ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ06ÖÜ
°ä²¼¹¦·ò 2020-02-11> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê02ÔÂ03ÈÕÖÁ09ÈÕ¹²ÊÕ¼°²È«·ì϶45¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇQEMU libslirpÔ½½ç¶Ñ½Ó¼û·ì϶; MikroTik WinBox CVE-2020-5720Ŀ¼±éÀú·ì϶£»Cisco NX-OS Software Cisco Discovery Protocol×ֶδ¦Öûº³åÇøÒç¶Âí½Å£»Squid ext_lm_group_aclÔ½½çд·ì϶£»Clam AntiVirus DLP»º³åÇøÒç¶Âí½Å¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÔÚÏß¹¤×÷ÖÎÀíÍøÕ¾Trelloй¶´óÁ¿Óû§Êý¾Ý£»ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È£»¹¥»÷ÕßÀÄÓÃBitbucket·þÎñ£¬Òѵ¼ÖÂ50¶àÍòÖ÷»úϰȾ¶ñÒâÈí¼þ£»Ë¼¿Æ½¨¸´·¢ÏÖºÍ̸£¨CDP£©ÖÐÎå¸ö¸ßΣ·ì϶£¬Ó°ÏìÊý°ÙÍòÉ豸£»×êÑÐÈËÔ±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐ佨¸´µÄºóÃÅ·ì϶¼°PoC¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
>³ÁÒª°²È«·ì϶Áбí
1. QEMU libslirpÔ½½ç¶Ñ½Ó¼û·ì϶
QEMU libslirp´æÔÚÔ½½ç¶Ñ½Ó¼û·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔHOSTÉϵÄQEMU¹ý³Ì¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.openwall.com/lists/oss-security/2020/02/06/2
2. MikroTik WinBox CVE-2020-5720Ŀ¼±éÀú·ì϶
MikroTik WinBox´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐÐĿ¼±éÀú¹¥»÷£¬Ð´ËÁÒâÎļþµ½ÏµÍ³¡£
https://www.tenable.com/security/research/tra-2020-07
3. Cisco NX-OS Software Cisco Discovery Protocol×ֶδ¦Öûº³åÇøÒç¶Âí½Å
Cisco NX-OS Software´¦ÖÃCDPÐÂÎÅ×ֶδæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce
4. Squid ext_lm_group_aclÔ½½çд·ì϶
Squid ext_lm_group_acl½âÎöNTLMÑé֤ʹ´¦´æÔÚÔ½½çд·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡Ãô¸ÐÐÅÏ¢»òÕß½øÐлؾø·þÎñ¹¥»÷¡£
http://www.squid-cache.org/Advisories/SQUID-2020_3.txt
5. Clam AntiVirus DLP»º³åÇøÒç¶Âí½Å
Clam AntiVirus DLPÄ£¿é´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢ÔÚÏß¹¤×÷ÖÎÀíÍøÕ¾Trelloй¶´óÁ¿Óû§Êý¾Ý
ƾ¾ÝNaked SecurityµÄÒ»·Ý»ã±¨£¬ÔÚÏß¹¤×÷ÖÎÀíÍøÕ¾Trelloй¶ÁË´óÁ¿Óû§µÄ¸öÈËÊý¾Ý£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢»úÄÜÆÀ¼¶ºÍ¹«Ë¾ÅàѵÊÓÆµµÈ¡£Ð¹Â¶µÄÔÒòÊDz¿ÃÅÓû§ÃýÎ󵨽«ÆäTrelloÃæ°åÅäÖÃΪpublic£¬ÕâʹµÃÈκÎÈ˶¼Äܹ»²é¿´ÆäÖеÄÄÚÈÝ£¬ÉõÖÁGoogleÖ®ÀàµÄËÑË÷ÒýÇæÄܹ»½«Ãæ°åÖеÄÄÚ°üÈÝÈëË÷Òý£¬½ö±ØÒªÍ¨¹ýÒ»ÖÖ³ÆÎª¡°dork¡±µÄÌØÊâÀàÐͼ´¿ÉËÑË÷µ½¡£
ÔÎÄÁ´½Ó£º
https://www.techworm.net/2020/02/trello-search-exposes-private-data.html
2¡¢ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È
ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽ°ä²¼ÍøÂ簲ȫ³ÉÊì¶ÈÄ£ÐÍÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¹ú·À²¿°ä·¢£¬µ½2026Äê¹ú·À³Ð°üÉÌÔڻظõ±¾Ö²É¹º´òËãµÄÌá°¸ÒªÇóʱ£¬±ØÐëÂú×ã¸ù»ùµÄÍøÂ簲ȫ³ß¶È¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬¹ú·À²¿µ«Ô¸Í¨¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¨DIB£©·Ö°üÉ̵ÄÍøÂ簲ȫ³ï±¸Ë®Æ½£¬À´¼ÓÇ¿¶Ô¹©¸øÁ´Î´·ÖÀàÐÅÏ¢£¨Áª¹úºÏͬÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»¤¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶´ËÍâÈÏÖ¤À´¼ò»¯´óÐͺÍÓ×Ð͹ú·À³Ð°üÉ̵ÄÍøÂç¾ÍÐ÷ÐÔÈÏÖ¤£¬³ÁµãÊÇÍøÂ簲ȫʵ¼ÊºÍÁ÷³Ì¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-
contractors/
3¡¢¹¥»÷ÕßÀÄÓÃBitbucket·þÎñ£¬Òѵ¼ÖÂ50¶àÍòÖ÷»úϰȾ¶ñÒâÈí¼þ
¹¥»÷ÕßÔÚÀÄÓôúÂëÍйܷþÎñBitbucket´æ´¢7ÖÖ¶ñÒâÈí¼þpayload£¬¸Ã¹¥»÷»î¶¯ÒÑÔÚÈ«ÇòÁìÓòÄÚϰȾÁ˳¬¹ý50Íǫ̀ÉÌÓÃÍÆËã»ú¡£Æ¾¾Ý°²È«³§ÉÌCybereason°ä²¼µÄÒ»·Ý»ã±¨£¬¹¥»÷Õß²¿Êðµ½Ö¸±êϵͳµÄ¶ñÒâpayloadÔ̺¬Predator¡¢Azorult¡¢Evasive Monero Miner¡¢ÀÕË÷Èí¼þSTOP¡¢Vidar¡¢Amadey botºÍIntelRapid¡£¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶ÔѰÕÒµÁ°æÃ³Ò×Èí¼þ£¨ÀýÈçAdobe Photoshop¡¢Microsoft OfficeµÈ£©µÄÓû§¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/bitbucket-abused-to-infect-500-000-hosts-with-malware-cocktail/
4¡¢Ë¼¿Æ½¨¸´·¢ÏÖºÍ̸£¨CDP£©ÖÐÎå¸ö¸ßΣ·ì϶£¬Ó°ÏìÊý°ÙÍòÉ豸
ÎïÁªÍø°²È«¹«Ë¾ArmisÔÚ˼¿Æ·¢ÏÖºÍ̸£¨CDP£©Öз¢ÏÖÎå¸ö¸ßΣ·ì϶£¬Ó°ÏìÊý°ÙÍòÉ豸¡£CDPÊÇ˼¿ÆÉ豸ʹÓõÄרÓеÚ2²ã£¨Êý¾ÝÁ´Â·²ã£©ºÍ̸£¬ÓÃÓÚ·¢ÏÖ±¾µØÍøÂçÉÏµÄÆäËü˼¿ÆÉ豸¡£Ä¬ÈÏÇé¿öÏ£¬ÏÕЩËùÓÐ˼¿Æ²úÆ·£¨Ô̺¬Â·ÓÉÆ÷¡¢»¥»»»úÒÔ¼°IPµç»°ºÍÉãÏñ»ú£©¾ùÆôÓô˺Í̸¡£ÕâÎå¸ö·ì϶±»³ÆÎªCDPwn£¬Ô̺¬ËĸöÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-3110¡¢CVE-2020-3111¡¢CVE-2020-3118¡¢CVE-2020-3119£©ºÍÒ»¸ö»Ø¾ø·þÎñ·ì϶£¨CVE-2020-3120£©¡£´ÓǰʮÄêÖа䲼µÄ˼¿Æ¹Ì¼þ°æ±¾¾ùÊܵ½ÕâЩ·ì϶µÄÓ°Ï죬ÕâЩ·ì϶¿ÉÄÜÊ¹ÉøÈëµ½ÆóÒµÍøÂçÖеı¾µØ¹¥»÷Õß¿ÉÄÜÖ´ÐÐÖÐÑëÈ˹¥»÷¡¢¼à¶½ÓïÒô»òÊÓÆµºô½Ó×¢ÍøÂçºÍй©Êý¾ÝÒÔ¼°·ÛËéÍøÂç·Ö¶Î¡£Ä¿Ç°Ë¼¿ÆÒѾ°ä²¼ÁËÓйزúÆ·µÄ¹Ì¼þ¸üÐÂÀ´½¨¸´ÕâЩ·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/
5¡¢×êÑÐÈËÔ±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐ佨¸´µÄºóÃÅ·ì϶¼°PoC
¶íÂÞ˹°²È«×¨¼ÒVladislav Yarmak°ä²¼ÁËËûÔÚº£Ë¼Ð¾Æ¬Öз¢ÏֵĺóÃÅ»úÔìµÄ¼¼Êõϸ½Ú£¬²¢°µÊ¾ÓÉÓÚ¶Ô¹©¸øÉ̲»×ãÐÅÀµ£¬ËûûÓÐÏòº£Ë¼Åû¶¸Ã·ì϶¡£¸ÃºóÃÅ»úÔìÄܹ»Ê¹¹¥»÷Õß»ñµÃroot shell½Ó¼ûȨÏÞ²¢ÆëÈ«½ÚÔìÉ豸£¬¾ßÌåÀ´Ëµ£¬¹¥»÷Õß¿ÉÄÜÀûÓà ºóÃÅͨ¹ýÔÚTCP¶Ë¿Ú9530ÉÏÏò»ùÓÚº£Ë¼Ð¾Æ¬µÄÉ豸·¢ËÍһϵÁкÅÁÕâЩºÅÁîÔÊÐí¹¥»÷ÕßÔÚÉ豸ÉÏÆôÓÃTelnet·þÎñ£¬¶øºó¹¥»÷ÕßÄܹ»Ê¹ÓÃÁù¸öTelnetÍ´´¦Ö®Ò»µÇ¼£¬²¢»ñµÃ¶ÔrootÕÊ»§µÄ½Ó¼ûȨÏÞ¡£Yarmak»¹ÔÚgithubÉϰ䲼Á˸÷ì϶µÄPoC´úÂë¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html


¾©¹«Íø°²±¸11010802024551ºÅ