Win10 DefenderÖдæÔÚbug£¬¿ÉÔÚCÅÌ´´½¨´óÁ¿Îļþ £»¸ßͨоƬ´æÔÚ´úÂëÖ´Ðзì϶£¬Ó°Ïì30£¥µÄAndroidϵͳ

°ä²¼¹¦·ò 2021-05-07

1.Win10 DefenderÖдæÔÚbug£¬¿ÉÔÚCÅÌ´´½¨´óÁ¿Îļþ


1.jpg


Windows Defender´æÔÚbug£¬¿ÉÔÚC£º\ProgramData\Microsoft\Windows Defender\Scans\History\StoreÎļþ¼ÐÄÚ´´½¨´óÁ¿MD5¹þÏ£Îļþ¡£ÕâЩÎļþµÄ´óÓ×Ϊ600×Ö½Úµ½1KB£¬ÓеÄϵͳÖÐÖ»ÓÐԼĪ1MBµÄÎļþ£¬¶øÓеÄÓû§Ôò³ÆÆäϵͳ´æÔÚ´óÁ¿µÄÎļþ£¬Õ¼ÓÃÁË30GBµÄ´æ´¢¿Õ¼ä¡£Ä¿Ç°£¬¸ÃÎÊÌâÒÑÔÚWindows Defender 1.1.18100.6°æ±¾Öн¨¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/windows-defender-bug-fills-windows-10-boot-drive-with-thousands-of-files/


2.¸ßͨоƬ´æÔÚ´úÂëÖ´Ðзì϶£¬Ó°Ïì30£¥µÄAndroidϵͳ


2.jpg


Check Point·¢ÏÖ¸ßͨ£¨Qualcomm£©µ÷Ôì½âµ÷Æ÷£¨MSM£©½Ó¿Ú£¨¼ò³ÆÎªQMI£©ÖдæÔÚ´úÂëÖ´Ðзì϶¡£¾Ýͳ¼Æ£¬È«ÇòÔ¼30£¥µÄÊÖ»ú¶¼ÔÚʹÓÃQMI£¬Ô̺¬Google Pixels¡¢LG¡¢OnePlus¡¢ÈýÐÇGalaxyϵÁкÍÓ×Ã×ÊÖ»ú¡£¸Ã·ì϶׷×ÙΪCVE-2020-11292£¬ÊÇqmi_voicei_srvcc_call_config_req´¦Ö÷¨Ê½£¨0x64£©ÖеĶÑÒç¶Âí½Å£¬¹¥»÷ÕßÄܹ»ÀûÓô˷ì϶Զ³ÌÖ´ÐдúÂ룬À´½Ó¼ûÓû§µÄͨ»°¼Í¼ºÍ¶ÌÐÅ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/


3.½¡ÉíÀûÓÃPelotonµÄAPI´æÔÚ·ì϶£¬¿Éй¶300ÍòÓû§ÒþÖÔ


3.jpg


½¡ÉíÀûÓÃPelotonµÄAPI´æÔÚ·ì϶£¬¿Éй¶300ÍòÓû§ÒþÖÔ¡£ÈκÎÈ˶¼Äܹ»ÀûÓô˷ì϶´ÓPeloton·þÎñÆ÷ÉÏץȡÓû§µÄÕÊ»§Êý¾Ý£¬Ô̺¬Óû§±àºÅ¡¢½²Ê¦ID¡¢¼¯ÌåζԱ¡¢µØÖ·¡¢Ä¥Á¶Í³¼Æ¡¢ÐÔ±ðÓë´ºÇïµÈÐÅÏ¢¡£×êÑÐÈËÔ±ÓÚ1ÔÂ20Èջ㱨Á˸ÃÎÊÌ⣬·ì϶ÏÖÒѱ»½¨¸´¡£´Ë±í£¬¸Ã¹«Ë¾»¹ÔÚÖÜÈýÕÙ»ØÁËÆìÏÂËùÓеÄÅܲ½»ú£¬ÓÉÓÚÕâЩÅܲ½»ú¿ÉÄÜÓë70ÈËÊÜÉ˺Í1Ãû¶ùͯµÄéæÃüÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pelotons-spilled-riders-data/165880/


4.ÀÕË÷ÍÅ»ïAvaddon³ÆÒÑ´ÓTelstraÇÔÈ¡´óÁ¿SIM¿¨µÄÊý¾Ý


4.jpg


ÀÕË÷ÍÅ»ïAvaddon³ÆÒÑ´Ó°Ä´óÀûÑǵçÐŹ«Ë¾TelstraÇÔÈ¡´óÁ¿SIM¿¨µÄÊý¾Ý¡£TelstraµÄºÏ×÷ͬ°é£¬Î»ÓÚÄ«¶û±¾µÄ·þÎñÌṩÉÌCommunicationÔâµ½ÁËDDoS¹¥»÷µÈһϵÁÐÍøÂç¹¥»÷£¬µ¼ÖÂÍøÕ¾ÀëÏßÒÔ¼°´óÁ¿Êý¾Ýй¶£¬Ô̺¬SIM¿¨¡¢²ÆÕþÐÅÏ¢¡¢ºÏͬºÍÒøÐÐÐÅÏ¢µÈ¡£Ö»¹ÜTelstraÐû³ÆÓû§µÄÃô¸ÐÐÅÏ¢²¢Î´Ð¹Â¶£¬µ«Í¨¹ýºÚ¿Í°ä²¼µÄ½ØÍ¼ÏÔʾ£¬¿Í»§µÄµç»°ºÅÂëºÍµØÖ·µÈÐÅÏ¢ÒѾ­Ð¹Â¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/avaddon-hackers-sim-card-data-from-telstra/


5.ŦԼ¹Ç¿ÆÐ­»áOADCÔâµ½¹¥»÷£¬33Íò¸ö»¼ÕßÐÅϢй¶


5.jpg


3ÔÂ5ÈÕ£¬Î»ÓÚŦԼÖݵİ¢ÄÉÎ÷Ë¹ÏØ¹Ç¿ÆÐ­»á£¨OADC£©·¢ÏÔìäÔâµ½¹¥»÷£¬33Íò¸ö»¼ÕßÐÅϢй¶¡£¾­µ÷²éÈ·¶¨£¬ºÚ¿Í¿ÉÄÜÔÚ2021Äê3ÔÂ1ÈÕ×óÓÒ½Ó¼ûÁËOADCϵͳµÄ¼ÓÃÜÎļþ£¬²¢Ðû³ÆÒÑɾ³ýºÍ²é¿´Á˲¿ÃÅÎļþ¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬»¼ÕßµÄÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢´¹Î£ÁªÏµÈË¡¢µ£±£ÈË¡¢»¼Õß¼ø±ðºÅ¡¢²¡ÀúºÅ¡¢Õï¶ÏÐÅÏ¢¡¢½¡È«±£ÏÕºÅÂë¡¢¸¶¿îÃ÷ϸ¡¢µ®ÉúÈÕÆÚ¡¢Éç»á±£ÏպźÍÒ½ÖÎÐÅÏ¢¡£¸Ã×éÖ¯ÒÑ֪ͨÊÜÓ°ÏìµÄ331376Ãû»¼Õߣ¬²¢ÎªÆäÌṩÁË12¸öÔµÄÉí·ÝºÍÐÅÓþ¼à¿Ø¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/orthopedic-associates-of-dutchess-county-notifies-more-than-330000-patients-of-breach/


6.ESET°ä²¼ÓйØÕë¶Ô°ÍÎ÷µÄÒøÐÐľÂíOusabanµÄ·ÖÎö»ã±¨


6.jpg


ESET°ä²¼ÁËÓйØÕë¶Ô°ÍÎ÷µÄÒøÐÐľÂíOusabanµÄ·ÖÎö»ã±¨¡£OusabanÊǽöÔÚ°ÍÎ÷»îÔ¾µÄÀ­¶¡ÃÀÖÞÒøÐÐľÂí£¬ESET×Ô2018ÄêÒÔÀ´Ò»ÏòÔÚ×·×ٸöñÒâÈí¼þ¼Ò×å¡£Ousaban£¨Ò²³ÆÎªJavali£©ÊÇÓÃDelphi±àдµÄ£¬Ê¹ÓÃThemida»òEnigma¶þ½øÔì»ìºÏÆ÷À´± £»¤Æä¿ÉÖ´ÐÐÎļþ¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃÁ˶þ½øÔìÌî³ä½«´óÎÞÊýEXEÀ©´óµ½Ô¼Äª400 MB£¬ÕâÑù×ö¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²âºÍ×Ô¶¯É¾³ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2021/05/05/ousaban-private-photo-collection-hidden-cabinet/