GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î£»£»£»GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC

Ðû²¼Ê±¼ä 2021-03-15

1.GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î


1.jpg


GRIMMµÄÑо¿Ö°Ô±ÔÚLinuxÄÚºË×ÓϵͳiSCSIÖз¢Ã÷ÁË3¸ö¸ßΣÎó²î£¬ £¬£¬£¬£¬£¬ÕâЩÎó²î×Ô2006ÄêÒѾ­±£´æ¡£¡£¡£¡£¡£¡£¡£Õâ3¸öÎó²î»®·ÖΪ¶Ñ»º³åÇøÒç³öÎó²î£¨CVE-2021-27365£©£¬ £¬£¬£¬£¬£¬¿Éµ¼ÖÂÍâµØÌáȨ¡¢ÐÅϢй¶ºÍ¾Ü¾øÐ§ÀÍ£»£»£»ÄÚºËÖ¸Õëй¶Îó²î£¨CVE-2021-27363£©£¬ £¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶£»£»£»ÒÔ¼°Ô½½ç¶ÁÈ¡Îó²î£¨CVE-2021-27364£©£¬ £¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶ºÍ¾Ü¾øÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´ÈƹýKASLR¡¢SMEP¡¢SMAPºÍKPTIµÈÇå¾²¹¦Ð§¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬ÕâЩÎó²îÒÑÓÚ3ÔÂ7ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/15-year-old-linux-kernel-bugs-let-attackers-gain-root-privileges/


2.NCC GroupÅû¶Netgear½»Á÷»úÖеÄ15¸öÎó²î


2.jpg


NCC GroupÑо¿Ö°Ô±·¢Ã÷NetgearµÄJGS516PEÒÔÌ«Íø½»Á÷»úÖб£´æ15¸öÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖнÏΪÑÏÖØµÄÊÇ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-26919£©£¬ £¬£¬£¬£¬£¬CVSS v3ÆÀ·ÖΪ9.8£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÒÔÖÎÀíԱȨÏÞÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬ÉÐÓÐCVSS v3ÆÀ·ÖΪ8.8µÄNSDPÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-35231£©ºÍ¿ÉÉÏ´«¶ñÒâ´úÂëµÄ£¨CVE-2020-35220£©µÈÎó²î¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬NetgearÒÑÐû²¼Çå¾²¸üУ¬ £¬£¬£¬£¬£¬À´ÐÞ¸´ÉÏÊöÎó²î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115586/hacking/netgear-soho-flaws.html


3.GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC


3.jpg


GoogleÐû²¼ÁËÕë¶ÔChromeä¯ÀÀÆ÷JavaScriptÒýÇæµÄSpectre¹¥»÷PoC¡£¡£¡£¡£¡£¡£¡£Google³Æ£¬ £¬£¬£¬£¬£¬¸ÃPoC´úÂë¿ÉÔÚIntel Skylake CPUµÄChrome 88ÉÏÔËÐУ¬ £¬£¬£¬£¬£¬ÒÔ1kB/ sµÄËÙÂÊ´Ó×°±¸ÄÚ´æÖÐÏÂÔØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬GoogleÑо¿Ö°Ô±ÍƲâPoC´úÂë¿ÉÔÚÆäËûCPU£¨²î±ðµÄ¹©Ó¦É̺ÍÐͺţ©¡¢²Ù×÷ϵͳºÍChromium°æ±¾ÉÏʹÓᣡ£¡£¡£¡£¡£¡£Google½¨ÒéWeb¿ª·¢Ö°Ô±Ê¹Óà еÄÇå¾²»úÖÆÀ´»º½âSpectreÓ²¼þ¹¥»÷ºÍ³£¼ûµÄWeb¿çվй¶£¬ £¬£¬£¬£¬£¬²¢ÌṩÁËPost-Spectre Web¿ª·¢»ººÍ½âSide-Channel¹¥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115573/hacking/google-chrome-spectre-poc.html


4.ÄϷǰü¹Ü¹«Ë¾PPSÔâµ½¹¥»÷£¬ £¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅϢй¶


4.jpg


ÄϷǰü¹ÜºÍͶ×Ê×Éѯ¹«Ë¾PPSÔâµ½¹¥»÷£¬ £¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬ £¬£¬£¬£¬£¬ÆäÔ⵽δ֪ºÚ¿ÍµÄÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬Ð§ÀÍ¿ÉÄÜ»áÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬ËûÃÇÕýÔÚ¶Ô´ËʾÙÐÐÊӲ죬 £¬£¬£¬£¬£¬²¢ÊÔͼ»Ö¸´ÆäIT»ù´¡¼Ü¹¹µÄ¹¦Ð§Ê±¡£¡£¡£¡£¡£¡£¡£Ôڴ˹ý¶Éʱ´ú£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹ÌṩÁËÐí¶àÌæ»»Á÷³Ì£¬ £¬£¬£¬£¬£¬ÒÔ×îºéÁ÷ƽµØïÔÌ­¹¥»÷¶Ô¿Í»§µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬Éв»ÖªµÀPPSÔâµ½µÄ¹¥»÷ÀàÐÍ£¬ £¬£¬£¬£¬£¬ÒÔ¼°¿ÉÄÜй¶ÐÅÏ¢µÄ¹æÄ£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://mybroadband.co.za/news/security/389402-pps-hit-by-cyber-attack.html    


5.Unit42Ðû²¼ÓйØDearCryÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ


5.jpg


Unit42Ðû²¼ÁËÓйØDearCryÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£DearCryÊÇÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ£¬ £¬£¬£¬£¬£¬¹ØÓÚËüµÄ±¨µÀ×îÔç·ºÆðÔÚ2021Äê3ÔÂ9ÈÕ£¬ £¬£¬£¬£¬£¬¿ÉÒÔʹÓÃMicrosoft ExchangeЧÀÍÆ÷µÄProxyLogonÎó²î¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Ä¿µÄ°üÀ¨ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵȹú¼Ò¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬¸Ã±¨¸æ»¹¼Í¼ÁËDearCryʹÓõÄÏà¹ØÕ½ÂÔÒÔ¼°ÊÖÒÕºÍÀú³Ì£¨TTP£©£¬ £¬£¬£¬£¬£¬²¢Îª¿Í»§ÔõÑù׼ȷÉèÖÃËûÃǵÄ×°±¸ÌṩÁ˽¨Òé¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/dearcry-ransomware/


6.Check PointÐû²¼ÓйØExchange¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ


6.jpg


Check PointÐû²¼ÁËÓйØExchange¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Ôڸñ¨¸æÖУ¬ £¬£¬£¬£¬£¬Check Point Research£¨CPR£©Åû¶ÁËÆäÔÚÈ«Çò¹æÄ£ÄÚ×·×ÙµÄʵÑéʹÓôËÎó²îµÄ×éÖ¯µÄ×îÐÂЧ¹û¡£¡£¡£¡£¡£¡£¡£CPR·¢Ã÷È«ÇòÒÑÓÐÊý°Ù´ÎµÄʹÓÃʵÑ飻£»£»½öÔÚÒÑÍùµÄ72¸öСʱÖУ¬ £¬£¬£¬£¬£¬ÊµÑéʹÓõĴÎÊý¾Í·­ÁË6±¶ÒÔÉÏ£»£»£»¹¥»÷µÄ´ÎÊýÀÛ¼ÆÁè¼Ý4800´Î£¬ £¬£¬£¬£¬£¬Éæ¼°ÌìÏÂÊý°Ù¸ö×éÖ¯£»£»£»ÔâÊܹ¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È21£¥£©£¬ £¬£¬£¬£¬£¬Æä´ÎÊǺÉÀ¼£¨12£¥£©ºÍÍÁ¶úÆä£¨12£¥£©£»£»£»ÊÜÓ°Ïì×î´óµÄ²¿·ÖÊÇÕþ¸®ºÍ¾ü·½£¨Õ¼±È27£¥£©£¬ £¬£¬£¬£¬£¬Æä´ÎÊÇÖÆÔìÒµ£¨22£¥£©ºÍÈí¼þ¹©Ó¦ÉÌ£¨9£¥£©¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/03/11/exploits-on-organizations-worldwide/