ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ17ÖÜ

°ä²¼¹¦·ò 2019-04-29

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê4ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼°²È«·ì϶51¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇPulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç¶Âí½Å£»ISC BIND nxdomain-redirect»Ø¾ø·þÎñ·ì϶; Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖúÅÁî×¢Èë·ì϶£»Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç¶Âí½Å£»Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSºÅÁî×¢Èë·ì϶  ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǸßͨæçÁúоƬ¸ßΣ·ì϶£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶;Google PlayϼÜ50¸ö¶ñÒâÀûÓã¬×°ÖÃÁ¿´ï3000Íò´Î;Õë¶Ô»ªË¶µÄ¹©¸øÁ´¹¥»÷ShadowHammer»¹¶Ô×¼Áí±íÁù¼ÒÑÇÖÞ¹«Ë¾;Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë;Google PlayÖиæ°×Èí¼þPreAMo£¬ÏÂÔØÁ¿´ï9000Íò´Î  ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ  ¡£

³ÁÒª°²È«·ì϶Áбí


1. Pulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç¶Âí½Å

Pulse Secure Pulse Connect Secure´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë  ¡£

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101

2. ISC BIND nxdomain-redirect»Ø¾ø·þÎñ·ì϶
ISC BIND nxdomain-redirectÖ°ÄÜ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÊ¹ÊØ»¤·¨Ê½±ÀÀ££¬½øÐлؾø·þÎñ¹¥»÷  ¡£
https://kb.isc.org/docs/cve-2019-6468

3. Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖúÅÁî×¢Èë·ì϶
Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖôæÔÚÊäÈë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâOSºÅÁî  ¡£
https://www.securifera.com/advisories/cve-2018-20052-20053/

4. Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç¶Âí½Å
Tenda AC7¡¢AC9ºÍAC10 web server (httpd)´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐí Ô¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлº³åÇøÒç³ö¹¥»÷£¬¿ÉÖ´ÐÐËÁÒâ´úÂë»ò½øÐлؾø·þÎñ¹¥»÷  ¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md

5. Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSºÅÁî×¢Èë·ì϶
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi´æÔÚÊäÈëÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâOSºÅÁî  ¡£
https://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html

³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¸ßͨæçÁúоƬ¸ßΣ·ì϶£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¸ßͨоƬ×é´æÔÚÒ»¸ö²àÐÅ·¹¥»÷·ì϶£¬¸Ã·ì϶£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEE°²È«ÇøÓòÖмìË÷¼ÓÃÜ˽Կ  ¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´Ðл·¾³£¨TEE£©£¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX  ¡£Æ¾¾ÝNCC×êÑÐÈËÔ±Keegan RyanµÄ±íÊö£¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©´æÔÚ·ì϶£¬¿Éͨ¹ýËæ»úÊýµÄһЩbit´§Ä¦³ö256λECDSAÃÜÔ¿  ¡£¸Ã·ì϶µÄÀûÓñØÒªÉ豸µÄrootȨÏÞ  ¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ï죬Ô̺¬¶à¿îæçÁúоƬ  ¡£¸Ã·ì϶µÄ½¨¸´²¹¶¡ÒѾ­Ô̺¬ÔÚGoogle°ä²¼µÄ4ÔÂAndroid°²È«¸üÐÂÖÐ  ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/

2¡¢Google PlayϼÜ50¸ö¶ñÒâÀûÓã¬×°ÖÃÁ¿´ï3000Íò´Î

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Avast×êÑÐÍŶÓÔÚGoogle PlayÖз¢ÏÖ50¸ö¶ñÒâÀûÓã¬ÕâЩÀûÓõÄ×ÜÏÂÔØ´ÎÊý´ï3000Íò´Î  ¡£Æ¾¾ÝAvastµÄ»ã±¨£¬ÕâЩÀûÓÃͨ¹ýµÚÈý·½¿â»¥ÓйØÁª£¬¿ÉÈÆ¹ýAndroidµÄºó¶Ü·þÎñÏ޶Ȳ»ÐÝÏòÓû§ÏÔʾԽÀ´Ô½¶àµÄ¸æ°×£¬ÔÚijЩÇé¿öÏÂÉõÖÁÓÕʹÓû§×°ÖÃÆäËü¸æ°×Èí¼þ  ¡£ÕâЩ¶ñÒâÀûÓõÄÃû³ÆÔ̺¬Pro Piczoo¡¢Photo Blur Studio¡¢Mov-tracker¡¢Magic Cut OutºÍPro Photo EraserµÈ£¬ÏÂÔØÁ¿´Ó100Íòµ½1000´Î²»µÈ  ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/30-million-android-users-have-installed-malicious-lifestyle-apps/

3¡¢Õë¶Ô»ªË¶µÄ¹©¸øÁ´¹¥»÷ShadowHammer»¹¶Ô×¼Áí±íÁù¼ÒÑÇÖÞ¹«Ë¾

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù·¢´Ë¿Ì֮ǰÕë¶Ô»ªË¶µÄ¹©¸øÁ´¹¥»÷ShadowHammerÖУ¬ÖÁÉÙ»¹ÓÐÁù¼ÒÑÇÖÞ¹«Ë¾³ÉΪָ±ê£¬Ô̺¬Èý¼ÒÓÎÏ·¹«Ë¾£¨Electronics Extreme¡¢Innovative ExtremistºÍZepetto£©ÒÔ¼°Î´Ìá¼°Ãû³ÆµÄÒ»¼ÒÊÓÆµÓÎÏ·¹«Ë¾¡¢Ò»¼Ò×ۺϿعɹ«Ë¾ºÍÒ»¼ÒÔìÒ©¹«Ë¾  ¡£Ôڳɹ¦ÈëÇÖÊܺ¦Õßϵͳºó£¬¹¥»÷Õß¿ªÊ͵ĶñÒâÈí¼þ½«¿ÉÄÜÍøÂçϵͳÐÅÏ¢²¢´ÓC&CÏÂÔØÆäËüpayload  ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shadowhammer-targets-multiple-companies-asus-just-one-of-them/

4¡¢Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝTechCrunchµÄ»ã±¨£¬Ò»¸öÃûΪWiFi FinderµÄAndroid APPй¶Á˳¬¹ý200Íò¸öWi-FiÍøÂçµÄÃÜÂ룬ÆäÖÐÊýÍò¸öWi-FiÈȵãλÓÚÃÀ¹ú  ¡£¸ÃAPPÓÃÓÚÔ®ÊÖÓû§²éÕÒWi-FiÈȵ㣬ÆäÏÂÔØÁ¿´ïÊýǧ´Î  ¡£×êÑÐÈËÔ±·¢ÏÖ¸ÃAPPµÄÊý¾Ý¿â¶³öÔÚÍøÉÏÇÒδÊܱ£»¤£¬Êý¾Ý¿âÖеļͼÔ̺¬Wi-FiÍøÂçµÄÃû³Æ¡¢¾«È·µÄµØÀíµØÎ»¡¢BSSIDºÍÃ÷ÎÄÃÜÂ룬µ«²»Ô̺¬Wi-FiËùÓÐÕßµÄÁªÏµÐÅÏ¢  ¡£ÔÆ·þÎñ¹«Ë¾DigitalOceanÔÚ½Óµ½»ã±¨ºóɾ³ýÁ˸ÃÊý¾Ý¿â  ¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/leaky_app_data/144029/

5¡¢Google PlayÖиæ°×Èí¼þPreAMo£¬ÏÂÔØÁ¿´ï9000Íò´Î


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Checkpoint×êÑÐÈËÔ±ÔÚGoogle PlayÖз¢ÏÖ¸æ°×Èí¼þPreAMo£¬¸Ã¸æ°×Èí¼þ¼Ù×°³É6¸öAPP£¬×ÜÏÂÔØÁ¿³¬¹ý9000Íò´Î  ¡£PreAMoÖØÒªÕë¶ÔÈý¸ö¸æ°×´úÀíÉÌ - Presage¡¢AdmobºÍMopub½øÐÐڲƭ£¬¹¥»÷ÕßÕë¶Ôÿ¸ö¸æ°×´úÀíÉÌʹÓÃ·ÖÆçµÄ´¦Öò½Ö裬µ«Ê¹ÓÃÁËÒ»ÑùµÄC£¦C·þÎñÆ÷£¨res.mnexuscdn[.]com£©£¬ÓÃÓÚ·¢ËÍͳ¼ÆÐÅÏ¢ºÍ½Ó¹ÜÅäÏàÐÅÏ¢  ¡£Google PlayÔÚ½Óµ½»ã±¨ºóÒѾ­Ï¼ÜÁËÕâЩÊÜϰȾµÄAPP  ¡£

Ô­ÎÄÁ´½Ó£º
https://research.checkpoint.com/preamo-a-clicker-campaign-found-on-google-play/