GRUB2Öзì϶BootHoleÓ°ÏìÊýÊ®ÒÚÉ豸 £»×êÑÐÈËÔ±Åû¶TorÖÐÁ½¸ö0day²¢´òËã°ä²¼Áí±íÈý¸ö

°ä²¼¹¦·ò 2020-07-31

1.GRUB2Öзì϶BootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinuxÉ豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Eclypsium×êÑÐÈËÔ±ÔÚÎÞÊýLinuxϵͳʹÓõÄGRUB2Êèµ¼·¨Ê½Öз¢ÏÖÁËÒ»¸ö·ì϶£¬²¢½«Æä¶¨ÃûΪ¡°BootHole¡±£¨CVE-2020-10713£©£¬¼´±ãÆôÓÃÁËSecure Boot£¬¹¥»÷ÕßÒ²¿ÉÔÚÆô¶¯¹ý³ÌÖÐÖ´ÐÐËÁÒâ´úÂ룬»¹Äܹ»ÀûÓø÷ì϶װÖÃÓÆ¾ÃÇÒÒñ±ÎµÄbootkit»ò¶ñÒâÊèµ¼·¨Ê½À´½ÚÔìÉ豸 ¡£´Ë±íGRUB2»¹Ö§³ÔìäËü²Ù×÷ϵͳ¡¢Äں˺ÍÖÎÀí·¨Ê½£¬ÀýÈ磬Xen ¡£¸Ã·ì϶»¹Éæ¼°µ½ËùÓÐʹÓó߶ÈMicrosoft Third Party UEFI Certificate AuthorityµÄSecure BootµÄWindowsÉ豸£¬ÀýÈ繤ҵ¡¢Ò½ÁÆ¡¢½ðÈÚµÈÐÐÒµÖÐʹÓõÄÉ豸¾ùÊÜÓ°Ïì ¡£Ä¿Ç°£¬¸Ã·ì϶ӰÏìÁËÊýÊ®ÒÚʹÓÃSecure BootµÄWindowsºÍLinuxÉ豸 ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/


2.×êÑÐÈËÔ±Åû¶TorÖеÄÁ½¸ö0day²¢´òËã°ä²¼Áí±íÈý¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±Neal KrawetzÔÚ´ÓǰһÖÜÄÚÅú¶ÁËÁ½¸öTorÖеÄ0day£¬²¢³ÐŵÖÁÉÙÔÙ°ä²¼Èý¸öTor 0day£¬ÆäÖÐÒ»¸öÄܹ»½ÒʾTor·þÎñÆ÷ÕæÊµIPµØÖ· ¡£Õâ´ÎÅû¶µÄ·ì϶ÖУ¬µÚÒ»¸ö¿É±»ÀûÓÃͨ¹ýɨÃèÍøÂçÏνÓ£¬Ñ°ÕÒTor¶ÀÓеÄÊý¾Ý°üÊðÃûÀ´×èÖ¹Óû§Ïνӵ½TorÍøÂ磬¸ÃÊý¾Ý°ü¿ÉÓÃÀ´×èÖ¹TorÏÎ½ÓµÄÆô¶¯²¢ÓÐЧµØÆëÈ«½ûÓÃTor ¡£ÏñµÚÒ»¸ö0dayÒ»Ñù£¬µÚ¶þ¸öÒ²ÔÊÐíÍøÂçÔËÓªÉ̼ì²âTorÁ÷Á¿£¬µ«Ëü¿ÉÓÃÓÚ¼ì²â¼ä½ÓÏνÓ ¡£Krawetz²©Ê¿°µÊ¾£¬Ê¹Óøú×ÙÌØ¶¨TCPÊý¾Ý°üµÄ¼¼Êõ£¬Ò²Äܹ»ÇáËɼì²âµ½TorÇŵÄÏνÓ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/106567/hacking/tor-zero-day-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=tor-zero-day-flaws


3.˼¿Æ°ä²¼°²È«¸üУ¬½¨¸´¶à¿î²úÆ·ÖеÄ11¸ö°²È«·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿Æ°ä²¼°²È«¸üУ¬×ܼƽ¨¸´¶à¿î²úÆ·ÖеÄ11¸ö°²È«·ì϶ ¡£ÆäÖÐÓÐÈý¸ö½ÏΪÑϳÁµÄ·ì϶£¬µÚÒ»¸öΪDCNM REST APIÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2020-3382£©£¬CVSSÆÀ·ÖΪ9.8£¬ÓµÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐËÁÒâ²Ù×÷ £»µÚ¶þ¸öΪSD-WAN vManageÈí¼þÖеÄÊÚÈ¨ÈÆ¹ý·ì϶£¨CVE-2020-3374£©£¬CVSSÆÀ·ÖΪ9.9£¬ÆäÔÊÐí¾­¹ýÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÊÚȨ£¬½Ó¼ûÃô¸ÐÐÅÏ¢²¢Åú¸ÄϵͳÅäÖà £»µÚÈý¸öΪSD-WAN½â¾ö¹æ»®Èí¼þÖеĻº³åÇøÒç¶Âí½Å(CVE-2020-3375),ÓÉÓÚÊäÈëÑéÖ¤²»¼°µ¼Ö£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß½Ó¼ûÐÅÏ¢£¬²¢¶ÔËûÃÇûÓÐȨÏÞµÄϵͳ½øÐиü¸Ä ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-data-center-management-solution/


4.Ô¼»áÈí¼þOkCupid´æÔÚ¶à¸ö·ì϶£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point ResearchÅû¶ÁËOkCupidÖеÄһϵÁзì϶£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶ ¡£ÍøÂ簲ȫ×êÑÐÈËÔ±¶Ô¸ÃAndroidÀûÓýøÐÐÁËÄæÏò¹¤³Ì£¬²¢·¢ÏÖÁËÆäÉî²ãÁ´½ÓÖ°ÄÜ£¬ÕâÒâζ׏¥»÷Õ߿ɷ¢ËÍ×Ô½ç˵µÄ¶ñÒâÁ´½ÓÀ´´ò¿ª¸ÃÀûÓ÷¨Ê½ ¡£ÓÉÓÚÀûÓõÄÓû§ÉèÖÃÖ°ÄÜÖеıàÂëÎÊÌ⣬×êÑÐÈËÔ±»¹·¢ÏÖÁË·´Éä¿çÕ¾µã¾ç±¾£¨XSS£©¹¥»÷ý½é ¡£½«¶þÕß½áºÏÆðÀ´£¬¹¥»÷ÕßÄܹ»´Ó×Ô¼ºµÄ·þÎñÆ÷·¢ËÍHTTP GETÒªÇóºÍXSSÓÐЧ¸ºÔØ£¬¶øºóÄܹ»Í¨¹ýWebViewÖ´ÐÐJavaScript ¡£Õâ¿ÉÄܵ¼Ö¸ÃÀûÓÃÉϵÄÃô¸ÐÅäÖÃÎļþÊý¾Ý¶³ö£¬Óû§ÕÊ»§½Ù³ÖÒÔ¼°Óû§Éí·ÝÑéÖ¤ÁîÅÆ¡¢IDÒÔ¼°µç×ÓÓʼþµØÖ·Ð¹Â¶ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/okcupid-hackers-want-your-data-not-a-relationship/#ftag=RSSbaffb68


5.FBIÖÒ¸æNetwalkerÕë¶Ô¹ú¶ÈµÄ¹¥»÷»î¶¯²¢°ä²¼·çÏÕÖ¸±ê


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


FBIÖÒ¸æÓйØNetwalkerÕë¶ÔÃÀ¹úºÍ±í¹úµ±¾Ö×éÖ¯µÄ¹¥»÷»î¶¯²¢°ä²¼·çÏÕÖ¸±ê ¡£FBI°µÊ¾£¬¸ÃÀÕË÷Èí¼þÍÅ»ï´Ó2020Äê6ÔÂÆðÍ·Õë¶ÔÃÀ¹úºÍ±í¹úµ±¾Ö×éÖ¯£¬´ËǰNetwalker¼ÓÃÜÁ˼ÓÖÝ´óѧ¾É½ðɽ·ÖУҽѧԺµÄϵͳ£¬Ö®ºó£¬ÓÖÁ½´Î¹¥»÷Á˰ĴóÀûÑÇÔËÊäºÍÎïÁ÷¹«Ë¾Toll Group£¬ÔÚ±¾Ô¹¥»÷ÁËLorienÒ½Ôº ¡£FBI»¹·¢ÏÖ£¬NetwalkerÍÅ»ïÔÚ3Ô·Ýͨ¹ýÀûÓÃVisual Basic¾ç±¾£¨VBS£©ÌáÒéÍøÂç´¹µö¹¥»÷£¬4Ô·ÝÓÔìðÍ·ÀûÓÃÒ×Êܹ¥»÷µÄÐ鹹רÓÃÍø£¨VPN£©É豸ÌáÒé¹¥»÷ ¡£FBI¶½´ÙÊܺ¦Õß¾Ù±¨ÀÕË÷Èí¼þÊÂÎñ£¬ÒÔÔ®ÊÖ×·×Ù¹¥»÷Õß²¢·À±¸½«À´µÄ¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/


6.¿¨°Í˹»ù·¢ÏÖºÚ¿Í×éÖ¯DeceptikonsÖØÒªÕë¶ÔÅ·ÖÞÂÉËù


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫ¹«Ë¾¿¨°Í˹»ù·¢ÏÖÁËÒ»¸öеĺڿÍ×éÖ¯Deceptikons£¬ÆäÖØÒªÕë¶ÔÅ·ÖÞÂÉʦÊÂÎñËùºÍ½ðÈڿƼ¼¹«Ë¾ ¡£¸Ã×é֯רһÓÚÇÔȡóÒ׺ͽðÈÚ»úÃÜ£¬¶ø²»ÊÇÓëµ±¾ÖÓйصÄÐÅÏ¢£¬ÆäÖØÒªÖ¸±ê¶¼Î»ÓÚÅ·ÖÞ£¬Å¼È»Ò²ÓÐһЩÖж«¹ú¶È£¬ÀýÈçÒÔÉ«ÁУ¬Ô¼µ©ºÍ°£¼° ¡£¸Ã×éÖ¯ÔÚ×î½üµÄ¹¥»÷ÖжԶà¸öÅ·ÖÞÂÉʦÊÂÎñËùÌáÒéÁËÓã²æÊ½ÍøÂç´¹µö¹¥»÷£¬²¢Í¨¹ý¶ñÒâPowerShell½ÅÕý±¾Ï°È¾Ö÷»ú ¡£¿¨°Í˹»ù°µÊ¾£¬DeceptikonsÔÚ¼¼ÊõÉϲ¢²»³ÉÊ죬Ŀǰ»¹Ã»ÓÐÀûÓùýÁãÈÕ·ì϶£¬´óÎÞÊý¹¥»÷¶¼×ñÑ­ÀàËÆµÄģʽ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kaspersky-new-hacker-for-hire-mercenary-group-is-targeting-european-law-firms/#ftag=RSSbaffb68