ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ19ÖÜ

Ðû²¼Ê±¼ä 2021-05-10

> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2021Äê05ÔÂ03ÈÕÖÁ05ÔÂ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î54¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇTenda AC11 /goform/setVLAN»º³åÇøÒç³öÎó²î£»Pulse Secure Pulse Connect SecureÖ¤Êé·þÎñWEB·þÎñÄÚ´æ¹ýʧӦÓôúÂëÖ´ÐÐÎó²î£»Linux Kernel eBPFȨÏÞÌáÉýÎó²î£»Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤ÈƹýÎó²î£»Foxit Reader CVE-2021-31468ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDZÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û£»QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄÎó²î21Nails£»FireEyeÐû²¼ÓйØUNC2529´¹ÂÚÔ˶¯µÄÆÊÎö±¨¸æ£»Win10 DefenderÖб£´æbug£¬¿ÉÔÚCÅ̽¨Éè´ó×ÚÎļþ£»¸ßͨоƬ±£´æ´úÂëÖ´ÐÐÎó²î£¬Ó°Ïì30£¥µÄAndroidϵͳ¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Tenda AC11 /goform/setVLAN»º³åÇøÒç³öÎó²î


Tenda AC11 /goform/setVLAN±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4


2.Pulse Secure Pulse Connect SecureÖ¤Êé·þÎñWEB·þÎñÄÚ´æ¹ýʧӦÓôúÂëÖ´ÐÐÎó²î


Pulse Secure Pulse Connect SecureÖ¤Êé·þÎñWEB·þÎñ±£´æÊͷźóʹÓÃÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o


3.Linux Kernel eBPFȨÏÞÌáÉýÎó²î


Linux Kernel eBPF±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£

https://www.zerodayinitiative.com/advisories/ZDI-21-503/


4.Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤ÈƹýÎó²î


Trend Micro IM Security¼àÌý16373¶Ë¿ÚµÄWEB¿ØÖÆ̨±£´æÈõ»á»°Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÇå¾²ÏÞÖÆ£¬Î´ÊÚȨ»á¼û¡£

https://www.zerodayinitiative.com/advisories/ZDI-21-525/


5.Foxit Reader CVE-2021-31468ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î


Foxit Reader U3DÔ½½ç¶ÁÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-21-557/


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û


1.jpg


±ÈÀûʱBelnetÓÚÖܶþÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û¡£Belnet£¨±ÈÀûʱ ¹ú¼ÒÑо¿ºÍ½ÌÓýÍøÂ磩ÊÇΪ±ÈÀûʱ½ÌÓý»ú¹¹¡¢Ñо¿ÖÐÐÄ¡¢¿ÆѧÑо¿ËùºÍÕþ¸®·þÎñÌṩ·þÎñµÄ»¥ÁªÍøÌṩÉÌ¡£¾ÝÔ¤¼Æ£¬Õâ´Î¹¥»÷Ó°ÏìÁ˱ÈÀûʱµÄ200¶à¸ö×éÖ¯£¬°üÀ¨Õþ¸®¡¢¾¯Ô±¾ÖºÍCOVID-19ÒßÃçÔ¤¶©µÈÍøÕ¾¡£ÏÖÔÚ£¬±ÈÀûʱÕþ¸®ÕýÔÚÊÓ²ì´ËÊÂÎñ£¬Éв»ÇåÎú·¢¶¯´Ë´Î¹¥»÷µÄ¹¥»÷Õß¡£


Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/belgium-was-hit-by-a-massive-cyberattack-532812.shtml


2¡¢QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄÎó²î21Nails


2.jpg


QualysÅû¶EximÓʼþ´«ÊäÊðÀí£¨MTA£©Èí¼þÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ21¸öÎó²î£¬Í³³ÆΪ21Nails¡£ÕâЩÎó²îÓÐ10¸ö¿É±»Ô¶³ÌʹÓã¬ÁíÍâ11¸öΪÍâµØÎó²î£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿É×éºÏʹÓÃÕâЩÎó²î£¬À´Ô¶³ÌÖ´ÐдúÂ룬²¢ÔÚExim ServerÉÏ»ñµÃrootȨÏÞ¡£ÕâЩÎó²î»®·ÖΪqueue_run£¨£©ÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-28011£©¡¢tls-openssl.cÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-28018£©µÈ¡£Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦Éý¼¶µ½×îеĿÉÓÃExim°æ±¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-21nails-exim-bugs-expose-millions-of-servers-to-attacks/


3¡¢FireEyeÐû²¼ÓйØUNC2529´¹ÂÚÔ˶¯µÄÆÊÎö±¨¸æ


3.jpg


FireEyeÐû²¼ÁËÓйØUNC2529´¹ÂÚÔ˶¯µÄÆÊÎö±¨¸æ¡£FireEyeµÄMandiantÍŶӷ¢Ã÷2020Äê12ÔÂ2ÈÕ£¬ºÍ2020Äê12ÔÂ11ÈÕÖÁ12ÔÂ18ÈÕÖ®¼ä±¬·¢µÄÁ½ÂÖ´¹ÂÚÔ˶¯£¬Ö÷ÒªÒÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵĹ«Ë¾ÎªÄ¿µÄ¡£¹¥»÷Õß×ܹ²Ê¹ÓÃÁËÁè¼Ý50¸öÓò£¬Ê¹Óö¨ÖƵĴ¹ÂÚÓʼþ£¬Õë¶Ô°üÀ¨¹ú·À¡¢Ò½Ò©¡¢ÔËÊä¡¢¾üʺ͵ç×ӵȲî±ðµÄÐÐÒµ¡£ÔÚÒ»´Î¹¥»÷Ô˶¯ÖУ¬UNC2529ÀÖ³ÉÈëÇÖÁËÃÀ¹úÒ»¼Ò¹©ÎÂůÖÆÀä·þÎñ¹«Ë¾µÄÓò²¢¸Ä¶¯ÁËÆäDNS¼Í¼¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2021/05/unc2529-triple-double-trifecta-phishing-campaign.html


4¡¢Win10 DefenderÖб£´æbug£¬¿ÉÔÚCÅ̽¨Éè´ó×ÚÎļþ


4.jpg


Windows Defender±£´æbug£¬¿ÉÔÚC£º\ProgramData\Microsoft\Windows Defender\Scans\History\StoreÎļþ¼ÐÄÚ½¨Éè´ó×ÚMD5¹þÏ£Îļþ¡£ÕâЩÎļþµÄ¾ÞϸΪ600×Ö½Úµ½1KB£¬ÓеÄϵͳÖÐÖ»ÓÐԼĪ1MBµÄÎļþ£¬¶øÓеÄÓû§Ôò³ÆÆäϵͳ±£´æ´ó×ÚµÄÎļþ£¬Õ¼ÓÃÁË30GBµÄ´æ´¢¿Õ¼ä¡£ÏÖÔÚ£¬¸ÃÎÊÌâÒÑÔÚWindows Defender 1.1.18100.6°æ±¾ÖÐÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/windows-defender-bug-fills-windows-10-boot-drive-with-thousands-of-files/


5¡¢¸ßͨоƬ±£´æ´úÂëÖ´ÐÐÎó²î£¬Ó°Ïì30£¥µÄAndroidϵͳ


5.jpg


Check Point·¢Ã÷¸ßͨ£¨Qualcomm£©µ÷Öƽâµ÷Æ÷£¨MSM£©½Ó¿Ú£¨¼ò³ÆΪQMI£©Öб£´æ´úÂëÖ´ÐÐÎó²î¡£¾Ýͳ¼Æ£¬È«ÇòÔ¼30£¥µÄÊÖ»ú¶¼ÔÚʹÓÃQMI£¬°üÀ¨Google Pixels¡¢LG¡¢OnePlus¡¢ÈýÐÇGalaxyϵÁкÍСÃ×ÊÖ»ú¡£¸ÃÎó²î×·×ÙΪCVE-2020-11292£¬ÊÇqmi_voicei_srvcc_call_config_req´¦Öóͷ£³ÌÐò£¨0x64£©ÖеĶÑÒç³öÎó²î£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÔ¶³ÌÖ´ÐдúÂ룬À´»á¼ûÓû§µÄͨ»°¼Í¼ºÍ¶ÌÐÅ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/