Deutsch | English

[CERT-daily] Tageszusammenfassung - Mittwoch 19-11-2014

Daily end-of-shift report team at cert.at
Wed Nov 19 18:03:33 CET 2014


=======================
= End-of-Shift report =
=======================

Timeframe:   Dienstag 18-11-2014 18:00 − Mittwoch 19-11-2014 18:00
Handler:     Stephan Richter
Co-Handler:  n/a




*** MS14-068 - Critical: Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780) - Version: 1.0 ***
---------------------------------------------
This security update resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to...
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-068




*** Additional information about CVE-2014-6324 ***
---------------------------------------------
Today Microsoft released update MS14-068 to address CVE-2014-6324, a Windows Kerberos implementation elevation of privilege vulnerability that is being exploited in-the-wild in limited, targeted attacks. The goal of this blog post is to provide additional information about the vulnerability, update priority, and detection guidance for defenders. Microsoft recommends customers apply this update to their domain controllers as quickly as possible.  Vulnerability Details  CVE-2014-6324 allows...
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/11/18/additional-information-about-cve-2014-6324.aspx




*** Google Removes SSLv3 Fallback Support From Chrome ***
---------------------------------------------
Google has released Chrome 39, fixing 42 security vulnerabilities and removing support for the fallback to SSLv3, the component that was the target of the POODLE attack revealed last month. When the POODLE attack was disclosed by several Google researchers in October, the company said that it had added a change to Chrome that would...
---------------------------------------------
http://threatpost.com/google-removes-sslv3-fallback-support-from-chrome/109455




*** A New Free CA ***
---------------------------------------------
Announcing Lets Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely fantastic idea. The anchor for any TLS-protected communication is a public-key certificate which demonstrates that the server youre actually talking to is the server you intended to talk to. For many server operators,...
---------------------------------------------
https://www.schneier.com/blog/archives/2014/11/a_new_free_ca.html




*** Survey: real-time SIEM solutions help orgs detect attacks within minutes ***
---------------------------------------------
Real-time security information and event management solutions help organizations detect targeted attacks and advanced persistent threats within minutes, according to a McAfee survey.
---------------------------------------------
http://www.scmagazine.com/survey-real-time-siem-solutions-help-orgs-detect-attacks-within-minutes/article/384030/




*** POWELIKS Levels Up With New Autostart Mechanism ***
---------------------------------------------
Last August, we wrote about POWELIKS's malware routines that are known for hiding its malicious codes in the registry entry as part of its evasion tactics. In the newer samples we spotted, malware detected as TROJ_POWELIKS.B employed a new autostart mechanism and removes users' privileges in viewing the registry's content. As a result, users won't be able to suspect that...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/zurdvNxST00/




*** Pan-European Cyber Security Competition organised by ENISA ***
---------------------------------------------
Today (19 November 2014) the European Union Agency for Network and Information Security (ENISA) is happy to announce the planning of the 1st pan-European Cyber Security Competition in 2015. The competition is organised jointly in collaboration with experienced organisations from EU Member States for students.
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/pan-european-cyber-security-competition-organised-by-enisa




*** RSS Reveals Malware Injections ***
---------------------------------------------
There are multiple different ways to detect invisible malware on a website: You can scrutinize the HTML code of web pages. Use external scanners like SiteCheck or UnmaskParasites. Get alerts from anti-viruses or search engines (both in search results and via their Webmaster Tools). Try to open web pages with different User-Agents and check for...
---------------------------------------------
http://blog.sucuri.net/2014/11/rss-reveals-malware-injections.html




*** Test Tool for Web App Security Scanners Released by Google ***
---------------------------------------------
A new tool was open-sourced by Google on Tuesday, aiming at improving the efficiency of automated web security scanners by evaluating them with patterns of vulnerabilities already seen in the wild.
---------------------------------------------
http://news.softpedia.com/news/Test-Tool-for-Web-App-Security-Scanners-Released-by-Google-465322.shtml




*** Microsoft bessert beim SChannel-Patch nach ***
---------------------------------------------
Still und heimlich haben die Windows-Macher am Dienstag mit dem Update außer der Reihe auch eine neue Revision des SChannel-Patches ausgeliefert. Diese soll die Probleme mit der TLS-Verschlüsselung und massive Performance-Einbußen bei SQL Server beheben.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-bessert-beim-SChannel-Patch-nach-2460212.html




*** Most advanced mobile botnet EVER is coming for your OFFICE Androids ***
---------------------------------------------
NotCompatible A newly discovered variant of NotCompatible is establishing what has been called the most advanced mobile botnet yet created.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/11/19/android_botnet_notcompatible/




*** jQuery: Cross-Site-Scripting in Captcha-Beispielcode weit verbreitet ***
---------------------------------------------
Ein populäres jQuery-Plugin liefert Code mit einer Cross-Site-Scripting-Lücke aus. Der verwundbare Code stammt ursprünglich von einem Beispielskript für Captchas, das auf sehr vielen Webseiten zu finden ist.
---------------------------------------------
http://www.golem.de/news/jquery-cross-site-scripting-in-captcha-beispielcode-weit-verbreitet-1411-110660-rss.html




*** A Peek Inside a PoS Scammer's Toolbox ***
---------------------------------------------
PoS malware has been receiving a tremendous amount of attention in the past two years with high profile incidents like Target, Home Depot, and Kmart. With the massive "Black Friday" shopping season coming up, PoS malware will surely get additional publicity. This high profile nature means, we constantly look for evolving PoS malware and look into their behavior...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/xF7gxViXP4A/




*** Nasty Security Bug Fixed in Android Lollipop 5.0 ***
---------------------------------------------
There is a vulnerability in Android versions below 5.0 that could allow an attacker to bypass ASLR and run arbitrary code on a target device under certain circumstances. The bug was fixed in Lollipop, the newest version of the mobile OS, released earlier this week. The vulnerability lies in java.io.ObjectInputStream, which fails to check whether...
---------------------------------------------
http://threatpost.com/nasty-security-bug-fixed-in-android-lollipop-5-0/109476




*** Cisco Unified Communications Manager IM and Presence Service Enumeration Vulnerability ***
---------------------------------------------
CVE-2014-8000
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8000




*** Multiple Samsung Galaxy Devices knox code execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/98780




*** Google Chrome pdfium code execution ***
---------------------------------------------
Google Chrome pdfium code execution
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/98790




*** Bugtraq: [SECURITY] [DSA 3074-2] php5 regression update ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534018




*** Bugtraq: Reflected Cross-Site Scripting (XSS) in Simple Email Form Joomla Extension ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534017


More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung