Deutsch | English

[CERT-daily] Tageszusammenfassung - Dienstag 23-09-2014

Daily end-of-shift report team at cert.at
Tue Sep 23 18:08:57 CEST 2014


=======================
= End-of-Shift report =
=======================

Timeframe:   Montag 22-09-2014 18:00 − Dienstag 23-09-2014 18:00
Handler:     Stephan Richter
Co-Handler:  Robert Waldner




*** Cyber Campaigns ***
---------------------------------------------
This website simply lists multiple cyber-espionage and cyber-attack campaigns. These campaigns have successfully compromised hundreds of government entities and global corporations in over 50 countries. Click on any of the links below to access more detailed information regarding these cyber campaigns. If you see one missing, just let me know.
---------------------------------------------
http://cybercampaigns.net/




*** Whonix Anonymous Operating System Version 9 Released ***
---------------------------------------------
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
---------------------------------------------
https://www.whonix.org/blog/whonix-anonymous-9-released




*** UK banks hook themselves up to real-time cop data feed ***
---------------------------------------------
Not like the movies: Law enforcement is on it... UK banks will receive real-time warnings about threats to their customers accounts as well as the overall integrity of their banking systems from a new financial crime alert system.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/23/uk_bank_fraud_alert_system/




*** HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access ***
---------------------------------------------
A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL. The vulnerability could be exploited remotely to allow remote unauthorized access.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04451722




*** BIND 9.8.8, 9.9.6 and 9.10.1 Release Notes ***
---------------------------------------------
https://kb.isc.org/article/AA-01211/81/BIND-9.8.8-Release-Notes.html
https://kb.isc.org/article/AA-01210/81/BIND-9.9.6-Release-Notes.html
https://kb.isc.org/article/AA-01209/81/BIND-9.10.1-Release-Notes.html




*** Bugtraq: Glype proxy cookie jar path traversal allows code execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533504




*** Security Advisory-Screen Capture Vulnerability on Huawei Ascend P6 Mobile Phones ***
---------------------------------------------
Sep 23, 2014 17:47
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372118.htm




*** TYPO3 CMS 4.5.36, 6.1.11 and 6.2.5 released ***
---------------------------------------------
All versions are maintenance releases and contain bug fixes.
---------------------------------------------
https://typo3.org/news/article/typo3-cms-4536-6111-and-625-released/




*** [20140901] - Core - XSS Vulnerability ***
---------------------------------------------
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 3.2.0 through 3.2.4, 3.3.0 through 3.3.3 Exploit type: XSS Vulnerability Reported Date: 2014-August-27 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6631  Description Inadequate escaping leads to XSS vulnerability in com_media. Affected Installs Joomla! CMS versions 3.2.0 through 3.2.4 and 3.3.0 through 3.3.3 Solution Upgrade to version 3.2.5 or 3.3.4 Contact The JSST at the Joomla! Security Center. Reported By: Dingjie (Daniel)
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/EiyFsQIjpu4/593-20140901-core-xss-vulnerability.html




*** [20140902] - Core - Unauthorised Logins ***
---------------------------------------------
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Exploit type: Unauthorised Logins Reported Date: 2014-September-09 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6632  Description Inadequate checking allowed unauthorised logins via LDAP authentication. Affected Installs Joomla! CMS versions 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Solution
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/uFCKpt1YcxU/594-20140902-core-unauthorised-logins.html




*** XEN Security Advisories ***
-------------------------------

*** Race condition in HVMOP_track_dirty_vram ***
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-104.html

*** Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation ***
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-105.html

*** Missing privilege level checks in x86 emulation of software interrupts ***
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-106.html


More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung