ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ26ÖÜ
Ðû²¼Ê±¼ä 2019-07-08±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê7ÔÂ01ÈÕÖÁ07ÈÕ¹²ÊÕ¼Çå¾²Îó²î46¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApache Mesos Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»TRENDnet TEW-827DRU apply.cgiÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»£»NLnet Labs Name Server Daemon CVE-2019-13207»º³åÇøÒç³öÎó²î£»£»£»£»£»£»£»Nortek Security£¦Control Linear eMerge E3-Series CVE-2019-7253Ŀ¼±éÀúÎó²î£»£»£»£»£»£»£»NetApp AFF A700s Baseboard Management Controller CVE-2019-5497ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£
Ö÷ÒªÇå¾²Îó²îÁбí
1. Apache Mesos Ô¶³Ì´úÂëÖ´ÐÐÎó²î
Apache Mesos×é¼þ±£´æÁýÕÖÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄDockerÓ³Ïñ£¬£¬£¬¿ÉÁýÕÖinit helperÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E
2. TRENDnet TEW-827DRU apply.cgiÏÂÁî×¢ÈëÎó²î
https://github.com/TeamSeri0us/pocs/blob/master/iot/trendnet/cmdinject678.jpg
3. NLnet Labs Name Server Daemon CVE-2019-13207»º³åÇøÒç³öÎó²î
https://github.com/NLnetLabs/nsd/issues/20
4. Nortek Security£¦Control Linear eMerge E3-Series CVE-2019-7253Ŀ¼±éÀúÎó²î
https://www.applied-risk.com/resources/ar-2019-005
5. NetApp AFF A700s Baseboard Management Controller CVE-2019-5497ÏÂÁî×¢ÈëÎó²î
https://security.netapp.com/advisory/ntap-20190627-0001/
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

Ç÷ÊÆ¿Æ¼¼ÊӲ쵽һ¸ö»îÔ¾µÄ¹ã¸æÈí¼þ»î¶¯£¨AndroidOS_HiddenAd.HRXAAºÍAndroidOS_HiddenAd.GCLA£©£¬£¬£¬¸Ã¹ã¸æÈí¼þÒþ²ØÔÚ182¸ö¿ÉÒÔÃâ·ÑÏÂÔØµÄÓÎÏ·ºÍÏà»úAPPÖУ¬£¬£¬ÆäÖÐ111¸ö¿ÉÔÚGoogle PlayÊÐËÁÖÐÕÒµ½£¬£¬£¬ÆäËü¶ñÒâAPPÔòÔÚ9AppsºÍPP AssistantÆ·¼¶Èý·½Ó¦ÓÃÊÐËÁÖзºÆð¡£¡£¡£¡£¡£ÔÚ±»Ï¼Ü֮ǰ£¬£¬£¬ÕâЩ¶ñÒâAPPµÄ×ÜÏÂÔØÁ¿´ï934.9Íò´Î¡£¡£¡£¡£¡£¸Ã¹ã¸æÈí¼þ¿ÉÒÔÒþ²Ø¶ñÒâAPPµÄͼ±ê£¬£¬£¬ÏòÓû§ÍÆËÍÎÞ·¨Á¬Ã¦¹Ø±Õ»òÍ˳öµÄÈ«ÆÁ¹ã¸æ£¬£¬£¬»¹¿ÉÒÔÌÓ±ÜɳºÐµÄ¼ì²â¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/adware-campaign-identified-from-182-game-and-camera-apps-on-google-play-and-third-party-stores-like-9apps/
2¡¢CloudflareÔٴα¬·¢¹ÊÕÏ£¬£¬£¬´ó×ÚÍøÕ¾å´»ú
CDN¼ÓËÙЧÀÍÉÌCloudflareÔÚ±±¾©Ê±¼ä7ÔÂ2ÈÕÍí¼ä·ºÆð´óÃæ»ýå´»ú£¬£¬£¬Óû§»á¼ûʹÓÃÁËCloudflareµÄÍøÕ¾·ºÆð502¹ýʧ¡£¡£¡£¡£¡£´Ë´Îå´»úÔµ¹ÊÔÓÉÊÇCloudflareÔÚеÄWebÓ¦Óòã·À»ðǽ(WAF£©Öа²ÅÅÁËÒ»¸öÉèÖùýʧµÄ¹æÔò£¬£¬£¬ÇÒÕâЩ¹æÔòÒ»´ÎÐÔÔÚËùÓнڵãÉϰ²ÅÅ£¬£¬£¬´Ó¶øµ¼ÖÂÁËÈ«Çò´óÃæ»ýå´»ú¡£¡£¡£¡£¡£¸Ã¹ýʧµÄ¹æÔò°üÀ¨Ò»¸öÕýÔò±í´ïʽ£¬£¬£¬µ¼ÖÂCloudflareЧÀÍÆ÷ÉϵÄCPUÕ¼ÓÃìÉýÖÁ100%¡£¡£¡£¡£¡£ËæºóCloudflare»Ø¹öÁ˹ýʧµÄ¹æÔò£¬£¬£¬ÏÖÔÚÏà¹ØÐ§ÀÍÒѻָ´Õý³£¡£¡£¡£¡£¡£ÕâÒѾÊÇCloundflare±¾Ôµڶþ´Î·ºÆðå´»úÊÂÎñ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.cloudflare.com/cloudflare-outage/
3¡¢ÖÇÄܼҾӳ§ÉÌOrviboÒâÍâй¶Áè¼Ý20ÒÚÌõÓû§¼Í¼
vpnMentorÑо¿Ö°Ô±·¢Ã÷ÖÇÄܼҾӳ§ÉÌOrviboµÄÒ»¸öElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬ÆäÖÐй¶ÁËÁè¼Ý20ÒÚÌõÓû§¼Í¼¡£¡£¡£¡£¡£Æ¾Ö¤Óû§ÈÕÖ¾£¬£¬£¬ÐÅÏ¢±»Ð¹Â¶µÄÓû§À´×ÔÖйú¡¢ÈÕ±¾¡¢Ì©¹ú¡¢ÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢·¨¹ú¡¢°Ä´óÀûÑǺͰÍÎ÷¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢ÕÊ»§ÖØÖôúÂ롢׼ȷµÄµØÀíλÖá¢IPµØµã¡¢Óû§ÃûºÍÓû§ID¡£¡£¡£¡£¡£ÆäÖÐÃÜÂëΪδ¼ÓÑεÄMD5¹þÏ£ÃûÌᣡ£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨¼ÒÍ¥ID¡¢¼ÒÍ¥Ãû³Æ¡¢¹ØÁªÖÇÄÜ×°±¸ÐÅÏ¢ºÍÍýÏëʹÃüµÈ¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÀ´ÓÀÊÀËø¶¨Óû§µÄÕË»§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/unprotected-database-of-smart-home-vendor-exposes-billions-of-records-23f3a56b
4¡¢Ñо¿Ö°Ô±·¢Ã÷Ê׸öÀÄÓÃDNS over HTTPSÐÒéµÄ¶ñÒâÈí¼þGodlua
Ñо¿Ö°Ô±·¢Ã÷Ê׸öÀÄÓÃDNS over HTTPS£¨DoH£©ÐÒéµÄ¶ñÒâÈí¼þGodlua£¬£¬£¬¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÓÃLua±àдµÄ¶ñÒâÈí¼þ£¬£¬£¬Æä×÷ÓÃÀàËÆÓÚºóÃÅ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÎó²î£¨CVE-2019-3396£©À´Ñ¬È¾LinuxЧÀÍÆ÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÁ½¸öGodluaÑù±¾¶¼Ê¹ÓÃDNS over HTTPSÇëÇóÀ´»ñÈ¡ÓòÃûTXT£¬£¬£¬ÆäÖд洢ÁËC£¦CЧÀÍÆ÷µÄURL¡£¡£¡£¡£¡£ÕâÖÖ´ÓDNSÎı¾¼Í¼ÖмìË÷µÚ¶þ/µÚÈý½×¶ÎC£¦CЧÀÍÆ÷URLµØµãµÄÊÖÒÕ²¢²»ÐÂÏÊ£¬£¬£¬µ«Ê¹ÓÃDoHÇëÇó¶ø²»ÊǹŰåµÄDNSÇëÇóΪÊ״ηºÆð¡£¡£¡£¡£¡£DoH£¨DNS£©ÇëÇó¶ÔµÚÈý·½ÊÓ²ìÕß¼ÓÃÜÇÒ²»¿É¼û£¬£¬£¬Õâ°üÀ¨ÒÀÀµ±»¶¯DNS¼à¿ØÀ´×èÖ¹¶ÔÒÑÖª¶ñÒâÓòÇëÇóµÄÍøÂçÇå¾²Èí¼þ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/first-ever-malware-strain-spotted-abusing-new-doh-dns-over-https-protocol/
5¡¢Áè¼Ý30¸öVMware²úÆ·Êܵ½Linux SACKÎó²îÓ°Ïì
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/many-vmware-products-affected-sack-linux-vulnerabilities