Win10 DefenderÖдæÔÚbug£¬¿ÉÔÚCÅÌ´´½¨´óÁ¿Îļþ£»¸ßͨоƬ´æÔÚ´úÂëÖ´ÐЩ¶´£¬Ó°Ïì30£¥µÄAndroidϵͳ

Ðû²¼Ê±¼ä 2021-05-07

1.Win10 DefenderÖдæÔÚbug£¬¿ÉÔÚCÅÌ´´½¨´óÁ¿Îļþ


1.jpg


Windows Defender´æÔÚbug£¬¿ÉÔÚC£º\ProgramData\Microsoft\Windows Defender\Scans\History\StoreÎļþ¼ÐÄÚ´´½¨´óÁ¿MD5¹þÏ£Îļþ ¡£ÕâЩÎļþµÄ¾ÞϸΪ600×Ö½Úµ½1KB£¬ÓеÄϵͳÖÐÖ»ÓÐԼĪ1MBµÄÎļþ£¬¶øÓеÄÓû§Ôò³ÆÆäϵͳ´æÔÚ´óÁ¿µÄÎļþ£¬Õ¼ÓÃÁË30GBµÄ´æ´¢¿Õ¼ä ¡£Ä¿Ç°£¬¸ÃÎÊÌâÒÑÔÚWindows Defender 1.1.18100.6°æ±¾ÖÐÐÞ¸´ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/windows-defender-bug-fills-windows-10-boot-drive-with-thousands-of-files/


2.¸ßͨоƬ´æÔÚ´úÂëÖ´ÐЩ¶´£¬Ó°Ïì30£¥µÄAndroidϵͳ


2.jpg


Check Point·¢ÏÖ¸ßͨ£¨Qualcomm£©µ÷ÖÆ½âµ÷Æ÷£¨MSM£©½Ó¿Ú£¨¼ò³ÆÎªQMI£©ÖдæÔÚ´úÂëÖ´ÐЩ¶´ ¡£¾Ýͳ¼Æ£¬È«ÇòÔ¼30£¥µÄÊÖ»ú¶¼ÔÚʹÓÃQMI£¬°üÂÞGoogle Pixels¡¢LG¡¢OnePlus¡¢ÈýÐÇGalaxyϵÁкÍСÃ×ÊÖ»ú ¡£¸Ã©¶´×·×ÙΪCVE-2020-11292£¬ÊÇqmi_voicei_srvcc_call_config_req´¦Ö÷¨Ê½£¨0x64£©ÖеĶÑÒç³ö©¶´£¬¹¥»÷Õß¿ÉÒÔÀûÓôË©¶´Ô¶³ÌÖ´ÐдúÂ룬À´·ÃÎÊÓû§µÄͨ»°¼Ç¼ºÍ¶ÌÐÅ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/


3.½¡ÉíÓ¦ÓÃPelotonµÄAPI´æÔÚ©¶´£¬¿Éй¶300ÍòÓû§Òþ˽


3.jpg


½¡ÉíÓ¦ÓÃPelotonµÄAPI´æÔÚ©¶´£¬¿Éй¶300ÍòÓû§Òþ˽ ¡£ÈκÎÈ˶¼¿ÉÒÔÀûÓôË©¶´´ÓPeloton·þÎñÆ÷ÉÏץȡÓû§µÄÕÊ»§Êý¾Ý£¬°üÂÞÓû§±àºÅ¡¢½²Ê¦ID¡¢ÍÅÌå»áÔ±¡¢ËùÔÚ¡¢¶ÍÁ¶Í³¼Æ¡¢ÐÔ±ðÓëÄêÁäµÈÐÅÏ¢ ¡£Ñо¿ÈËÔ±ÓÚ1ÔÂ20ÈÕ³ÂËßÁ˸ÃÎÊÌ⣬©¶´ÏÖÒѱ»ÐÞ¸´ ¡£´ËÍ⣬¸Ã¹«Ë¾»¹ÔÚÖÜÈýÕÙ»ØÁËÆìÏÂËùÓеÄÅܲ½»ú£¬ÒòΪÕâЩÅܲ½»ú¿ÉÄÜÓë70ÈËÊÜÉ˺Í1Ãû¶ùͯµÄËÀÍöÓйØ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pelotons-spilled-riders-data/165880/


4.ÀÕË÷ÍÅ»ïAvaddon³ÆÒÑ´ÓTelstraÇÔÈ¡´óÁ¿SIM¿¨µÄÊý¾Ý


4.jpg


ÀÕË÷ÍÅ»ïAvaddon³ÆÒÑ´Ó°Ä´óÀûÑǵçÐŹ«Ë¾TelstraÇÔÈ¡´óÁ¿SIM¿¨µÄÊý¾Ý ¡£TelstraµÄºÏ×÷»ï°é£¬Î»ÓÚÄ«¶û±¾µÄ·þÎñÌṩÉÌCommunicationÔâµ½ÁËDDoS¹¥»÷µÈһϵÁÐÍøÂç¹¥»÷£¬µ¼ÖÂÍøÕ¾ÀëÏßÒÔ¼°´óÁ¿Êý¾Ýй¶£¬°üÂÞSIM¿¨¡¢²ÆÕþÐÅÏ¢¡¢ºÏͬºÍÒøÐÐÐÅÏ¢µÈ ¡£¾¡¹ÜTelstraÉù³ÆÓû§µÄÃô¸ÐÐÅÏ¢²¢Î´Ð¹Â¶£¬µ«Í¨¹ýºÚ¿ÍÐû²¼µÄ½ØÍ¼ÏÔʾ£¬¿Í»§µÄµç»°ºÅÂëºÍµØÖ·µÈÐÅÏ¢ÒѾ­Ð¹Â¶ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/avaddon-hackers-sim-card-data-from-telstra/


5.ŦԼ¹Ç¿ÆÐ­»áOADCÔâµ½¹¥»÷£¬33Íò¸ö»¼ÕßÐÅϢй¶


5.jpg


3ÔÂ5ÈÕ£¬Î»ÓÚŦԼÖݵİ¢ÄÉÎ÷Ë¹ÏØ¹Ç¿ÆÐ­»á£¨OADC£©·¢ÏÖÆäÔâµ½¹¥»÷£¬33Íò¸ö»¼ÕßÐÅϢй¶ ¡£¾­ÊÓ²ìÈ·¶¨£¬ºÚ¿Í¿ÉÄÜÔÚ2021Äê3ÔÂ1ÈÕ×óÓÒ·ÃÎÊÁËOADCϵͳµÄ¼ÓÃÜÎļþ£¬²¢Éù³ÆÒÑɾ³ýºÍ¼ì²ìÁ˲¿ÃÅÎļþ ¡£´Ë´Îй¶µÄÊý¾Ý°üÂÞ»¼ÕßµÄÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢½ô¼±ÁªÏµÈË¡¢µ£±£ÈË¡¢»¼Õßʶ±ðºÅ¡¢²¡ÀúºÅ¡¢Õï¶ÏÐÅÏ¢¡¢½¡¿µ±£ÏÕºÅÂë¡¢¸¶¿îÃ÷ϸ¡¢³öÉúÈÕÆÚ¡¢Éç»á±£ÏպźÍÖÎÁÆÐÅÏ¢ ¡£¸Ã×éÖ¯ÒÑ֪ͨÊÜÓ°ÏìµÄ331376Ãû»¼Õߣ¬²¢ÎªÆäÌṩÁË12¸öÔµÄÉí·ÝºÍÐÅÓÃ¼à¿Ø ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/orthopedic-associates-of-dutchess-county-notifies-more-than-330000-patients-of-breach/


6.ESETÐû²¼ÓйØÕë¶Ô°ÍÎ÷µÄÒøÐÐľÂíOusabanµÄ·ÖÎö³ÂËß


6.jpg


ESETÐû²¼ÁËÓйØÕë¶Ô°ÍÎ÷µÄÒøÐÐľÂíOusabanµÄ·ÖÎö³ÂËß ¡£OusabanÊǽöÔÚ°ÍÎ÷»îÔ¾µÄÀ­¶¡ÃÀÖÞÒøÐÐľÂí£¬ESET×Ô2018ÄêÒÔÀ´Ò»Ö±ÔÚ×·×ٸöñÒâÈí¼þ¼Ò×å ¡£Ousaban£¨Ò²³ÆÎªJavali£©ÊÇÓÃDelphi±àдµÄ£¬Ê¹ÓÃThemida»òEnigma¶þ½øÖÆ»ìÏýÆ÷À´±£»¤Æä¿ÉÖ´ÐÐÎļþ ¡£´ËÍ⣬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃÁ˶þ½øÖÆÌî³ä½«´ó¶àÊýEXEÀ©Õ¹µ½Ô¼Äª400 MB£¬ÕâÑù×ö¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²âºÍ×Ô¶¯É¾³ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2021/05/05/ousaban-private-photo-collection-hidden-cabinet/