[CERT-daily] Tageszusammenfassung - Mittwoch 25-09-2013

Daily end-of-shift report team at cert.at
Wed Sep 25 18:12:40 CEST 2013


=======================
= End-of-Shift report =
=======================

Timeframe:   Dienstag 24-09-2013 18:00 − Mittwoch 25-09-2013 18:00
Handler:     Robert Waldner
Co-Handler:  n/a

*** IBM Rational ClearCase / ClearQuest GSKit Information Disclosure Weakness ***
---------------------------------------------
IBM has acknowledged a weakness in IBM Rational ClearCase and Rational ClearQuest, which can be exploited by malicious people to disclose certain sensitive information.
The weakness is caused due to a bundled vulnerable version of IBM Global Security ToolKit.
---------------------------------------------
https://secunia.com/advisories/54928




*** 7 Characteristics of a Secure Mobile App ***
---------------------------------------------
Keeping a mobile application secure is tough, but not impossible, and certain aspects of session management can go a long way in helping.
---------------------------------------------
http://www.csoonline.com/article/740266/7-characteristics-of-a-secure-mobile-app?source=rss_application_security




*** WordPress Custom Website Data Plugin Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in the Custom Website Data plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/54865




*** Linux Kernel "free_netdev()" Use-After-Free Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.
The vulnerability is caused due to a use-after-free error in the "tun_set_iff()" function (drivers/net/tun.c) and can be exploited to dereference already freed memory.
---------------------------------------------
https://secunia.com/advisories/54753




*** FFmpeg Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54972




*** Vuln: Cisco MediaSense CVE-2013-5502 Information Disclosure Vulnerability ***
---------------------------------------------
Cisco MediaSense is prone to an information-disclosure vulnerability.
A man-in-the-middle attacker may be able to exploit this issue to obtain sensitive information. Information obtained may aid in further attacks. 
---------------------------------------------
http://www.securityfocus.com/bid/62601




*** Wordpress simple forum Cross site scripting Vulnerability ***
---------------------------------------------
Exploit Title : Wordpress simple forum Cross site scripting Vulnerability
Exploit Author : Ashiyane Digital Security Team
Software Link : http://wordpress.org
Tested on: Windows 7 , Linux
Date: 2013/09/23
Exploit : Cross site scripting
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013090168




*** Bugtraq: CVE-2013-5118 - XSS Good for Enterprise iOS ***
---------------------------------------------
Last month I identified a XSS vulnerability in the Good for Enterprise iOS application.
The vulnerable versions are v2.2.2.1611 and earlier
---------------------------------------------
http://www.securityfocus.com/archive/1/528839




*** Now You See Me – H-worm by Houdini ***
---------------------------------------------
H-worm is a VBS (Visual Basic Script) based RAT written by an individual going by the name Houdini. We believe the author is based in Algeria and has connections to njq8, the author of njw0rm and njRAT/LV 
---------------------------------------------
http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html




*** Security Bulletin: IBM Tivoli Composite Application Manager for Transactions affected by vulnerabilities in IBM JRE (Multiple CVEs) ***
---------------------------------------------
IBM Tivoli Composite Application Manager for Transactions is shipped with two IBM JREs that are based on Oracle Java. It is also dependent on ITM 6.2.1 Framework, which also has its own JRE. Oracle has released an April 2013 Critical Patch Update (CPU) that contains security vulnerability fixes and IBM Java is affected.    CVE(s):    CVE-2013-0401  CVE-2013-0402  CVE-2013-1488  CVE-2013-1491  CVE-2013-1518  CVE-2013-1537  CVE-2013-1540  CVE-2013-1557  CVE-2013-1558  CVE-2013-1561  CVE-2013-1563
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_tivoli_composite_application_manager_for_transactions_affected_by_vulnerabilities_in_ibm_jre_multiple_cves1?lang=en_us




*** Is mobile anti-virus necessary? ***
---------------------------------------------
Experts disagree over whether or not there are any immediate threats
---------------------------------------------
http://www.csoonline.com/article/740301/is-mobile-anti-virus-necessary-?source=rss_application_security




*** Social media spam on the rise, says study ***
---------------------------------------------
Recent report from Nexgate points to 355 percent increase in social media spam in 2013 alone
---------------------------------------------
http://www.csoonline.com/article/740292/social-media-spam-on-the-rise-says-study?source=rss_application_security




*** SurgeMail surgeweb interface security bypass ***
---------------------------------------------
SurgeMail could allow a remote attacker to bypass security restrictions, caused by the failure to restrict access to other accounts by the surgeweb interface. An attacker could exploit this vulnerability to login to another user's accounts.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/87335




*** Google Chrome 31.0 Webkit Auditor Bypass ***
---------------------------------------------
Topic: Google Chrome 31.0 Webkit Auditor Bypass
Risk: Low
Title: Chrome 31.0 Webkit XSS Auditor Bypass 
Author: Rafay Baloch @rafaybaloch And PEPE Vila
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013090173




*** Newly launched E-shop offers access to hundreds of thousands of compromised accounts ***
---------------------------------------------
In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented cybercrime ecosystem, the increasing availability of sophisticated commercial/leaked DIY undetectable malware generating tools, malware-infected hosts as a service, log files on demand services, as well as basic data mining concepts applied on behalf of the operator of a particular botnet. What
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/iHbGGHj2f1o/




*** Details zum iPhone-5s-Hack ***
---------------------------------------------
ct dokumentiert Schritt-für-Schritt, wie Starbug den Fingerabdruck-Sensor des iPhone 5S austrickst.
---------------------------------------------
http://www.heise.de/newsticker/meldung/c-t-veroeffentlicht-Details-zu-iPhone-5S-Hack-1966079.html




*** elproLOG MONITOR WebAccess Two Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
Vulnerability Lab has reported two vulnerabilities in elproLOG MONITOR WebAccess, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/54955




*** IT-Sicherheitsbranche: it-sa 2013 wieder mit Kongress, aber ohne Extraentgelt ***
---------------------------------------------
2012 begleitete die it-sa erstmalig ein Kongressprogramm. Der Kongress ist nun wieder dabei, muss aber nicht mehr extra bezahlt werden. Für Studierende der Informatik gibt es spezielle Vorträge und Sonderschauen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/IT-Sicherheitsbranche-it-sa-2013-wieder-mit-Kongress-aber-ohne-Extraentgelt-1965352.html




*** Bugtraq: GreHack 2013 - 15 Nov. Grenoble, France - Conf. Registration OPEN ***
---------------------------------------------
GREHACK 2013 - 2nd International Symposium in Grey-Hat Hacking
2nd Edition - p*wn me i'm famous!

http://grehack.org
https://twitter.com/grehack

Grenoble, France
November 15, 2013
---------------------------------------------
http://www.securityfocus.com/archive/1/528852




*** UKs Get Safe Online? No one cares - run the blockbuster ads instead ***
---------------------------------------------
Something like Jack Bauers 24 ... whatever itll take to teach kids how to bat away hackers The UKs Get Safe Online campaign has failed to teach Brits how to secure their computers - so says the ex top cop who established the information security awareness effort in 2004.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/09/25/gets_safe_online_has_failed_to_change_behaviours/




*** Splunk Alert Test Scripts Arbitrary Command Execution Vulnerabilities ***
---------------------------------------------
Some vulnerabilities have been reported in Splunk, which can be exploited by malicious users to compromise a vulnerable system.
The vulnerabilities are caused due to some errors related to alert testing and troubleshooting scripts and can be exploited to execute arbitrary shell scripts.
The vulnerabilities are reported in versions prior to 5.0.5.
---------------------------------------------
https://secunia.com/advisories/54934




*** Oracle Solaris Tomcat FormAuthenticator Session Hijacking Weakness ***
---------------------------------------------
Oracle has acknowledged a weakness in Tomcat included in Solaris, which can be exploited by malicious people to hijack a user's session.
---------------------------------------------
https://secunia.com/advisories/55033




*** Oracle Solaris Kerberos KDC Two Vulnerabilities ***
---------------------------------------------
Oracle has acknowledged two vulnerabilities in Kerberos included in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system and by malicious people to potentially compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/55036




*** IBM Sterling External Authentication Server JRE Multiple Vulnerabilities ***
---------------------------------------------
The application bundles a vulnerable version of the Java Runtime Environment (JRE).
---------------------------------------------
https://secunia.com/advisories/55004




*** Several vulnerabilities in extension Apache Solr for TYPO3 (solr) ***
---------------------------------------------
It has been discovered that the extension "Apache Solr for TYPO3" (solr) is vulnerable to Cross-Site Scripting and Insecure Unserialize. Affected Versions: Version 2.8.2 and below
---------------------------------------------
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-009/




*** Security issues in several third party TYPO3 ectensions ***
---------------------------------------------
Direct Mail (direct_mail)
RealURL: speaking paths for TYPO3 (realurl)
Formhandler (formhandler) AWStats (cc_awstats)
booking (booking)
ICS AWStats (ics_awstats)
Simple Image Gallery (iflowgallery)
Ratsinformationssystem (RIS) (cronmm_ratsinfo)
Frontend User Registration (ke_userregister)
AWStats with individual access (meta_beawstatsind)
Powermail double opt-in (powermail_optin)
smarty (smarty)
Youtube Channel Videos (youtubevideos)
---------------------------------------------
http://lists.typo3.org/pipermail/typo3-announce/2013/000285.html




*** iPhone-Trojaner verdient mit Klickbetrug ***
---------------------------------------------
Eine App für iPhones mit Jailbreak, die eigentlich im Browser WebGL-Funktionen freischalten soll, bringt dem Entwickler nebenbei noch Einnahmen aus versteckt angezeigter Werbung ein.
---------------------------------------------
http://www.heise.de/newsticker/meldung/iPhone-Trojaner-verdient-mit-Klickbetrug-1966560.html




*** ClearSCADA Web Requests Handling Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in ClearSCADA, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54931




*** Oracle Solaris Kerberos kpasswd UDP Packet Processing Denial of Service Vulnerability ***
---------------------------------------------
Oracle has acknowledged a vulnerability in Kerberos included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/55039




*** Cyber attacks will cause real world harm in next seven years ***
---------------------------------------------
New technologies such as Google Glass and IPv6 will lead to new, deadly forms of cyber attack if current manufacturing security practices continue, according to experts from Europol, Trend Micro and The International Cyber Security Protection Alliance (ICSPA). The experts made the warning in a recently published Scenarios for the Future of Cyber Crime white paper. The paper explored what threats the experts expect to emerge in the next six and a half years ...
---------------------------------------------
http://www.v3.co.uk/v3-uk/analysis/2296357/cyber-attacks-will-cause-real-world-harm-in-next-seven-years




*** Secure Domain Name System (DNS) Deployment Guide ***
---------------------------------------------
This document provides deployment guidelines for securing DNS within an enterprise. Because DNS data is meant to be public, preserving the confidentiality of DNS data. The primary security goals for DNS are data integrity and source authentication, which are needed to ensure the authenticity of domain name information and maintain the integrity of domain name information in transit. This document provides extensive guidance on maintaining data integrity and performing source authentication.
---------------------------------------------
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81-2.pdf




*** How to Protect Your Privacy on Social Media ***
---------------------------------------------
How do you keep information private on social networking sites? ... Relying on a site’s privacy settings is just the start. While stricter account settings and tools can help you maintain privacy, there are other ways your personal information can leak out to the public. Knowing and addressing these potential privacy risks will help you protect your data.
---------------------------------------------
http://about-threats.trendmicro.com/ebooks/how-to-protect-your-privacy-on-social-media/files/assets/downloads/how-to-protect-your-privacy-on-social-media.pdf




*** Oracle Solaris LibXSLT "xsltDocumentFunction()" and "xsltAddKey()" Denial of Service Vulnerabilities ***
---------------------------------------------
Oracle has acknowledged two vulnerabilities in LibXSLT included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/55030






More information about the Daily mailing list