ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ14ÖÜ
Ðû²¼Ê±¼ä 2020-04-07> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê03ÔÂ30ÈÕÖÁ04ÔÂ05ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇHAProxy hpack_dht_insertí§Òâ´úÂëÖ´ÐÐÎó²î; CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ£»£»£»£»£»£»Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Google Kubernetes API Server YAMLÆÊÎö¾Ü¾øÐ§ÀÍÎó²î£»£»£»£»£»£»pam-krb5 Kerberos»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î£»£»£»£»£»£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ£»£»£»£»£»£»ÒÁÀʷǹٷ½TelegramÓ¦ÓÃй¶4200ÍòÓû§¼Í¼£»£»£»£»£»£»ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35ÒÚÌõ¼Í¼£»£»£»£»£»£»Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. HAProxy hpack_dht_insertí§Òâ´úÂëÖ´ÐÐÎó²î
HAProxy HPACK½âÂëÆ÷hpack-tbl.c hpack_dht_insert±£´æí§Òâ×Ö½ÚдÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»ò¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£
https://www.haproxy.org/download/2.1/src/CHANGELOG
2. CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ
CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP TELNETЧÀͱ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÎÞÐèÃÜÂëÒÔROOTȨÏÞ»á¼ûϵͳ¡£¡£¡£¡£¡£¡£¡£¡£
https://insights.oem.avira.com/serious-security-flaws-uncovered-in-cacagoo-ip-cameras/
3. Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´ÐÐÎó²î
Sonatype Nexus Repository NXRM±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÓµÓÐí§ÒâÕË»§µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£
https://support.sonatype.com/hc/en-us/articles/360044882533
4. Google Kubernetes API Server YAMLÆÊÎö¾Ü¾øÐ§ÀÍÎó²î
Google Kubernetes API ServerÆÊÎö¶ñÒâYAML¸ºÔر£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉʹЧÀͳÌÐòÍ߽⣬£¬£¬£¬£¬Ôì³É¾Ü¾øÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£
https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
5. pam-krb5 Kerberos»º³åÇøÒç³öÎó²î
pam-krb5 Kerberos¿â´¦Öóͷ£±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»ò¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£
https://www.auscert.org.au/bulletins/ESB-2020.1159/
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î
Positive TechnologiesµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬£¬ËùÓеÄ4GºÍ²¿·Ö5GµçÐÅÍøÂç¶¼Ò×Êܵ½Ê¹ÓÃDiameterÐÅÁîÐÒéÎó²îµÄDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£DiameterÐÅÁîÐÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢£¬£¬£¬£¬£¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿·Ö£¬£¬£¬£¬£¬ÓÐÖúÓÚ»¥ÁªÍøÐÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÐÒéÖеÄÎó²îÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ËæºóʹÓÃÕâЩÐÅÏ¢×èµ²ÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯Ð§À͵ÄÏÞÖÆ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉøÍ¸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬µ±5GÍøÂ罨ÉèÔÚÏÖÓмܹ¹ºÍÐÒéÖ®ÉÏʱ£¬£¬£¬£¬£¬ÕâЩÇå¾²Îó²î½«¼ÌÐø±£´æ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true
2¡¢ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ
ÉÏÖÜĩʱ´ú£¬£¬£¬£¬£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ£¬£¬£¬£¬£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤FBIÔÚ½ñÄêRSA¾Û»áÉϵÄÒ»´ÎÑݽ²£¬£¬£¬£¬£¬DharmaÊǽüÄêÀ´×¬Ç®µÚ¶þ¶àµÄÀÕË÷Èí¼þÓªÒµ£¬£¬£¬£¬£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£¡£¡£¡£¡£¡£¡£¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸üÆÕ±éµÄй¶£¬£¬£¬£¬£¬½ø¶øÔÚ¶à¸ö·¸·¨¼¯ÍÅÖ®¼äÀ©É¢£¬£¬£¬£¬£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£¡£¡£¡£¡£¡£¡£¡£DharmaµÄ¼ÓÃܼƻ®ºÜÊÇÏȽø£¬£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/
3¡¢ÒÁÀʷǹٷ½TelegramÓ¦ÓÃй¶4200ÍòÓû§¼Í¼
Ç徲ר¼Ò±«²ª¡¤µÏÑÇÇÙ¿Æ£¨Bob Diachenko£©·¢Ã÷ÒÁÀʷǹٷ½TelegramÓ¦ÓõÄ4200Íò×¢²áÓû§ÐÅÏ¢ÔÚÍøÉÏй¶¡£¡£¡£¡£¡£¡£¡£¡£ÒÁÀÊÓÚ2018ÄêÍ·ÓÀÊÀ·â±ÕÁËTelegram£¬£¬£¬£¬£¬Òò´ËÐí¶àÓû§×ª¶øÊ¹Ó÷ǹٷ½°æ±¾µÄTelegram¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÊÇÓÉHunting systemÍŶÓÔÚÒ»¸ö¿É¹ûÕæ»á¼ûµÄElasticsearch¼¯ÈºÉÏ̻¶µÄ£¬£¬£¬£¬£¬ÔÚ3ÔÂ25ÈÕDiachenkoÏòÍйÜЧÀÍÉ̱¨¸æÁË´ËÊÂÎñºó£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âÒѱ»¹Ø±Õ¡£¡£¡£¡£¡£¡£¡£¡£DiachenkoÌåÏÖÖÁÉÙÓÐÒ»¸öÓû§ÒѾ»á¼ûÁËÕâЩÊý¾Ý²¢½«Êý¾ÝÐû²¼µ½Á˺ڿÍÂÛ̳¡£¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄ¼Í¼°üÀ¨Óû§µÄÕË»§ID¡¢Óû§Ãû¡¢µç»°ºÅÂë¡¢¹þÏ£¼°ÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/100810/data-breach/unofficial-telegram-fork-leak.html
4¡¢ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35ÒÚÌõ¼Í¼
vpnMentor·¢Ã÷¼ÓÀû¸£ÄáÑÇÖÝÔÚÏß±¸·Ý¹«Ë¾SOS Online BackupµÄÒ»¸ö¿É¹ûÕæ»á¼ûµÄÊý¾Ý¿âй¶Áè¼Ý1.35ÒÚÌõ¼Í¼¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖаüÀ¨½ü70GBÓëÓû§ÕÊ»§Ïà¹ØµÄÔªÊý¾Ý£¬£¬£¬£¬£¬Õâ°üÀ¨½á¹¹¡¢²Î¿¼¡¢ÐÎòÐÔºÍÖÎÀíÐÔÔªÊý¾Ý£¬£¬£¬£¬£¬º¸ÇÁËSOSÔÆÐ§À͵ÄÐí¶à·½Ãæ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ì»Â¶µÄÊý¾Ý¿âÖл¹°üÀ¨Ð¡ÎÒ˽¼Òʶ±ðÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÓªÒµÏêϸÐÅÏ¢£¨Õë¶Ô¹«Ë¾¿Í»§£©ºÍÓû§Ãû¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÊý¾ÝÕë¶ÔSOS¼°Æä¿Í»§ÌᳫÖÖÖÖڲƹ¥»÷¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/secure-backup-company-leaks-135/
5¡¢Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ
Ñо¿Ö°Ô±ÔÚZoomµÄmacOS¿Í»§¶ËÖз¢Ã÷Á½¸ö0day£¬£¬£¬£¬£¬Îó²î¿ÉÄÜÔÊÐíÍâµØ¡¢ÎÞÌØÈ¨¹¥»÷Õß»ñµÃrootÌØÈ¨£¬£¬£¬£¬£¬²¢ÔÊÐíËûÃÇ»á¼ûÊܺ¦ÕßµÄÂó¿Ë·çºÍÉãÏñÍ·¡£¡£¡£¡£¡£¡£¡£¡£JamfÊ×ϯÇå¾²Ñо¿Ô±Patrick Wardle·¢Ã÷ÁËÕâÁ½¸öÎó²î£¬£¬£¬£¬£¬µÚÒ»¸öÎó²îÔ´ÓÚZoom×°ÖóÌÐòʹÓÃAuthorizationExecuteWithPrivileges APIÔÚÎÞÓû§½»»¥µÄÇéÐÎϾÙÐÐ×°Ö㬣¬£¬£¬£¬µ«¸ÃAPIÓÉÓÚûÓÐÑéÖ¤ÔÚ¸ùĿ¼ÏÂÖ´ÐеĶþ½øÖÆÎļþ£¬£¬£¬£¬£¬ÏÖʵÉÏÒѾ±»AppleÆúÓᣡ£¡£¡£¡£¡£¡£¡£ÍâµØÎÞÌØÈ¨µÄ¹¥»÷Õß»ò¶ñÒâÈí¼þ¿ÉÄÜʹÓøÃÎó²îÌáȨÖÁroot¡£¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²îÓëZoomÔÊÐíµÚÈý·½¿â×¢Èë´úÂëÓйأ¬£¬£¬£¬£¬¹¥»÷Õ߿ɽ«¶ñÒâµÄµÚÈý·½¿â¼ÓÔØµ½ZoomµÄÀú³Ì/µØµã¿Õ¼äÖУ¬£¬£¬£¬£¬´Ó¶ø×Ô¶¯¼ÌÐøËùÓÐZooms»á¼ûȨÏÞ²¢×îÖÕ»ñµÃÉãÏñÍ·ºÍÂó¿Ë·çµÄ¿ØÖÆÈ¨ÏÞ¡£¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÖÜËÄZoomÌåÏÖÒѾÐÞ¸´ÁËÕâÁ½¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/two-zoom-zero-day-flaws-uncovered/154337/


¾©¹«Íø°²±¸11010802024551ºÅ