Deutsch | English

[CERT-daily] Tageszusammenfassung - Mittwoch 13-03-2013

Daily end-of-shift report team at cert.at
Wed Mar 13 18:19:42 CET 2013


=======================
= End-of-Shift report =
=======================

Timeframe:   Dienstag 12-03-2013 18:00 − Mittwoch 13-03-2013 18:00
Handler:     Stephan Richter
Co-Handler:  L. Aaron Kaplan




*** MS13-026 - Important : Vulnerability in Office Outlook for Mac Could Allow Information Disclosure (2813682) - Version: 1.0 ***
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-026


*** MS13-003 - Important : Vulnerabilities in System Center Operations Manager Could Allow Elevation of Privilege (2748552) - Version: 2.0 ***
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-003




*** Flash: Unseren monatlichen Patch gib uns heute ***
---------------------------------------------
Adobe veröffentlicht wieder Sicherheits-Updates für den Flash-Player, diesmal ausnahmsweise nicht außer der Reihe. Eine wesentliche Lücke bleibt dabei aber ungestopft.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/297e24e3/l/0L0Sheise0Bde0Csecurity0Cmeldung0CFlash0EUnseren0Emonatlichen0EPatch0Egib0Euns0Eheute0E18217560Bhtml0Cfrom0Crss0A9/story01.htm




*** ASUS RT-N66U multiple vulns ***
---------------------------------------------
Topic: ASUS RT-N66U multiple vulns Risk: Medium Text:Vulnerable product: ASUS RT-N66U Vulnerabilities: - Linux 2.6.22.19 - Old libraries and executables Interesting vulnerabili...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/o7EbpwGc_yk/WLB-2013030099




*** Google rolls out initiative to help hacked sites ***
---------------------------------------------
"With its new informational series, the Web giant aims to answer questions about why a site was hacked, what malware may have been used, and how to wipe the site clean of bugs. Its not pretty when a Web site gets a "this site may be compromised" or "this site may harm your computer" status note. Many webmasters and Web site owners can be at a loss of what to do in these situations...."
---------------------------------------------
http://news.cnet.com/8301-1023_3-57573986-93/google-rolls-out-initiative-to-help-hacked-sites/




*** Security-Linux Kali tritt Nachfolge von BackTrack an ***
---------------------------------------------
Mit einer neuen Tool-Auswahl und einem modernen Linux-Unterbau lässt Kali die Altlasten von BackTrack hinter sich. Die Distribution für Pentester, Admins und Forensiker steht ab sofort zum Download bereit.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/2983f19a/l/0L0Sheise0Bde0Csecurity0Cmeldung0CSecurity0ELinux0EKali0Etritt0ENachfolge0Evon0EBackTrack0Ean0E18217520Bhtml0Cfrom0Crss0A9/story01.htm




*** Security agency tells Europe to find alternative to risky email ***
---------------------------------------------
"European governments and businesses should investigate alternative communication channels to e-mail in the longer term after a string of alarming attacks, the EUs cyber security agency warned today (13 March) in a special alert. The European Network and Information Security Agency (ENISA) issued the so-called Flash Note in the wake of recent major cyber-attacks, calling for Europes businesses and governments to take urgent action to combat emerging cyber-attack trends. The report cites...
---------------------------------------------
http://www.euractiv.com/infosociety/security-agency-tells-europe-fin-news-518449




*** Exploit Kit Distribution in the Wild ***
---------------------------------------------
Have you ever wondered which exploit kits are the most prevalent?We have been tracking several exploit kits that we have identified these past few months and its interesting to see which gets the biggest chunk of the pie:56% of the coverage is owned by only three exploit kits: Blackhole, Sweet Orange, and Cool.Blackhole, a kit that has been around for almost three years, is still keeping a strong presence at no. 1 with 27% of the exploit kit coverage. Followed by Sweet Orange with 18% and Cool...
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002522.html




*** (IN)SECURE Magazine Issue 37 released ***
---------------------------------------------
"IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Issue #37 has just been released - download the magazine! The articles in this issue include:Becoming a malware analystReview: Nipper StudioFive questions for Microsofts Chief Privacy OfficerApplication security testing for AJAX and JSONPenetrating and achieving persistence in highly secured networksReport: RSA Conference 2013Social engineering: An underestimated...
---------------------------------------------
http://www.net-security.org/insecuremag.php




*** Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1, (Wed, Mar 13th) ***
---------------------------------------------
At Shmoocon 2013 Jake Williams (@MalwareJake) and I gave a presentation entitled Wipe the Drive. The point of the presentation was that you should always wipe the drive and reinstall the OS after a confirmed malware infection. We all know wiping the drive is the safest move but there are business pressures to simply remove the known malware and move on. Also, because we are security professionals there is often an expectation that we are able to remove all the malware. But, in my and Jakes...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15394&rss




*** Bugtraq: Open-Xchange Security Advisory 2013-03-13 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/525979




*** Bugtraq: SEC Consult SA-20130313-0 :: QlikView Desktop Client Integer Overflow ***
---------------------------------------------
http://www.securityfocus.com/archive/1/525980




*** Issue with SWFUploader Could Lead to XSS Vulnerabilities, Content Spoofing ***
---------------------------------------------
Many versions of SWFUpload – an applet that combines Flash and
JavaScript that’s used in millions of websites, including WordPress
sites– are vulnerable to content spoofing and a cross-site scripting
vulnerability that could lead to the takeover of accounts, according to
reports this week.
---------------------------------------------
https://threatpost.com/en_us/blogs/issue-swfuploader-could-lead-xss-vulnerabilities-content-spoofing-031213



More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung