每日安全资讯-2020.4.22

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日读读:WINNTI GROUP针对韩国游戏公司的新攻击、IBM Data Risk Manager多个0Day漏洞披露、haproxy中ttp2 hpack动态表的越界写、Android rw_t2t_update_lock_attributes(NFC)中的跨界写、Windows内核中的一行更改如何破坏Windows Chromium沙箱、從 SQL 到 RCE-利用 SessionState反序列化攻擊 ASP.NET 網站應用程式等。

【病毒区】
1、WINNTI GROUP:Newly uncovered DNS tunnelling technique, and new campaign against South Korean gaming company

2、New Android Banking Trojan Targets Spanish, Portuguese Speaking Users

3、Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal

4、Trickbot to Ryuk in Two Hours

5、来自“蓝茶”的问候:“你是不是疯了”,暗藏新攻击手法

【漏洞分析区】
6、Multiple Vulnerabilities in IBM Data Risk Manager(0Day)

7、haproxy: out-of-bounds-write in http2 hpack dynamic table(CVE-2020-11100)
https://bugs.chromium.org/p/project-zero/issues/detail?id=2023

8、Out-Of-Bounds write in Android’s rw_t2t_update_lock_attributes (NFC) - CVE-2020-0070

9、How a one line change in the Windows kernel broke the Windows Chromium sandbox(CVE-2020-0981)

【技术分享区】
10、從 SQL 到 RCE: 利用 SessionState 反序列化攻擊 ASP.NET 網站應用程式
https://devco.re/blog/2020/04/21/from-sql-to-rce-exploit-aspnet-app-with-sessionstate/

11、Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts
https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts/

12、MindShaRE: Using lldbinit to Enhance the LLDB Debugger

#工具#Vuln Cost - Security Scanner for VS Code

1