Deutsch | English

[CERT-daily] Tageszusammenfassung - Freitag 16-10-2015

Daily end-of-shift report team at cert.at
Fri Oct 16 18:15:32 CEST 2015


=======================
= End-of-Shift report =
=======================

Timeframe:   Donnerstag 15-10-2015 18:00 − Freitag 16-10-2015 18:00
Handler:     Stephan Richter
Co-Handler:  n/a




*** Security Updates Available for Adobe Flash Player (APSB15-27) ***
---------------------------------------------
A security bulletin (APSB15-27) has been published regarding security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an...
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1288




*** Exposing the most dangerous financial malware threats ***
---------------------------------------------
Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems. The most dangerous financial malware threats have resulted i...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/otxCIk5qeu4/malware_news.php




*** Data dump points to a breach at Electronic Arts ***
---------------------------------------------
Account details of some 600 Electronic Arts (EA) customers have apparently been leaked on Pastebin. The company has yet to confirm that the leak is genuine, but they are "taking steps to secure any ac...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/-grCjlQtA4c/secworld.php




*** Enhanced Mitigation Experience Toolkit (EMET) version 5.5 Beta is now available ***
---------------------------------------------
Enhanced Mitigation Experience Toolkit (EMET) version 5.5 Beta is now available The Enhanced Mitigation Experience Toolkit (EMET) benefits enterprises and all computer users by helping to protect against security threats and breaches that can disrupt businesses and daily lives. It does this by anticipating, diverting, terminating, blocking, or otherwise invalidating the most common actions and techniques adversaries might use to compromise a computer. In this way, EMET can help protect your...
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2015/10/15/enhanced-mitigation-experience-toolkit-emet-version-5-5-beta-is-now-available.aspx




*** Windows Drivers are True'ly Tricky ***
---------------------------------------------
Posted by James Forshaw, Driving for BugsAuditing a product for security vulnerabilities can be a difficult challenge, and there's no guarantee you'll catch all vulnerabilities even when you do. This post describes an issue I identified in the Windows Driver code for Truecrypt, which has already gone through a security audit. The issue allows an application running as a normal user or within a low-integrity sandbox to remap the main system drive and elevate privileges to SYSTEM or...
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/10/windows-drivers-are-truely-tricky.html




*** Breaking Diffie-Hellman with Massive Precomputation (Again) ***
---------------------------------------------
The Internet is abuzz with this blog post and paper, speculating that the NSA is breaking the Diffie-Hellman key-exchange protocol in the wild through massive precomputation. I wrote about this at length in May when this paper was first made public. (The reason its news again is that the paper was just presented at the ACM Computer and Communications Security...
---------------------------------------------
https://www.schneier.com/blog/archives/2015/10/breaking_diffie.html




*** Auch Ubuntu Phone hat seine Sicherheitslücken ***
---------------------------------------------
Eine App aus dem Ubuntu Phone Store hat eine Sicherheitslücke aufgezeigt, mit der Angreifer die komplette Kontrolle über die Geräte der Opfer hätte erlangen können. Stattdessen ändert die App nur den Boot-Splash.
---------------------------------------------
http://heise.de/-2849370




*** Elasticsearch 1.7.3 released ***
---------------------------------------------
Today, we are happy to announce the bug fix release of Elasticsearch 1.7.3, based on Lucene 4.10.4. This is the latest stable release. Users are advised to upgrade if they find themselves affected by any of the bugs which have been fixed.You can download Elasticsearch 1.7.3 and read the full changes list here.Previous blog posts about the 1.7 series:Elasticsearch 1.7.2Elasticsearch 1.7.1Elasticsearch 1.7.0This release contains a number of bug fixes including:Synced flushes were reactivating...
---------------------------------------------
https://www.elastic.co/blog/elasticsearch-1-7-3-released




*** VMSA-2015-0003.12 ***
---------------------------------------------
VMware product updates address critical information disclosure issue in JRE
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2015-0003.html




*** Bugtraq: [security bulletin] HPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) and Other Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/536687




*** Bugtraq: [security bulletin] HPSBOV03503 rev.1 - HP OpenVMS CSWS_JAVA running Tomcat, Multiple Remote Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/536689




*** Updated F5 Security Advisory: OpenSSL vulnerability CVE-2014-0224 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/15000/300/sol15325.html?ref=rss




*** F5 Security Advisory: vCMP DoS vulnerability CVE-2015-6546 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/17000/300/sol17386.html?ref=rss




*** APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 ***
---------------------------------------------
APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, andiWork for iOS 2.6Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 are nowavailable which address the following:Keynote, Pages, and NumbersAvailable for: OS X Yosemite v10.10.4 or later, iOS 8. [...]
---------------------------------------------
http://prod.lists.apple.com/archives/security-announce/2015/Oct/msg00000.html




*** USN-2772-1: PostgreSQL vulnerabilities ***
---------------------------------------------
Ubuntu Security Notice USN-2772-116th October, 2015postgresql-9.1, postgresql-9.3, postgresql-9.4 vulnerabilitiesA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.04 Ubuntu 14.04 LTS Ubuntu 12.04 LTSSummaryPostgreSQL could be made to crash or expose private information if ithandled specially crafted data.Software description postgresql-9.1 - Object-relational SQL database  postgresql-9.3 - Object-relational SQL database  postgresql-9.4 - Object-relational SQL...
---------------------------------------------
http://www.ubuntu.com/usn/usn-2772-1/




*** 3S CODESYS Runtime Toolkit Null Pointer Dereference Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a NULL pointer dereference vulnerability in the 3S-Smart Software Solutions GmbHs CODESYS Runtime Toolkit.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-288-01




*** Bugtraq: Qualys Security Advisory - LibreSSL (CVE-2015-5333 and CVE-2015-5334) ***
---------------------------------------------
http://www.securityfocus.com/archive/1/536692




*** Windows 10 Sandboxed Mount Reparse Point Creation Mitigation Bypass (MS15-111) ***
---------------------------------------------
Topic: Windows 10 Sandboxed Mount Reparse Point Creation Mitigation Bypass (MS15-111) Risk: Medium Text:Source: https://code.google.com/p/google-security-research/issues/detail?id=486 Windows: Sandboxed Mount Reparse Point Crea...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015100120




*** Bugtraq: ERPSCAN Research Advisory [ERPSCAN-15-017] SAP NetWeaver J2EE DAS service - Unauthorized Access ***
---------------------------------------------
http://www.securityfocus.com/archive/1/536695


More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung