[CERT-daily] Tageszusammenfassung - Freitag 28-06-2013

Daily end-of-shift report team at cert.at
Fri Jun 28 18:12:04 CEST 2013


=======================
= End-of-Shift report =
=======================

Timeframe:   Donnerstag 27-06-2013 18:00 − Freitag 28-06-2013 18:00
Handler:     Stephan Richter
Co-Handler:  n/a




*** Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Apache XML Security, which can be exploited by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53959




*** April-June 2013 ***
---------------------------------------------
The “ICS-CERT Monitor” newsletter offers a means of promoting preparedness, information sharing, and collaboration with the 16 critical infrastructure sectors. ICS‑CERT accomplishes this on a day-to-day basis through sector briefings, meetings, conferences, and information product releases.
---------------------------------------------
http://ics-cert.us-cert.gov/monitors/ICS-MM201306




*** Citadel Trojan Variant Delivers Localized Content, Targets Amazon Customers ***
---------------------------------------------
A new variant of the Citadel banking malware was discovered, this one delivering localized content for European targets that include not only banks but major ecommerce sites such as Amazon.
---------------------------------------------
http://threatpost.com/citadel-trojan-variant-delivers-localized-content-targets-amazon-customers/




*** One-click/key attack forces IE and Chrome to execute malicious code ***
---------------------------------------------
Minimal user interaction increases chances that social engineering will succeed.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/siZrFBsO_0E/




*** Ruby Certificate Hostname Validation Flaw Lets Remote Users Spoof SSL Servers ***
---------------------------------------------
A vulnerability was reported in Ruby. A remote user can spoof SSL servers.
---------------------------------------------
http://www.securitytracker.com/id/1028714




*** Bugtraq: Mobile USB Drive HD 1.2 - Arbitrary File Upload Vulnerability ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the Mobile USB Drive HD v1.2 apple iOS application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526997




*** Bugtraq: eFile Wifi Transfer Manager 1.0 iOS - Multiple Vulnerabilities ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the eFile Wifi Manager v1.0 iOS mobile application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526995




*** Bugtraq: Re: Re: EMC Avamar: World writable cache files ***
---------------------------------------------
Due to a vulnerability, described in detail below, the Avamar client leaves certain directories and files as world writable. The presence of world writable directories and files may inadvertently result in elevation of privileges by a user who has access to the local file system.
---------------------------------------------
http://www.securityfocus.com/archive/1/526996




*** Bugtraq: Barracuda CudaTel 2.6.02.04 - Multiple Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526999
http://www.securityfocus.com/archive/1/527000




*** Xerox WorkCube / Xerox ColorQube Unspecified Vulnerabilities ***
---------------------------------------------
Some vulnerabilities with an unknown impact have been reported in Xerox WorkCube and Xerox ColorQube.
---------------------------------------------
https://secunia.com/advisories/54005




*** Criminals sell access to rooted servers via online shop ***
---------------------------------------------
Researchers have discovered an online store where criminals sell access to hacked servers, another cautionary example of miscreants commercialization of stolen data.
---------------------------------------------
http://www.scmagazine.com//criminals-sell-access-to-rooted-servers-via-online-shop/article/300772/




*** Cisco ASA Next-Generation Firewall Services Fragmented Traffic Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Cisco ASA Next-Generation Firewall Services, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53971


More information about the Daily mailing list