ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ17ÖÜ

Ðû²¼Ê±¼ä 2019-04-29

±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê4ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´51¸ö  £¬ÖµµÃ¹Ø×¢µÄÊÇPulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç³ö©¶´£»ISC BIND nxdomain-redirect¾Ü¾ø·þÎñ©¶´; Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖÃÃüÁî×¢È멶´£»Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³ö©¶´£»Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÃüÁî×¢È멶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǸßͨæçÁúоƬ¸ßΣ©¶´  £¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶;Google PlayϼÜ50¸ö¶ñÒâÓ¦Óà  £¬°²×°Á¿´ï3000Íò´Î;Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾;Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë;Google PlayÖйã¸æÈí¼þPreAMo  £¬ÏÂÔØÁ¿´ï9000Íò´Î¡£


ƾ¾ÝÒÔÉÏ×ÛÊö  £¬±¾ÖÜÄþ¾²ÍþвΪÖС£

ÖØÒªÄþ¾²Â©¶´Áбí


1. Pulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç³ö©¶´

Pulse Secure Pulse Connect Secure´æÔÚ»º³åÇøÒç³ö©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó  £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101

2. ISC BIND nxdomain-redirect¾Ü¾ø·þÎñ©¶´
ISC BIND nxdomain-redirect¹¦Ð§´æÔÚÄþ¾²Â©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó  £¬¿ÉʹÊØ»¤·¨Ê½Í᫃  £¬½øÐоܾø·þÎñ¹¥»÷¡£
https://kb.isc.org/docs/cve-2019-6468

3. Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖÃÃüÁî×¢È멶´
Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖôæÔÚÊäÈ멶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó  £¬¿ÉÖ´ÐÐÈÎÒâOSÃüÁî¡£
https://www.securifera.com/advisories/cve-2018-20052-20053/

4. Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³ö©¶´
Tenda AC7¡¢AC9ºÍAC10 web server (httpd)´æÔÚ»º³åÇøÒç³ö©¶´  £¬ÔÊÐí Ô¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó  £¬¿É½øÐлº³åÇøÒç³ö¹¥»÷  £¬¿ÉÖ´ÐÐÈÎÒâ´úÂë»ò½øÐоܾø·þÎñ¹¥»÷¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md

5. Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÃüÁî×¢È멶´
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi´æÔÚÊäÈëÑé֤©¶´  £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó  £¬¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâOSÃüÁî¡£
https://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html

ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢¸ßͨæçÁúоƬ¸ßΣ©¶´  £¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¸ßͨоƬ×é´æÔÚÒ»¸ö²àÐŵÀ¹¥»÷©¶´  £¬¸Ã©¶´£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÄþ¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´Ðл·¾³£¨TEE£©  £¬ÀàËÆÓÚÓ¢ÌضûµÄSGX¡£Æ¾¾ÝNCCÑо¿ÈËÔ±Keegan RyanµÄ±íÊö  £¬¸ßͨоƬµÄ¼ÓÃÜÇ©ÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©´æÔÚ©¶´  £¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍƲâ³ö256λECDSAÃÜÔ¿¡£¸Ã©¶´µÄÀûÓÃÐèÒªÉ豸µÄrootȨÏÞ¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ïì  £¬°üÂÞ¶à¿îæçÁúоƬ¡£¸Ã©¶´µÄÐÞ¸´²¹¶¡ÒѾ­°üÂÞÔÚGoogleÐû²¼µÄ4ÔÂAndroidÄþ¾²¸üÐÂÖС£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/

2¡¢Google PlayϼÜ50¸ö¶ñÒâÓ¦Óà  £¬°²×°Á¿´ï3000Íò´Î

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


AvastÑо¿ÍŶÓÔÚGoogle PlayÖз¢ÏÖ50¸ö¶ñÒâÓ¦Óà  £¬ÕâЩӦÓõÄ×ÜÏÂÔØ´ÎÊý´ï3000Íò´Î¡£Æ¾¾ÝAvastµÄ³ÂËß  £¬ÕâЩӦÓÃͨ¹ýµÚÈý·½¿âÏ໥¹ØÁª  £¬¿ÉÈƹýAndroidµÄºǫ́·þÎñÏÞÖƲ»Í£ÏòÓû§ÏÔʾԽÀ´Ô½¶àµÄ¹ã¸æ  £¬ÔÚijЩÇé¿öÏÂÉõÖÁÓÕʹÓû§°²×°ÆäËü¹ã¸æÈí¼þ¡£ÕâЩ¶ñÒâÓ¦ÓõÄÃû³Æ°üÂÞPro Piczoo¡¢Photo Blur Studio¡¢Mov-tracker¡¢Magic Cut OutºÍPro Photo EraserµÈ  £¬ÏÂÔØÁ¿´Ó100Íòµ½1000´Î²»µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/30-million-android-users-have-installed-malicious-lifestyle-apps/

3¡¢Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù·¢ÏÖÔÚ֮ǰÕë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammerÖÐ  £¬ÖÁÉÙ»¹ÓÐÁù¼ÒÑÇÖÞ¹«Ë¾³ÉΪĿ±ê  £¬°üÂÞÈý¼ÒÓÎÏ·¹«Ë¾£¨Electronics Extreme¡¢Innovative ExtremistºÍZepetto£©ÒÔ¼°Î´Ìá¼°Ãû³ÆµÄÒ»¼ÒÊÓƵÓÎÏ·¹«Ë¾¡¢Ò»¼Ò×ۺϿعɹ«Ë¾ºÍÒ»¼ÒÖÆÒ©¹«Ë¾¡£ÔÚÀÖ³ÉÈëÇÖÊܺ¦Õßϵͳºó  £¬¹¥»÷ÕßÊͷŵĶñÒâÈí¼þ½«Äܹ»ÊÕ¼¯ÏµÍ³ÐÅÏ¢²¢´ÓC&CÏÂÔØÆäËüpayload¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shadowhammer-targets-multiple-companies-asus-just-one-of-them/

4¡¢Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝTechCrunchµÄ³ÂËß  £¬Ò»¸öÃûΪWiFi FinderµÄAndroid APPй¶ÁËÁè¼Ý200Íò¸öWi-FiÍøÂçµÄÃÜÂë  £¬ÆäÖÐÊýÍò¸öWi-FiÈȵãλÓÚÃÀ¹ú¡£¸ÃAPPÓÃÓÚ×ÊÖúÓû§²éÕÒWi-FiÈȵã  £¬ÆäÏÂÔØÁ¿´ïÊýǧ´Î¡£Ñо¿ÈËÔ±·¢ÏÖ¸ÃAPPµÄÊý¾Ý¿â̻¶ÔÚÍøÉÏÇÒδÊܱ£»¤  £¬Êý¾Ý¿âÖеļǼ°üÂÞWi-FiÍøÂçµÄÃû³Æ¡¢¾«È·µÄµØÀíλÖá¢BSSIDºÍÃ÷ÎÄÃÜÂë  £¬µ«²»°üÂÞWi-FiËùÓÐÕßµÄÁªÏµÐÅÏ¢¡£ÔÆ·þÎñ¹«Ë¾DigitalOceanÔÚ½Óµ½³ÂËߺóɾ³ýÁ˸ÃÊý¾Ý¿â¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/leaky_app_data/144029/

5¡¢Google PlayÖйã¸æÈí¼þPreAMo  £¬ÏÂÔØÁ¿´ï9000Íò´Î


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


CheckpointÑо¿ÈËÔ±ÔÚGoogle PlayÖз¢ÏÖ¹ã¸æÈí¼þPreAMo  £¬¸Ã¹ã¸æÈí¼þαװ³É6¸öAPP  £¬×ÜÏÂÔØÁ¿Áè¼Ý9000Íò´Î¡£PreAMoÖ÷ÒªÕë¶ÔÈý¸ö¹ã¸æÊðÀíÉÌ - Presage¡¢AdmobºÍMopub½øÐÐÆÛÕ©  £¬¹¥»÷ÕßÕë¶Ôÿ¸ö¹ã¸æÊðÀíÉÌʹÓòîÒìµÄ´¦ÖÃÒªÁì  £¬µ«Ê¹ÓÃÁËÏàͬµÄC£¦C·þÎñÆ÷£¨res.mnexuscdn[.]com£©  £¬ÓÃÓÚ·¢ËÍͳ¼ÆÐÅÏ¢ºÍ½ÓÊÕÅäÖÃÐÅÏ¢¡£Google PlayÔÚ½Óµ½³ÂËߺóÒѾ­Ï¼ÜÁËÕâЩÊÜѬȾµÄAPP¡£

Ô­ÎÄÁ´½Ó£º
https://research.checkpoint.com/preamo-a-clicker-campaign-found-on-google-play/