ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ14ÖÜ

°ä²¼¹¦·ò 2020-04-07

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê03ÔÂ30ÈÕÖÁ04ÔÂ05ÈÕ¹²ÊÕ¼°²È«·ì϶52¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇHAProxy hpack_dht_insertËÁÒâ´úÂëÖ´Ðзì϶; CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ£»Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´Ðзì϶£»Google Kubernetes API Server YAML½âÎö»Ø¾ø·þÎñ·ì϶£»pam-krb5 Kerberos»º³åÇøÒç¶Âí½Å ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS·ì϶£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳ÏúÊÛ£»ÒÁÀʷǹٷ½TelegramÀûÓÃй¶4200ÍòÓû§¼Í¼£»ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35Òڱʼͼ£»Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖÐ ¡£


>³ÁÒª°²È«·ì϶Áбí


1. HAProxy hpack_dht_insertËÁÒâ´úÂëÖ´Ðзì϶


HAProxy HPACK½âÂëÆ÷hpack-tbl.c hpack_dht_insert´æÔÚËÁÒâ×Ö½Úд·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£

https://www.haproxy.org/download/2.1/src/CHANGELOG


2. CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ


CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP TELNET·þÎñ´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÎÞÐèÃÜÂëÒÔROOTȨÏÞ½Ó¼ûϵͳ ¡£

https://insights.oem.avira.com/serious-security-flaws-uncovered-in-cacagoo-ip-cameras/


3. Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´Ðзì϶


Sonatype Nexus Repository NXRM´æÔÚ°²È«·ì϶ £¬ÔÊÐíÕ¼ÓÐËÁÒâÕË»§µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£

https://support.sonatype.com/hc/en-us/articles/360044882533


4. Google Kubernetes API Server YAML½âÎö»Ø¾ø·þÎñ·ì϶


Google Kubernetes API Server½âÎö¶ñÒâYAML¸ºÔØ´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿Éʹ·þÎñ·¨Ê½±ÀÀ£ £¬Ôì³É»Ø¾ø·þÎñ¹¥»÷ ¡£

https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ


5. pam-krb5 Kerberos»º³åÇøÒç¶Âí½Å


pam-krb5 Kerberos¿â´¦ÖôæÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐËÁÒâ´úÂë ¡£

https://www.auscert.org.au/bulletins/ESB-2020.1159/


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢×êÑÐÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Positive TechnologiesµÄÒ»ÏîÐÂ×êÑÐÅú×¢ £¬ËùÓеÄ4GºÍ²¿ÃÅ5GµçÐÅÍøÂç¶¼Ò×Êܵ½ÀûÓÃDiameterÐÅÁîºÍ̸·ì϶µÄDoS¹¥»÷ ¡£DiameterÐÅÁîºÍ̸ÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢ £¬ËüÊÇLTEÖеĹؼü×é³É²¿ÃÅ £¬ÓÐÖúÓÚ»¥ÁªÍøºÍÌ¸ÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ ¡£¸ÃºÍ̸Öеķì϶ÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄµØÎ»²¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢ £¬ËæºóÀûÓÃÕâЩÐÅÏ¢À¹½ØÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯·þÎñµÄÏÞ¶È ¡£×êÑÐÈËÔ±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼ä³É¹¦ÉøÈëµ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ ¡£´Ë±í £¬µ±5GÍøÂç³ÉÁ¢ÔÚÏÖÓмܹ¹ºÍºÍ̸֮ÉÏʱ £¬ÕâЩ°²È«·ì϶½«³ÖÐø´æÔÚ £¬¹¥»÷ÕßÄܹ»³ÖÐø¸ú×ÙÓû§µÄµØÎ»¡¢»ñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2¡¢ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳ÏúÊÛ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÉÏÖÜÄ©ÆÚ¼ä £¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉÏÏúÊÛ £¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª ¡£Æ¾¾ÝFBIÔÚ½ñÄêRSA»áÒéÉϵÄÒ»´ÎÑݽ² £¬DharmaÊǽüÄêÀ´»ñÀûµÚ¶þ¶àµÄÀÕË÷Èí¼þÒµÎñ £¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁ˳¬¹ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶ ¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÏúÊۺܿÉÄܻᵼÖ¸ü¿í·ºµÄй¶ £¬½ø¶øÔÚ¶à¸ö·¸×OÍÅÖ®¼äÀ©É¢ £¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö ¡£DharmaµÄ¼ÓÃܹ滮¼«¶ÈÏȽø £¬×Ô2017ÄêÒÔÀ´Ò»ÏòûÓÐÃâ·ÑµÄ½âÃܹ¤¾ß ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3¡¢ÒÁÀʷǹٷ½TelegramÀûÓÃй¶4200ÍòÓû§¼Í¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×¨¼Ò±«²ª¡¤µÏÑÇÇÙ¿Æ£¨Bob Diachenko£©·¢ÏÖÒÁÀʷǹٷ½TelegramÀûÓõÄ4200Íò×¢²áÓû§ÐÅÏ¢ÔÚÍøÉÏй¶ ¡£ÒÁÀÊÓÚ2018ËêÊ×ÓÀÔ¶¹Ø±ÕÁËTelegram £¬Òò¶øºÜ¶àÓû§×ª¶øÊ¹Ó÷ǹٷ½°æ±¾µÄTelegram ¡£ÕâЩÊý¾ÝÊÇÓÉHunting systemÍŶÓÔÚÒ»¸ö¿É¹«¿ª½Ó¼ûµÄElasticsearch¼¯ÈºÉ϶³öµÄ £¬ÔÚ3ÔÂ25ÈÕDiachenkoÏòÍйܷþÎñÉ̻㱨ÁË´ËÊÂÎñºó £¬¸ÃÊý¾Ý¿âÒѱ»¹Ø¹Ø ¡£Diachenko°µÊ¾ÖÁÉÙÓÐÒ»¸öÓû§ÒѾ­½Ó¼ûÁËÕâЩÊý¾Ý²¢½«Êý¾Ý°ä²¼µ½Á˺ڿÍÂÛ̳ ¡£Ð¹Â¶µÄ¼Í¼Ô̺¬Óû§µÄÕË»§ID¡¢Óû§Ãû¡¢µç»°ºÅÂë¡¢¹þÏ£¼°ÃÜÔ¿ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100810/data-breach/unofficial-telegram-fork-leak.html


4¡¢ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35Òڱʼͼ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


vpnMentor·¢ÏÖ¼ÓÀû¸£ÄáÑÇÖÝÔÚÏß±¸·Ý¹«Ë¾SOS Online BackupµÄÒ»¸ö¿É¹«¿ª½Ó¼ûµÄÊý¾Ý¿âй¶³¬¹ý1.35Òڱʼͼ ¡£¸ÃÊý¾Ý¿âÖÐÔ̺¬½ü70GBÓëÓû§ÕÊ»§ÓйصÄÔªÊý¾Ý £¬ÕâÔ̺¬½á¹¹¡¢²Î¿¼¡¢ÃèÊöÐÔºÍÖÎÀíÐÔÔªÊý¾Ý £¬º­¸ÇÁËSOSÔÆ·þÎñµÄºÜ¶à·½Ãæ ¡£´Ë±í £¬Â¶³öµÄÊý¾Ý¿âÖл¹Ô̺¬Ó×ÎÒ¼ø±ðÐÅÏ¢ £¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÒµÎñ¾ßÌåÐÅÏ¢£¨Õë¶Ô¹«Ë¾¿Í»§£©ºÍÓû§Ãû ¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾ÝÕë¶ÔSOS¼°Æä¿Í»§ÌáÒé¸÷Ààڲƭ¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/secure-backup-company-leaks-135/


5¡¢Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±ÔÚZoomµÄmacOS¿Í»§¶ËÖз¢ÏÖÁ½¸ö0day £¬·ì϶¿ÉÄÜÔÊÐí±¾µØ¡¢ÎÞÌØÈ¨¹¥»÷Õß»ñµÃrootÌØÈ¨ £¬²¢ÔÊÐíËûÃǽӼûÊܺ¦ÕßµÄÂó¿Ë·çºÍÉãÏñÍ· ¡£JamfÊ×ϯ°²È«×êÑÐÔ±Patrick Wardle·¢ÏÖÁËÕâÁ½¸ö·ì϶ £¬µÚÒ»¸ö·ì϶ԴÓÚZoom×°Ö÷¨Ê½Ê¹ÓÃAuthorizationExecuteWithPrivileges APIÔÚÎÞÓû§½»»¥µÄÇé¿öϽøÐÐ×°Öà £¬µ«¸ÃAPIÓÉÓÚûÓÐÑéÖ¤ÔÚ¸ùĿ¼ÏÂÖ´ÐеĶþ½øÔìÎļþ £¬ÏÖʵÉÏÒѾ­±»AppleÆúÓà ¡£±¾µØÎÞÌØÈ¨µÄ¹¥»÷Õß»ò¶ñÒâÈí¼þ¿ÉÄÜÀûÓø÷ì϶ÌáȨÖÁroot ¡£µÚ¶þ¸ö·ì϶ÓëZoomÔÊÐíµÚÈý·½¿â×¢Èë´úÂëÓйØ £¬¹¥»÷Õ߿ɽ«¶ñÒâµÄµÚÈý·½¿â¼ÓÔØµ½ZoomµÄ¹ý³Ì/µØÖ·¿Õ¼äÖÐ £¬´Ó¶ø×Ô¶¯¼Ì³ÐËùÓÐZooms½Ó¼ûȨÏÞ²¢×îÖÕ»ñµÃÉãÏñÍ·ºÍÂó¿Ë·çµÄ½ÚÔìȨÏÞ ¡£½ØÖÁÖÜËÄZoom°µÊ¾ÒѾ­½¨¸´ÁËÕâÁ½¸ö·ì϶ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/two-zoom-zero-day-flaws-uncovered/154337/