èÈ·ÈϽ«ÐÞ¸´¸ÃÎó²î£¬£¬£¬ £¬£¬ £¬£¬µ«Ã»ÓÐÌṩԤ¼ÆµÄʱ¼ä±í¡£ ¡£¡£¡£¡£¡£¹È¸èÔÚ±¾ÖÜÐû²¼µÄ9ÔÂAndroidÇå¾²¸üÐÂÖÐÐÞ¸´Á˽ü50¸öÎó²î£¬£¬£¬ £¬£¬ £¬£¬µ«²»°üÀ¨´ËÎó²î¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/