Deutsch | English

[CERT-daily] Tageszusammenfassung - Mittwoch 11-11-2015

Daily end-of-shift report team at cert.at
Wed Nov 11 18:13:32 CET 2015


=======================
= End-of-Shift report =
=======================

Timeframe:   Dienstag 10-11-2015 18:00 − Mittwoch 11-11-2015 18:00
Handler:     Robert Waldner
Co-Handler:  Stephan Richter




*** November 2015 Security Update Release Summary ***
---------------------------------------------
Today we released security updates to provide protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released.  More information about this month's security updates and advisories can be found in the Security TechNet Library.   MSRC Team
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2015/11/10/november-2015-security-update-release-summary.aspx




*** MSRT November 2015: Detection updates ***
---------------------------------------------
The Microsoft Malicious Software Removal Tool (MSRT) is updated monthly with new malware detections - so far this year we have added 29 malware families. This month we are updating our detections for some of the malware families already included in the tool. We choose the malware families we add to the MSRT each month using several criteria. One of the most common reasons is the prevalence of a family in the malware ecosystem. For example, in recent months we focused on...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/11/10/msrt-november-2015-detection-updates.aspx




*** Patchday: Adobe pflegt den Flash-Patienten ***
---------------------------------------------
Flash liegt mal wieder auf dem OP-Tisch und wird geflickt. Nutzer sollten ihren Flash-Patienten zügig behandeln, denn die Lücken gelten als kritisch. Exploits sollen aber noch nicht kursieren.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Patchday-Adobe-pflegt-den-Flash-Patienten-2916509.html?wt_mc=rss.ho.beitrag.rdf




*** What You Should Know about Triangulation Fraud and eBay ***
---------------------------------------------
The increasing phenomenon of triangulation fraud on eBay has led to a published analysis on behalf of the company, as to how buyers should get informed and what they should pay attention to. Over the past few months, a new phenomenon has risen and its proportions have been growing exponentially. It seems that, even if...
---------------------------------------------
http://securityaffairs.co/wordpress/41891/cyber-crime/triangulation-fraud-and-ebay.html




*** Symantec Endpoint Protection: Alte Sicherheitslücke bricht wieder auf ***
---------------------------------------------
Eine totgeglaubte Schwachstelle ist wieder da, da ein älterer Patch nur Teile des Problems angegangen ist. Das aktuelle Update für Symantecs Endpoint Protection soll es nun richten und noch weitere Schwachstellen abdichten.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Symantec-Endpoint-Protection-Alte-Sicherheitsluecke-bricht-wieder-auf-2917002.html?wt_mc=rss.ho.beitrag.rdf




*** What Happens to Hacked Social Media Accounts ***
---------------------------------------------
This article is going to look at a few reasons why a social media account is hacked. The goal is for you to understand why you will want to better protect your account, regardless of whether or not you see yourself as "important".
---------------------------------------------
http://www.tripwire.com/state-of-security/security-awareness/what-happens-to-hacked-social-media-accounts/




*** InstaAgent: Passwort-sammelnder Instagram-Client fliegt aus App Store und Google Play ***
---------------------------------------------
Die App, die Nutzern verschiedene Zusatzinformationen zu ihrem Profil bei Facebooks populärem Foto-Dienst verspricht, sendete offenbar Instagram-Benutzernamen und Passwort im Klartext an einen Dritt-Server.
---------------------------------------------
http://heise.de/-2917792




*** GasPot Integrated Into Conpot, Contributing to Open Source ICS Research ***
---------------------------------------------
In August of this year, we presented at Blackhat our paper titled The GasPot Experiment: Unexamined Perils in Using Gas-Tank-Monitoring Systems. GasPot was a honeypot designed to mimic the behavior of the Guardian AST gas-tank-monitoring system. It was designed to look like no other existing honeypot, with each instance being unique to make fingerprinting by attackers impossible. These were deployed within networks located in various countries, to give us a complete picture of the attacks...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/4jNwbTj60bk/




*** Questions are the answeres - How to avoid becoming the blamed victim ***
---------------------------------------------
"You have to ask questions", I say. Questions before, during, and after a breach. If you ask the right questions at the right time, you'll be able to make better decisions than the knee-jerk ones you've been making.
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/questions-are-the-answers




*** TA15-314A: Web Shells - Threat Awareness and Guidance ***
---------------------------------------------
Original release date: November 10, 2015 Systems Affected Web servers that allow web shells Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert outlines the threat and provides prevention, detection, and mitigation strategies.Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to significant cyber incidents.This...
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA15-313A




*** Bugtraq: [security bulletin] HPSBGN03507 rev.2 - HP Arcsight Management Center, Arcsight Logger, Remote Cross-Site Scripting (XSS) ***
---------------------------------------------
http://www.securityfocus.com/archive/1/536877




*** Huawei HG630a / HG630a-50 Default SSH Admin Password ***
---------------------------------------------
Topic: Huawei HG630a / HG630a-50 Default SSH Admin Password Risk: High Text:# Exploit Title: Huawei HG630a and HG630a-50 Default SSH Admin Password on Adsl Modems # Date: 10.11.2015 # Exploit Author: M...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015110087




*** Huawei Security Advisories ***
---------------------------------------------
*** Security Advisory - Input Validation Vulnerability in Huawei VP9660 Products ***
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461216.htm
---------------------------------------------
*** Security Advisory - Directory Traversal Vulnerability in Huawei AR Router ***
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461676.htm
---------------------------------------------
*** Security Advisory - DoS Vulnerability in Huawei U2990 and U2980 ***
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461219.htm
---------------------------------------------
*** Security Advisory - DoS Vulnerability in Huawei eSpace 8950 IP Phone ***
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461217.htm
---------------------------------------------
*** Security Advisory - DoS Vulnerability in Huawei eSpace 7900 IP Phone ***
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461213.htm
---------------------------------------------




*** ZDI-15-549: AlienVault Unified Security Management av-forward Deserialization of Untrusted Data Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/eDK-If3dTI8/




*** ZDI-15-548: AlienVault Unified Security Management Local Privilege Escalation Vulnerability ***
---------------------------------------------
This vulnerability allows local attackers to escalate privileges to root on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/TpChWMSd5n0/




*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM FileNet eForms is affected by vulnerabilities in Apache HttpComponents(CVE-2012-6153 and CVE-2014-3577) ***
http://www.ibm.com/support/docview.wss?uid=swg21962659
---------------------------------------------
*** IBM Security Bulletin: IBM Forms Server could be affected by a denial of service attack (CVE-2013-4517) ***
http://www.ibm.com/support/docview.wss?uid=swg21962659
---------------------------------------------
*** IBM Security Bulletin: Fix Available for Denial of Service Vulnerability in IBM WebSphere Portal (CVE-2015-7419) ***
http://www.ibm.com/support/docview.wss?uid=swg21969906
---------------------------------------------
*** IBM Security Bulletin: Additional Password Disclosure via application tracing in FlashCopy Manager on Windows, Data Protection for Exchange, and Data Protection for SQL CVE-2015-7404 ***
http://www.ibm.com/support/docview.wss?uid=swg21969514
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in libuser affect Power Hardware Management Console (CVE-2015-3245 CVE-2015-3246) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1020961
---------------------------------------------
*** IBM Security Bulletin: IBM Cúram Social Program Management is vulnerable to a SQL injection attack ***
http://www.ibm.com/support/docview.wss?uid=swg21967851
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Content Collector and IBM CommonStore for Lotus Domino (CVE-2015-2613, CVE-2015-2601, CVE-2015-2625, CVE-2015-1931) ***
http://www.ibm.com/support/docview.wss?uid=swg21969654
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM WebSphere MQ ***
http://www.ibm.com/support/docview.wss?uid=swg21970103
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Expeditor (CVE-2015-4000) ***
http://www.ibm.com/support/docview.wss?uid=swg21959292
---------------------------------------------
*** Security Bulletin: Multiple vulnerabilities in IBM Java SDK 7 affect IBM Systems Director Storage Control ***
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098822
---------------------------------------------
*** IBM Security Bulletin: IBM FileNet eForms is affected by vulnerabilities in Apache HttpComponents(CVE-2012-6153 and CVE-2014-3577) ***
http://www.ibm.com/support/docview.wss?uid=swg21970090
---------------------------------------------


More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung