ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ19ÖÜ
Ðû²¼Ê±¼ä 2021-05-10> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê05ÔÂ03ÈÕÖÁ05ÔÂ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î54¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇTenda AC11 /goform/setVLAN»º³åÇøÒç³öÎó²î£»£»£»£»£»Pulse Secure Pulse Connect SecureÖ¤ÊéЧÀÍWEBЧÀÍÄÚ´æ¹ýʧӦÓôúÂëÖ´ÐÐÎó²î£»£»£»£»£»Linux Kernel eBPFȨÏÞÌáÉýÎó²î£»£»£»£»£»Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»Foxit Reader CVE-2021-31468ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDZÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬£¬£¬£¬£¬£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û£»£»£»£»£»QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀ЧÀÍÆ÷µÄÎó²î21Nails£»£»£»£»£»FireEyeÐû²¼ÓйØUNC2529´¹ÂڻµÄÆÊÎö±¨¸æ£»£»£»£»£»Win10 DefenderÖб£´æbug£¬£¬£¬£¬£¬£¬¿ÉÔÚCÅ̽¨Éè´ó×ÚÎļþ£»£»£»£»£»¸ßͨоƬ±£´æ´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬Ó°Ïì30£¥µÄAndroidϵͳ¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Tenda AC11 /goform/setVLAN»º³åÇøÒç³öÎó²î
Tenda AC11 /goform/setVLAN±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4
2.Pulse Secure Pulse Connect SecureÖ¤ÊéЧÀÍWEBЧÀÍÄÚ´æ¹ýʧӦÓôúÂëÖ´ÐÐÎó²î
Pulse Secure Pulse Connect SecureÖ¤ÊéЧÀÍWEBЧÀͱ£´æÊͷźóʹÓÃÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o
3.Linux Kernel eBPFȨÏÞÌáÉýÎó²î
Linux Kernel eBPF±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-503/
4.Trend Micro IM SecurityÈõÁîÅÆÑéÖ¤ÈÆ¹ýÎó²î
Trend Micro IM Security¼àÌý16373¶Ë¿ÚµÄWEB¿ØÖÆÌ¨±£´æÈõ»á»°Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆ£¬£¬£¬£¬£¬£¬Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-525/
5.Foxit Reader CVE-2021-31468ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î
Foxit Reader U3DÔ½½ç¶ÁÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-557/
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬£¬£¬£¬£¬£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û

±ÈÀûʱBelnetÓÚÖܶþÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û¡£¡£¡£¡£¡£¡£Belnet£¨±ÈÀûʱ ¹ú¼ÒÑо¿ºÍ½ÌÓýÍøÂ磩ÊÇΪ±ÈÀûʱ½ÌÓý»ú¹¹¡¢Ñо¿ÖÐÐÄ¡¢¿ÆÑ§Ñо¿ËùºÍÕþ¸®Ð§ÀÍÌṩЧÀ͵Ļ¥ÁªÍøÌṩÉÌ¡£¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬£¬Õâ´Î¹¥»÷Ó°ÏìÁ˱ÈÀûʱµÄ200¶à¸ö×éÖ¯£¬£¬£¬£¬£¬£¬°üÀ¨Õþ¸®¡¢¾¯Ô±¾ÖºÍCOVID-19ÒßÃçÔ¤¶©µÈÍøÕ¾¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬±ÈÀûʱÕþ¸®ÕýÔÚÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬£¬Éв»ÇåÎú·¢¶¯´Ë´Î¹¥»÷µÄ¹¥»÷Õß¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/belgium-was-hit-by-a-massive-cyberattack-532812.shtml
2¡¢QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀ЧÀÍÆ÷µÄÎó²î21Nails

QualysÅû¶EximÓʼþ´«ÊäÊðÀí£¨MTA£©Èí¼þÓ°ÏìÊý°ÙÍǫ̀ЧÀÍÆ÷µÄ21¸öÎó²î£¬£¬£¬£¬£¬£¬Í³³ÆÎª21Nails¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓÐ10¸ö¿É±»Ô¶³ÌʹÓ㬣¬£¬£¬£¬£¬ÁíÍâ11¸öΪÍâµØÎó²î£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿É×éºÏʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬£¬À´Ô¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬²¢ÔÚExim ServerÉÏ»ñµÃrootȨÏÞ¡£¡£¡£¡£¡£¡£ÕâЩÎó²î»®·ÖΪqueue_run£¨£©ÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-28011£©¡¢tls-openssl.cÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-28018£©µÈ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦Éý¼¶µ½×îеĿÉÓÃExim°æ±¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-21nails-exim-bugs-expose-millions-of-servers-to-attacks/
3¡¢FireEyeÐû²¼ÓйØUNC2529´¹ÂڻµÄÆÊÎö±¨¸æ

FireEyeÐû²¼ÁËÓйØUNC2529´¹ÂڻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£FireEyeµÄMandiantÍŶӷ¢Ã÷2020Äê12ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬ºÍ2020Äê12ÔÂ11ÈÕÖÁ12ÔÂ18ÈÕÖ®¼ä±¬·¢µÄÁ½ÂÖ´¹Âڻ£¬£¬£¬£¬£¬£¬Ö÷ÒªÒÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵĹ«Ë¾ÎªÄ¿µÄ¡£¡£¡£¡£¡£¡£¹¥»÷Õß×ܹ²Ê¹ÓÃÁËÁè¼Ý50¸öÓò£¬£¬£¬£¬£¬£¬Ê¹Óö¨ÖƵĴ¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Õë¶Ô°üÀ¨¹ú·À¡¢Ò½Ò©¡¢ÔËÊä¡¢¾üʺ͵ç×ӵȲî±ðµÄÐÐÒµ¡£¡£¡£¡£¡£¡£ÔÚÒ»´Î¹¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬UNC2529ÀÖ³ÉÈëÇÖÁËÃÀ¹úÒ»¼Ò¹©ÎÂŝ֯ÀäЧÀ͹«Ë¾µÄÓò²¢¸Ä¶¯ÁËÆäDNS¼Í¼¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2021/05/unc2529-triple-double-trifecta-phishing-campaign.html
4¡¢Win10 DefenderÖб£´æbug£¬£¬£¬£¬£¬£¬¿ÉÔÚCÅ̽¨Éè´ó×ÚÎļþ

Windows Defender±£´æbug£¬£¬£¬£¬£¬£¬¿ÉÔÚC£º\ProgramData\Microsoft\Windows Defender\Scans\History\StoreÎļþ¼ÐÄÚ½¨Éè´ó×ÚMD5¹þÏ£Îļþ¡£¡£¡£¡£¡£¡£ÕâЩÎļþµÄ¾ÞϸΪ600×Ö½Úµ½1KB£¬£¬£¬£¬£¬£¬ÓеÄϵͳÖÐÖ»ÓÐԼĪ1MBµÄÎļþ£¬£¬£¬£¬£¬£¬¶øÓеÄÓû§Ôò³ÆÆäϵͳ±£´æ´ó×ÚµÄÎļþ£¬£¬£¬£¬£¬£¬Õ¼ÓÃÁË30GBµÄ´æ´¢¿Õ¼ä¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÒÑÔÚWindows Defender 1.1.18100.6°æ±¾ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/windows-defender-bug-fills-windows-10-boot-drive-with-thousands-of-files/
5¡¢¸ßͨоƬ±£´æ´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬Ó°Ïì30£¥µÄAndroidϵͳ

Check Point·¢Ã÷¸ßͨ£¨Qualcomm£©µ÷ÖÆ½âµ÷Æ÷£¨MSM£©½Ó¿Ú£¨¼ò³ÆÎªQMI£©Öб£´æ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬£¬È«ÇòÔ¼30£¥µÄÊÖ»ú¶¼ÔÚʹÓÃQMI£¬£¬£¬£¬£¬£¬°üÀ¨Google Pixels¡¢LG¡¢OnePlus¡¢ÈýÐÇGalaxyϵÁкÍСÃ×ÊÖ»ú¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2020-11292£¬£¬£¬£¬£¬£¬ÊÇqmi_voicei_srvcc_call_config_req´¦Öóͷ£³ÌÐò£¨0x64£©ÖеĶÑÒç³öÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬À´»á¼ûÓû§µÄͨ»°¼Í¼ºÍ¶ÌÐÅ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/


¾©¹«Íø°²±¸11010802024551ºÅ