ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ19ÖÜ
Ðû²¼Ê±¼ä 2021-05-10> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê05ÔÂ03ÈÕÖÁ05ÔÂ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î54¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇTenda AC11 /goform/setVLAN»º³åÇøÒç³öÎó²î£»£»£»Pulse Secure Pulse Connect SecureÖ¤ÊéЧÀÍWEBЧÀÍÄÚ´æ¹ýʧӦÓôúÂëÖ´ÐÐÎó²î£»£»£»Linux Kernel eBPFȨÏÞÌáÉýÎó²î£»£»£»Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤ÈÆ¹ýÎó²î£»£»£»Foxit Reader CVE-2021-31468ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDZÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬£¬£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û£»£»£»QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀ЧÀÍÆ÷µÄÎó²î21Nails£»£»£»FireEyeÐû²¼ÓйØUNC2529´¹ÂڻµÄÆÊÎö±¨¸æ£»£»£»Win10 DefenderÖб£´æbug£¬£¬£¬¿ÉÔÚCÅ̽¨Éè´ó×ÚÎļþ£»£»£»¸ßͨоƬ±£´æ´úÂëÖ´ÐÐÎó²î£¬£¬£¬Ó°Ïì30£¥µÄAndroidϵͳ¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Tenda AC11 /goform/setVLAN»º³åÇøÒç³öÎó²î
Tenda AC11 /goform/setVLAN±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4
2.Pulse Secure Pulse Connect SecureÖ¤ÊéЧÀÍWEBЧÀÍÄÚ´æ¹ýʧӦÓôúÂëÖ´ÐÐÎó²î
Pulse Secure Pulse Connect SecureÖ¤ÊéЧÀÍWEBЧÀͱ£´æÊͷźóʹÓÃÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o
3.Linux Kernel eBPFȨÏÞÌáÉýÎó²î
Linux Kernel eBPF±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-503/
4.Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤ÈÆ¹ýÎó²î
Trend Micro IM Security¼àÌý16373¶Ë¿ÚµÄWEB¿ØÖÆÌ¨±£´æÈõ»á»°Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆ£¬£¬£¬Î´ÊÚȨ»á¼û¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-525/
5.Foxit Reader CVE-2021-31468ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î
Foxit Reader U3DÔ½½ç¶ÁÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-557/
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬£¬£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û
±ÈÀûʱBelnetÓÚÖܶþÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û¡£¡£¡£¡£Belnet£¨±ÈÀûʱ ¹ú¼ÒÑо¿ºÍ½ÌÓýÍøÂ磩ÊÇΪ±ÈÀûʱ½ÌÓý»ú¹¹¡¢Ñо¿ÖÐÐÄ¡¢¿ÆÑ§Ñо¿ËùºÍÕþ¸®Ð§ÀÍÌṩЧÀ͵Ļ¥ÁªÍøÌṩÉÌ¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬Õâ´Î¹¥»÷Ó°ÏìÁ˱ÈÀûʱµÄ200¶à¸ö×éÖ¯£¬£¬£¬°üÀ¨Õþ¸®¡¢¾¯Ô±¾ÖºÍCOVID-19ÒßÃçÔ¤¶©µÈÍøÕ¾¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬±ÈÀûʱÕþ¸®ÕýÔÚÊÓ²ì´ËÊÂÎñ£¬£¬£¬Éв»ÇåÎú·¢¶¯´Ë´Î¹¥»÷µÄ¹¥»÷Õß¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/belgium-was-hit-by-a-massive-cyberattack-532812.shtml
2¡¢QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀ЧÀÍÆ÷µÄÎó²î21Nails
QualysÅû¶EximÓʼþ´«ÊäÊðÀí£¨MTA£©Èí¼þÓ°ÏìÊý°ÙÍǫ̀ЧÀÍÆ÷µÄ21¸öÎó²î£¬£¬£¬Í³³ÆÎª21Nails¡£¡£¡£¡£ÕâЩÎó²îÓÐ10¸ö¿É±»Ô¶³ÌʹÓ㬣¬£¬ÁíÍâ11¸öΪÍâµØÎó²î£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿É×éºÏʹÓÃÕâЩÎó²î£¬£¬£¬À´Ô¶³ÌÖ´ÐдúÂ룬£¬£¬²¢ÔÚExim ServerÉÏ»ñµÃrootȨÏÞ¡£¡£¡£¡£ÕâЩÎó²î»®·ÖΪqueue_run£¨£©ÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-28011£©¡¢tls-openssl.cÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-28018£©µÈ¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦Éý¼¶µ½×îеĿÉÓÃExim°æ±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-21nails-exim-bugs-expose-millions-of-servers-to-attacks/
3¡¢FireEyeÐû²¼ÓйØUNC2529´¹ÂڻµÄÆÊÎö±¨¸æ
FireEyeÐû²¼ÁËÓйØUNC2529´¹ÂڻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£FireEyeµÄMandiantÍŶӷ¢Ã÷2020Äê12ÔÂ2ÈÕ£¬£¬£¬ºÍ2020Äê12ÔÂ11ÈÕÖÁ12ÔÂ18ÈÕÖ®¼ä±¬·¢µÄÁ½ÂÖ´¹Âڻ£¬£¬£¬Ö÷ÒªÒÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵĹ«Ë¾ÎªÄ¿µÄ¡£¡£¡£¡£¹¥»÷Õß×ܹ²Ê¹ÓÃÁËÁè¼Ý50¸öÓò£¬£¬£¬Ê¹Óö¨ÖƵĴ¹ÂÚÓʼþ£¬£¬£¬Õë¶Ô°üÀ¨¹ú·À¡¢Ò½Ò©¡¢ÔËÊä¡¢¾üʺ͵ç×ӵȲî±ðµÄÐÐÒµ¡£¡£¡£¡£ÔÚÒ»´Î¹¥»÷»î¶¯ÖУ¬£¬£¬UNC2529ÀÖ³ÉÈëÇÖÁËÃÀ¹úÒ»¼Ò¹©ÎÂŝ֯ÀäЧÀ͹«Ë¾µÄÓò²¢¸Ä¶¯ÁËÆäDNS¼Í¼¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2021/05/unc2529-triple-double-trifecta-phishing-campaign.html
4¡¢Win10 DefenderÖб£´æbug£¬£¬£¬¿ÉÔÚCÅ̽¨Éè´ó×ÚÎļþ
Windows Defender±£´æbug£¬£¬£¬¿ÉÔÚC£º\ProgramData\Microsoft\Windows Defender\Scans\History\StoreÎļþ¼ÐÄÚ½¨Éè´ó×ÚMD5¹þÏ£Îļþ¡£¡£¡£¡£ÕâЩÎļþµÄ¾ÞϸΪ600×Ö½Úµ½1KB£¬£¬£¬ÓеÄϵͳÖÐÖ»ÓÐԼĪ1MBµÄÎļþ£¬£¬£¬¶øÓеÄÓû§Ôò³ÆÆäϵͳ±£´æ´ó×ÚµÄÎļþ£¬£¬£¬Õ¼ÓÃÁË30GBµÄ´æ´¢¿Õ¼ä¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÎÊÌâÒÑÔÚWindows Defender 1.1.18100.6°æ±¾ÖÐÐÞ¸´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/windows-defender-bug-fills-windows-10-boot-drive-with-thousands-of-files/
5¡¢¸ßͨоƬ±£´æ´úÂëÖ´ÐÐÎó²î£¬£¬£¬Ó°Ïì30£¥µÄAndroidϵͳ
Check Point·¢Ã÷¸ßͨ£¨Qualcomm£©µ÷ÖÆ½âµ÷Æ÷£¨MSM£©½Ó¿Ú£¨¼ò³ÆÎªQMI£©Öб£´æ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬È«ÇòÔ¼30£¥µÄÊÖ»ú¶¼ÔÚʹÓÃQMI£¬£¬£¬°üÀ¨Google Pixels¡¢LG¡¢OnePlus¡¢ÈýÐÇGalaxyϵÁкÍСÃ×ÊÖ»ú¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2020-11292£¬£¬£¬ÊÇqmi_voicei_srvcc_call_config_req´¦Öóͷ£³ÌÐò£¨0x64£©ÖеĶÑÒç³öÎó²î£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÔ¶³ÌÖ´ÐдúÂ룬£¬£¬À´»á¼ûÓû§µÄͨ»°¼Í¼ºÍ¶ÌÐÅ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/