Android 0day(CVE-2019-2215) PoC£»£»£»£»£»£»¹¥»÷ÕßÔÚWAVÒôƵÎļþÖÐÒþ²ØºóÃźÍÍÚ¿óľÂí

Ðû²¼Ê±¼ä 2019-10-18
1¡¢Android 0day(CVE-2019-2215)µÄPoC´úÂëÒÑÐû²¼

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

±¾Ô³õ¹È¸èÇå¾²Ñо¿Ô±Maddie StoneÅû¶ÁËÒ»¸öAndroidÁãÈÕÎó²î£¨CVE-2019-2215£© £¬£¬£¬£¬ £¬£¬£¬Æäʱ¹È¸èÌåÏÖ¸ÃÁãÈÕÎó²îÔÚÒ°Íâ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£¿ËÈÕ·ðÂÞÀï´ï´óѧGrant HernandezÔÚ²©¿ÍÖÐÐû²¼ÁËÒ»¸öеÄPoC¹¤¾ßQu1ckR00t £¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøù¤¾ß»ñµÃrootȨÏÞ²¢ÍêÈ«¿ØÖÆ×°±¸¡£¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßûÓÐ×÷Ϊ´ò°üµÄAPKÎļþÐû²¼ £¬£¬£¬£¬ £¬£¬£¬¶øÊÇÒÔÔ´´úÂëµÄÐÎʽÔÚGitHubÉÏÐû²¼¡£¡£¡£¡£¡£¡£¡£HernandezÌåÏÖËûÖ»ÔÚPixel 2ÊÖ»úÉϲâÊÔ¹ýQu1ckR00t £¬£¬£¬£¬ £¬£¬£¬²¢ÖÒÑÔûÓÐÂÄÀúµÄÓû§²»Òª²âÊԸôúÂë £¬£¬£¬£¬ £¬£¬£¬²»È»»áÓÐϵͳ±äשºÍÊý¾ÝɥʧµÄΣº¦¡£¡£¡£¡£¡£¡£¡£GoogleÒÑÔÚ2019Äê10ÔµÄAndroidÇ徲ͨ¸æ£¨Çå¾²²¹¶¡³ÌÐò¼¶±ð2019-10-06£©ÖÐÐÞ²¹ÁËCVE-2019-2215 ¡£¡£¡£¡£¡£¡£¡£ÎªÁË×èÖ¹·ºÆðÎÊÌâ £¬£¬£¬£¬ £¬£¬£¬½¨ÒéÓû§×°ÖÃÐëÒªµÄ²¹¶¡³ÌÐò¡£¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/security-researcher-publishes-proof-of-concept-code-for-recent-android-zero-day/

2¡¢Êý°ÙÍòÑÇÂíÑ·EchoºÍKindle×°±¸Ò×ÊÜWiFi KRACK¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤ESETµÄÒ»·Ý±¨¸æ £¬£¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Amazon Echo 1stºÍAmazon Kindle 8th×°±¸ÈÔÈ»Êܵ½WiFi KRACKÎó²îµÄÓ°Ïì £¬£¬£¬£¬ £¬£¬£¬Õâ¿ÉÄÜÓ°ÏìÊý°ÙÍò×°±¸¡£¡£¡£¡£¡£¡£¡£KRACKÎó²îÊÇWPA2ЭÒé4´ÎÎÕÊÖÖеÄÎó²î£¨CVE-2017-13077ºÍCVE-2017-13078£© £¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÓÚ2017Äê10Ô±»¹ûÕæ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ESETµÄ±íÊö £¬£¬£¬£¬ £¬£¬£¬ÕâЩÎó²î¿ÉÄÜÔÊÐí¹¥»÷ÕßÖ´ÐÐDoS¹¥»÷¡¢ÆÆËðÍøÂçͨѶ»òÖØ²¥¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬×赲ϢÕùÃÜÓû§´«ÊäµÄÃÜÂë»ò»á»°µÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬Î±ÔìÊý¾Ý°üÉõÖÁ×¢ÈëÐÂÊý¾Ý°üµÈ¡£¡£¡£¡£¡£¡£¡£ESETÓÚ2018Äê10ÔÂ23ÈÕ֪ͨÁËÑÇÂíÑ· £¬£¬£¬£¬ £¬£¬£¬ÑÇÂíÑ·ÔÚ2019Äê1ÔÂÒÑÏòÊÜÓ°ÏìµÄ×°±¸ÍÆËÍÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/millions-of-amazon-echo-and-kindle-devices-affected-by-wifi-bug/

3¡¢¹¥»÷ÕßÔÚWAVÒôƵÎļþÖÐÒþ²ØºóÃźÍÍÚ¿óľÂí

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

BlackBerry CylanceÑо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÔÚжñÒâ»î¶¯ÖÐʹÓÃWAVÒôƵÎļþÔÚÄ¿µÄϵͳÉÏÒþ²ØºóÃźͶñÒâ¿ó¹¤¡£¡£¡£¡£¡£¡£¡£ËäÈ»·¸·¨×éÖ¯¾­³£Ê¹ÓÃÒþдÊõÔÚJPEG»òPNGͼÏñÎļþÖÐ×¢Èëpayload £¬£¬£¬£¬ £¬£¬£¬µ«ÔÚÀÄÓÃWAVÒôƵÎļþÉÏÉÐÊýµÚ¶þ´Î¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬£¬£¬£¬ £¬£¬£¬Ã¿¸öWAVÎļþ¶¼ÓëÒ»¸ö¼ÓÔØ³ÌÐò×é¼þÁ¬ÏµÔÚÒ»Æð £¬£¬£¬£¬ £¬£¬£¬ÓÃÓÚ½âÂëºÍÖ´ÐÐÒþ²ØÔÚÒôƵÊý¾ÝÖеĶñÒâÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£ÔÚ²¥·Åʱ £¬£¬£¬£¬ £¬£¬£¬ÆäÖÐһЩWAVÎļþËù±¬·¢µÄÒôÀÖûÓÐÏÔ×ŵÄÖÊÁ¿ÎÊÌâ»òë´Ì £¬£¬£¬£¬ £¬£¬£¬¶øÆäËüÎļþÒ²½ö±¬·¢¾²Ì¬°×ÔëÉù¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷Òª·Ö·¢MetasploitºóÃźÍXMRig¿ó¹¤¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/attackers-hide-backdoors-and-cryptominers-in-wav-audio-files/

4¡¢Ñо¿»ú¹¹·¢Ã÷550¶à¸öÕë¶ÔÃÀ¹úÑ¡¾ÙµÄÐéαÓòÃû


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Digital ShadowsÔÚÒ»ÏîÐÂÑо¿Öз¢Ã÷Áè¼Ý550¸öÕë¶ÔÃÀ¹úÑ¡ÃñµÄÐéαѡ¾ÙÍøÕ¾¡£¡£¡£¡£¡£¡£¡£ÕâÐ©ÍøÕ¾Î±×°³É19¸öÃñÖ÷µ³ºÍ4¸ö¹²ºÍµ³×ÜͳºòÑ¡È˵ÄÑ¡¾ÙÏà¹ØÍøÕ¾ £¬£¬£¬£¬ £¬£¬£¬ÆäÖдó´ó¶¼ÍøÕ¾£¨68%£©Ö»Êǽ«Óû§Öض¨Ïòµ½ÁíÒ»¸öÓòÃûÉÏ£¨Í¨³£ÊǾºÕùµÐÊÖµÄÓòÃû£©¡£¡£¡£¡£¡£¡£¡£µ«Ò²ÓÐ8%µÄÍøÕ¾½«Óû§Öض¨ÏòÖÁ¿ÉÄÜÇÖռѡÃñÒþ˽/±£´æ¶ñÒâÈí¼þµÄChrome²å¼þÉÏ¡£¡£¡£¡£¡£¡£¡£ÓÐ66¸öÓòÃûÍйÜÔÚͳһ¸öIPµØµãÉÏ £¬£¬£¬£¬ £¬£¬£¬²¢ÇÒÊÇͨ¹ýÒþ˽±£»£»£»£»£»£»¤Ð§ÀÍWhoisGuard×¢²áµÄ £¬£¬£¬£¬ £¬£¬£¬ËüÃÇ¿ÉÄÜÊÇÓÉͳһ¸öÍŶÓÔÚÔËÓª¡£¡£¡£¡£¡£¡£¡£Digital ShadowsÎÞ·¨½«ÕâЩÐéαÓòÃû¹éÒòÓÚÌØ¶¨µÄСÎÒ˽¼Ò»ò×éÖ¯¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/over-550-fake-us-election-web/

5¡¢ÐÂÍÚ¿óÈ䳿GraboidÖ÷Ҫͨ¹ýDockerÈÝÆ÷Èö²¥

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Palo Alto NetworksµÄÑо¿Ö°Ô±·¢Ã÷Ö÷ÒªÕë¶ÔDockerÈÝÆ÷µÄÐÂÍÚ¿óÈ䳿Graboid¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±´ÓGraboidµÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷Öз¢Ã÷ÁËÒ»¸ö¾ç±¾ £¬£¬£¬£¬ £¬£¬£¬¸Ã¾ç±¾°üÀ¨Ò»¸ö¾ßÓÐ2000¶à¸öÄ¿µÄIPµØµãµÄÁÐ±í £¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚÉв»ÇåÎúÆäÖÐÓм¸¶àÒѱ»Ñ¬È¾¡£¡£¡£¡£¡£¡£¡£ÔÚѬȾDockerЧÀÍºó £¬£¬£¬£¬ £¬£¬£¬¸ÃÈ䳿»á´ÓDocker HubÏÂÔØ¡° pocosow/centos¡± Docker¾µÏñ²¢°²ÅÅ £¬£¬£¬£¬ £¬£¬£¬ÍÚ¿ó»î¶¯Í¨¹ý±»³ÆÎª¡°gakeaws/nginx¡±µÄµ¥¶ÀÈÝÆ÷¾ÙÐС£¡£¡£¡£¡£¡£¡£¸ÃÈ䳿»¹»á´ÓÄ¿µÄIPÁбíÖÐËæ»úÑ¡ÔñÏÂÒ»¸öÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£×ÜÌå¶øÑÔ £¬£¬£¬£¬ £¬£¬£¬Æ¾Ö¤Unit 42µÄÊý¾Ý £¬£¬£¬£¬ £¬£¬£¬×î³õµÄ¶ñÒâDocker¾µÏñÒѱ»ÏÂÔØÁË1Íò´ÎÒÔÉÏ £¬£¬£¬£¬ £¬£¬£¬È䳿×ÔÉíÒѱ»ÏÂÔØÁË6500¶à´Î¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/unsecured-docker-hosts-attacked-by-new-graboid-cryptojacking-worm/

6¡¢Å·ÖÞij¹ú¼Ê»ú³¡50%ÒÔÉϵÄϵͳѬȾÍÚ¿óľÂí


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CyberbitÑо¿Ö°Ô±·¢Ã÷Å·ÖÞÒ»¸ö¹ú¼Ê»ú³¡µÄ50%ÒÔÉϵÄÊÂÇéվѬȾÁËÃÅÂÞ±ÒÍÚ¿óľÂí¡£¡£¡£¡£¡£¡£¡£CyberbitÌåÏÖ £¬£¬£¬£¬ £¬£¬£¬¸ÃÍÚ¿óľÂíÊÇÒ»Äê¶àÒÔǰÓÉZscaler·¢Ã÷µÄXMRigµÄÒ»¸ö±äÖÖ £¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¶ÔÆä¾ÙÐÐÁ˸üÐÂÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£¸Ã±äÖÖÔÚVirusTotalÉÏÖ»»ñµÃÁË16/73µÄ¼ì³öÂÊ¡£¡£¡£¡£¡£¡£¡£¸ÃľÂí¿ÉÄÜÒѾ­±£´æÁËÊýÔµÄʱ¼ä £¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚÉв»ÇåÎúÏêϸµÄѬȾǰÑÔ £¬£¬£¬£¬ £¬£¬£¬µ«ºÃÐÂÎÅÊǸûú³¡µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/european-airport-systems-infected-with-monero-mining-malware/