Deutsch | English

[CERT-daily] Tageszusammenfassung - 04.10.2017

Daily end-of-shift report team at cert.at
Wed Oct 4 18:10:07 CEST 2017


=====================
= End-of-Day report =
=====================

Timeframe:   Dienstag 03-10-2017 18:00 − Mittwoch 04-10-2017 18:00
Handler:     Stephan Richter
Co-Handler:  n/a

=====================
=       News        =
=====================

∗∗∗ Microsoft Announces New Tool to Investigate Memory Corruption Bugs ∗∗∗
---------------------------------------------
Microsoft announced yesterday a new tool that automates the process of detecting the root cause of memory corruption issues. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-new-tool-to-investigate-memory-corruption-bugs/


∗∗∗ New Rowhammer Attack Bypass Previously Proposed Countermeasures ∗∗∗
---------------------------------------------
Security researchers have come up with a variation of the Rowhammer attack that bypasses all previously proposed countermeasures. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-rowhammer-attack-bypass-previously-proposed-countermeasures/


∗∗∗ Website Hosting: Security Awareness Can Reduce Costs ∗∗∗
---------------------------------------------
Website hosting security has matured in recent years. Naturally, the types of security issues have changed because of it. For example, cross-contamination over multiple shared hosting accounts used to be a major problem for large website hosting providers, but this isn’t really a huge threat today. However, malware attacks and other website security-related issues at the account level are still very real problems – just ask anyone who has had their website defaced, redirected, or [...]
---------------------------------------------
http://feedproxy.google.com/~r/sucuri/blog/~3/3W5Ls3JO36o/website-hosting-security-awareness-can-reduce-costs.html



=====================
=  Vulnerabilities  =
=====================

∗∗∗ DSA-3991 qemu - security update ∗∗∗
---------------------------------------------
Multiple vulnerabilities were found in qemu, a fast processor emulator:
---------------------------------------------
https://www.debian.org/security/2017/dsa-3991


∗∗∗ Apple Releases Security Update for iOS ∗∗∗
---------------------------------------------
Original release date: October 03, 2017 Apple has released iOS 11.0.2 to address vulnerabilities in previous versions of iOS. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected system.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2017/10/03/Apple-Releases-Security-Update-iOS


∗∗∗ Apache Releases Security Updates for Apache Tomcat ∗∗∗
---------------------------------------------
Original release date: October 03, 2017 The Apache Software Foundation has released Apache Tomcat 9.0.1 and 8.5.23 to address a vulnerability in previous versions of the software. A remote attacker could exploit this vulnerability to take control of an affected server.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2017/10/03/Apache-Releases-Security-Updates-Apache-Tomcat


∗∗∗ Apache Struts 2 Remote Code Execution Vulnerability Affecting Multiple Cisco Products: September 2017 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170909-struts2-rce


∗∗∗ Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2


∗∗∗ Cisco Integrated Management Controller Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc


∗∗∗ Cisco Integrated Management Controller Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3


∗∗∗ IBM Security Advisories ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/


∗∗∗ Linux kernel vulnerability CVE-2017-14489 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K71796229


∗∗∗ HPESBMU03753 rev.2 - HPE System Management Homepage for Windows and Linux, Multiple Remote Vulnerabilities ∗∗∗
---------------------------------------------
https://h20565.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us


∗∗∗ HPESBHF03782 rev.1 - HPE intelligent Management Center (iMC) PLAT, Remote Code Execution ∗∗∗
---------------------------------------------
https://h20565.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03782en_us


∗∗∗ HPESBHF03776 rev.1 - HPE Intelligent Management Center (iMC) Service Operation Management (SOM), Remote Arbitrary File Download ∗∗∗
---------------------------------------------
https://h20565.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03776en_us


∗∗∗ HPESBHF03778 rev.1 - HPE intelligent Management Center (iMC) PLAT, Remote Code Execution ∗∗∗
---------------------------------------------
https://h20565.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03778en_us


∗∗∗ HPESBHF03777 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Denial of Service ∗∗∗
---------------------------------------------
https://h20565.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03777en_us


∗∗∗ HPESBHF03781 rev.1 - HPE intelligent Management Center (iMC) PLAT, Remote Code Execution ∗∗∗
---------------------------------------------
https://h20565.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03781en_us

-- 
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily




More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung