ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ45ÖÜ
Ðû²¼Ê±¼ä 2021-11-08>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾Öܹ²ÊÕ¼Çå¾²Îó²î60¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Policy Suite¾²Ì¬SSHÃÜÔ¿Îó²î£»£»Mozilla Firefox ESR HTTP2 session objectÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î£»£»Apache Traffic Server stats-over-http²å¼þÄÚ´æÁýÕÖÎó²î£»£»D-Link DIR-823G HNAP1ÏÂÁî×¢ÈëÎó²î£»£»Beckhoff Automation TwinCAT OPC UA ServerĿ¼±éÀúÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDz¿·ÖMac×°±¸Éý¼¶ÖÁmacOS MontereyºóÎÞ·¨Õý³£Æô¶¯£»£»Ñо¿ÍŶӷ¢Ã÷ÏÕЩÍþвËùÓдúÂëµÄÎó²îTrojan Source£»£»Ñо¿ÍŶӳƽ©Ê¬ÍøÂçPinkÒÑѬȾÁè¼Ý160Íǫ̀ÖйúµÄ×°±¸£»£»GoogleÐû²¼Android 11Ô¸üУ¬£¬£¬£¬×ܼÆÐÞ¸´39¸öÎó²î£»£»BlackMatterÍÅ»ïÐû²¼ÆÈÓÚÖ´·¨²¿·ÖµÄѹÁ¦½«×èÖ¹ÔËÓª¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Cisco Policy Suite¾²Ì¬SSHÃÜÔ¿Îó²î
Cisco Policy Suite±£´æ¾²Ì¬SSHÃÜÔ¿Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬Î´ÊÚȨ»á¼ûϵͳ¡£¡£¡£¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cps-static-key-JmS92hNv
2. Mozilla Firefox ESR HTTP2 session objectÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î
Mozilla Firefox ESR HTTP2 session object±£´æÊͷźóʹÓÃÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/
3. Apache Traffic Server stats-over-http²å¼þÄÚ´æÁýÕÖÎó²î
Apache Traffic Server stats-over-http²å¼þ±£´æÄÚ´æÁýÕÖÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164
4. D-Link DIR-823G HNAP1ÏÂÁî×¢ÈëÎó²î
D-Link DIR-823G HNAP1±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâSHELLÏÂÁî¡£¡£¡£¡£¡£¡£
https://www.dlink.com/en/security-bulletin/
5. Beckhoff Automation TwinCAT OPC UA ServerĿ¼±éÀúÎó²î
Beckhoff Automation TwinCAT OPC UA Server±£´æÄ¿Â¼±éÀúÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎĽ¨Éè»òɾ³ýϵͳÉϵÄÈκÎÎļþ¡£¡£¡£¡£¡£¡£
https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2021-003.pdf
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢²¿·ÖMac×°±¸Éý¼¶ÖÁmacOS MontereyºóÎÞ·¨Õý³£Æô¶¯
½üÆÚ£¬£¬£¬£¬Ô½À´Ô½¶àµÄMacºÍMacbookÓû§±¨¸æ£¬£¬£¬£¬µ±Æä¸üе½ÉÏÖÜÐû²¼µÄ×îаæmacOS Montereyºó£¬£¬£¬£¬×°±¸ÎÞ·¨Õý³£Æô¶¯¡£¡£¡£¡£¡£¡£´ËÎÊÌâËÆºõ½öÓ°ÏìÁË2019Äê֮ǰµÄMac×°±¸£¬£¬£¬£¬²»»áÓ°ÏìʹÓÃM1оƬµÄпîMac¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ËäÈ»²¿·ÖÓû§³ÆËûÃǵÄϵͳÒѾ±äש£¬£¬£¬£¬µ«´ó´ó¶¼Óû§¿ÉÒÔͨ¹ýApple Configurator¹¤¾ß»Ö¸´×°±¸¡£¡£¡£¡£¡£¡£ÆäËûÓû§ÔòÕÒµ½ÁËÁíÒ»ÖÖÒªÁ죬£¬£¬£¬¾ÍÊÇͨ¹ýÆô¶¯DFUÀ´»Ö¸´×°±¸¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/apple/macos-monterey-update-causes-some-macs-to-become-unbootable/
2¡¢Ñо¿ÍŶӷ¢Ã÷ÏÕЩÍþвËùÓдúÂëµÄÎó²îTrojan Source
½£ÇÅ´óѧµÄÑо¿Ö°Ô±ÔÚ11ÔÂ1ÈÕ¹ûÕæÁËÒ»¸öÓ°Ïì´ó´ó¶¼ÅÌËã»ú´úÂë±àÒëÆ÷ºÍÐí¶àÈí¼þ¿ª·¢ÇéÐεÄÎó²îTrojan Source¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚUnicodeÖУ¬£¬£¬£¬ÓÐÁ½ÖÖʹÓÃÒªÁ죺ÆäÒ»ÊÇʹÓÃUnicodeµÄBidiËã·¨£¨CVE-2021-42574£©£¬£¬£¬£¬¶Ô×Ö·û¾ÙÐÐÊÓ¾õÉϵÄÖØÐÂÅÅÐò£¬£¬£¬£¬Ê¹Æä·ºÆðÓë±àÒëÆ÷Ï¢ÕùÊÍÆ÷Ëù²î±ðµÄÂ߼˳Ðò£»£»ÁíÒ»ÖÖÊÇͬÐÎÎÄ×Ö¹¥»÷(CVE-2021-42694)£¬£¬£¬£¬¼´Ê¹ÓÃÔÚÊÓ¾õÉÏ¿´ÆðÀ´ÏàËÆµÄ²î±ð×Ö·û¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÊÓÃÓÚC¡¢C++¡¢C#¡¢JavaScript¡¢JavaµÈÆÕ±éʹÓõÄÓïÑÔ£¬£¬£¬£¬¿ÉÓÃÓÚ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.trojansource.codes/
3¡¢Ñо¿ÍŶӳƽ©Ê¬ÍøÂçPinkÒÑѬȾÁè¼Ý160Íǫ̀ÖйúµÄ×°±¸
Ñо¿ÍŶÓÔÚ10ÔÂ29ÈÕÅû¶ÁËÔÚÒÑÍùÁùÄê·¢Ã÷µÄ×î´ó½©Ê¬ÍøÂçµÄϸ½Ú¡£¡£¡£¡£¡£¡£ÓÉÓÚÆä´ó×ڵĺ¯ÊýÃû³ÆÒÔpinkΪÊ×£¬£¬£¬£¬ÒÔÊÇÈ¡ÃûPinkbot¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÒÑѬȾÁËÁè¼Ý160Íǫ̀װ±¸£¬£¬£¬£¬ÆäÖÐ96%λÓÚÖйú¡£¡£¡£¡£¡£¡£ËüÖ÷ÒªÕë¶Ô»ùÓÚMIPSµÄ¹âÏË·ÓÉÆ÷£¬£¬£¬£¬Ê¹ÓõÚÈý·½Ð§À͵Ä×éºÏ£¬£¬£¬£¬ÀýÈçGitHub¡¢P2PÍøÂçºÍC2ЧÀÍÆ÷£¬£¬£¬£¬»¹¶Ô²¿·ÖÓòÃûµÄÆÊÎöÅÌÎʽÓÄÉÁËDNS-Over-HTTPSµÄ·½·¨¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬Æù½ñΪֹ£¬£¬£¬£¬PinkBotÌᳫÁ˽ü°Ù´ÎDDoS¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/11/researchers-uncover-pink-botnet-malware.html
4¡¢GoogleÐû²¼Android 11Ô¸üУ¬£¬£¬£¬×ܼÆÐÞ¸´39¸öÎó²î
GoogleÔÚ±¾ÖÜÒ»Ðû²¼ÁËAndroid 11Ô·ݵĸüУ¬£¬£¬£¬×ܼÆÐÞ¸´39¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂÐÞ¸´ÁËÒ»¸öÒѱ»ÔÚҰʹÓõÄ0day£¬£¬£¬£¬ÊÇÓÉÊͷźóʹÓõ¼ÖµÄÍâµØÌáȨÎó²îCVE-2021-1048¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹ÐÞ¸´Á˶à¸öÑÏÖØµÄÎó²î£¬£¬£¬£¬°üÀ¨Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-0918ºÍCVE-2021-0930£¬£¬£¬£¬Ó°Ïì¸ßͨ×é¼þµÄCVE-2021-1924ºÍCVE-2021-1975£¬£¬£¬£¬ÒÔ¼°Android TVÔ¶³ÌЧÀÍÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-0889µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/android-patches-exploited-kernel-bug/175931/
5¡¢BlackMatterÍÅ»ïÐû²¼ÆÈÓÚÖ´·¨²¿·ÖµÄѹÁ¦½«×èÖ¹ÔËÓª
11ÔÂ1ÈÕ£¬£¬£¬£¬ÀÕË÷ÔËÓªÍÅ»ïBlackMatterÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÐÂÎÅ£¬£¬£¬£¬³ÆÆÈÓÚÖ´·¨²¿·ÖµÄѹÁ¦ËûÃǽ«ÔÚ48СʱÄڹرÕÕû¸ö»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£Ñо¿ÍŶÓÌåÏÖ£¬£¬£¬£¬Õâ¿ÉÄÜÓë×î½üµÄÒ»´Î¹ú¼ÊÖ´·¨Ðж¯Óйأ¬£¬£¬£¬´Ë´ÎÐж¯¹²¾Ð²¶ÁË12¸öÉæ¼°1800ÆðÀÕË÷¹¥»÷»î¶¯µÄÏÓÒÉÈË¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬×ÝÈ»BlackMatterÏÖÔÚ×èÖ¹ÆäÔËÓª£¬£¬£¬£¬ÔÚδÀ´Ò²½«»áÒÔеÄÃû³Æ»Ø¹é£¬£¬£¬£¬ÕýÈçBlackMatter×Ô¼º¾ÍÊÇDarkSideÔÚ¹¥»÷Colonial PipelineºóÆÈÓÚѹÁ¦¸üÃû¶øÀ´µÄ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/124135/cyber-crime/blackmatter-ransomware-shutting-down-operations.html