ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ06ÖÜ

Ðû²¼Ê±¼ä 2020-02-11

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2020Äê02ÔÂ03ÈÕÖÁ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î45¸ö£¬£¬ £¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇQEMU libslirpÔ½½ç¶Ñ»á¼ûÎó²î; MikroTik WinBox CVE-2020-5720Ŀ¼±éÀúÎó²î £»£»£»£» £» £»£»Cisco NX-OS Software Cisco Discovery Protocol×ֶδ¦Öóͷ£»º³åÇøÒç³öÎó²î £»£»£»£» £» £»£»Squid ext_lm_group_aclÔ½½çдÎó²î £»£»£»£» £» £»£»Clam AntiVirus DLP»º³åÇøÒç³öÎó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý £»£»£»£» £» £»£»ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼ £»£»£»£» £» £»£»¹¥»÷ÕßÀÄÓÃBitbucketЧÀÍ£¬£¬ £¬£¬£¬£¬Òѵ¼ÖÂ50¶àÍòÖ÷»úѬȾ¶ñÒâÈí¼þ £»£»£»£» £» £»£»Ë¼¿ÆÐÞ¸´·¢Ã÷ЭÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬£¬ £¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸ £»£»£»£» £» £»£»Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí




1. QEMU libslirpÔ½½ç¶Ñ»á¼ûÎó²î


QEMU libslirp±£´æÔ½½ç¶Ñ»á¼ûÎó²î£¬£¬ £¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬ÒÔHOSTÉϵÄQEMUÀú³ÌÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£


https://www.openwall.com/lists/oss-security/2020/02/06/2



2. MikroTik WinBox CVE-2020-5720Ŀ¼±éÀúÎó²î


MikroTik WinBox±£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬¿É¾ÙÐÐĿ¼±éÀú¹¥»÷£¬£¬ £¬£¬£¬£¬Ð´í§ÒâÎļþµ½ÏµÍ³¡£¡£¡£¡£


https://www.tenable.com/security/research/tra-2020-07



3. Cisco NX-OS Software Cisco Discovery Protocol×ֶδ¦Öóͷ£»º³åÇøÒç³öÎó²î


Cisco NX-OS Software´¦Öóͷ£CDPÐÂÎÅ×ֶα£´æ»º³åÇøÒç³öÎó²î£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ £»£»£»£» £» £»£»ò¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce



4. Squid ext_lm_group_aclÔ½½çдÎó²î


Squid ext_lm_group_aclÆÊÎöNTLMÑé֤ƾ֤±£´æÔ½½çдÎó²î£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÕß¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£


http://www.squid-cache.org/Advisories/SQUID-2020_3.txt



5. Clam AntiVirus DLP»º³åÇøÒç³öÎó²î


Clam AntiVirus DLPÄ£¿£¿£¿ £¿£¿£¿£¿é±£´æ»º³åÇøÒç³öÎó²î£¬£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ £»£»£»£» £» £»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£


https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤Naked SecurityµÄÒ»·Ý±¨¸æ£¬£¬ £¬£¬£¬£¬ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶ÁË´ó×ÚÓû§µÄ˽ÈËÊý¾Ý£¬£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÐÔÄÜÆÀ¼¶ºÍ¹«Ë¾ÅàѵÊÓÆµµÈ¡£¡£¡£¡£Ð¹Â¶µÄÔµ¹ÊÔ­ÓÉÊDz¿·ÖÓû§¹ýʧµØ½«ÆäTrelloÃæ°åÉèÖÃΪpublic£¬£¬ £¬£¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔÉó²éÆäÖеÄÄÚÈÝ£¬£¬ £¬£¬£¬£¬ÉõÖÁGoogleÖ®ÀàµÄËÑË÷ÒýÇæ¿ÉÒÔ½«Ãæ°åÖеÄÄÚÈÝÄÉÈëË÷Òý£¬£¬ £¬£¬£¬£¬½öÐèҪͨ¹ýÒ»ÖÖ³ÆÎª¡°dork¡±µÄÌØÊâÀàÐͼ´¿ÉËÑË÷µ½¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.techworm.net/2020/02/trello-search-exposes-private-data.html


2¡¢ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽÐû²¼ÍøÂçÇå¾²³ÉÊì¶ÈÄ£×ÓÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¡£¡£¡£¹ú·À²¿Ðû²¼£¬£¬ £¬£¬£¬£¬µ½2026Äê¹ú·À³Ð°üÉÌÔÚ»ØÓ¦Õþ¸®²É¹ºÍýÏëµÄÌá°¸ÇëÇóʱ£¬£¬ £¬£¬£¬£¬±ØÐèÖª×ã»ù±¾µÄÍøÂçÇå¾²±ê×¼¡£¡£¡£¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬£¬ £¬£¬£¬£¬¹ú·À²¿Ï£Íûͨ¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¡£¡£¡£¨DIB£©·Ö°üÉ̵ÄÍøÂçÇå¾²×¼±¸Ë®Æ½£¬£¬ £¬£¬£¬£¬À´ÔöÇ¿¶Ô¹©Ó¦Á´Î´·ÖÀàÐÅÏ¢£¨Áª°îÌõÔ¼ÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ± £»£»£»£» £» £»£»¤¡£¡£¡£¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶±ðµÄÈÏÖ¤À´¼ò»¯´óÐͺÍСÐ͹ú·À³Ð°üÉ̵ÄÍøÂçÍ£µ±ÐÔÈÏÖ¤£¬£¬ £¬£¬£¬£¬ÖصãÊÇÍøÂçÇ徲ʵ¼ùºÍÁ÷³Ì¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º


https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-

contractors/


3¡¢¹¥»÷ÕßÀÄÓÃBitbucketЧÀÍ£¬£¬ £¬£¬£¬£¬Òѵ¼ÖÂ50¶àÍòÖ÷»úѬȾ¶ñÒâÈí¼þ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¹¥»÷ÕßÕýÔÚÀÄÓôúÂëÍйÜЧÀÍBitbucket´æ´¢7ÖÖ¶ñÒâÈí¼þpayload£¬£¬ £¬£¬£¬£¬¸Ã¹¥»÷»î¶¯ÒÑÔÚÈ«Çò¹æÄ£ÄÚѬȾÁËÁè¼Ý50Íǫ̀ÉÌÓÃÅÌËã»ú¡£¡£¡£¡£Æ¾Ö¤Çå¾²³§ÉÌCybereasonÐû²¼µÄÒ»·Ý±¨¸æ£¬£¬ £¬£¬£¬£¬¹¥»÷Õß°²Åŵ½Ä¿µÄϵͳµÄ¶ñÒâpayload°üÀ¨Predator¡¢Azorult¡¢Evasive Monero Miner¡¢ÀÕË÷Èí¼þSTOP¡¢Vidar¡¢Amadey botºÍIntelRapid¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔѰÕÒµÁ°æÉÌÒµÈí¼þ£¨ÀýÈçAdobe Photoshop¡¢Microsoft OfficeµÈ£©µÄÓû§¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bitbucket-abused-to-infect-500-000-hosts-with-malware-cocktail/


4¡¢Ë¼¿ÆÐÞ¸´·¢Ã÷ЭÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬£¬ £¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



ÎïÁªÍøÇå¾²¹«Ë¾ArmisÔÚ˼¿Æ·¢Ã÷ЭÒ飨CDP£©Öз¢Ã÷Îå¸ö¸ßΣÎó²î£¬£¬ £¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸¡£¡£¡£¡£CDPÊÇ˼¿Æ×°±¸Ê¹ÓõÄרÓеÚ2²ã£¨Êý¾ÝÁ´Â·²ã£©Ð­Ò飬£¬ £¬£¬£¬£¬ÓÃÓÚ·¢Ã÷ÍâµØÍøÂçÉÏµÄÆäËü˼¿Æ×°±¸¡£¡£¡£¡£Ä¬ÈÏÇéÐÎÏ£¬£¬ £¬£¬£¬£¬ÏÕЩËùÓÐ˼¿Æ²úÆ·£¨°üÀ¨Â·ÓÉÆ÷¡¢½»Á÷»úÒÔ¼°IPµç»°ºÍÉãÏñ»ú£©¾ùÆôÓôËЭÒé¡£¡£¡£¡£ÕâÎå¸öÎó²î±»³ÆÎªCDPwn£¬£¬ £¬£¬£¬£¬°üÀ¨ËĸöÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-3110¡¢CVE-2020-3111¡¢CVE-2020-3118¡¢CVE-2020-3119£©ºÍÒ»¸ö¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3120£©¡£¡£¡£¡£ÒÑÍùÊ®ÄêÖÐÐû²¼µÄ˼¿Æ¹Ì¼þ°æ±¾¾ùÊܵ½ÕâЩÎó²îµÄÓ°Ï죬£¬ £¬£¬£¬£¬ÕâЩÎó²î¿ÉÄÜÊ¹ÉøÍ¸µ½ÆóÒµÍøÂçÖеÄÍâµØ¹¥»÷ÕßÄܹ»Ö´ÐÐÖÐÐÄÈ˹¥»÷¡¢¼àÊÓÓïÒô»òÊÓÆµºô½Ð¡¢ÍøÂçºÍ×ß©Êý¾ÝÒÔ¼°ÆÆËðÍøÂç·Ö¶Î¡£¡£¡£¡£ÏÖÔÚ˼¿ÆÒѾ­Ðû²¼ÁËÏà¹Ø²úÆ·µÄ¹Ì¼þ¸üÐÂÀ´ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£



Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/



5¡¢Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC



¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¶íÂÞ˹Ç徲ר¼ÒVladislav YarmakÐû²¼ÁËËûÔÚº£Ë¼Ð¾Æ¬Öз¢Ã÷µÄºóÃÅ»úÖÆµÄÊÖÒÕϸ½Ú£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖÓÉÓÚ¶Ô¹©Ó¦ÉÌȱ·¦ÐÅÈΣ¬£¬ £¬£¬£¬£¬ËûûÓÐÏòº£Ë¼Åû¶¸ÃÎó²î¡£¡£¡£¡£¸ÃºóÃÅ»úÖÆ¿ÉÒÔʹ¹¥»÷Õß»ñµÃroot shell»á¼ûȨÏÞ²¢ÍêÈ«¿ØÖÆ×°±¸£¬£¬ £¬£¬£¬£¬ÏêϸÀ´Ëµ£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓà ºóÃÅͨ¹ýÔÚTCP¶Ë¿Ú9530ÉÏÏò»ùÓÚº£Ë¼Ð¾Æ¬µÄ×°±¸·¢ËÍһϵÁÐÏÂÁ£¬ £¬£¬£¬£¬ÕâЩÏÂÁîÔÊÐí¹¥»÷ÕßÔÚ×°±¸ÉÏÆôÓÃTelnetЧÀÍ£¬£¬ £¬£¬£¬£¬È»ºó¹¥»÷Õß¿ÉÒÔʹÓÃÁù¸öTelnetƾ֤֮һµÇ¼£¬£¬ £¬£¬£¬£¬²¢»ñµÃ¶ÔrootÕÊ»§µÄ»á¼ûȨÏÞ¡£¡£¡£¡£Yarmak»¹ÔÚgithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC´úÂë¡£¡£¡£¡£



Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html