ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ14ÖÜ
°ä²¼¹¦·ò 2020-04-07> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê03ÔÂ30ÈÕÖÁ04ÔÂ05ÈÕ¹²ÊÕ¼°²È«·ì϶52¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇHAProxy hpack_dht_insertËÁÒâ´úÂëÖ´Ðзì϶; CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ£»Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´Ðзì϶£»Google Kubernetes API Server YAML½âÎö»Ø¾ø·þÎñ·ì϶£»pam-krb5 Kerberos»º³åÇøÒç¶Âí½Å¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS·ì϶£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳ÏúÊÛ£»ÒÁÀʷǹٷ½TelegramÀûÓÃй¶4200ÍòÓû§¼Í¼£»ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35Òڱʼͼ£»Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
>³ÁÒª°²È«·ì϶Áбí
1. HAProxy hpack_dht_insertËÁÒâ´úÂëÖ´Ðзì϶
HAProxy HPACK½âÂëÆ÷hpack-tbl.c hpack_dht_insert´æÔÚËÁÒâ×Ö½Úд·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.haproxy.org/download/2.1/src/CHANGELOG
2. CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ
CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP TELNET·þÎñ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÎÞÐèÃÜÂëÒÔROOTȨÏÞ½Ó¼ûϵͳ¡£
https://insights.oem.avira.com/serious-security-flaws-uncovered-in-cacagoo-ip-cameras/
3. Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´Ðзì϶
Sonatype Nexus Repository NXRM´æÔÚ°²È«·ì϶£¬ÔÊÐíÕ¼ÓÐËÁÒâÕË»§µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://support.sonatype.com/hc/en-us/articles/360044882533
4. Google Kubernetes API Server YAML½âÎö»Ø¾ø·þÎñ·ì϶
Google Kubernetes API Server½âÎö¶ñÒâYAML¸ºÔØ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿Éʹ·þÎñ·¨Ê½±ÀÀ££¬Ôì³É»Ø¾ø·þÎñ¹¥»÷¡£
https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
5. pam-krb5 Kerberos»º³åÇøÒç¶Âí½Å
pam-krb5 Kerberos¿â´¦ÖôæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2020.1159/
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢×êÑÐÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS·ì϶
Positive TechnologiesµÄÒ»ÏîÐÂ×êÑÐÅú×¢£¬ËùÓеÄ4GºÍ²¿ÃÅ5GµçÐÅÍøÂç¶¼Ò×Êܵ½ÀûÓÃDiameterÐÅÁîºÍ̸·ì϶µÄDoS¹¥»÷¡£DiameterÐÅÁîºÍ̸ÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢£¬ËüÊÇLTEÖеĹؼü×é³É²¿ÃÅ£¬ÓÐÖúÓÚ»¥ÁªÍøºÍÌ¸ÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¸ÃºÍ̸Öеķì϶ÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄµØÎ»²¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬ËæºóÀûÓÃÕâЩÐÅÏ¢À¹½ØÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯·þÎñµÄÏÞ¶È¡£×êÑÐÈËÔ±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼ä³É¹¦ÉøÈëµ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£´Ë±í£¬µ±5GÍøÂç³ÉÁ¢ÔÚÏÖÓмܹ¹ºÍºÍ̸֮ÉÏʱ£¬ÕâЩ°²È«·ì϶½«³ÖÐø´æÔÚ£¬¹¥»÷ÕßÄܹ»³ÖÐø¸ú×ÙÓû§µÄµØÎ»¡¢»ñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true
2¡¢ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳ÏúÊÛ
ÉÏÖÜÄ©ÆÚ¼ä£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉÏÏúÊÛ£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£Æ¾¾ÝFBIÔÚ½ñÄêRSA»áÒéÉϵÄÒ»´ÎÑݽ²£¬DharmaÊǽüÄêÀ´»ñÀûµÚ¶þ¶àµÄÀÕË÷Èí¼þÒµÎñ£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁ˳¬¹ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÏúÊۺܿÉÄܻᵼÖ¸ü¿í·ºµÄй¶£¬½ø¶øÔÚ¶à¸ö·¸×OÍÅÖ®¼äÀ©É¢£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£DharmaµÄ¼ÓÃܹ滮¼«¶ÈÏȽø£¬×Ô2017ÄêÒÔÀ´Ò»ÏòûÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/
3¡¢ÒÁÀʷǹٷ½TelegramÀûÓÃй¶4200ÍòÓû§¼Í¼
°²È«×¨¼Ò±«²ª¡¤µÏÑÇÇÙ¿Æ£¨Bob Diachenko£©·¢ÏÖÒÁÀʷǹٷ½TelegramÀûÓõÄ4200Íò×¢²áÓû§ÐÅÏ¢ÔÚÍøÉÏй¶¡£ÒÁÀÊÓÚ2018ËêÊ×ÓÀÔ¶¹Ø±ÕÁËTelegram£¬Òò¶øºÜ¶àÓû§×ª¶øÊ¹Ó÷ǹٷ½°æ±¾µÄTelegram¡£ÕâЩÊý¾ÝÊÇÓÉHunting systemÍŶÓÔÚÒ»¸ö¿É¹«¿ª½Ó¼ûµÄElasticsearch¼¯ÈºÉ϶³öµÄ£¬ÔÚ3ÔÂ25ÈÕDiachenkoÏòÍйܷþÎñÉ̻㱨ÁË´ËÊÂÎñºó£¬¸ÃÊý¾Ý¿âÒѱ»¹Ø¹Ø¡£Diachenko°µÊ¾ÖÁÉÙÓÐÒ»¸öÓû§ÒѾ½Ó¼ûÁËÕâЩÊý¾Ý²¢½«Êý¾Ý°ä²¼µ½Á˺ڿÍÂÛ̳¡£Ð¹Â¶µÄ¼Í¼Ô̺¬Óû§µÄÕË»§ID¡¢Óû§Ãû¡¢µç»°ºÅÂë¡¢¹þÏ£¼°ÃÜÔ¿¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/100810/data-breach/unofficial-telegram-fork-leak.html
4¡¢ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35Òڱʼͼ
vpnMentor·¢ÏÖ¼ÓÀû¸£ÄáÑÇÖÝÔÚÏß±¸·Ý¹«Ë¾SOS Online BackupµÄÒ»¸ö¿É¹«¿ª½Ó¼ûµÄÊý¾Ý¿âй¶³¬¹ý1.35Òڱʼͼ¡£¸ÃÊý¾Ý¿âÖÐÔ̺¬½ü70GBÓëÓû§ÕÊ»§ÓйصÄÔªÊý¾Ý£¬ÕâÔ̺¬½á¹¹¡¢²Î¿¼¡¢ÃèÊöÐÔºÍÖÎÀíÐÔÔªÊý¾Ý£¬º¸ÇÁËSOSÔÆ·þÎñµÄºÜ¶à·½Ãæ¡£´Ë±í£¬Â¶³öµÄÊý¾Ý¿âÖл¹Ô̺¬Ó×ÎÒ¼ø±ðÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÒµÎñ¾ßÌåÐÅÏ¢£¨Õë¶Ô¹«Ë¾¿Í»§£©ºÍÓû§Ãû¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾ÝÕë¶ÔSOS¼°Æä¿Í»§ÌáÒé¸÷Ààڲƹ¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/secure-backup-company-leaks-135/
5¡¢Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ
×êÑÐÈËÔ±ÔÚZoomµÄmacOS¿Í»§¶ËÖз¢ÏÖÁ½¸ö0day£¬·ì϶¿ÉÄÜÔÊÐí±¾µØ¡¢ÎÞÌØÈ¨¹¥»÷Õß»ñµÃrootÌØÈ¨£¬²¢ÔÊÐíËûÃǽӼûÊܺ¦ÕßµÄÂó¿Ë·çºÍÉãÏñÍ·¡£JamfÊ×ϯ°²È«×êÑÐÔ±Patrick Wardle·¢ÏÖÁËÕâÁ½¸ö·ì϶£¬µÚÒ»¸ö·ì϶ԴÓÚZoom×°Ö÷¨Ê½Ê¹ÓÃAuthorizationExecuteWithPrivileges APIÔÚÎÞÓû§½»»¥µÄÇé¿öϽøÐÐ×°Ö㬵«¸ÃAPIÓÉÓÚûÓÐÑéÖ¤ÔÚ¸ùĿ¼ÏÂÖ´ÐеĶþ½øÔìÎļþ£¬ÏÖʵÉÏÒѾ±»AppleÆúÓᣱ¾µØÎÞÌØÈ¨µÄ¹¥»÷Õß»ò¶ñÒâÈí¼þ¿ÉÄÜÀûÓø÷ì϶ÌáȨÖÁroot¡£µÚ¶þ¸ö·ì϶ÓëZoomÔÊÐíµÚÈý·½¿â×¢Èë´úÂëÓйأ¬¹¥»÷Õ߿ɽ«¶ñÒâµÄµÚÈý·½¿â¼ÓÔØµ½ZoomµÄ¹ý³Ì/µØÖ·¿Õ¼äÖУ¬´Ó¶ø×Ô¶¯¼Ì³ÐËùÓÐZooms½Ó¼ûȨÏÞ²¢×îÖÕ»ñµÃÉãÏñÍ·ºÍÂó¿Ë·çµÄ½ÚÔìȨÏÞ¡£½ØÖÁÖÜËÄZoom°µÊ¾ÒѾ½¨¸´ÁËÕâÁ½¸ö·ì϶¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/two-zoom-zero-day-flaws-uncovered/154337/


¾©¹«Íø°²±¸11010802024551ºÅ