[CERT-daily] Tageszusammenfassung - Donnerstag 26-03-2015

Daily end-of-shift report team at cert.at
Thu Mar 26 18:22:16 CET 2015


=======================
= End-of-Shift report =
=======================

Timeframe:   Mittwoch 25-03-2015 18:00 − Donnerstag 26-03-2015 18:00
Handler:     Stephan Richter
Co-Handler:  n/a




*** Pin-up on your Smartphone!, (Thu, Mar 26th) ***
---------------------------------------------
Yeah, okay, I admit that headline is cheap click bait. Originally, it said Certificate Pinning on Smartphones. If you are more interested in pin-ups on your smartphone, I fear youll have to look elsewhere :). Recently, an email provider that I use changed their Internet-facing services completely. I hadnt seen any announcement that this would happen, and the provider likely thought that since the change was transparent to the customer, no announcement was needed. But Im probably a tad more...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19513&rss




*** Data lurking: How to protect your company against overlooked insider threats ***
---------------------------------------------
Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system err...
---------------------------------------------
http://www.net-security.org/article.php?id=2245




*** Setting issue in Windows 7 and 8.1 could allow privilege escalation ***
---------------------------------------------
Experts of the Project Zero have disclosed a proof-of-concept for the exploitation of a default setting in Windows 7, 8.1 that allow privilege escalation. A new security issue threatens users of Windows 7 and 8.1, this time experts are warning about a default setting in both OSs that could allow local users to elevate privileges...
---------------------------------------------
http://securityaffairs.co/wordpress/35318/hacking/win-7-and-8-1-privilege-escalation.html




*** Security Harden CentOS 7 ***
---------------------------------------------
This HowTo walks you through the steps required to security harden CentOS 7, it's based on the OpenSCAP benchmark, unfortunately the current version of OpenSCAP that ships with CentOS does not offically support CentOS CPEs. But there is a "workaround" that will allow OpenSCAP + OpenSCAP workbench to run on CentOS, I'll document this in a separate post.
---------------------------------------------
http://highon.coffee/blog/security-harden-centos-7/




*** Encryption Solutions for the New World ***
---------------------------------------------
Keeping personal information secure and protected remains a top priority for computer users who now rely heavily on information systems to manage a large part of their personal and business lives. One of the ways to make sure only authorized users have access to information is the use of encryption, a process that transforms data...
---------------------------------------------
http://resources.infosecinstitute.com/encryption-solutions-for-the-new-world/




*** Who Is the Antidetect Author? ***
---------------------------------------------
Earlier this month I wrote about Antidetect, a commercial tool designed to help thieves evade fraud detection schemes employed by many e-commerce companies. That piece walked readers through a sales video produced by the author of Antidetect showing the software being used to buy products online with stolen credit cards. Today, well take a closer look at clues to a possible real-life identity of this tools creator.
---------------------------------------------
http://krebsonsecurity.com/2015/03/who-is-the-antidetect-author/




*** Hacking-Kit für Steuergeräte im Auto ***
---------------------------------------------
Ein Hacking-Toolkit soll dabei helfen, IT-Sicherheitslücken bei Autos aufzudecken. Ziel ist es, die Hersteller zu mehr Sorgfalt bei diesem Thema zu bewegen.
---------------------------------------------
http://heise.de/-2585225




*** Verschlüsselung: RC4 erneut unter Beschuss ***
---------------------------------------------
Auf der Black Hat Asia hat der Kryptograph Itsik Mantin neue Angriffsmethoden gegen die RC4-Verschlüsselung vorgestellt. Den Grundstein dazu hatte Mantin bereits vor 13 Jahren gelegt. Davon unabhängig wurde kürzlich ein weiterer Angriff gegen RC4 vorgestellt, der IMAP-Verbindungen betrifft.
---------------------------------------------
http://www.golem.de/news/verschluesselung-rc4-erneut-unter-beschuss-1503-113189-rss.html




*** WordPress Malware Causes Psuedo-Darkleech Infection ***
---------------------------------------------
Darkleech is a nasty malware infection that infects web servers at the root level. It use malicious Apache modules to add hidden iFrames to certain responses. It's difficult to detect because the malware is only active when both server and site admins are not logged in, and the iFrame is only injected once a dayRead More
---------------------------------------------
http://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html




*** VMSA-2015-0001.2 ***
---------------------------------------------
VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2015-0001.html




*** DFN-CERT-2015-0416 - Citrix Command Center: Zwei Schwachstellen ermöglichen die Übernahme des Systems ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0416/




*** EMC Isilon OneFS Privilege Escalation ***
---------------------------------------------
Topic: EMC Isilon OneFS Privilege Escalation Risk: Medium Text:ESA-2015-049: EMC Isilon OneFS Privilege Escalation Vulnerability EMC Identifier: ESA-2015-049 CVE Identifier: CVE-2015-...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015030182




*** Security Advisories for Drupal Third-Party Modules ***
---------------------------------------------
*** Linear Case - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-084 ***
https://www.drupal.org/node/2459327

*** Webform Multiple File Upload - Moderately Critical - Cross Site Request Forgery (CSRF) - SA-CONTRIB-2015-083 ***
https://www.drupal.org/node/2459323

*** Crumbs - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-082 ***
https://www.drupal.org/node/2459315

*** Petition - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-081 ***
https://www.drupal.org/node/2459311

*** Invoice - Moderately Critical - Multiple vulnerabilities - Unsupported - SA-CONTRIB-2015-085 ***
https://www.drupal.org/node/2459337

*** Ubercart Webform Checkout Pane - Moderately Critical - Cross Site Scripting (XSS) - Unsupported - SA-CONTRIB-2015-087 ***
https://www.drupal.org/node/2459359

*** Decisions - Moderately Critical - Cross Site Scripting (XSS) - Unsupported - SA-CONTRIB-2015-086 ***
https://www.drupal.org/node/2459349

*** Decisions - Moderately Critical - Cross Site Request Forgery (CSRF) - Unsupported - SA-CONTRIB-2015-086 ***
https://www.drupal.org/node/2459349


More information about the Daily mailing list