ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ19ÖÜ

Ðû²¼Ê±¼ä 2021-05-10

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2021Äê05ÔÂ03ÈÕÖÁ05ÔÂ09ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´54¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇTenda AC11 /goform/setVLAN»º³åÇøÒç³ö©¶´ £»Pulse Secure Pulse Connect SecureÖ¤Êé·þÎñWEB·þÎñÄÚ´æ´íÎóÓ¦ÓôúÂëÖ´ÐЩ¶´ £»Linux Kernel eBPFȨÏÞÌáÉý©¶´ £»Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤Èƹý©¶´ £»Foxit Reader CVE-2021-31468ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊDZÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨·ÃÎÊ £»QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ©¶´21Nails £»FireEyeÐû²¼ÓйØUNC2529µöÓã»î¶¯µÄ·ÖÎö³ÂËß £»Win10 DefenderÖдæÔÚbug£¬¿ÉÔÚCÅÌ´´½¨´óÁ¿Îļþ £»¸ßͨоƬ´æÔÚ´úÂëÖ´ÐЩ¶´£¬Ó°Ïì30£¥µÄAndroidϵͳ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


> ÖØÒªÄþ¾²Â©¶´Áбí


1.Tenda AC11 /goform/setVLAN»º³åÇøÒç³ö©¶´


Tenda AC11 /goform/setVLAN´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4


2.Pulse Secure Pulse Connect SecureÖ¤Êé·þÎñWEB·þÎñÄÚ´æ´íÎóÓ¦ÓôúÂëÖ´ÐЩ¶´


Pulse Secure Pulse Connect SecureÖ¤Êé·þÎñWEB·þÎñ´æÔÚÊͷźóʹÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o


3.Linux Kernel eBPFȨÏÞÌáÉý©¶´


Linux Kernel eBPF´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£

https://www.zerodayinitiative.com/advisories/ZDI-21-503/


4.Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤Èƹý©¶´


Trend Micro IM Security¼àÌý16373¶Ë¿ÚµÄWEB¿ØÖÆ̨´æÔÚÈõ»á»°Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÄþ¾²ÏÞÖÆ£¬Î´ÊÚȨ·ÃÎÊ¡£

https://www.zerodayinitiative.com/advisories/ZDI-21-525/


5.Foxit Reader CVE-2021-31468ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


Foxit Reader U3DÔ½½ç¶Á©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-21-557/


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨·ÃÎÊ


1.jpg


±ÈÀûʱBelnetÓÚÖܶþÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨·ÃÎÊ¡£Belnet£¨±ÈÀûʱ ¹ú¼ÒÑо¿ºÍ½ÌÓýÍøÂ磩ÊÇΪ±ÈÀûʱ½ÌÓý»ú¹¹¡¢Ñо¿ÖÐÐÄ¡¢¿ÆѧÑо¿ËùºÍÕþ¸®·þÎñÌṩ·þÎñµÄ»¥ÁªÍøÌṩÉÌ¡£¾ÝÔ¤¼Æ£¬Õâ´Î¹¥»÷Ó°ÏìÁ˱ÈÀûʱµÄ200¶à¸ö×éÖ¯£¬°üÂÞÕþ¸®¡¢¾¯²ì¾ÖºÍCOVID-19ÒßÃçÔ¤¶©µÈÍøÕ¾¡£Ä¿Ç°£¬±ÈÀûʱÕþ¸®ÕýÔÚÊÓ²ì´Ëʼþ£¬Éв»Çå³þ·¢¶¯´Ë´Î¹¥»÷µÄ¹¥»÷Õß¡£


Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/belgium-was-hit-by-a-massive-cyberattack-532812.shtml


2¡¢QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ©¶´21Nails


2.jpg


QualysÅû¶EximÓʼþ´«ÊäÊðÀí£¨MTA£©Èí¼þÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ21¸ö©¶´£¬Í³³ÆΪ21Nails¡£ÕâЩ©¶´ÓÐ10¸ö¿É±»Ô¶³ÌÀûÓã¬ÁíÍâ11¸öΪµ±µØ©¶´£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿É×éºÏʹÓÃÕâЩ©¶´£¬À´Ô¶³ÌÖ´ÐдúÂ룬²¢ÔÚExim ServerÉÏ»ñµÃrootȨÏÞ¡£ÕâЩ©¶´·Ö±ðΪqueue_run£¨£©ÖеĶѻº³åÇøÒç³ö©¶´£¨CVE-2020-28011£©¡¢tls-openssl.cÖеÄÊͷźóʹÓ鶴£¨CVE-2020-28018£©µÈ¡£Ñо¿ÈËÔ±½¨ÒéÓû§Á¢¼´Éý¼¶µ½×îеĿÉÓÃExim°æ±¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-21nails-exim-bugs-expose-millions-of-servers-to-attacks/


3¡¢FireEyeÐû²¼ÓйØUNC2529µöÓã»î¶¯µÄ·ÖÎö³ÂËß


3.jpg


FireEyeÐû²¼ÁËÓйØUNC2529µöÓã»î¶¯µÄ·ÖÎö³ÂËß¡£FireEyeµÄMandiantÍŶӷ¢ÏÖ2020Äê12ÔÂ2ÈÕ£¬ºÍ2020Äê12ÔÂ11ÈÕÖÁ12ÔÂ18ÈÕÖ®¼ä·¢ÉúµÄÁ½ÂÖµöÓã»î¶¯£¬Ö÷ÒªÒÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵĹ«Ë¾ÎªÄ¿±ê¡£¹¥»÷Õß×ܹ²Ê¹ÓÃÁËÁè¼Ý50¸öÓò£¬ÀûÓö¨ÖƵĵöÓãÓʼþ£¬Õë¶Ô°üÂÞ¹ú·À¡¢Ò½Ò©¡¢ÔËÊä¡¢¾üʺ͵ç×ӵȲîÒìµÄÐÐÒµ¡£ÔÚÒ»´Î¹¥»÷»î¶¯ÖУ¬UNC2529ÀÖ³ÉÈëÇÖÁËÃÀ¹úÒ»¼Ò¹©Å¯ºÍÖÆÀä·þÎñ¹«Ë¾µÄÓò²¢¸Ä¶¯ÁËÆäDNS¼Ç¼¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2021/05/unc2529-triple-double-trifecta-phishing-campaign.html


4¡¢Win10 DefenderÖдæÔÚbug£¬¿ÉÔÚCÅÌ´´½¨´óÁ¿Îļþ


4.jpg


Windows Defender´æÔÚbug£¬¿ÉÔÚC£º\ProgramData\Microsoft\Windows Defender\Scans\History\StoreÎļþ¼ÐÄÚ´´½¨´óÁ¿MD5¹þÏ£Îļþ¡£ÕâЩÎļþµÄ¾ÞϸΪ600×Ö½Úµ½1KB£¬ÓеÄϵͳÖÐÖ»ÓÐԼĪ1MBµÄÎļþ£¬¶øÓеÄÓû§Ôò³ÆÆäϵͳ´æÔÚ´óÁ¿µÄÎļþ£¬Õ¼ÓÃÁË30GBµÄ´æ´¢¿Õ¼ä¡£Ä¿Ç°£¬¸ÃÎÊÌâÒÑÔÚWindows Defender 1.1.18100.6°æ±¾ÖÐÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/windows-defender-bug-fills-windows-10-boot-drive-with-thousands-of-files/


5¡¢¸ßͨоƬ´æÔÚ´úÂëÖ´ÐЩ¶´£¬Ó°Ïì30£¥µÄAndroidϵͳ


5.jpg


Check Point·¢ÏÖ¸ßͨ£¨Qualcomm£©µ÷Öƽâµ÷Æ÷£¨MSM£©½Ó¿Ú£¨¼ò³ÆΪQMI£©ÖдæÔÚ´úÂëÖ´ÐЩ¶´¡£¾Ýͳ¼Æ£¬È«ÇòÔ¼30£¥µÄÊÖ»ú¶¼ÔÚʹÓÃQMI£¬°üÂÞGoogle Pixels¡¢LG¡¢OnePlus¡¢ÈýÐÇGalaxyϵÁкÍСÃ×ÊÖ»ú¡£¸Ã©¶´×·×ÙΪCVE-2020-11292£¬ÊÇqmi_voicei_srvcc_call_config_req´¦Ö÷¨Ê½£¨0x64£©ÖеĶÑÒç³ö©¶´£¬¹¥»÷Õß¿ÉÒÔÀûÓôË©¶´Ô¶³ÌÖ´ÐдúÂ룬À´·ÃÎÊÓû§µÄͨ»°¼Ç¼ºÍ¶ÌÐÅ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/