Ñо¿Ö°Ô±Åû¶FragAttacks£¬£¬£¬£¬£¬£¬Ó°Ïì½ü24ÄêËùÓÐWi-Fi×°±¸£»£»£»£»£»AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´12¿î²úÆ·ÖеÄ43¸öÎó²î
Ðû²¼Ê±¼ä 2021-05-131.Ñо¿Ö°Ô±Åû¶FragAttacks£¬£¬£¬£¬£¬£¬Ó°Ïì½ü24ÄêËùÓÐWi-Fi×°±¸
±ÈÀûʱÇå¾²Ñо¿Ô±Mathy VanhoefÅû¶Á˱»Í³³ÆÎªFragAttacksµÄ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÁË1997ÄêÖÁ½ñµÄËùÓÐWi-Fi×°±¸£¨°üÀ¨ÅÌËã»ú¡¢ÖÇÄÜÊÖ»úºÍÖÇÄÜ×°±¸£©¡£¡£¡£¡£¡£ÔÚÕâЩÎó²îÖУ¬£¬£¬£¬£¬£¬ÓÐ3¸öÊÇWi-Fi 802.11±ê×¼ÔÚÖ¡¾ÛºÏºÍÖ¡Ë鯬¹¦Ð§ÉϵÄÉè¼ÆÈ±ÏÝ£¬£¬£¬£¬£¬£¬¶øÆäËûÎó²îÔòÊÇWi-Fi²úÆ·Öеıà³Ì¹ýʧ¡£¡£¡£¡£¡£Vanhoef³Æ£¬£¬£¬£¬£¬£¬ÊµÑéЧ¹ûÏÔʾÿ¸öWi-Fi²úÆ·¶¼±£´æÖÁÉÙÒ»¸öÎó²îÇÒ´ó´ó¶¼²úÆ·±£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬Ö»ÓÐNetBSDºÍOpenBSD²»ÊÜÓ°Ï죬£¬£¬£¬£¬£¬ÓÉÓÚËüÃDz»Ö§³ÖA-MSDUµÄÎüÊÕ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/117819/hacking/wifi-fragattacks.html
2.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´12¿î²úÆ·ÖеÄ43¸öÎó²î
AdobeÐû²¼ÁË´ó¹æÄ£µÄÖܶþ²¹¶¡³Ì£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË12¿î²úÆ·ÖеÄ43¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÇå¾²¸üÐÂÐÞ¸´ÁËAdobe AcrobatºÍReaderÖÐÒѱ»ÔÚҰʹÓõÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2021-28550£©£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÆäÔÚÄ¿µÄϵͳÖÐ×°ÖöñÒâÈí¼þ»ò½ÓÊÜÅÌËã»ú¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеÄí§Òâ´úÂëÖ´ÐеÄÎó²î£¨CVE-2021-28562ºÍCVE-2021-28553£©¡¢ IllustratorÖеÄÔ½½çдÎó²î£¨CVE-2021-21101£©ºÍAEMÖеÄXSSÎó²î£¨CVE-2021-21084£©µÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-reader-zero-day-vulnerability-exploited-in-the-wild/
3.αװΪChromeµÄAndroid¶ñÒâÈí¼þÒÑѬȾÊýÊ®Íò×°±¸
PradeoµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚÒÑÍùµÄ¼¸ÖÜÖУ¬£¬£¬£¬£¬£¬Î±×°ÎªChromeµÄÒ»ÖÖеÄAndroid¶ñÒâÈí¼þÒÑѬȾÊýÊ®Íò×°±¸¡£¡£¡£¡£¡£ºÚ¿Í»áÏòÄ¿µÄ·¢ËÍÒ»Ìõ¶ÌÐÅ£¬£¬£¬£¬£¬£¬ÒªÇóËûÃÇÖ§¸¶º£¹ØÓöÈÀ´Í¶µÝ°ü¹ü¡£¡£¡£¡£¡£µ±Ä¿µÄµã»÷¶ÌÐÅÖеÄÁ´½Óºó¾Í»áµ¯³öÒ»ÌõÐÅÏ¢£¬£¬£¬£¬£¬£¬ÌáÐÑËûÃǸüÐÂChromeÓ¦ÓóÌÐò¡£¡£¡£¡£¡£Ö®ºóÓû§»á±»Öض¨Ïòµ½´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬²¢±»ÒªÇóÖ§¸¶Ò»Ð¡±ÊÇ®£¨Í¨³£Îª1»ò2ÃÀÔª£©ÒÔÍøÂçÐÅÓÿ¨ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃαÔìµÄChrome»áʹÓñ»Ñ¬È¾µÄÊÖ»úÌìÌì×Ô¶¯·¢ËÍ300Ìõ´¹ÂÚ¶ÌОÙÐÐÈö²¥¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/fake-chrome-app-worming-smish-cyberattack/166038/
4.United ValorÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬Ð¹Â¶ÃÀ¹ú20ÍòÍËÎéÎäÊ¿ÐÅÏ¢
Jeremiah FowlerÓÚ4ÔÂ18ÈÕ·¢Ã÷United Valorй¶Á˽ü20ÍòÃûÃÀ¹úÍËÎéÎäÊ¿µÄÒ½ÁƼͼ¡£¡£¡£¡£¡£United ValorÊDZ±¿¨ÂÞÀ´ÄÉÖݵÄÒ»¼ÒΪÍËÎéÎäÊ¿ÖÎÀí¾ÖÒÔ¼°ÆäËûÁª°îºÍÖݵĻú¹¹Ìṩ²Ð¼²ÆÀ¹ÀЧÀ͵Ĺ«Ë¾¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Ò½ÁÆÐÅÏ¢¡¢ÁªÏµÐÅÏ¢¡¢Ò½ÉúÐÅÏ¢ºÍԤԼʱ¼ä£¬£¬£¬£¬£¬£¬ÒÔ¼°ÁËδ¼ÓÃܵÄÃÜÂëºÍÕ˵¥ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´Ë´Îй¶ÊÇÓÉÓÚÄÚ²¿²Ù×÷¹ýʧµ¼Öµģ¬£¬£¬£¬£¬£¬µ«Fowler³ÆÆä·¢Ã÷ÁËÃûΪread_meµÄÀÕË÷ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÉÏÃæÌåÏÖËùÓмͼ¾ùÒÑÏÂÔØ£¬£¬£¬£¬£¬£¬²¢ÒªÇóÖ§¸¶0.15±ÈÌØ±Ò£¨8148ÃÀÔª£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/veterans-medical-records-ransomware/166025/
5.BabukÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÈÕ±¾µÄYamabiko 0.5TBÊý¾Ý
BabukÍÅ»ïÉù³ÆÒѹ¥»÷ÈÕ±¾¹«Ë¾Yamabiko²¢ÇÔÈ¡ÁË0.5TBÊý¾Ý¡£¡£¡£¡£¡£YamabikoµÄ×ܲ¿Î»ÓÚ¶«¾©£¬£¬£¬£¬£¬£¬ÔÚÈ«Çò¹æÄ£ÄÚÏúÊ۵綯¹¤¾ß¡¢Å©Òµ»úеºÍ»§Í⶯Á¦×°±¸£¬£¬£¬£¬£¬£¬ÄêÊÕÈëÁè¼ÝÊ®ÒÚÃÀÔª¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨Îļþϵͳ¡¢SolidworksÎļþ¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢²ÆÎñ±¨¸æ¡¢²âÊÔͼºÍµç·ÔÀíͼµÈ¡£¡£¡£¡£¡£¿ÉÊÇÁîÈËÒÉ»óµÄÊÇ£¬£¬£¬£¬£¬£¬BabukÔøÌåÏÖÕë¶Ô»ªÊ¢¶ÙÌØÇø¾¯Ô±¾ÖµÄ¹¥»÷½«ÊÇÆä×îºóÒ»´Î»î¶¯£¬£¬£¬£¬£¬£¬²¢½«¹ûÕæÆä´úÂ룬£¬£¬£¬£¬£¬µ«ÏÖÔÚËÆºõÒѻָ´Õý³£ÔËÐС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/japanese-manufacturer-yamabiko/
6.CISAºÍFBIÁªºÏÐû²¼ÓйØDarkSideÍÅ»ïµÄÇå¾²×Éѯ
ÃÀ¹úCISAºÍFBIÁªºÏÐû²¼ÁËÓйØDarkSideÍÅ»ïµÄÇå¾²×Éѯ¡£¡£¡£¡£¡£ÔÚ½üÆÚµÄ»î¶¯ÖУ¬£¬£¬£¬£¬£¬DarkSide½«Ä¿µÄÃé×¼Á˶à¸öÁìÓòµÄÒªº¦»ù´¡ÉèÊ©£¨CI£©×éÖ¯£¬£¬£¬£¬£¬£¬°üÀ¨ÖÆÔì¡¢Ö´·¨¡¢°ü¹Ü¡¢Ò½ÁƱ£½¡ºÍÄÜÔ´ÐÐÒµ¡£¡£¡£¡£¡£¸ÃÍÅ»ïÔø¹ûÕæÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÄþÔ¸Ãé×¼ÓÐÄÜÁ¦Ö§¸¶´ó±ÊÊê½ðµÄ×éÖ¯£¬£¬£¬£¬£¬£¬¶ø·ÇÒ½Ôº¡¢Ñ§Ð£¡¢·ÇÓªÀû×éÖ¯ºÍÕþ¸®»ú¹¹¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬¸Ã×Éѯ»¹ÌṩÁË´ó×ڵĻº½â²½·¥À´×ÊÖúCIÔËÓªÉ̵ÖÓùºÍÓ¦¶Ô´ËÀ๥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/05/11/joint-cisa-fbi-cybersecurity-advisory-darkside-ransomware