Deutsch | English

[CERT-daily] Tageszusammenfassung - Mittwoch 9-01-2013

Daily end-of-shift report team at cert.at
Wed Jan 9 18:25:49 CET 2013


=======================
= End-of-Shift report =
=======================

Timeframe:   Dienstag 08-01-2013 18:00 − Mittwoch 09-01-2013 18:00
Handler:     Stephan Richter
Co-Handler:  Otmar Lendl




*** Serious Password Reset Hole In Accellion Secure FTP ***
---------------------------------------------
chicksdaddy writes "A security researcher who was looking for vulnerabilities in Facebooks platform instead stumbled on a much larger hole that could affect scores of firms who rely on a secure file transfer platform from Accellion. Writing on his blog on Monday, Israeli researcher Nir Goldshlager said he discovered the password reset vulnerability while analyzing a Accellion deployment that is used, internally, by Facebook employees. Goldshlager used public knowledge of the Accellion...
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/BpSzZxCpN3k/story01.htm




*** Microsoft Updates for Multiple Vulnerabilities ***
---------------------------------------------
The Microsoft Security Bulletin Summary for January 2013 describes
multiple vulnerabilities in Microsoft software. Microsoft has
released updates to address the vulnerabilities.
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-jan




*** Adobe Security Bulletins Posted ***
---------------------------------------------
Today, we released the following Security Bulletins: APSB13-01 Security updates available for Adobe Flash Player APSB13-02 Security updates available for Adobe Reader and Acrobat Customers of the affected products should consult the relevant Security Bulletin(s) for details. This posting is provided "AS IS" with no warranties and confers no rights.
---------------------------------------------
http://blogs.adobe.com/psirt/2013/01/adobe-security-bulletins-posted-4.html




*** Experts Identify, Analyze Botnet Used to Launch DDOS Attacks Against US Banks ***
---------------------------------------------
"Researchers have been constantly analyzing the distributed denial-of-service (DDOS) attacks launched by Izz ad-Din al-Qassam Cyber Fighters against United States financial institutions but, up until now, little was known about the resources used by the hacktivists. Incapsula, a cloud-based security and acceleration service provider, has uncovered some interesting details about the cyberattacks and the botnet that powers them after noticing that the website of a new customer was...
---------------------------------------------
http://news.softpedia.com/news/Experts-Identify-Analyze-Botnet-Used-to-Launch-DDOS-Attacks-Against-US-Banks-319699.shtml




*** Mobile Browser Security: Problem Exists Between Device and Chair ***
---------------------------------------------
"Last month, a Georgia Tech study found that mobile browsers frequently left even expert users insufficient information to judge if a site was potentially dangerous, because of user interface limitations. The item that is most problematic is how SSL information is displayed. Compared to desktops, mobile browsers have far more limited ways to show if a site is using SSL...."
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/mobile-browser-security-problem-exists-between-device-and-chair/




*** Kritische Lücken in Firefox, Thunderbird und SeaMonkey geschlossen ***
---------------------------------------------
Mit den jüngsten Updates haben die Entwickler zahlreiche Schwachstellen in den Mozilla-Programmen beseitigt. Man sollte daher sicherstellen, dass man jeweils die aktuelle Version nutzt.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/2758df0f/l/0L0Sheise0Bde0Cmeldung0CKritische0ELuecken0Ein0EFirefox0EThunderbird0Eund0ESeaMonkey0Egeschlossen0E17794490Bhtml0Cfrom0Crss0A9/story01.htm




*** First confirmed hard victim of Ruby on Rails Zero-Day Dutch DigiD Government Service. All services ***
---------------------------------------------
"After having alerted on a new SQL Injection Vulnerability in Ruby on rails on 3 january, Bricade alerted on a second, even more serious, Zero Day on 8 January. The Dutch Government DigiD Service reported today 9th of January on their website that the DigiD service was not available today. See https://www...."
---------------------------------------------
http://weblog.rubyonrails.org/2013/1/8/Rails-3-2-11-3-1-10-3-0-19-and-2-3-15-have-been-released/




*** Aktuelle Foxit-Reader-Version führt Schadcode aus ***
---------------------------------------------
In Browser-Plug-in des PDF-Anzeigeprogramms klafft eine hochkritische Sicherheitslücke, weshalb man es umgehend abschalten sollte.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/275a0b01/l/0L0Sheise0Bde0Cmeldung0CAktuelle0EFoxit0EReader0EVersion0Efuehrt0ESchadcode0Eaus0E1780A290A0Bhtml0Cfrom0Crss0A9/story01.htm




*** Cisco Security Advisory: Cisco Prime LAN Management Solution Command Execution Vulnerability ***
---------------------------------------------
Advisory ID: cisco-sa-20130109-lms
---------------------------------------------
Cisco Prime LAN Management Solution (LMS) Virtual Appliance contains a
vulnerability that could allow an unauthenticated, remote attacker to
execute arbitrary commands with the privileges of the root user.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms


More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung