ÈýÐÇ¡¢»ªÎªµÈÊÖ»úÒ×ÊÜOMA CP¶ÌÐÅÖ¸ÁîºýŪ¹¥»÷£»AndroidÌáȨ0day£¬Î´ÔÚ9Ô°²È«¸üÐÂÖн¨¸´

°ä²¼¹¦·ò 2019-09-05

1.ÈýÐÇ¡¢»ªÎªµÈÊÖ»úÒ×ÊÜOMA CP¶ÌÐÅÖ¸ÁîºýŪ¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point×êÑÐÈËÔ±·¢ÏÖËļÒÖÇÄÜÊÖ»úÔì×÷ÉÌ£¨Ô̺¬ÈýÐÇ¡¢»ªÎª¡¢LGºÍË÷ÄᣩδÔÚÆäÉ豸ÉÏÖ´Ðа²È«µÄOMA CPÖ¸Áî³ß¶È£¬Ê¹µÃ¹¥»÷ÕßÄܹ»Í¨¹ýαÔìOMA CP¶ÌÐÅÖ¸ÁîÓÕÆ­Óû§Åú¸ÄÉ豸ÅäÖ㬴ӶøÀ¹½ØÆäµç×ÓÓʼþ»òÍøÂçÁ÷Á¿¡£OMA CP´ú±íÊ¢¿ªÒƶ¯Í¬Ã˿ͻ§¶ËÅäÖã¬ËüÖ¸µÄÊÇÒÆ¶¯ÔËÓªÉÌ¿Éͨ¹ýÌØ¶¨¶ÌÐŽ«ÍøÂçÉèÖ÷¢Ë͵½Óû§É豸µÄÒ»Öֳ߶È¡£×êÑÐÈËÔ±³ÆÈýÐǵÄÊÖ»ú×î²»°²È«£¬ÓÉÓÚËüÄܹ»½ÓÊÜÈκÎÀàÐ͵ÄOMA CPÐÂÎŲ¢ÇÒûÓÐÈÏÖ¤»òÑéÖ¤»úÔì¡£ÈýÐǺÍLG±ðÀëÓÚ5Ô·ݺÍ7Ô·ݰ䲼Á˽¨¸´²¹¶¡£¬»ªÎª°µÊ¾½«±ÉÈËÒ»´úMate»òPϵÁÐÊÖ»úÖвÎÓ뽨¸´²¹¶¡£¬µ«Ë÷Äá»Ø¾øÈϿɸ÷ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages/


2.Foxit PDF¹«Ë¾È·Èϳ¬¹ý32.8ÍòÓû§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Foxit PDF¹«Ë¾È·ÈÏÉÏÖܵÄÊý¾Ýй¶ÊÂÎñÓ°ÏìÁË328549ÃûÓû§¡£¸ÃÊÂÎñÓëÆäMy Account·þÎñÔâδÊÚȨ½Ó¼ûÓйØ£¬Ð¹Â¶µÄÊý¾ÝÔ̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢ÃÜÂë¡¢µç»°ºÅÂë¡¢¹«Ë¾Ãû³ÆºÍIPµØÖ·£¬µ«²»Ô̺¬Ö§¸¶ÐÅÏ¢¡£FoxitÒÑ֪ͨ·¨ÂÉ»ú¹¹ºÍÊý¾Ý±£»¤²¿ÃŲ¢½øÐкÏ×÷µ÷²é¡£¸Ã¹«Ë¾»¹°µÊ¾ÒѳÁÖÃÊÜÓ°ÏìÓû§ÕË»§µÄÃÜÂ룬²¢½¨ÒéÓû§¾¯Ìè¿ÉÄܵÄÉí·ÝµÁÓúÍڲƭ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/over-328000-users-hit-foxit-data-breach


3.жñÒ⹤¾ß°üDomen¿ÉÍÆËÍ30ÖÖ˵»°µÄÐéαFlash¸üÐÂ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Malwarebytes×êÑÐÈËÔ±J¨¦r?me Segura·¢ÏÖÐÂÉç½»¹¤³Ì¹¥»÷¹¤¾ß°üDomen£¬ËüÔÚÊÜϰȾµÄÕ¾µãÉÏͨ¹ýµ¯³öÐéαµÄä¯ÀÀÆ÷ºÍFlash Player¸üÐÂÀ´´«²¼Ô¶¿ØÄ¾ÂíºÍ¶ñÒâÈí¼þ¡£DomenµÄ¸´ÔÓÐԺͶ¨Ô컯ˮƽ½Ï¸ß£¬ËüÄܹ»ÊÊÓ¦·ÖÆçµÄ¿Í»§¶Ë¡¢ä¯ÀÀÆ÷ºÍ½Ó¼ûÕß¡£¾ßÌåÀ´Ëµ£¬DomenÖ§³Ö30ÖÖ·ÖÆçµÄ˵»°£¬²¢ÇÒרΪ×ÀÃæºÍÒÆ¶¯½Ó¼ûÕßÉè¼Æ£¬ÕâʹµÃÆä¹¥»÷ÁìÓòÏ൱¿í·º¡£Ä¿Ç°»¹²»Ã÷ÏÔÓм¸¶àÍøÕ¾Êܵ½Ï°È¾£¬µ«DomenÐéαÖÒ¸æµÄ½Ó¼ûÕßÊýÁ¿Îª11.1Íò¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-toolkit-pushes-malware-via-fake-program-update-alerts-in-30-languages/


4.ÀÕË÷Èí¼þNemty»ý¼«ÀûÓÃRIG EK½øÐзַ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±Mol69·¢ÏÖÀÕË÷Èí¼þNemty´Ë¿Ì³ÉΪRIG·ì϶ÀûÓù¤¾ß°ü¶ñÒâ»î¶¯µÄpayload¡£NemtyÔÚ8Ôµ׳öÏÖ£¬Æä1.0°æ±¾ÖеĴúÂëÔ̺¬¶Ô¶íÂÞ˹×ÜͳºÍ·´²¡¶¾Èí¼þµÄÁôÑÔ¡£Ëü¼ÓÃÜÎļþºóµÄÊê½ðÒªÇóԼΪ¼ÛÖµ1000ÃÀÔªµÄ±ÈÌØ±Ò£¬µ«Ä¿Ç°Ã»ÓпÉÓõÄÃâ·Ñ½âÃܹ¤¾ß¡£Ô­Ê¼µÄNemtyÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.nemtyÀ©´óÃû£¬µ«Mol69¹Û²ìµ½µÄ±äÌåÔÚÎļþºó¸½¼Ó._NEMTY_Lct5F3C_À©´óÃû¡£ÆäÀÕË÷µ¥¾ÝÖÐÔ̺¬½âÃÜÃÜÔ¿µÄ¼ÓÃܰ汾£¬ÐèÖ§¸¶Êê½ðÒÔ»ñµÃ½âÃÜÃÜÔ¿¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nemty-ransomware-gets-distribution-from-rig-exploit-kit/


5.AstarothľÂí±äÖÖͨ¹ýCloudflare Workersƽ̨´«²¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point·¢ÏÖÒ»¸öеĶñÒâ¹¥»÷»î¶¯ÀûÓÃCloudflare WorkersÎÞ·þÎñÆ÷ÍÆËãÆ½Ì¨À´»ý¼«·Ö·¢AstarothľÂíбäÌ壬ÒÔÌӱܼì²âºÍ×èÖ¹×Ô¶¯·ÖÎö¡£Cloudflare WorkersÊÇÖ¸Óû§Äܹ»´Ó90¸ö¹ú¶ÈµÄ193¸ö³ÇÊеÄCloudflare·þÎñÆ÷ÉÏÔËÐÐJavaScript¾ç±¾£¬´Ó¶øÎÞÐè²»°²»ù´¡ÉèÊ©µÄÊØ»¤¡£°²È«×êÑÐÔ±Marcel Afrahim·¢ÏÖAstaroth¹¥»÷ÕßÀûÓÃCloudflare WorkersÖ´ÐÐÈý½×¶ÎϰȾ¹ý³Ì£¬Ô̺¬Ê×ÏÈͨ¹ý´¹µöÓʼþ·Ö·¢Ö¸ÏòCloudflare»ù´¡¼Ü¹¹ÓòÃûµÄÁ´½Ó£¬¶øºóÁ´½ÓÖеÄJSONÎļþ×Ô¶¯ÏÂÔØZIP´æµµ²¢½«Ö¸±êת»»Îª³Á¶¨Ïòµ½Ê¹ÓÃCloudflare WorkersÒDZí°å¾ç±¾±à×ëÆ÷´´½¨µÄ¾ç±¾URL£¬×îºóÀûÓÃDLL Side-loading¼¼ÊõÖжϺϷ¨¹ý³Ì²¢¼ÓÔØ¶ñÒâDLL¡£¶ñÒâDLLÓë¹¥»÷Õß½ÚÔìµÄYouTubeºÍFacebookÅäÖÃÎļþͨѶ£¬ÒÔ»ñµÃAstaroth±äÖÖ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/astaroth-trojan-uses-cloudflare-workers-to-bypass-av-software/


6.ZDIÅû¶AndroidÌáȨ0day£¬Î´ÔÚ9Ô°²È«¸üÐÂÖн¨¸´


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ZDI×êÑÐÈËÔ±ÖÒ¸æAndroidϵͳÖеĸßΣÌáȨ0day£¬¸Ã·ì϶δÔڹȸè°ä²¼9ÔÂAndroid°²È«¸üÐÂÖн¨¸´¡£×êÑÐÈËÔ±³ÆAndroid v4l2£¨Video4Linux 2£©Çý¶¯·¨Ê½ÖдæÔÚ·ì϶£¬µ±±»ÀûÓÃʱ£¬v4l2ÖеÄÒ»¸ö×é¼þÔÚ¶Ô¶ÔÏóÖ´ÐвÙ×÷֮ǰûÓÐÑéÖ¤¶ÔÏóµÄ´æÔÚ£¬ÓµÓÐÎïÀí½Ó¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÀûÓø÷ì϶ÌáȨÖÁRing0¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ7.8·Ö¡£×êÑÐÈËÔ±ÓÚ3ÔÂ13ÈÕ·¢ÏÖ²¢»ã±¨ÁË·ì϶£¬¹È¸èÈ·ÈϽ«½¨¸´¸Ã·ì϶£¬µ«Ã»ÓÐÌṩԤ¼ÆµÄ¹¦·ò±í¡£¹È¸èÔÚ±¾Öܰ䲼µÄ9ÔÂAndroid°²È«¸üÐÂÖн¨¸´Á˽ü50¸ö·ì϶£¬µ«²»Ô̺¬´Ë·ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/