GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚ×°±¸£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶TorÖÐÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸ö

Ðû²¼Ê±¼ä 2020-07-31

1.GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinux×°±¸


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


EclypsiumÑо¿Ö°Ô±ÔÚ´ó¶¼LinuxϵͳʹÓõÄGRUB2Ö¸µ¼³ÌÐòÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬ £¬£¬£¬£¬£¬²¢½«ÆäÃüÃûΪ¡°BootHole¡±£¨CVE-2020-10713£©£¬£¬ £¬£¬£¬£¬£¬×ÝÈ»ÆôÓÃÁËSecure Boot£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÔÚÆô¶¯Àú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬£¬ £¬£¬£¬£¬£¬»¹¿ÉÒÔʹÓøÃÎó²î×°Öó¤ÆÚÇÒÒþ²ØµÄbootkit»ò¶ñÒâÖ¸µ¼³ÌÐòÀ´¿ØÖÆ×°±¸¡£¡£¡£±ðµÄGRUB2»¹Ö§³ÖÆäËü²Ù×÷ϵͳ¡¢Äں˺ÍÖÎÀí³ÌÐò£¬£¬ £¬£¬£¬£¬£¬ÀýÈ磬£¬ £¬£¬£¬£¬£¬Xen¡£¡£¡£¸ÃÎó²î»¹Éæ¼°µ½ËùÓÐʹÓñê×¼Microsoft Third Party UEFI Certificate AuthorityµÄSecure BootµÄWindows×°±¸£¬£¬ £¬£¬£¬£¬£¬ÀýÈ繤ҵ¡¢Ò½ÁÆ¡¢½ðÈÚµÈÐÐÒµÖÐʹÓõÄ×°±¸¾ùÊÜÓ°Ïì¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÊýÊ®ÒÚʹÓÃSecure BootµÄWindowsºÍLinux×°±¸¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/


2.Ñо¿Ö°Ô±Åû¶TorÖеÄÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸öÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Neal KrawetzÔÚÒÑÍùÒ»ÖÜÄÚÅú¶ÁËÁ½¸öTorÖеÄ0day£¬£¬ £¬£¬£¬£¬£¬²¢ÔÊÐíÖÁÉÙÔÙÐû²¼Èý¸öTor 0day£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐÒ»¸ö¿ÉÒÔÕ¹ÏÖTorЧÀÍÆ÷ÕæÊµIPµØµã¡£¡£¡£´Ë´ÎÅû¶µÄÎó²îÖУ¬£¬ £¬£¬£¬£¬£¬µÚÒ»¸ö¿É±»Ê¹ÓÃͨ¹ýɨÃèÍøÂçÅþÁ¬£¬£¬ £¬£¬£¬£¬£¬Ñ°ÕÒTor¶ÀÍ̵ÄÊý¾Ý°üÊðÃûÀ´×èÖ¹Óû§ÅþÁ¬µ½TorÍøÂ磬£¬ £¬£¬£¬£¬£¬¸ÃÊý¾Ý°ü¿ÉÓÃÀ´×èÖ¹TorÅþÁ¬µÄÆô¶¯²¢ÓÐÓõØÍêÈ«½ûÓÃTor¡£¡£¡£ÏñµÚÒ»¸ö0dayÒ»Ñù£¬£¬ £¬£¬£¬£¬£¬µÚ¶þ¸öÒ²ÔÊÐíÍøÂçÔËÓªÉ̼ì²âTorÁ÷Á¿£¬£¬ £¬£¬£¬£¬£¬µ«Ëü¿ÉÓÃÓÚ¼ì²â¼ä½ÓÅþÁ¬¡£¡£¡£Krawetz²©Ê¿ÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬Ê¹Óøú×ÙÌØ¶¨TCPÊý¾Ý°üµÄÊÖÒÕ£¬£¬ £¬£¬£¬£¬£¬Ò²¿ÉÒÔÇáËɼì²âµ½TorÇŵÄÅþÁ¬¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/106567/hacking/tor-zero-day-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=tor-zero-day-flaws


3.˼¿ÆÐû²¼Çå¾²¸üУ¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


˼¿ÆÐû²¼Çå¾²¸üУ¬£¬ £¬£¬£¬£¬£¬×ܼÆÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î¡£¡£¡£ÆäÖÐÓÐÈý¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬ £¬£¬£¬£¬£¬µÚÒ»¸öΪDCNM REST APIÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-3382£©£¬£¬ £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬£¬£¬£¬£¬¾ßÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐí§Òâ²Ù×÷£»£»£»£»£»£»µÚ¶þ¸öΪSD-WAN vManageÈí¼þÖеÄÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2020-3374£©£¬£¬ £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.9£¬£¬ £¬£¬£¬£¬£¬ÆäÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÊÚȨ£¬£¬ £¬£¬£¬£¬£¬»á¼ûÃô¸ÐÐÅÏ¢²¢ÐÞ¸ÄϵͳÉèÖ㻣»£»£»£»£»µÚÈý¸öΪSD-WAN½â¾ö¼Æ»®Èí¼þÖеĻº³åÇøÒç³öÎó²î(CVE-2020-3375),ÓÉÓÚÊäÈëÑé֤ȱ·¦µ¼Ö£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»á¼ûÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬²¢¶ÔËûÃÇûÓÐȨÏÞµÄϵͳ¾ÙÐиü¸Ä¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-data-center-management-solution/


4.Ô¼»áÈí¼þOkCupid±£´æ¶à¸öÎó²î£¬£¬ £¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Check Point ResearchÅû¶ÁËOkCupidÖеÄһϵÁÐÎó²î£¬£¬ £¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±¶Ô¸ÃAndroidÓ¦ÓþÙÐÐÁËÄæÏò¹¤³Ì£¬£¬ £¬£¬£¬£¬£¬²¢·¢Ã÷ÁËÆäÉî²ãÁ´½Ó¹¦Ð§£¬£¬ £¬£¬£¬£¬£¬ÕâÒâζ׏¥»÷Õ߿ɷ¢ËÍ×Ô½ç˵µÄ¶ñÒâÁ´½ÓÀ´·­¿ª¸ÃÓ¦ÓóÌÐò¡£¡£¡£ÓÉÓÚÓ¦ÓõÄÓû§ÉèÖù¦Ð§ÖеıàÂëÎÊÌ⣬£¬ £¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁË·´Éä¿çÕ¾µã¾ç±¾£¨XSS£©¹¥»÷ǰÑÔ¡£¡£¡£½«¶þÕßÁ¬ÏµÆðÀ´£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ´Ó×Ô¼ºµÄЧÀÍÆ÷·¢ËÍHTTP GETÇëÇóºÍXSSÓÐÓøºÔØ£¬£¬ £¬£¬£¬£¬£¬È»ºó¿ÉÒÔͨ¹ýWebViewÖ´ÐÐJavaScript¡£¡£¡£Õâ¿ÉÄܵ¼Ö¸ÃÓ¦ÓÃÉϵÄÃô¸ÐÉèÖÃÎļþÊý¾Ý̻¶£¬£¬ £¬£¬£¬£¬£¬Óû§ÕÊ»§Ð®ÖÆÒÔ¼°Óû§Éí·ÝÑéÖ¤ÁîÅÆ¡¢IDÒÔ¼°µç×ÓÓʼþµØµãй¶¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/okcupid-hackers-want-your-data-not-a-relationship/#ftag=RSSbaffb68


5.FBIÖÒÑÔNetwalkerÕë¶Ô¹ú¼ÒµÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


FBIÖÒÑÔÓйØNetwalkerÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯µÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê¡£¡£¡£FBIÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÍÅ»ï´Ó2020Äê6ÔÂ×îÏÈÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯£¬£¬ £¬£¬£¬£¬£¬´ËǰNetwalker¼ÓÃÜÁ˼ÓÖÝ´óѧ¾É½ðɽ·ÖУҽѧԺµÄϵͳ£¬£¬ £¬£¬£¬£¬£¬Ö®ºó£¬£¬ £¬£¬£¬£¬£¬ÓÖÁ½´Î¹¥»÷Á˰ĴóÀûÑÇÔËÊäºÍÎïÁ÷¹«Ë¾Toll Group£¬£¬ £¬£¬£¬£¬£¬ÔÚ±¾Ô¹¥»÷ÁËLorienÒ½Ôº¡£¡£¡£FBI»¹·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬NetwalkerÍÅ»ïÔÚ3Ô·Ýͨ¹ýʹÓÃVisual Basic¾ç±¾£¨VBS£©Ìá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬4Ô·ÝÓÖ×îÏÈʹÓÃÒ×Êܹ¥»÷µÄÐéÄâרÓÃÍø£¨VPN£©×°±¸Ìᳫ¹¥»÷¡£¡£¡£FBI±Þ²ßÊܺ¦Õß¾Ù±¨ÀÕË÷Èí¼þÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬ÒÔ×ÊÖú×·×Ù¹¥»÷Õß²¢Ìá·ÀδÀ´µÄ¹¥»÷¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/


6.¿¨°Í˹»ù·¢Ã÷ºÚ¿Í×éÖ¯DeceptikonsÖ÷ÒªÕë¶ÔÅ·ÖÞÂÉËù


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ù·¢Ã÷ÁËÒ»¸öеĺڿÍ×éÖ¯Deceptikons£¬£¬ £¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÅ·ÖÞ״ʦÊÂÎñËùºÍ½ðÈڿƼ¼¹«Ë¾¡£¡£¡£¸Ã×é֯רעÓÚÇÔÈ¡ÉÌÒµºÍ½ðÈÚÉñÃØ£¬£¬ £¬£¬£¬£¬£¬¶ø²»ÊÇÓëÕþ¸®ÓйصÄÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ÆäÖ÷ҪĿµÄ¶¼Î»ÓÚÅ·ÖÞ£¬£¬ £¬£¬£¬£¬£¬ÎÞÒâÒ²ÓÐһЩÖж«¹ú¼Ò£¬£¬ £¬£¬£¬£¬£¬ÀýÈçÒÔÉ«ÁУ¬£¬ £¬£¬£¬£¬£¬Ô¼µ©ºÍ°£¼°¡£¡£¡£¸Ã×éÖ¯ÔÚ×î½üµÄ¹¥»÷ÖжԶà¸öÅ·ÖÞ״ʦÊÂÎñËùÌᳫÁËÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬²¢Í¨¹ý¶ñÒâPowerShell½ÅÔ­À´Ñ¬È¾Ö÷»ú¡£¡£¡£¿£¿£¿£¿¨°Í˹»ùÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬DeceptikonsÔÚÊÖÒÕÉϲ¢²»¿ÉÊ죬£¬ £¬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐʹÓùýÁãÈÕÎó²î£¬£¬ £¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷¶¼×ñÕÕÏàËÆµÄģʽ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kaspersky-new-hacker-for-hire-mercenary-group-is-targeting-european-law-firms/#ftag=RSSbaffb68