ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ26ÖÜ
Ðû²¼Ê±¼ä 2019-07-08±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê7ÔÂ01ÈÕÖÁ07ÈÕ¹²ÊÕ¼Çå¾²Îó²î46¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApache Mesos Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»TRENDnet TEW-827DRU apply.cgiÏÂÁî×¢ÈëÎó²î£»£»£»£»£»NLnet Labs Name Server Daemon CVE-2019-13207»º³åÇøÒç³öÎó²î£»£»£»£»£»Nortek Security£¦Control Linear eMerge E3-Series CVE-2019-7253Ŀ¼±éÀúÎó²î£»£»£»£»£»NetApp AFF A700s Baseboard Management Controller CVE-2019-5497ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
Ö÷ÒªÇå¾²Îó²îÁбí
1. Apache Mesos Ô¶³Ì´úÂëÖ´ÐÐÎó²î
Apache Mesos×é¼þ±£´æÁýÕÖÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄDockerÓ³Ïñ£¬£¬£¬£¬¿ÉÁýÕÖinit helperÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E
2. TRENDnet TEW-827DRU apply.cgiÏÂÁî×¢ÈëÎó²î
https://github.com/TeamSeri0us/pocs/blob/master/iot/trendnet/cmdinject678.jpg
3. NLnet Labs Name Server Daemon CVE-2019-13207»º³åÇøÒç³öÎó²î
https://github.com/NLnetLabs/nsd/issues/20
4. Nortek Security£¦Control Linear eMerge E3-Series CVE-2019-7253Ŀ¼±éÀúÎó²î
https://www.applied-risk.com/resources/ar-2019-005
5. NetApp AFF A700s Baseboard Management Controller CVE-2019-5497ÏÂÁî×¢ÈëÎó²î
https://security.netapp.com/advisory/ntap-20190627-0001/
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

Ç÷ÊÆ¿Æ¼¼ÊӲ쵽һ¸ö»îÔ¾µÄ¹ã¸æÈí¼þ»î¶¯£¨AndroidOS_HiddenAd.HRXAAºÍAndroidOS_HiddenAd.GCLA£©£¬£¬£¬£¬¸Ã¹ã¸æÈí¼þÒþ²ØÔÚ182¸ö¿ÉÒÔÃâ·ÑÏÂÔØµÄÓÎÏ·ºÍÏà»úAPPÖУ¬£¬£¬£¬ÆäÖÐ111¸ö¿ÉÔÚGoogle PlayÊÐËÁÖÐÕÒµ½£¬£¬£¬£¬ÆäËü¶ñÒâAPPÔòÔÚ9AppsºÍPP AssistantÆ·¼¶Èý·½Ó¦ÓÃÊÐËÁÖзºÆð¡£¡£¡£¡£ÔÚ±»Ï¼Ü֮ǰ£¬£¬£¬£¬ÕâЩ¶ñÒâAPPµÄ×ÜÏÂÔØÁ¿´ï934.9Íò´Î¡£¡£¡£¡£¸Ã¹ã¸æÈí¼þ¿ÉÒÔÒþ²Ø¶ñÒâAPPµÄͼ±ê£¬£¬£¬£¬ÏòÓû§ÍÆËÍÎÞ·¨Á¬Ã¦¹Ø±Õ»òÍ˳öµÄÈ«ÆÁ¹ã¸æ£¬£¬£¬£¬»¹¿ÉÒÔÌÓ±ÜɳºÐµÄ¼ì²â¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/adware-campaign-identified-from-182-game-and-camera-apps-on-google-play-and-third-party-stores-like-9apps/
2¡¢CloudflareÔٴα¬·¢¹ÊÕÏ£¬£¬£¬£¬´ó×ÚÍøÕ¾å´»ú
CDN¼ÓËÙЧÀÍÉÌCloudflareÔÚ±±¾©Ê±¼ä7ÔÂ2ÈÕÍí¼ä·ºÆð´óÃæ»ýå´»ú£¬£¬£¬£¬Óû§»á¼ûʹÓÃÁËCloudflareµÄÍøÕ¾·ºÆð502¹ýʧ¡£¡£¡£¡£´Ë´Îå´»úÔµ¹ÊÔÓÉÊÇCloudflareÔÚеÄWebÓ¦Óòã·À»ðǽ(WAF£©Öа²ÅÅÁËÒ»¸öÉèÖùýʧµÄ¹æÔò£¬£¬£¬£¬ÇÒÕâЩ¹æÔòÒ»´ÎÐÔÔÚËùÓнڵãÉϰ²ÅÅ£¬£¬£¬£¬´Ó¶øµ¼ÖÂÁËÈ«Çò´óÃæ»ýå´»ú¡£¡£¡£¡£¸Ã¹ýʧµÄ¹æÔò°üÀ¨Ò»¸öÕýÔò±í´ïʽ£¬£¬£¬£¬µ¼ÖÂCloudflareЧÀÍÆ÷ÉϵÄCPUÕ¼ÓÃìÉýÖÁ100%¡£¡£¡£¡£ËæºóCloudflare»Ø¹öÁ˹ýʧµÄ¹æÔò£¬£¬£¬£¬ÏÖÔÚÏà¹ØÐ§ÀÍÒѻָ´Õý³£¡£¡£¡£¡£ÕâÒѾÊÇCloundflare±¾Ôµڶþ´Î·ºÆðå´»úÊÂÎñ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.cloudflare.com/cloudflare-outage/
3¡¢ÖÇÄܼҾӳ§ÉÌOrviboÒâÍâй¶Áè¼Ý20ÒÚÌõÓû§¼Í¼
vpnMentorÑо¿Ö°Ô±·¢Ã÷ÖÇÄܼҾӳ§ÉÌOrviboµÄÒ»¸öElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬ÆäÖÐй¶ÁËÁè¼Ý20ÒÚÌõÓû§¼Í¼¡£¡£¡£¡£Æ¾Ö¤Óû§ÈÕÖ¾£¬£¬£¬£¬ÐÅÏ¢±»Ð¹Â¶µÄÓû§À´×ÔÖйú¡¢ÈÕ±¾¡¢Ì©¹ú¡¢ÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢·¨¹ú¡¢°Ä´óÀûÑǺͰÍÎ÷¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢ÕÊ»§ÖØÖôúÂ롢׼ȷµÄµØÀíλÖá¢IPµØµã¡¢Óû§ÃûºÍÓû§ID¡£¡£¡£¡£ÆäÖÐÃÜÂëΪδ¼ÓÑεÄMD5¹þÏ£ÃûÌᣡ£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨¼ÒÍ¥ID¡¢¼ÒÍ¥Ãû³Æ¡¢¹ØÁªÖÇÄÜ×°±¸ÐÅÏ¢ºÍÍýÏëʹÃüµÈ¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÀ´ÓÀÊÀËø¶¨Óû§µÄÕË»§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/unprotected-database-of-smart-home-vendor-exposes-billions-of-records-23f3a56b
4¡¢Ñо¿Ö°Ô±·¢Ã÷Ê׸öÀÄÓÃDNS over HTTPSÐÒéµÄ¶ñÒâÈí¼þGodlua
Ñо¿Ö°Ô±·¢Ã÷Ê׸öÀÄÓÃDNS over HTTPS£¨DoH£©ÐÒéµÄ¶ñÒâÈí¼þGodlua£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÓÃLua±àдµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬Æä×÷ÓÃÀàËÆÓÚºóÃÅ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÎó²î£¨CVE-2019-3396£©À´Ñ¬È¾LinuxЧÀÍÆ÷¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÁ½¸öGodluaÑù±¾¶¼Ê¹ÓÃDNS over HTTPSÇëÇóÀ´»ñÈ¡ÓòÃûTXT£¬£¬£¬£¬ÆäÖд洢ÁËC£¦CЧÀÍÆ÷µÄURL¡£¡£¡£¡£ÕâÖÖ´ÓDNSÎı¾¼Í¼ÖмìË÷µÚ¶þ/µÚÈý½×¶ÎC£¦CЧÀÍÆ÷URLµØµãµÄÊÖÒÕ²¢²»ÐÂÏÊ£¬£¬£¬£¬µ«Ê¹ÓÃDoHÇëÇó¶ø²»ÊǹŰåµÄDNSÇëÇóΪÊ״ηºÆð¡£¡£¡£¡£DoH£¨DNS£©ÇëÇó¶ÔµÚÈý·½ÊÓ²ìÕß¼ÓÃÜÇÒ²»¿É¼û£¬£¬£¬£¬Õâ°üÀ¨ÒÀÀµ±»¶¯DNS¼à¿ØÀ´×èÖ¹¶ÔÒÑÖª¶ñÒâÓòÇëÇóµÄÍøÂçÇå¾²Èí¼þ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/first-ever-malware-strain-spotted-abusing-new-doh-dns-over-https-protocol/
5¡¢Áè¼Ý30¸öVMware²úÆ·Êܵ½Linux SACKÎó²îÓ°Ïì
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/many-vmware-products-affected-sack-linux-vulnerabilities