ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ45ÖÜ
Ðû²¼Ê±¼ä 2021-11-08>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾Öܹ²ÊÕ¼Çå¾²Îó²î60¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Policy Suite¾²Ì¬SSHÃÜÔ¿Îó²î£»£»Mozilla Firefox ESR HTTP2 session objectÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î£»£»Apache Traffic Server stats-over-http²å¼þÄÚ´æÁýÕÖÎó²î£»£»D-Link DIR-823G HNAP1ÏÂÁî×¢ÈëÎó²î£»£»Beckhoff Automation TwinCAT OPC UA ServerĿ¼±éÀúÎó²î¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊDz¿·ÖMac×°±¸Éý¼¶ÖÁmacOS MontereyºóÎÞ·¨Õý³£Æô¶¯£»£»Ñо¿ÍŶӷ¢Ã÷ÏÕЩÍþвËùÓдúÂëµÄÎó²îTrojan Source£»£»Ñо¿ÍŶӳƽ©Ê¬ÍøÂçPinkÒÑѬȾÁè¼Ý160Íǫ̀ÖйúµÄ×°±¸£»£»GoogleÐû²¼Android 11Ô¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´39¸öÎó²î£»£»BlackMatterÍÅ»ïÐû²¼ÆÈÓÚÖ´·¨²¿·ÖµÄѹÁ¦½«×èÖ¹ÔËÓª¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Cisco Policy Suite¾²Ì¬SSHÃÜÔ¿Îó²î
Cisco Policy Suite±£´æ¾²Ì¬SSHÃÜÔ¿Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬Î´ÊÚȨ»á¼ûϵͳ¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cps-static-key-JmS92hNv
2. Mozilla Firefox ESR HTTP2 session objectÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î
Mozilla Firefox ESR HTTP2 session object±£´æÊͷźóʹÓÃÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/
3. Apache Traffic Server stats-over-http²å¼þÄÚ´æÁýÕÖÎó²î
Apache Traffic Server stats-over-http²å¼þ±£´æÄÚ´æÁýÕÖÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164
4. D-Link DIR-823G HNAP1ÏÂÁî×¢ÈëÎó²î
D-Link DIR-823G HNAP1±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâSHELLÏÂÁî¡£¡£
https://www.dlink.com/en/security-bulletin/
5. Beckhoff Automation TwinCAT OPC UA ServerĿ¼±éÀúÎó²î
Beckhoff Automation TwinCAT OPC UA Server±£´æÄ¿Â¼±éÀúÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎĽ¨Éè»òɾ³ýϵͳÉϵÄÈκÎÎļþ¡£¡£
https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2021-003.pdf
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢²¿·ÖMac×°±¸Éý¼¶ÖÁmacOS MontereyºóÎÞ·¨Õý³£Æô¶¯
½üÆÚ£¬£¬£¬£¬£¬£¬Ô½À´Ô½¶àµÄMacºÍMacbookÓû§±¨¸æ£¬£¬£¬£¬£¬£¬µ±Æä¸üе½ÉÏÖÜÐû²¼µÄ×îаæmacOS Montereyºó£¬£¬£¬£¬£¬£¬×°±¸ÎÞ·¨Õý³£Æô¶¯¡£¡£´ËÎÊÌâËÆºõ½öÓ°ÏìÁË2019Äê֮ǰµÄMac×°±¸£¬£¬£¬£¬£¬£¬²»»áÓ°ÏìʹÓÃM1оƬµÄпîMac¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ËäÈ»²¿·ÖÓû§³ÆËûÃǵÄϵͳÒѾ±äש£¬£¬£¬£¬£¬£¬µ«´ó´ó¶¼Óû§¿ÉÒÔͨ¹ýApple Configurator¹¤¾ß»Ö¸´×°±¸¡£¡£ÆäËûÓû§ÔòÕÒµ½ÁËÁíÒ»ÖÖÒªÁ죬£¬£¬£¬£¬£¬¾ÍÊÇͨ¹ýÆô¶¯DFUÀ´»Ö¸´×°±¸¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/apple/macos-monterey-update-causes-some-macs-to-become-unbootable/
2¡¢Ñо¿ÍŶӷ¢Ã÷ÏÕЩÍþвËùÓдúÂëµÄÎó²îTrojan Source
½£ÇÅ´óѧµÄÑо¿Ö°Ô±ÔÚ11ÔÂ1ÈÕ¹ûÕæÁËÒ»¸öÓ°Ïì´ó´ó¶¼ÅÌËã»ú´úÂë±àÒëÆ÷ºÍÐí¶àÈí¼þ¿ª·¢ÇéÐεÄÎó²îTrojan Source¡£¡£¸ÃÎó²î±£´æÓÚUnicodeÖУ¬£¬£¬£¬£¬£¬ÓÐÁ½ÖÖʹÓÃÒªÁ죺ÆäÒ»ÊÇʹÓÃUnicodeµÄBidiËã·¨£¨CVE-2021-42574£©£¬£¬£¬£¬£¬£¬¶Ô×Ö·û¾ÙÐÐÊÓ¾õÉϵÄÖØÐÂÅÅÐò£¬£¬£¬£¬£¬£¬Ê¹Æä·ºÆðÓë±àÒëÆ÷Ï¢ÕùÊÍÆ÷Ëù²î±ðµÄÂ߼˳Ðò£»£»ÁíÒ»ÖÖÊÇͬÐÎÎÄ×Ö¹¥»÷(CVE-2021-42694)£¬£¬£¬£¬£¬£¬¼´Ê¹ÓÃÔÚÊÓ¾õÉÏ¿´ÆðÀ´ÏàËÆµÄ²î±ð×Ö·û¡£¡£¸ÃÎó²îÊÊÓÃÓÚC¡¢C++¡¢C#¡¢JavaScript¡¢JavaµÈÆÕ±éʹÓõÄÓïÑÔ£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¹©Ó¦Á´¹¥»÷¡£¡£
ÔÎÄÁ´½Ó£º
https://www.trojansource.codes/
3¡¢Ñо¿ÍŶӳƽ©Ê¬ÍøÂçPinkÒÑѬȾÁè¼Ý160Íǫ̀ÖйúµÄ×°±¸
Ñо¿ÍŶÓÔÚ10ÔÂ29ÈÕÅû¶ÁËÔÚÒÑÍùÁùÄê·¢Ã÷µÄ×î´ó½©Ê¬ÍøÂçµÄϸ½Ú¡£¡£ÓÉÓÚÆä´ó×ڵĺ¯ÊýÃû³ÆÒÔpinkΪÊ×£¬£¬£¬£¬£¬£¬ÒÔÊÇÈ¡ÃûPinkbot¡£¡£¸Ã½©Ê¬ÍøÂçÒÑѬȾÁËÁè¼Ý160Íǫ̀װ±¸£¬£¬£¬£¬£¬£¬ÆäÖÐ96%λÓÚÖйú¡£¡£ËüÖ÷ÒªÕë¶Ô»ùÓÚMIPSµÄ¹âÏË·ÓÉÆ÷£¬£¬£¬£¬£¬£¬Ê¹ÓõÚÈý·½Ð§À͵Ä×éºÏ£¬£¬£¬£¬£¬£¬ÀýÈçGitHub¡¢P2PÍøÂçºÍC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬»¹¶Ô²¿·ÖÓòÃûµÄÆÊÎöÅÌÎʽÓÄÉÁËDNS-Over-HTTPSµÄ·½·¨¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬Æù½ñΪֹ£¬£¬£¬£¬£¬£¬PinkBotÌᳫÁ˽ü°Ù´ÎDDoS¹¥»÷¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/11/researchers-uncover-pink-botnet-malware.html
4¡¢GoogleÐû²¼Android 11Ô¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´39¸öÎó²î
GoogleÔÚ±¾ÖÜÒ»Ðû²¼ÁËAndroid 11Ô·ݵĸüУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´39¸öÎó²î¡£¡£´Ë´Î¸üÐÂÐÞ¸´ÁËÒ»¸öÒѱ»ÔÚҰʹÓõÄ0day£¬£¬£¬£¬£¬£¬ÊÇÓÉÊͷźóʹÓõ¼ÖµÄÍâµØÌáȨÎó²îCVE-2021-1048¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´Á˶à¸öÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬°üÀ¨Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-0918ºÍCVE-2021-0930£¬£¬£¬£¬£¬£¬Ó°Ïì¸ßͨ×é¼þµÄCVE-2021-1924ºÍCVE-2021-1975£¬£¬£¬£¬£¬£¬ÒÔ¼°Android TVÔ¶³ÌЧÀÍÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2021-0889µÈ¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/android-patches-exploited-kernel-bug/175931/
5¡¢BlackMatterÍÅ»ïÐû²¼ÆÈÓÚÖ´·¨²¿·ÖµÄѹÁ¦½«×èÖ¹ÔËÓª
11ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬ÀÕË÷ÔËÓªÍÅ»ïBlackMatterÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÐÂÎÅ£¬£¬£¬£¬£¬£¬³ÆÆÈÓÚÖ´·¨²¿·ÖµÄѹÁ¦ËûÃǽ«ÔÚ48СʱÄڹرÕÕû¸ö»ù´¡ÉèÊ©¡£¡£Ñо¿ÍŶÓÌåÏÖ£¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜÓë×î½üµÄÒ»´Î¹ú¼ÊÖ´·¨Ðж¯Óйأ¬£¬£¬£¬£¬£¬´Ë´ÎÐж¯¹²¾Ð²¶ÁË12¸öÉæ¼°1800ÆðÀÕË÷¹¥»÷»î¶¯µÄÏÓÒÉÈË¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬×ÝÈ»BlackMatterÏÖÔÚ×èÖ¹ÆäÔËÓª£¬£¬£¬£¬£¬£¬ÔÚδÀ´Ò²½«»áÒÔеÄÃû³Æ»Ø¹é£¬£¬£¬£¬£¬£¬ÕýÈçBlackMatter×Ô¼º¾ÍÊÇDarkSideÔÚ¹¥»÷Colonial PipelineºóÆÈÓÚѹÁ¦¸üÃû¶øÀ´µÄ¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/124135/cyber-crime/blackmatter-ransomware-shutting-down-operations.html


¾©¹«Íø°²±¸11010802024551ºÅ