ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ17ÖÜ

Ðû²¼Ê±¼ä 2019-04-29

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2019Äê4ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼Çå¾²Îó²î51¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇPulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç³öÎó²î £»ISC BIND nxdomain-redirect¾Ü¾ø·þÎñÎó²î; Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÉèÖÃÏÂÁî×¢ÈëÎó²î £»Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³öÎó²î £»Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÏÂÁî×¢ÈëÎó²î ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǸßͨæçÁúоƬ¸ßΣÎó²î £¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶;Google PlayϼÜ50¸ö¶ñÒâÓ¦Óà £¬×°ÖÃÁ¿´ï3000Íò´Î;Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾;Wi-FiÈÈÃŲéÕÒÆ÷й¶200ÍòWi-FiÃÜÂë;Google PlayÖÐ¹ã¸æÈí¼þPreAMo £¬ÏÂÔØÁ¿´ï9000Íò´Î ¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£

Ö÷ÒªÇå¾²Îó²îÁбí


1. Pulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç³öÎó²î

Pulse Secure Pulse Connect Secure±£´æ»º³åÇøÒç³öÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓóÌÐò±ÀÀ £»òÖ´ÐÐí§Òâ´úÂë ¡£

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101

2. ISC BIND nxdomain-redirect¾Ü¾ø·þÎñÎó²î
ISC BIND nxdomain-redirect¹¦Ð§±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÊ¹ÊØ»¤³ÌÐòÍ߽⠣¬¾ÙÐоܾø·þÎñ¹¥»÷ ¡£
https://kb.isc.org/docs/cve-2019-6468

3. Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÉèÖÃÏÂÁî×¢ÈëÎó²î
Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÉèÖñ£´æÊäÈëÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî ¡£
https://www.securifera.com/advisories/cve-2018-20052-20053/

4. Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³öÎó²î
Tenda AC7¡¢AC9ºÍAC10 web server (httpd)±£´æ»º³åÇøÒç³öÎó²î £¬ÔÊÐí Ô¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿É¾ÙÐлº³åÇøÒç³ö¹¥»÷ £¬¿ÉÖ´ÐÐí§Òâ´úÂë»ò¾ÙÐоܾø·þÎñ¹¥»÷ ¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md

5. Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÏÂÁî×¢ÈëÎó²î
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi±£´æÊäÈëÑéÖ¤Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî ¡£
https://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html

Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢¸ßͨæçÁúоƬ¸ßΣÎó²î £¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

¸ßͨоƬ×é±£´æÒ»¸ö²àÐŵÀ¹¥»÷Îó²î £¬¸ÃÎó²î£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÇå¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ ¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´ÐÐÇéÐΣ¨TEE£© £¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX ¡£Æ¾Ö¤NCCÑо¿Ö°Ô±Keegan RyanµÄ±íÊö £¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©±£´æÎó²î £¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍÆ²â³ö256λECDSAÃÜÔ¿ ¡£¸ÃÎó²îµÄʹÓÃÐèҪװ±¸µÄrootȨÏÞ ¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ïì £¬°üÀ¨¶à¿îæçÁúоƬ ¡£¸ÃÎó²îµÄÐÞ¸´²¹¶¡ÒѾ­°üÀ¨ÔÚGoogleÐû²¼µÄ4ÔÂAndroidÇå¾²¸üÐÂÖÐ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/

2¡¢Google PlayϼÜ50¸ö¶ñÒâÓ¦Óà £¬×°ÖÃÁ¿´ï3000Íò´Î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


AvastÑо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷50¸ö¶ñÒâÓ¦Óà £¬ÕâЩӦÓõÄ×ÜÏÂÔØ´ÎÊý´ï3000Íò´Î ¡£Æ¾Ö¤AvastµÄ±¨¸æ £¬ÕâЩӦÓÃͨ¹ýµÚÈý·½¿âÏ໥¹ØÁª £¬¿ÉÈÆ¹ýAndroidµÄºǫ́·þÎñÏÞÖÆÒ»Ö±ÏòÓû§ÏÔʾԽÀ´Ô½¶àµÄ¹ã¸æ £¬ÔÚijЩÇéÐÎÏÂÉõÖÁÓÕʹÓû§×°ÖÃÆäËü¹ã¸æÈí¼þ ¡£ÕâЩ¶ñÒâÓ¦ÓõÄÃû³Æ°üÀ¨Pro Piczoo¡¢Photo Blur Studio¡¢Mov-tracker¡¢Magic Cut OutºÍPro Photo EraserµÈ £¬ÏÂÔØÁ¿´Ó100Íòµ½1000´Î²»µÈ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/30-million-android-users-have-installed-malicious-lifestyle-apps/

3¡¢Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¿¨°Í˹»ù·¢Ã÷ÔÚ֮ǰÕë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammerÖÐ £¬ÖÁÉÙÉÐÓÐÁù¼ÒÑÇÖÞ¹«Ë¾³ÉΪĿµÄ £¬°üÀ¨Èý¼ÒÓÎÏ·¹«Ë¾£¨Electronics Extreme¡¢Innovative ExtremistºÍZepetto£©ÒÔ¼°Î´Ìá¼°Ãû³ÆµÄÒ»¼ÒÊÓÆµÓÎÏ·¹«Ë¾¡¢Ò»¼Ò×ۺϿعɹ«Ë¾ºÍÒ»¼ÒÖÆÒ©¹«Ë¾ ¡£ÔÚÀÖ³ÉÈëÇÖÊܺ¦Õßϵͳºó £¬¹¥»÷ÕßÊͷŵĶñÒâÈí¼þ½«Äܹ»ÍøÂçϵͳÐÅÏ¢²¢´ÓC&CÏÂÔØÆäËüpayload ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shadowhammer-targets-multiple-companies-asus-just-one-of-them/

4¡¢Wi-FiÈÈÃŲéÕÒÆ÷й¶200ÍòWi-FiÃÜÂë


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤TechCrunchµÄ±¨¸æ £¬Ò»¸öÃûΪWiFi FinderµÄAndroid APPй¶ÁËÁè¼Ý200Íò¸öWi-FiÍøÂçµÄÃÜÂë £¬ÆäÖÐÊýÍò¸öWi-FiÈÈÃÅλÓÚÃÀ¹ú ¡£¸ÃAPPÓÃÓÚ×ÊÖúÓû§²éÕÒWi-FiÈÈÃÅ £¬ÆäÏÂÔØÁ¿´ïÊýǧ´Î ¡£Ñо¿Ö°Ô±·¢Ã÷¸ÃAPPµÄÊý¾Ý¿â̻¶ÔÚÍøÉÏÇÒδÊܱ £»¤ £¬Êý¾Ý¿âÖеļͼ°üÀ¨Wi-FiÍøÂçµÄÃû³Æ¡¢×¼È·µÄµØÀíλÖá¢BSSIDºÍÃ÷ÎÄÃÜÂë £¬µ«²»°üÀ¨Wi-FiËùÓÐÕßµÄÁªÏµÐÅÏ¢ ¡£ÔÆ·þÎñ¹«Ë¾DigitalOceanÔÚ½Óµ½±¨¸æºóɾ³ýÁ˸ÃÊý¾Ý¿â ¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/leaky_app_data/144029/

5¡¢Google PlayÖÐ¹ã¸æÈí¼þPreAMo £¬ÏÂÔØÁ¿´ï9000Íò´Î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


CheckpointÑо¿Ö°Ô±ÔÚGoogle PlayÖз¢Ã÷¹ã¸æÈí¼þPreAMo £¬¸Ã¹ã¸æÈí¼þαװ³É6¸öAPP £¬×ÜÏÂÔØÁ¿Áè¼Ý9000Íò´Î ¡£PreAMoÖ÷ÒªÕë¶ÔÈý¸ö¹ã¸æÊðÀíÉÌ - Presage¡¢AdmobºÍMopub¾ÙÐÐڲƭ £¬¹¥»÷ÕßÕë¶Ôÿ¸ö¹ã¸æÊðÀíÉÌʹÓòî±ðµÄ´¦Öóͷ£ÒªÁì £¬µ«Ê¹ÓÃÁËÏàͬµÄC£¦C·þÎñÆ÷£¨res.mnexuscdn[.]com£© £¬ÓÃÓÚ·¢ËÍͳ¼ÆÐÅÏ¢ºÍÎüÊÕÉèÖÃÐÅÏ¢ ¡£Google PlayÔÚ½Óµ½±¨¸æºóÒѾ­Ï¼ÜÁËÕâЩÊÜѬȾµÄAPP ¡£

Ô­ÎÄÁ´½Ó£º
https://research.checkpoint.com/preamo-a-clicker-campaign-found-on-google-play/