ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ14ÖÜ

Ðû²¼Ê±¼ä 2020-04-07

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê03ÔÂ30ÈÕÖÁ04ÔÂ05ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´52¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇHAProxy hpack_dht_insertÈÎÒâ´úÂëÖ´ÐЩ¶´; CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ £»Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´ÐЩ¶´ £»Google Kubernetes API Server YAML½âÎö¾Ü¾ø·þÎñ©¶´ £»pam-krb5 Kerberos»º³åÇøÒç³ö©¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS©¶´ £»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ £»ÒÁÀʷǹٷ½TelegramÓ¦ÓÃй¶4200ÍòÓû§¼Ç¼ £»ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35ÒÚÌõ¼Ç¼ £»Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. HAProxy hpack_dht_insertÈÎÒâ´úÂëÖ´ÐЩ¶´


HAProxy HPACK½âÂëÆ÷hpack-tbl.c hpack_dht_insert´æÔÚÈÎÒâ×Ö½Ú䩶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ £»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.haproxy.org/download/2.1/src/CHANGELOG


2. CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP telnetÈõ¼ÓÃÜ


CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP TELNET·þÎñ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÎÞÐèÃÜÂëÒÔROOTȨÏÞ·ÃÎÊϵͳ¡£

https://insights.oem.avira.com/serious-security-flaws-uncovered-in-cacagoo-ip-cameras/


3. Sonatype Nexus Repository NXRM CVE-2020-10199δÃ÷´úÂëÖ´ÐЩ¶´


Sonatype Nexus Repository NXRM´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÓµÓÐÈÎÒâÕË»§µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://support.sonatype.com/hc/en-us/articles/360044882533


4. Google Kubernetes API Server YAML½âÎö¾Ü¾ø·þÎñ©¶´


Google Kubernetes API Server½âÎö¶ñÒâYAML¸ºÔØ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿Éʹ·þÎñ·¨Ê½Í߽⣬Ôì³É¾Ü¾ø·þÎñ¹¥»÷¡£

https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ


5. pam-krb5 Kerberos»º³åÇøÒç³ö©¶´


pam-krb5 Kerberos¿â´¦ÖôæÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ £»ò¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2020.1159/


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Ñо¿ÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS©¶´


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Positive TechnologiesµÄÒ»ÏîÐÂÑо¿±íÃ÷£¬ËùÓеÄ4GºÍ²¿ÃÅ5GµçÐÅÍøÂ綼Ò×Êܵ½ÀûÓÃDiameterÐÅÁîЭÒ驶´µÄDoS¹¥»÷¡£DiameterÐÅÁîЭÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÏûÏ¢·Ö·¢£¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿ÃÅ£¬ÓÐÖúÓÚ»¥ÁªÍøЭÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨÐÅ¡£¸ÃЭÒéÖеÄ©¶´ÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬ËæºóÀûÓÃÕâЩÐÅÏ¢À¹½ØÓïÒôºô½ÐºÍÈƹý¶ÔÒƶ¯·þÎñµÄÏÞÖÆ¡£Ñо¿ÈËÔ±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉø͸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£´ËÍ⣬µ±5GÍøÂ罨Á¢ÔÚÏÖÓмܹ¹ºÍЭÒéÖ®ÉÏʱ£¬ÕâЩÄþ¾²Â©¶´½«¼ÌÐø´æÔÚ£¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2¡¢ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ÉÏÖÜÄ©Æڼ䣬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£Æ¾¾ÝFBIÔÚ½ñÄêRSA»áÒéÉϵÄÒ»´ÎÑݽ²£¬DharmaÊǽüÄêÀ´»ñÀûµÚ¶þ¶àµÄÀÕË÷Èí¼þÒµÎñ£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸ü¹ã·ºµÄй¶£¬½ø¶øÔÚ¶à¸ö·¸×OÍÅÖ®¼äÀ©É¢£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£DharmaµÄ¼ÓÃÜ·½°¸·Ç³£ÏȽø£¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3¡¢ÒÁÀʷǹٷ½TelegramÓ¦ÓÃй¶4200ÍòÓû§¼Ç¼


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Äþ¾²×¨¼Ò±«²ª¡¤µÏÑÇÇÙ¿Æ£¨Bob Diachenko£©·¢ÏÖÒÁÀʷǹٷ½TelegramÓ¦ÓõÄ4200Íò×¢²áÓû§ÐÅÏ¢ÔÚÍøÉÏй¶¡£ÒÁÀÊÓÚ2018Äê³õÓÀ¾Ã·âËøÁËTelegram£¬Òò´ËÐí¶àÓû§×ª¶øʹÓ÷ǹٷ½°æ±¾µÄTelegram¡£ÕâЩÊý¾ÝÊÇÓÉHunting systemÍŶÓÔÚÒ»¸ö¿É¹ûÈ»·ÃÎʵÄElasticsearch¼¯ÈºÉÏ̻¶µÄ£¬ÔÚ3ÔÂ25ÈÕDiachenkoÏòÍйܷþÎñÉ̳ÂËßÁË´Ëʼþºó£¬¸ÃÊý¾Ý¿âÒѱ»¹Ø±Õ¡£DiachenkoÌåÏÖÖÁÉÙÓÐÒ»¸öÓû§ÒѾ­·ÃÎÊÁËÕâЩÊý¾Ý²¢½«Êý¾ÝÐû²¼µ½Á˺ڿÍÂÛ̳¡£Ð¹Â¶µÄ¼Ç¼°üÂÞÓû§µÄÕË»§ID¡¢Óû§Ãû¡¢µç»°ºÅÂë¡¢¹þÏ£¼°ÃÜÔ¿¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100810/data-breach/unofficial-telegram-fork-leak.html


4¡¢ÔÚÏß±¸·Ý¹«Ë¾SOS Online Backupй¶1.35ÒÚÌõ¼Ç¼


×ðÁú¶¶È¦ - Ϊdu¶øÉú


vpnMentor·¢ÏÖ¼ÓÀû¸£ÄáÑÇÖÝÔÚÏß±¸·Ý¹«Ë¾SOS Online BackupµÄÒ»¸ö¿É¹ûÈ»·ÃÎʵÄÊý¾Ý¿âй¶Áè¼Ý1.35ÒÚÌõ¼Ç¼¡£¸ÃÊý¾Ý¿âÖаüÂÞ½ü70GBÓëÓû§ÕÊ»§Ïà¹ØµÄÔªÊý¾Ý£¬Õâ°üÂ޽ṹ¡¢²Î¿¼¡¢ÃèÊöÐԺ͹ÜÀíÐÔÔªÊý¾Ý£¬º­¸ÇÁËSOSÔÆ·þÎñµÄÐí¶à·½Ãæ¡£´ËÍ⣬̻¶µÄÊý¾Ý¿âÖл¹°üÂÞ¸öÈËʶ±ðÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÒµÎñÏêϸÐÅÏ¢£¨Õë¶Ô¹«Ë¾¿Í»§£©ºÍÓû§Ãû¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾ÝÕë¶ÔSOS¼°Æä¿Í»§ÌᳫÖÖÖÖÆÛÕ©¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/secure-backup-company-leaks-135/


5¡¢Zoom macOS¿Í»§¶ËÁ½¸ö0day¿Éµ¼ÖÂÌáÉýȨÏÞ


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Ñо¿ÈËÔ±ÔÚZoomµÄmacOS¿Í»§¶ËÖз¢ÏÖÁ½¸ö0day£¬Â©¶´¿ÉÄÜÔÊÐíµ±µØ¡¢ÎÞÌØȨ¹¥»÷Õß»ñµÃrootÌØȨ£¬²¢ÔÊÐíËûÃÇ·ÃÎÊÊܺ¦ÕßµÄÂó¿Ë·çºÍÉãÏñÍ·¡£JamfÊ×ϯÄþ¾²Ñо¿Ô±Patrick Wardle·¢ÏÖÁËÕâÁ½¸ö©¶´£¬µÚÒ»¸ö©¶´Ô´ÓÚZoom°²×°·¨Ê½Ê¹ÓÃAuthorizationExecuteWithPrivileges APIÔÚÎÞÓû§½»»¥µÄÇé¿öϽøÐа²×°£¬µ«¸ÃAPIÓÉÓÚûÓÐÑéÖ¤ÔÚ¸ùĿ¼ÏÂÖ´ÐеĶþ½øÖÆÎļþ£¬Êµ¼ÊÉÏÒѾ­±»AppleÆúÓᣵ±µØÎÞÌØȨµÄ¹¥»÷Õß»ò¶ñÒâÈí¼þ¿ÉÄÜÀûÓø鶴ÌáȨÖÁroot¡£µÚ¶þ¸ö©¶´ÓëZoomÔÊÐíµÚÈý·½¿â×¢Èë´úÂëÓйØ£¬¹¥»÷Õ߿ɽ«¶ñÒâµÄµÚÈý·½¿â¼ÓÔص½ZoomµÄ½ø³Ì/µØÖ·¿Õ¼äÖУ¬´Ó¶ø×Ô¶¯¼Ì³ÐËùÓÐZooms·ÃÎÊȨÏÞ²¢×îÖÕ»ñµÃÉãÏñÍ·ºÍÂó¿Ë·çµÄ¿ØÖÆȨÏÞ¡£½ØÖÁÖÜËÄZoomÌåÏÖÒѾ­ÐÞ¸´ÁËÕâÁ½¸ö©¶´¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/two-zoom-zero-day-flaws-uncovered/154337/