[CERT-daily] Tageszusammenfassung - Montag 15-06-2015

Daily end-of-shift report team at cert.at
Mon Jun 15 18:16:41 CEST 2015


=======================
= End-of-Shift report =
=======================

Timeframe:   Freitag 12-06-2015 18:00 − Montag 15-06-2015 18:00
Handler:     Stephan Richter
Co-Handler:  n/a




*** Hey kids, who wants to pwn a million BIOSes? ***
---------------------------------------------
IT security bods warn of dysfunctional ecosystem, fraught with vulnerability The overlooked task of patching PC BIOS and UEFI firmware vulnerabilities leaves corporations wide open to attack, a new paper by security researchers warns.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/12/bios_security_is_pants/




*** Oh look - JavaScript Droppers ***
---------------------------------------------
In a typical drive-by-download attack scenario the shellcode would download and execute a malware binary. The malware binary is usually wrapped in a dropper that unpacks or de-obfuscates and executes it. Droppers' main goal is to launch malware without being detected by antiviruses and HIPS. Nowadays the most popular way of covert launching would probably...
---------------------------------------------
http://labs.bromium.com/2015/06/12/oh-look-javascript-droppers/




*** NTP für Windows: Schaltsekunde könnte Probleme bereiten ***
---------------------------------------------
Wer den NTP-Client für Windows installiert hat, sollte vor dem 30. Juni ein Update durchführen
---------------------------------------------
http://derstandard.at/2000017430786




*** Windows Server 2003 End of Life: You Can't RIP ***
---------------------------------------------
Windows XP reached end of support last year and now it's time for another end of life: Windows Server 2003. On July 14, 2015, this widely deployed Microsoft operating system will reach its end of life - a long run since its launch in April 2003. Estimates on the number of still-active Windows Server 2003 users vary from...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/FwOEN1rriTc/




*** OPM hack: Vast amounts of extremely sensitive data stolen ***
---------------------------------------------
The extent of the breach suffered by the US Office of Personnel Management has apparently widened. Reports are coming in that the hackers have not only accessed Social Security numbers, job assign...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/FaMAmsBY66Y/secworld.php




*** Dnstwist variiert und testet Domainnamen ***
---------------------------------------------
Wer überwachen will, wie Vertipper- und Phishing-Domains für einen Domainnamen verbreitet sind, kann das Python-Skript Dnstwist nutzen. Es übernimmt viel Handarbeit und hilft bei der Analyse.
---------------------------------------------
http://heise.de/-2690418




*** The top mistakes banks make defending against hackers ***
---------------------------------------------
Many financial institutions fail to perform comprehensive risk analysis and assessment, exposing their companies and clients to enormous risk.
---------------------------------------------
https://www.htbridge.com/blog/the-top-mistakes-banks-make-defending-against-hackers.html




*** Call to participate in the EU28 Cloud Security Conference ***
---------------------------------------------
On June 16, in Riga, the Ministry of Defence of the Republic of Latvia and the European Union Agency for Network and Information Security (ENISA) will organise the EU28 Cloud Security Conference: Reaching the Cloud Era in the European Union. The participants of the conference will discuss the cloud security in the two parallel tracks: "Legal & Compliance" and "Technologies and Solutions".
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/call-to-participate-in-the-eu28-cloud-security-conference




*** The Duqu 2.0 persistence module ***
---------------------------------------------
We have described how Duqu 2.0 does not have a normal "persistence" mechanism. This can lead users to conclude that flushing out the malware is as simple as rebooting all the infected machines. In reality, things are a bit more complicated.
---------------------------------------------
http://securelist.com/blog/research/70641/the-duqu-2-0-persistence-module/




*** Duqu 2.0 Attackers Used Stolen Foxconn Certificate to Sign Driver ***
---------------------------------------------
The attackers behind the recently disclosed Duqu 2.0 APT have used stolen digital certificates to help sneak their malware past security defenses, and one of the certificates used in the attacks was issued to Foxconn, the Chinese company that manufactures products for Apple, BlackBerry, Dell, and many other companies. Researchers at Kaspersky Lab, who discovered...
---------------------------------------------
http://threatpost.com/duqu-2-0-attackers-used-stolen-foxconn-certificate-to-sign-driver/113315




*** Massive route leak causes Internet slowdown ***
---------------------------------------------
Earlier today a massive route leak initiated by Telekom Malaysia (AS4788) caused significant network problems for the global routing system. Primarily affected was Level3 (AS3549 - formerly known as Global Crossing) and their customers. Below are some of the details as we know them now.
---------------------------------------------
https://www.bgpmon.net/massive-route-leak-cause-internet-slowdown/




*** Cisco issues 16 patches to pop pesky peccant packets ***
---------------------------------------------
Remote code execution for some, denial of service for the rest of us Cisco has issued a string of patches for 16 faults including a fix for a possible remote code execution in its IOS and IOS XE routing software.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/15/cisco_ipv6_ios_xr_patch/




*** Vulnerabilities in Cisco Products ***
---------------------------------------------

*** Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl

*** Cisco Email Security Appliance Anti-Spam Scanner Bypass Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39339

*** Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39343

*** Cisco Virtualization Experience Client 6215 Devices Command Injection Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39347




*** Novell ZENworks Mobile Management Input Validation Flaw Permits Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1032576




*** Novell Messenger 3.0 Support Pack 1 ***
---------------------------------------------
Abstract: Novell Messenger 3.0 Support Pack 1 has been released. Please be aware that there are security fixes to Messengers server and client components (see the change log below and the Readme documentation on the web). It is recommended that they are updated on an expedited basis.Document ID: 5212230Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:consoleone1.3.6h_windows.zip (46.82 MB)nm301_full_linux_multi.tar.gz (269.54 MB)nm301_client_mac_multi.zip (40.62...
---------------------------------------------
https://download.novell.com/Download?buildid=o8Y11QiTuc4~




*** DSA-3285 qemu-kvm - security update ***
---------------------------------------------
Several vulnerabilities were discovered in qemu-kvm, a fullvirtualization solution on x86 hardware.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3285




*** DSA-3284 qemu - security update ***
---------------------------------------------
Several vulnerabilities were discovered in qemu, a fast processoremulator.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3284




*** DSA-3288 libav - security update ***
---------------------------------------------
Several security issues have been corrected in multiple demuxers anddecoders of the libav multimedia library. A full list of the changes isavailable at https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.4
---------------------------------------------
https://www.debian.org/security/2015/dsa-3288




*** DSA-3287 openssl - security update ***
---------------------------------------------
Multiple vulnerabilities were discovered in OpenSSL, a Secure SocketsLayer toolkit.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3287




*** DSA-3286 xen - security update ***
---------------------------------------------
Multiple security issues have been found in the Xen virtualisationsolution:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3286




*** Vulnerabilities in multiple third party TYPO3 CMS extensions ***
---------------------------------------------

*** SQL Injection vulnerability in extension FAQ - Frequently Asked Questions (js_faq) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-faq-frequently-asked-questions-js-faq/

*** SQL Injection vulnerability in extension Developer Log (devlog) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-developer-log-devlog/

*** SQL Injection vulnerability in extension Smoelenboek (ncgov_smoelenboek) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-smoelenboek-ncgov-smoelenboek/

*** SQL Injection vulnerability in extension Store Locator (locator) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-store-locator-locator/

*** SQL Injection vulnerability in extension wt_directory (wt_directory) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-wt-directory-wt-directory/

*** Arbitrary Code Execution in extension Frontend User Upload (feupload) ***
http://www.typo3.org/news/article/arbitrary-code-execution-in-extension-frontend-user-upload-feupload/

*** Cross-Site Scripting in extension BE User Log (beko_beuserlog) ***
http://www.typo3.org/news/article/cross-site-scripting-in-extension-be-user-log-beko-beuserlog/

*** Arbitrary Code Execution in extension Job Fair (jobfair) ***
http://www.typo3.org/news/article/arbitrary-code-execution-in-extension-job-fair-jobfair/




*** Security Advisory - Web UI Authentication Vulnerability in Huawei E5756S ***
---------------------------------------------
Jun 15, 2015 18:00
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-441178.htm




*** Filezilla 3.11.0.2 sftp module denial of service vulnerability ***
---------------------------------------------
Topic: Filezilla 3.11.0.2 sftp module denial of service vulnerability Risk: Medium Text: # Exploit title: filezilla 3.11.0.2 sftp module denial of service vulnerability # Date: 5-6-2015 # Vendor homepage: http...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060077




*** putty v0.64 denial of service vulnerability ***
---------------------------------------------
Topic: putty v0.64 denial of service vulnerability Risk: Medium Text: # Exploit title: putty v0.64 denial of service vulnerability # Date: 5-6-2015 # Vendor homepage: http://www.chiark.green...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060076




*** E-Detective Lawful Interception System multiple security vulnerabilities ***
---------------------------------------------
Topic: E-Detective Lawful Interception System multiple security vulnerabilities Risk: Medium Text:Advisory: E-Detective Lawful Interception System multiple security vulnerabilities Date: 14/06/2015 CVE: ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060075


More information about the Daily mailing list