GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î£»£»£»£»£»£»£»GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC
Ðû²¼Ê±¼ä 2021-03-151.GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î

GRIMMµÄÑо¿Ö°Ô±ÔÚLinuxÄÚºË×ÓϵͳiSCSIÖз¢Ã÷ÁË3¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²î×Ô2006ÄêÒѾ±£´æ¡£¡£¡£¡£¡£¡£¡£Õâ3¸öÎó²î»®·ÖΪ¶Ñ»º³åÇøÒç³öÎó²î£¨CVE-2021-27365£©£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÍâµØÌáȨ¡¢ÐÅϢй¶ºÍ¾Ü¾øÐ§ÀÍ£»£»£»£»£»£»£»ÄÚºËÖ¸Õëй¶Îó²î£¨CVE-2021-27363£©£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶£»£»£»£»£»£»£»ÒÔ¼°Ô½½ç¶ÁÈ¡Îó²î£¨CVE-2021-27364£©£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶ºÍ¾Ü¾øÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´ÈƹýKASLR¡¢SMEP¡¢SMAPºÍKPTIµÈÇå¾²¹¦Ð§¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÒÑÓÚ3ÔÂ7ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/15-year-old-linux-kernel-bugs-let-attackers-gain-root-privileges/
2.NCC GroupÅû¶Netgear½»Á÷»úÖеÄ15¸öÎó²î

NCC GroupÑо¿Ö°Ô±·¢Ã÷NetgearµÄJGS516PEÒÔÌ«Íø½»Á÷»úÖб£´æ15¸öÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖнÏΪÑÏÖØµÄÊÇ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-26919£©£¬£¬£¬£¬£¬£¬£¬£¬CVSS v3ÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÒÔÖÎÀíԱȨÏÞÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐCVSS v3ÆÀ·ÖΪ8.8µÄNSDPÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-35231£©ºÍ¿ÉÉÏ´«¶ñÒâ´úÂëµÄ£¨CVE-2020-35220£©µÈÎó²î¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬NetgearÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬À´ÐÞ¸´ÉÏÊöÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115586/hacking/netgear-soho-flaws.html
3.GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC

GoogleÐû²¼ÁËÕë¶ÔChromeä¯ÀÀÆ÷JavaScriptÒýÇæµÄSpectre¹¥»÷PoC¡£¡£¡£¡£¡£¡£¡£Google³Æ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃPoC´úÂë¿ÉÔÚIntel Skylake CPUµÄChrome 88ÉÏÔËÐУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔ1kB/ sµÄËÙÂÊ´Ó×°±¸ÄÚ´æÖÐÏÂÔØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬GoogleÑо¿Ö°Ô±ÍƲâPoC´úÂë¿ÉÔÚÆäËûCPU£¨²î±ðµÄ¹©Ó¦É̺ÍÐͺţ©¡¢²Ù×÷ϵͳºÍChromium°æ±¾ÉÏʹÓᣡ£¡£¡£¡£¡£¡£Google½¨ÒéWeb¿ª·¢Ö°Ô±Ê¹Óà еÄÇå¾²»úÖÆÀ´»º½âSpectreÓ²¼þ¹¥»÷ºÍ³£¼ûµÄWeb¿çվй¶£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌṩÁËPost-Spectre Web¿ª·¢»ººÍ½âSide-Channel¹¥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115573/hacking/google-chrome-spectre-poc.html
4.ÄϷǰü¹Ü¹«Ë¾PPSÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅϢй¶

ÄϷǰü¹ÜºÍͶ×Ê×Éѯ¹«Ë¾PPSÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѾй¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÔ⵽δ֪ºÚ¿ÍµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍ¿ÉÄÜ»áÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚ¶Ô´ËʾÙÐÐÊӲ죬£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼ»Ö¸´ÆäIT»ù´¡¼Ü¹¹µÄ¹¦Ð§Ê±¡£¡£¡£¡£¡£¡£¡£Ôڴ˹ý¶Éʱ´ú£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹ÌṩÁËÐí¶àÌæ»»Á÷³Ì£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ×îºéÁ÷ƽµØïÔ̹¥»÷¶Ô¿Í»§µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬Éв»ÖªµÀPPSÔâµ½µÄ¹¥»÷ÀàÐÍ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¿ÉÄÜй¶ÐÅÏ¢µÄ¹æÄ£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://mybroadband.co.za/news/security/389402-pps-hit-by-cyber-attack.html
5.Unit42Ðû²¼ÓйØDearCryÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ

Unit42Ðû²¼ÁËÓйØDearCryÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£DearCryÊÇÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ£¬£¬£¬£¬£¬£¬£¬£¬¹ØÓÚËüµÄ±¨µÀ×îÔç·ºÆðÔÚ2021Äê3ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔʹÓÃMicrosoft ExchangeЧÀÍÆ÷µÄProxyLogonÎó²î¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Ä¿µÄ°üÀ¨ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵȹú¼Ò¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹¼Í¼ÁËDearCryʹÓõÄÏà¹ØÕ½ÂÔÒÔ¼°ÊÖÒÕºÍÀú³Ì£¨TTP£©£¬£¬£¬£¬£¬£¬£¬£¬²¢Îª¿Í»§ÔõÑù׼ȷÉèÖÃËûÃǵÄ×°±¸ÌṩÁ˽¨Òé¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/dearcry-ransomware/
6.Check PointÐû²¼ÓйØExchange¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ

Check PointÐû²¼ÁËÓйØExchange¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Ôڸñ¨¸æÖУ¬£¬£¬£¬£¬£¬£¬£¬Check Point Research£¨CPR£©Åû¶ÁËÆäÔÚÈ«Çò¹æÄ£ÄÚ×·×ÙµÄʵÑéʹÓôËÎó²îµÄ×éÖ¯µÄ×îÐÂЧ¹û¡£¡£¡£¡£¡£¡£¡£CPR·¢Ã÷È«ÇòÒÑÓÐÊý°Ù´ÎµÄʹÓÃʵÑ飻£»£»£»£»£»£»½öÔÚÒÑÍùµÄ72¸öСʱÖУ¬£¬£¬£¬£¬£¬£¬£¬ÊµÑéʹÓõĴÎÊý¾Í·ÁË6±¶ÒÔÉÏ£»£»£»£»£»£»£»¹¥»÷µÄ´ÎÊýÀÛ¼ÆÁè¼Ý4800´Î£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÌìÏÂÊý°Ù¸ö×éÖ¯£»£»£»£»£»£»£»ÔâÊܹ¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È21£¥£©£¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǺÉÀ¼£¨12£¥£©ºÍÍÁ¶úÆä£¨12£¥£©£»£»£»£»£»£»£»ÊÜÓ°Ïì×î´óµÄ²¿·ÖÊÇÕþ¸®ºÍ¾ü·½£¨Õ¼±È27£¥£©£¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÖÆÔìÒµ£¨22£¥£©ºÍÈí¼þ¹©Ó¦ÉÌ£¨9£¥£©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/03/11/exploits-on-organizations-worldwide/


¾©¹«Íø°²±¸11010802024551ºÅ