=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 20-12-2018 18:00 − Freitag 21-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Fake Amazon Order Confirmations Push Banking Trojans on Holiday Shoppers ∗∗∗
---------------------------------------------
Phishing and malspam campaigns are in high gear for the holidays and a new campaign pretending to be an Amazon order confirmation is particularly dangerous as people shop for holiday gifts.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fake-amazon-order-confirmati…
∗∗∗ Warnung vor Phishing-Mails mit Adresse help(a)orf.at ∗∗∗
---------------------------------------------
Seit einigen Stunden sind Phishing-Mails in Umlauf, die als Reply-Adresse help(a)orf.at eingetragen haben. ORF.at weist ausdrücklich darauf hin, dass von der Konsumentenredaktion des ORF-Radio keinerlei Mails ausgeschickt werden und warnt davor, solche Mails zu öffnen.
---------------------------------------------
https://orf.at/stories/3105176
∗∗∗ Betrügerische WhatsApp-Nachrichten beim Privatverkauf ∗∗∗
---------------------------------------------
Privatverkäufer/innen erhalten von einer Nummer mit der Vorwahl „+1“ eine WhatsApp-Nachricht. Darin erkundigen sich Kriminelle nach dem Produktpreis und schlagen die Kaufabwicklung mit der EMS Shipping Company vor. Sie bestätigt einen überhöhten Zahlungseingang. Verkäufer/innen sollen den Differenzbetrag und die Ware ins Ausland senden. Dadurch verlieren sie beides.
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-whatsapp-nachrichten-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Horner Automation Cscape ∗∗∗
---------------------------------------------
This advisory provides mitigation recommendations for an improper input validation vulnerability in Horner Automation’s Cscape, a Control System Application programming software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01
∗∗∗ Schneider Electric EcoStruxure ∗∗∗
---------------------------------------------
This advisory provides mitigation recommendations for an open redirect vulnerability in Schneider Electric’s EcoStruxure, an IoT-enabled architecture and platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-354-02
∗∗∗ JSON:API - Moderately critical - Access bypass - SA-CONTRIB-2018-081 ∗∗∗
---------------------------------------------
Project: JSON:APIDate: 2018-December-19Security risk: Moderately critical 13∕25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassDescription: This module provides a JSON:API specification-compliant HTTP API for accessing and manipulating Drupal content and configuration entities.The module doesnt sufficiently check access when responding to certain filtered collection requests, thereby causing an access bypass vulnerability.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-081
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libapache-mod-jk, libav, and netatalk), Fedora (kernel-headers, kernel-tools, and phpMyAdmin), Gentoo (go), Mageia (netty, jctools, php, and phpmyadmin), openSUSE (keepalived), Scientific Linux (ntp), SUSE (enigmail, libqt5-qtbase, mariadb, netatalk, and yast2-rmt), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-azure, linux-hwe, linux-aws-hwe, [...]
---------------------------------------------
https://lwn.net/Articles/775420/
∗∗∗ Synology-SA-18:62 Netatalk ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to execute arbitrary code via a susceptible version of Synology Diskstation Manager (DSM) and Synology Router Manager (SRM).
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_62
∗∗∗ Vuln: Ghostscript CVE-2018-19134 Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106278
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect API Connect ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: a CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis known as Variant 4 or SpectreNG vulnerability affects IBM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-cpu-hardware-utiliz…
∗∗∗ December 20, 2018 TNS-2018-17 [R1] Nessus 7.1.4 Fixes Multiple Third-party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2018-17
∗∗∗ TMM vulnerability CVE-2018-15330 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K23328310
∗∗∗ BIG-IP AAM DCDB vulnerability CVE-2018-15331 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K54843525
∗∗∗ TMUI vulnerability CVE-2018-15329 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K61620494
Next End-of-Day report: 2018-12-27
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 19-12-2018 18:00 − Donnerstag 20-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ On VBScript ∗∗∗
---------------------------------------------
Vulnerabilities in the VBScript scripting engine are a well known way to attack Microsoft Windows. In order to reduce this attack surface, in Windows 10 Fall Creators Update, Microsoft disabled VBScript execution in Internet Explorer in the Internet Zone and the Restricted Sites Zone by default. Yet this did not deter attackers ..
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/12/on-vbscript.html
∗∗∗ Rise of the Webminers ∗∗∗
---------------------------------------------
About a year ago webminers began to appear on more and more website. It was popularized by CoinHive and a couple of high-profile scandals revolving around ThePirateBay and Showtime and, in ..
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rise-of-the…
∗∗∗ WPA3 WLAN Encryption: All Good Things Come In 3s! ∗∗∗
---------------------------------------------
The current protocol WPA2 (WiFi Protected Access) from 2004 is getting on in years. In early 2018, the WiFi Alliance (WFA) announced an update at the Consumer Electronics Show in Las Vegas. WPA3 is the designated successor, which should eliminate weak points as well as the comfort and the security would clearly increase. In the last ..
---------------------------------------------
http://www.ikarussecurity.com/about-ikarus/security-blog/wpa3-wlan-encrypti…
∗∗∗ Kritische Sicherheitslücke in Internet Explorer - Patches verfügbar ∗∗∗
---------------------------------------------
Microsoft hat ausserhalb des monatlichen Patch-Zyklus Updates für den Internet Explorer veröffentlicht, mit denen eine kritische Sicherheitslücke geschlossen wird. Diese Schwachstelle soll bereits aktiv ..
---------------------------------------------
http://www.cert.at/warnings/all/20181219.html
∗∗∗ sgifashop.com ist unseriös ∗∗∗
---------------------------------------------
Der Online-Shop sgifashop.com ist mit seinem Sortiment sehr breit aufgestellt, so ist auch bestimmt für Sie das gewünschte Produkt dabei. Der Alleskönner ist jedoch betrügerisch und liefert ..
---------------------------------------------
https://www.watchlist-internet.at/news/sgifashopcom-ist-unserioes/
∗∗∗ Researcher publishes PoC for new Windows zero-day ∗∗∗
---------------------------------------------
This is the third Windows zero-day the researcher dumps online in the last five months.
---------------------------------------------
https://www.zdnet.com/article/researcher-publishes-poc-for-new-windows-zero…
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4355 openssl1.0 - security update ∗∗∗
---------------------------------------------
Several local side channel attacks and a denial of service via largeDiffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit.
---------------------------------------------
https://www.debian.org/security/2018/dsa-4355
∗∗∗ Vuln: Jenkins Multiple Security Vulnerabilities ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106176
∗∗∗ JSON:API - Moderately critical - Access bypass - SA-CONTRIB-2018-081 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-081
∗∗∗ E-Sign - Moderately critical - Cross site scripting - SA-CONTRIB-2018-080 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-080
∗∗∗ Security Advisory - MaxAge LSA Vulnerability in OSPF Protocol of Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170720-…
∗∗∗ IBM Security Bulletin: Cross-Site Scripting vulnerability in IBM Business Automation Workflow (CVE-2018-1849) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM MQ ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ D-LINK Router: Schwachstelle ermöglicht Codeausführung ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1191
∗∗∗ FreeBSD OS: Schwachstelle ermöglicht Codeausführung ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1192
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 18-12-2018 18:00 − Mittwoch 19-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Gefälschte Energie AG-Rechnung verbreitet Schadsoftware ∗∗∗
---------------------------------------------
Kriminelle versenden ein gefälschtes Energie AG-Schreiben. Darin behaupten sie, dass Kund/innen ihre aktuelle Rechnung herunterladen und ausdrucken können. Dazu sollen sie eine unbekannte Website aufrufen und eine ZIP-Datei öffnen. Diese verbirgt Schadsoftware. Konsument/innen, die die vermeintliche Rechnung öffnen, installieren diese auf ihrem Computer.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-energie-ag-rechnung-verb…
∗∗∗ Searching statically-linked vulnerable library functions in executable code ∗∗∗
---------------------------------------------
Software supply chains are increasingly complicated, and it can be hard to detect statically-linked copies of vulnerable third-party libraries in executables. This blog post discusses the technical details of an Apache-licensed open-source library to detect code from other open-source libraries in executables, along with some real-world findings of forked open-source libraries in real-world [...]
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/12/searching-statically-linked-…
∗∗∗ Das letzte Silvester für PHP 5.6 ∗∗∗
---------------------------------------------
PHP 5.6 steht kurz vor dem Ende seiner Lebenszeit. Mit 31.12.2018 endet der Security-Support für die letzte Version der PHP 5 Familie, ab dann wird nur noch PHP 7 weiterentwickelt. Das bedeutet, dass ab dem Jahreswechsel neu entdeckte Sicherheitslücken in PHP 5.6 Upstream nicht mehr gepatcht werden. Die uns zur Verfügung stehenden Daten von Shodan zeigen, dass derzeit die Mehrheit der Server in Österreich noch PHP 5 im [...]
---------------------------------------------
http://www.cert.at/services/blog/20181219120223-2326.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (ghostscript), Fedora (ansible and wireshark), openSUSE (go1.11, pdns, and pdns-recursor), Oracle (firefox), Red Hat (java-1.8.0-ibm), Scientific Linux (firefox), and SUSE (crash, libqt5-qtbase, perl, and qemu).
---------------------------------------------
https://lwn.net/Articles/775230/
∗∗∗ Advantech WebAccess/SCADA ∗∗∗
---------------------------------------------
This advisory provides mitigation recommendations for an improper input validation vulnerability identified in Advantechs WebAccess/SCADA software platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-02
∗∗∗ 3S-Smart Software Solutions GmbH CODESYS Control V3 Products ∗∗∗
---------------------------------------------
This advisory provides mitigation recommendations for an improper access control vulnerability identified in the 3S-Smart Software Solutions CODESYS Control V3 products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03
∗∗∗ 3S-Smart Software Solutions GmbH CODESYS V3 Products ∗∗∗
---------------------------------------------
This advisory provides mitigation recommendations for use of insufficiently random values and improper restriction of communication channel to intended endpoints vulnerabilities identified in the 3S-Smart Software Solutions GmbH CODESYS V3 products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04
∗∗∗ BSRT-2018-005 Vulnerabilities in Management Console Impact Affected Versions of BlackBerry UEM ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gateway ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN99810718/
∗∗∗ Vuln: Symfony Local File Include and Open Redirection Vulnerabilities ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106249
∗∗∗ Cisco Adaptive Security Appliance Software Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Notice - Statement on Information Leak Vulnerability in Huawei HG Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2018/huawei-sn-20181219-01-…
∗∗∗ IBM Security Bulletin: Privilege Escalation in Notes System Diagnostic Service of both IBM Notes and Domino (CVE-2018-1771) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-privilege-escalation-…
∗∗∗ IBM Security Bulletin: IBM API Connect is affected by a critical privilege escalation vulnerability in Kubernetes (CVE-2018-1002105) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-af…
∗∗∗ IBM Security Bulletin: IBM API Connect V5 – Admin Users Can Elevate Own Permissions (CVE-2018-1973) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-v5-ad…
∗∗∗ IBM Security Bulletin: IBM API Connect is affected by a NoSQL Injection in MongoDB connector for the LoopBack framework (CVE-2018-1784) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-af…
∗∗∗ IBM Security Bulletin: IBM API Connect is affected by authentication bypass vulnerability in LoopBack (CVE-2018-1778) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-af…
∗∗∗ IBM Security Bulletin: IBM Lotus Protector for Mail Security has released fixes in response to the public disclosed vulnerability from Network Time Protocol (NTP) (CVE-2018-12327) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-lotus-protector-f…
∗∗∗ IBM Security Bulletin: IBM DataPower Gateway is affected by a Denial of Service vulnerability (CVE-2018-1677) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-datapower-gateway…
∗∗∗ IBM Security Bulletin: IBM DataPower Gateway is affected by a CSRF vulnerability (CVE-2018-1661) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-datapower-gateway…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 17-12-2018 18:00 − Dienstag 18-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Hidden Code in Memes Instruct Malware via Twitter ∗∗∗
---------------------------------------------
Analysts discover malicious code embedded in tweeted images.
---------------------------------------------
https://threatpost.com/hidden-code-in-memes-instruct-malware-via-twitter/14…
∗∗∗ Sneaky phishing campaign beats two-factor authentication ∗∗∗
---------------------------------------------
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is equally secure.
---------------------------------------------
https://nakedsecurity.sophos.com/2018/12/18/sneaky-phishing-campaign-beats-…
∗∗∗ Your trust, our signature ∗∗∗
---------------------------------------------
Every organisation, whatever its size, will encounter phishing emails sooner or later. While the number of phishing attacks is increasing every day, the way in which phishing is used within a cyber-attack has not changed: an attacker comes up with a scenario [...]
---------------------------------------------
https://blog.fox-it.com/2018/12/18/your-trust-our-signature/
∗∗∗ Clever SEO Spam Injection ∗∗∗
---------------------------------------------
It's very common for us here at Sucuri to face SEO injections on almost any type of CMS-based site. Today, I'll be presenting how one particularly ingenious malware manages to hide so well inside a WordPress website.
---------------------------------------------
https://blog.sucuri.net/2018/12/clever-seo-spam-injection.html
∗∗∗ Erpressungstrojaner Everbe, Hidden Tear und InsaneCrypt kostenlos entschlüsseln ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat für verschiedene Verschlüsselungstrojaner Gratis-Entschlüsselungstools veröffentlicht.
---------------------------------------------
http://heise.de/-4254364
=====================
= Vulnerabilities =
=====================
∗∗∗ Sicherheitsupdate, 14.12.18 ∗∗∗
---------------------------------------------
[...] haben wir eine potenzielle Sicherheitsschwachstelle in unserer iCal-Feed-Funktion festgestellt, in dem durch vom Benutzer manuelles Manipulieren von Teilen der Feed-URL es theoretisch möglich gewesen wäre, zufällig auf die iCal-Feeds anderer TimeTac-Benutzer zugreifen zu können. [...] Dieses Problem wurde unmittelbar nach Bekanntwerden durch ein Sicherheitsupdate behoben und bei allen theoretisch betroffenen TimeTac-Kundenkonten ausgerollt.
---------------------------------------------
https://support.timetac.com/de/changelog-de/sicherheitsupdate-14-12-18/
∗∗∗ Razer Cortex Debugger Remote Command Execution ∗∗∗
---------------------------------------------
Razer "Cortex" has CEF debugger stub enabled by default allowing arbitrary remote command execution. I was alerted on...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2018120170
∗∗∗ VMSA-2018-0031 ∗∗∗
---------------------------------------------
vRealize Operations updates address a local privilege escalation vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0031.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libapache-mod-jk and sleuthkit), Fedora (kernel, kernel-headers, mbedtls, php, php-symfony, php-symfony3, php-symfony4, and wireshark), openSUSE (pdns, pdns-recursor, and salt), Oracle (firefox and ghostscript), Red Hat (ansible, firefox, ghostscript, and kernel), Scientific Linux (firefox and ghostscript), and SUSE (ovmf).
---------------------------------------------
https://lwn.net/Articles/775172/
∗∗∗ Synology-SA-18:61 Magellan ∗∗∗
---------------------------------------------
Magellan vulnerability allows remote authenticated users to conduct denial-of-service attacks or possibly execute arbitrary code via a susceptible version of Synology products.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_61
∗∗∗ libexif: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1182
∗∗∗ Nagios Enterprises Nagios XI: Mehrere Schwachstellen ermöglichen Cross-Site Scripting ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1180
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM i ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Vulnerabilities in curl affect PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-cu…
∗∗∗ IBM Security Bulletin: Vulnerabilities in krb5 affect PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-kr…
∗∗∗ IBM Security Bulletin: A vulnerability in git affects PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-vulnerability-in-gi…
∗∗∗ IBM Security Bulletin: Vulnerabilities in GnuTLS affect PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-gn…
∗∗∗ IBM Security Bulletin: Vulnerabilities in GNU binutils affect PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-gn…
∗∗∗ IBM Security Bulletin: Vulnerabilities in OpenSSL affect PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-op…
∗∗∗ IBM Security Bulletin: Vulnerabilities in Python affect PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-py…
∗∗∗ IBM Security Bulletin: A vulnerability in wpa_supplicant affects PowerKVM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-vulnerability-in-wp…
∗∗∗ IBM Security Bulletin: IBM Event Streams is affected by cURL vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-event-streams-is-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 14-12-2018 18:00 − Montag 17-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Shamoon Disk Wiper Returns with Second Sample Uncovered this Month ∗∗∗
---------------------------------------------
Shamoons comeback early last week was not marked by one, but two occurrences of the data-wiping malware. The second sighting observed a different sample that could indicate a follow-up to the initial attack. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/shamoon-disk-wiper-returns-w…
∗∗∗ Datenbank: Fehler in SQLite ermöglichte Codeausführung ∗∗∗
---------------------------------------------
Anwendungen, die SQLite einsetzen und von außen SQL-Zugriff darauf bieten, sind offenbar von einem Fehler betroffen, der eine beliebige Codeausführung ermöglicht. Dazu gehören unter anderem Browser auf Chromium-Basis, für die inzwischen Updates bereitstehen. (Security, Browser)
---------------------------------------------
https://www.golem.de/news/datenbank-fehler-in-sqlite-ermoeglichte-codeausfu…
∗∗∗ Worst passwords list is out, but this time we’re not scolding users ∗∗∗
---------------------------------------------
This is on you, makers of sites and services that allow users to create passwords like "password." You can do better!
---------------------------------------------
https://nakedsecurity.sophos.com/2018/12/17/worst-passwords-list-is-out-but…
∗∗∗ The GPS 2019 Week Rollover - What You Need to Know ∗∗∗
---------------------------------------------
The Global Positioning System provides accurate timing information to many of our critical systems - power grid, communications, financial markets, emergency services, and industrial control to name a few. [...] The next time the counter will reach week 1023 and rollover to zero is on April 6, 2019.
---------------------------------------------
https://spectracom.com/resources/blog/lisa-perdue/2018/gps-2019-week-rollov…
∗∗∗ Intels NUCs: Viele Mini-PCs mit fehlerhaftem BIOS-Schutz ∗∗∗
---------------------------------------------
Bei einigen Mini-PCs aus Intels NUC-Reihe lässt sich das BIOS mit manipuliertem Code überschreiben, etwa um eine Backdoor einzupflanzen.
---------------------------------------------
http://heise.de/-4251738
∗∗∗ Betrügerische Androhung von Pfändungsterminen ∗∗∗
---------------------------------------------
Konsument/innen erhalten von erfundenen Inkassobüros und Rechtsanwält/innen letzte Zahlungsaufforderungen in Höhe von 479,16 Euro. Darin heißt es, dass es zu einer Pfändung ihrer Wertgegenstände komme, wenn sie den geforderten Geldbetrag nicht bezahlen. Empfänger/innen können das Schreiben ignorieren und müssen keine Überweisung tätigen.
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-androhung-von-pfaendu…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (php5, poppler, and samba), Fedora (firefox, mbedtls, nbdkit, pdns-recursor, php, php-symfony, php-symfony3, and php-symfony4), Gentoo (CouchDB, scala, and spamassassin), Mageia (firefox, libwpd, nss, and thunderbird), openSUSE (Chromium, cups, ghostscript, kernel, openvswitch, phpMyAdmin, qemu, and tcpdump), Red Hat (RHGS WA), and SUSE (ansible, openldap2, openvswitch, qemu, and tcpdump).
---------------------------------------------
https://lwn.net/Articles/775102/
∗∗∗ IBM Security Bulletin: Vulnerabilities in GSKit affect IBM Tivoli Directory Server and IBM Security Directory Server for AIX Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-gs…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Rational DOORS Web Access ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Security Vulnerabilities in IBM® Java SDK affect multiple IBM Rational products based on IBM Jazz technology Oct 2018 CPU ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-security-vulnerabilit…
∗∗∗ IBM Security Bulletin: Rational Asset Analyzer (RAA) is affected by a vulnerability in WAS liberty. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-rational-asset-analyz…
∗∗∗ IBM Security Bulletin: Vulnerabilities in NTPv4 affect AIX (CVE-2018-12327, CVE-2018-7170) Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-nt…
∗∗∗ IBM Security Bulletin: IBM MQ Appliance is affected by a cross-site scripting vulnerability. (CVE-2018-1667) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-appliance-is-a…
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1643) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Rational Software Architect and Rational Software Architect for WebSphere Software ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Potential redirection to external site when using the the IBM Event Streams API (CVE-2018-1833) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-redirection…
∗∗∗ NodeJS vulnerability CVE-2018-12120 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K37111863
∗∗∗ OpenSSL vulnerabilities CVE-2018-0734 and CVE-2018-0735 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K43741620
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 13-12-2018 18:00 − Freitag 14-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ The economics of vulnerability disclosure ∗∗∗
---------------------------------------------
A new ENISA report aims to provide a glimpse into the costs, incentives, and impact related to discovering and disclosing vulnerabilities in information security.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/the-economics-of-vulnerability-…
∗∗∗ How to protect yourself as the threat of scam apps grows ∗∗∗
---------------------------------------------
As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?
---------------------------------------------
https://www.welivesecurity.com/2018/12/14/protect-yourself-threat-scam-apps…
=====================
= Vulnerabilities =
=====================
∗∗∗ BlackBerry powered by Android Security Bulletin - December 2018 ∗∗∗
---------------------------------------------
BlackBerry has released a security update to address multiple vulnerabilities in BlackBerry powered by Android smartphones.
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Logitech Keystroke Injection Flaw Went Unaddressed for Months ∗∗∗
---------------------------------------------
The flaw allows a remote attacker to gain full access over a machine.
---------------------------------------------
https://threatpost.com/logitech-keystroke-injection-flaw/139928/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (ghostscript, git, java-1.7.0-openjdk, java-11-openjdk, kernel, NetworkManager, python-paramiko, ruby, sos-collector, thunderbird, and xorg-x11-server), Debian (gcc-4.9), and SUSE (amanda, ntfs-3g_ntfsprogs, and tiff).
---------------------------------------------
https://lwn.net/Articles/774940/
∗∗∗ WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0009 ∗∗∗
---------------------------------------------
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE identifiers: CVE-2018-4437, CVE-2018-4438, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464.
---------------------------------------------
https://webkitgtk.org/security/WSA-2018-0009.html
∗∗∗ QEMU: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
Ein lokaler Angreifer kann mehrere Schwachstellen in QEMU ausnutzen, um Informationen offenzulegen oder einen Denial of Service zu verursachen.
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1175
∗∗∗ Medtronic 9790, 2090 CareLink, and 29901 Encore Programmers ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-347-01
∗∗∗ Schneider Electric GUIcon Eurotherm ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-347-01
∗∗∗ Siemens EN100 Ethernet Communication Module and SIPROTEC 5 Relays ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-347-02
∗∗∗ Geutebrück GmbH E2 Series IP Cameras ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-347-03
∗∗∗ GE Mark VIe, EX2100e, EX2100e_Reg, and LS2100e ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-347-04
∗∗∗ Multiple vulnerabilities in Aterm WF1200CR and Aterm WG1200CR ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN87535892/
∗∗∗ 2018-12-14: Vulnerability in GATE E2 – Cross-site scripting (CVE-2018-18997) ∗∗∗
---------------------------------------------
https://search-ext.abb.com/library/Download.aspx?DocumentID=2CMT2018-005753…
∗∗∗ 2018-12-14: Vulnerability in GATE E2 – No Access Control (CVE-2018-18995) ∗∗∗
---------------------------------------------
https://search-ext.abb.com/library/Download.aspx?DocumentID=2CMT2018-005751…
∗∗∗ IBM Security Bulletin: Vulnerabilities in Struts v2 affect IBM Security Guardium (CVE-2016-1181, CVE-2016-1182) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-st…
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for Corporate Payment Services for Multi-Platform v2.1.1 is affected by vulnerabilities in IBM Java Runtime ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-financial-transaction…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Cross-Site scripting vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Cross-Site scripting vulnerability in user login vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for Corporate Payment Services v2.1.1 is affected by a potential cross-site scripting (XSS) vulnerability (CVE-2018-1871) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-financial-transaction…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Foreshadow Spectre Variant vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Runtime Environment Java affect Rational Build Forge (CVE-2018-1656; CVE-2018-2973; CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Vulnerabilities in OpenSSL affect Tivoli Provisioning Manager for OS Deployment and Tivoli Provisioning Manager for Images (CVE-2018-0732) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-op…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a public disclosed vulnerability from Apache ZooKeeper ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK Affect IBM Emptoris Strategic Supply Management Suite of Products and IBM Emptoris Services Procurement ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 12-12-2018 18:00 − Donnerstag 13-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Captchas are dead...ish. ∗∗∗
---------------------------------------------
According to a recently published research paper, some types of Captchas are now obsolete. The reason: machines have learned to solve those Captchas.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/12/31374-captchas-are-dead-ish
∗∗∗ OWASP Top 10 Security Risks – Part III ∗∗∗
---------------------------------------------
Today, we are going to explore items 5 and 6: broken access control and security misconfigurations.
---------------------------------------------
https://blog.sucuri.net/2018/12/owasp-top-10-security-risks-part-iii.html
∗∗∗ Wichtiges Sicherheitsupdate: WordPress 5.0.1 ist da ∗∗∗
---------------------------------------------
Aufgrund von mehreren Sicherheitslücken könnten Angreifer mit WordPress erstellte Websites attackieren. Eine fehlerbereinigte Version steht bereit.
---------------------------------------------
http://heise.de/-4249500
∗∗∗ Scanning for Flaws, Scoring for Security ∗∗∗
---------------------------------------------
Is it fair to judge an organizations information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated software or accidentally exposed data and devices? Fair or not, a number of nascent efforts are using just such an approach to derive security scores for companies and entire industries.
---------------------------------------------
https://krebsonsecurity.com/2018/12/scanning-for-flaws-scoring-for-security/
∗∗∗ Vorsicht bei gamestar4.com ∗∗∗
---------------------------------------------
Der Online-Shop gamestar4.com, mit angeblichem Sitz in Wien, ist betrügerisch. Auf gamestar4.com finden Sie neben Haushaltszubehör und Elektrogeräten, billige Spielkonsolen, die als Wochendeals beworben werden. Bestellen Sie bei gamestar4.com, verlieren Sie Ihr Geld, übermitteln Betrüger/innen sensible Daten und erhalten keine Ware.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-bei-gamestar4com/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr), Fedora (singularity), openSUSE (compat-openssl098, cups, firefox, mozilla-nss, and xen), and SUSE (cups, exiv2, ghostscript, and git).
---------------------------------------------
https://lwn.net/Articles/774845/
∗∗∗ Linux kernel vulnerability CVE-2018-5390 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K95343321
∗∗∗ IBM Security Bulletin: IBM® DB2® contains a denial of service vulnerability in scalar functions (CVE-2018-1977) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-db2-contains-a-de…
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for ACH Services is affected by a potential cross-site scripting (XSS) vulnerability (CVE-2018-1871) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-financial-transaction…
∗∗∗ IBM Security Bulletin: Cross-Site Scripting vulnerability in IBM Business Automation Workflow (CVE-2018-1848) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-…
∗∗∗ IBM Security Bulletin: Potential MITM attack in Apache CXF used by IBM Event Streams (CVE-2018-8039) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-mitm-attack…
∗∗∗ IBM Security Bulletin: IBM Security Directory Server is affected by multiple vulnerabilities in GSKit ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-director…
∗∗∗ IBM Security Bulletin: IBM Security Directory Server is affected by a vulnerability in GSKit ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-director…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 11-12-2018 18:00 − Mittwoch 12-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Logitech Options: Logitech-Software ermöglicht bösartige Codeausführung ∗∗∗
---------------------------------------------
In einer Software zur Konfiguration von Logitech-Tastaturen und Mäusen klafft ein riesiges Sicherheitsloch. Nutzer von Logitech Options sollten es vorerst deinstallieren: Bisher gibt es keinen Fix. (Logitech, Eingabegerät)
---------------------------------------------
https://www.golem.de/news/logitech-options-logitech-software-ermoeglicht-bo…
∗∗∗ Adventures in Video Conferencing Part 3: The Even Wilder World of WhatsApp ∗∗∗
---------------------------------------------
Posted by Natalie Silvanovich, Project ZeroWhatsApp is another application that supports video conferencing that does not use WebRTC as its core implementation. Instead, it uses PJSIP, which contains some WebRTC code, but also contains a substantial amount of other code, and predates the WebRTC project. I fuzzed this implementation to see if it had similar results to WebRTC and FaceTime.Fuzzing Set-upPJSIP is open source, so it was easy to identify the PJSIP code in the Android WhatsApp binary [...]
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferen…
∗∗∗ A bug in Microsoft’s login system made it easy to hijack anyone’s Office account ∗∗∗
---------------------------------------------
A string of bugs when chained together created the perfect attack to gain access to someones Microsoft account - simply by tricking a user into clicking a link.
---------------------------------------------
https://techcrunch.com/2018/12/11/microsoft-login-bug-hijack-office-account…
∗∗∗ Patchday: Attacken auf Windows-Kernel-Lücke ∗∗∗
---------------------------------------------
Microsoft hat wichtige Sicherheitsupdates für Office, Windows & Co. veröffentlicht. Mehrere Schwachstellen gelten als kritisch.
---------------------------------------------
http://heise.de/-4248309
∗∗∗ Sicherheitsupdates: Angreifer könnten IP-Kameras von Bosch übernehmen ∗∗∗
---------------------------------------------
Einige IP-Kamera-Modelle von Bosch sind über eine als kritisch eingestufte Sicherheitslücke attackierbar. Updates schaffen Abhilfe.
---------------------------------------------
http://heise.de/-4248751
∗∗∗ Bitcoin Profit ist Betrug ∗∗∗
---------------------------------------------
Auf einer gefälschten orf.at-Website bewerben Kriminelle die Trading-Plattform Bitcoin Profit. In dem irreführenden Beitrag behaupten sie, dass es damit sehr einfach sei, sehr hohe Gewinne zu erzielen. Über die Werbung gelangen Leser/innen auf btcprofitnow.pro. Melden sie sich auf der Website für Bitcoin Profit an und überweisen sie ihr Geld an Kriminelle, verlieren sie es und ihre Daten an Betrüger/innen.
---------------------------------------------
https://www.watchlist-internet.at/news/bitcoin-profit-ist-betrug/
∗∗∗ Schadsoftware in gefälschter DHL-Sendungsbenachrichtigung ∗∗∗
---------------------------------------------
Zur Weihnachtszeit ist es leicht möglich, dass Sie Versandbenachrichtigungen in Ihrem E-Mail-Posteingang erwarten. Dennoch überrascht Sie dort womöglich eine gefälschte DHL-Nachricht. Die Mail gibt vor, Sie über eine anstehende Lieferung zu informieren, die gar nicht existiert. Wenn Sie auf den Link in der Nachricht klicken, wird versucht eine Datei herunterzuladen. Vorsicht! Diese vermeintliche Word-Datei enthält Schadsoftware.
---------------------------------------------
https://www.watchlist-internet.at/news/schadsoftware-in-gefaelschter-dhl-se…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (chromium, firefox, lib32-openssl, lib32-openssl-1.0, openssl, openssl-1.0, texlive-bin, and wireshark-cli), Fedora (perl), openSUSE (pdns), Oracle (kernel), Red Hat (kernel), Slackware (mozilla), SUSE (kernel, postgresql10, qemu, and xen), and Ubuntu (firefox, freerdp, freerdp2, pixman, and poppler).
---------------------------------------------
https://lwn.net/Articles/774731/
∗∗∗ Security Advisory - Cache Timing Vulnerability in OpenSSL RSA Key Generation ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181212-…
∗∗∗ IBM Security Bulletin: Denial of service vulnerability affects IBM Unified Extensible Firmware Interface (CVE-2018-9085) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-denial-of-service-vul…
∗∗∗ IBM Security Bulletin: Vulnerabilities in OpenSSL affect AIX (CVE-2018-0734, CVE-2018-5407) Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-op…
∗∗∗ IBM Security Bulletin: Vulnerability in Xorg affects AIX (CVE-2018-14665) Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-xorg…
∗∗∗ IBM Security Bulletin: Vulnerabilities in IBM Java Runtime affect Rational Publishing Engine ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-ib…
∗∗∗ IBM Security Bulletin: Vulnerability in Oracle Solaris affects AIX (CVE-2017-3623) Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-orac…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium…
∗∗∗ BIG-IP SNMP vulnerability CVE-2018-15328 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K42027747
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 10-12-2018 18:00 − Dienstag 11-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ MySQL-Frontend: Lücke in PhpMyAdmin erlaubt Datendiebstahl ∗∗∗
---------------------------------------------
Eine Sicherheitslücke im MySQL-Frontend PhpMyAdmin erlaubt es, lokale Dateien auszulesen. Dafür benötigt man jedoch einen bereits existierenden Login. (MySQL, PHP)
---------------------------------------------
https://www.golem.de/news/mysql-frontend-luecke-in-phpmyadmin-erlaubt-daten…
∗∗∗ Warnung vor schlossauf.at ∗∗∗
---------------------------------------------
Die Website schlossauf.at wirbt mit einem seriösen und preiswerter Schlüsseldienst, der in 20min vor Ort bei Kund/innen ist. Konsument/innen, die den Dienst nutzen, nehmen in Wahrheit Kontakt mit der deutschen Gesellschaft MK Notservice GmbH auf. Sie vermittelt Schlosser/innen. Die Dienste vor Ort sind laut Kund/innenmeinungen mit langen Wartezeiten verbunden und sehr teuer.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-schlossaufat/
∗∗∗ Augen auf beim digitale Vignetten-Kauf! ∗∗∗
---------------------------------------------
Die digitale Vignette können Sie an unterschiedlichsten Stellen erstehen. Neben der ASFINAG, dem ÖAMTC oder dem ARBÖ vertreiben nämlich auch andere unbekanntere Anbieter die digitale Vignette. Achtung: Hier werden zum Teil zusätzliche Kosten verrechnet, die Sie leicht vermeiden können, indem Sie einen kurzen Vergleich anstellen.
---------------------------------------------
https://www.watchlist-internet.at/news/augen-auf-beim-digitale-vignetten-ka…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates available for Adobe Acrobat and Reader (APSB18-41) ∗∗∗
---------------------------------------------
Adobe has published a security bulletin for Adobe Acrobat and Reader (APSB18-41). The updates referenced in the bulletin address critical and important vulnerabilities, and Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1674
∗∗∗ Decoupled Router - Critical - Access bypass - SA-CONTRIB-2018-071 ∗∗∗
---------------------------------------------
Project: Decoupled RouterVersion: 8.x-1.18.x-1.0Date: 2018-October-31Security risk: Critical 15∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassDescription: This module enables you to resolve the provided Drupal path in order to find the canonical path and information about the resolved entity. This information includes entity type ID, entity ID, entity UUID and entity label.The module doesnt sufficiently check access before displaying entity labels.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-071
∗∗∗ TYPO3 9.5.2, 8.7.21 and 7.6.32 security releases published ∗∗∗
---------------------------------------------
We are announcing the release of the following TYPO3 updates:
* TYPO3 9.5.2 LTS
* TYPO3 8.7.21 LTS
* TYPO3 7.6.32 LTS
All versions are security releases and contain important security fixes.
---------------------------------------------
https://typo3.org/article/typo3-952-8721-and-7632-security-releases-publish…
∗∗∗ SAP Security Patch Day – December 2018 ∗∗∗
---------------------------------------------
On 11th of December 2018, SAP Security Patch Day saw the release of 9 Security Notes. Additionally, there were 3 updates to previously released security notes.
---------------------------------------------
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (php7.0), Fedora (keepalived, kernel, kernel-headers, kernel-tools, mingw-uriparser, and uriparser), openSUSE (pdns-recursor), Oracle (kernel), SUSE (compat-openssl098, glibc, java-1_8_0-ibm, kernel, opensc, python, python-base, python-cryptography, python-pyOpenSSL, samba, and soundtouch), and Ubuntu (cups).
---------------------------------------------
https://lwn.net/Articles/774590/
∗∗∗ SSA-982399: Missing Authentication in TIM 1531 IRC Modules ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-982399.txt
∗∗∗ SSA-181018: Heap Overflow Vulnerability in SCALANCE X switches, RUGGEDCOM WiMAX, RFID 181-EIP, and SIMATIC RF182C ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-181018.txt
∗∗∗ SSA-674165: Vulnerability in McAfee MACC product for SINAMICS PERFECT HARMONY GH180 drives ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-674165.txt
∗∗∗ SSA-170881: Vulnerabilities in SINUMERIK Controllers ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-170881.txt
∗∗∗ IBM Security Bulletin: Open Source Python-paramiko vulnerability affects IBM Netezza Host Management. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-open-source-python-pa…
∗∗∗ IBM Security Bulletin: Potential cross-site request forgery in WebSphere Application Server Admin Console (CVE-2018-1926) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-cross-site-…
∗∗∗ IBM Security Bulletin: Potential Privilege Escalation Vulnerability in WebSphere Application Server (CVE-2018-1901) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-privilege-e…
∗∗∗ IBM Security Bulletin: Potential Remote code execution vulnerability in WebSphere Application Server (CVE-2018-1904) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-remote-code…
∗∗∗ IBM Security Bulletin: Vulnerability in BIND affects Power Hardware Management Console (CVE-2018-5740) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-bind…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: IBM Security Access Manager Appliance is affected by a glibc vulnerability (CVE-2017-15670) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-access-m…
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities affect IBM Cloud Private (CVE-2018-1060, CVE-2018-1061) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-security-vul…
∗∗∗ IBM Security Bulletin: IBM Cloud Manager with OpenStack is affected by a OpenSSL vulnerabilities (CVE-2018-0732, CVE-2018-0737) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-cloud-manager-wit…
∗∗∗ glibc vulnerability CVE-2017-16997 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K43546166
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 07-12-2018 18:00 − Montag 10-12-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Gefälschte T-Mobile-Nachricht fordert Auskunft ∗∗∗
---------------------------------------------
Kriminelle versenden eine gefälschte T-Mobile-Nachricht. Darin behaupten sie, dass Kund/innen im Zusammenhang mit der Nutzung von Diensten persönliche Daten bekannt geben und ihre Telefonnummer bestätigen müssen. Das soll auf einer gefälschten T-Mobile-Website geschehen. Konsument/innen, die die von Ihnen verlangten Informationen bekannt geben, werden Opfer eines Datendiebstahls.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-t-mobile-nachricht-forde…
∗∗∗ Sextortion Emails now Leading to Ransomware and Info-Stealing Trojans ∗∗∗
---------------------------------------------
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads and installs the GandCrab ransomware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/sextortion-emails-now-leadin…
∗∗∗ How can businesses get the most out of pentesting? ∗∗∗
---------------------------------------------
More than 4.5 billion data records were compromised in the first half of this year. If you still feel like your enterprise is secure after reading that statistic, you’re one of the few. Hackers utilizing high-profile exploits to victimize organizations is becoming an almost daily occurrence, with 18,000 to 19,000 new vulnerabilities estimated to show up in 2018. Here’s the thing though – we can still address the situation and make the current threat landscape [...]
---------------------------------------------
https://www.helpnetsecurity.com/2018/12/10/get-the-most-out-of-pentesting/
∗∗∗ Mac malware combines EmPyre backdoor and XMRig miner ∗∗∗
---------------------------------------------
New Mac malware is using the EmPyre backdoor and the XMRig cryptominer to drain processor power—and possibly worse.
---------------------------------------------
https://blog.malwarebytes.com/threat-analysis/2018/12/mac-malware-combines-…
∗∗∗ Malicious sites abuse 11-year-old Firefox bug that Mozilla failed to fix ∗∗∗
---------------------------------------------
Bug dealt with in Chrome and Edge, but still a problem for Firefox users.
---------------------------------------------
https://www.zdnet.com/article/malicious-sites-abuse-11-year-old-firefox-bug…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium-browser and lxml), Fedora (cairo, hadoop, and polkit), Mageia (tomcat), openSUSE (apache2-mod_jk, Chromium, dom4j, ImageMagick, libgit2, messagelib, ncurses, openssl-1_0_0, otrs, pam, php5, php7, postgresql10, rubygem-activejob-5_1, tiff, and tomcat), Red Hat (chromium-browser and rh-git218-git), Slackware (php), SUSE (audiofile, cri-o and kubernetes packages, cups, ImageMagick, libwpd, SMS3.2, and systemd), and Ubuntu (lxml).
---------------------------------------------
https://lwn.net/Articles/774489/
∗∗∗ WPForms <= 1.4.8 - Unauthenticated Cross-Site Scripting (XSS) ∗∗∗
---------------------------------------------
https://wpvulndb.com/vulnerabilities/9164
∗∗∗ IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Release 1801-s, 1801-t and 1801-u ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vyatta-5600-vrouter-s…
∗∗∗ IBM Security Bulletin: IBM Cloud Kubernetes Service is impacted by a security vulnerability in Project Calico ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-cloud-kubernetes-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affects WebSphere Application Server October 2018 CPU that is bundled with IBM WebSphere Application Server Patterns ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities affect IBM Voice Gateway ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Vulnerability in Apache Batik affects IBM Cúram Social Program Management (CVE-2018-8013) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-apac…
∗∗∗ IBM Security Bulletin: IBM Cúram Social Program Management contains a stored cross-site scripting vulnerability (CVE-2018-1900) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-curam-social-prog…
∗∗∗ IBM Security Bulletin: IBM Cúram Social Program Management contains an open redirect vulnerability (CVE-2018-1654) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-curam-social-prog…
∗∗∗ IBM Security Bulletin: IBM DataPower Gateways is affected by a Denial of Service vulnerability (CVE-2018-1652) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-datapower-gateway…
∗∗∗ IBM Security Bulletin: IBM Cloud Private is affected by a privilege escalation vulnerability in Kubernetes API server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-cloud-private-is-…
∗∗∗ IBM Security Bulletin: IBM Lotus Protector for Mail Security has released fixes in response to the public disclosed vulnerability for libcURL (CVE-2018-14618) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-lotus-protector-f…
∗∗∗ IBM Security Bulletin: IBM Lotus Protector for Mail Security has released fixes in response to the public disclosed vulnerability from OpenSSL (CVE-2018-0732) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-lotus-protector-f…
∗∗∗ IBM Security Bulletin: IBM MQ Appliance is affected by a denial of service vulnerability (CVE-2018-1652) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-appliance-is-a…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 06-12-2018 18:00 − Freitag 07-12-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Using Fuzzing to Mine for Zero-Days ∗∗∗
---------------------------------------------
Infosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in todays security landscape.
---------------------------------------------
https://threatpost.com/using-fuzzing-to-mine-for-zero-days/139683/
∗∗∗ Is it Time to Uninstall Flash? (If you havent already) ∗∗∗
---------------------------------------------
If you havent uninstalled Flash yet, maybe today should be that day. The update posted yesterday has a remote code exec proof-of-concept already here: [...]
---------------------------------------------
https://isc.sans.edu/forums/diary/Is+it+Time+to+Uninstall+Flash+If+you+have…
∗∗∗ Array string obfuscation ∗∗∗
---------------------------------------------
We continue to see an increase in the number of these PHP injections that use multiple obfuscation methods to evade detection, but lately one method has been increasingly utilized: [...]
---------------------------------------------
http://labs.sucuri.net/?note=2018-12-06
=====================
= Vulnerabilities =
=====================
∗∗∗ Philips HealthSuite Health Android App ∗∗∗
---------------------------------------------
This advisory includes mitigations for an inadequate encryption strength vulnerability in Philips HealthSuite Health Android App.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-340-01
∗∗∗ GE Proficy GDS ∗∗∗
---------------------------------------------
This advisory contains mitigations for an improper restriction of XML external entity reference vulnerability in GEs Proficy GDS.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-340-01
∗∗∗ Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules ∗∗∗
---------------------------------------------
This advisory contains mitigations for a missing authentication vulnerability in the Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02
∗∗∗ watchOS 5.1.2 ∗∗∗
---------------------------------------------
This document describes the security content of watchOS 5.1.2.
---------------------------------------------
https://support.apple.com/en-us/HT209343
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (jupyter-notebook), CentOS (ghostscript), Debian (libphp-phpmailer and policykit-1), Fedora (bird), Gentoo (ede), Mageia (flash-player-plugin), openSUSE (dom4j, dpdk, glib2, nextcloud, postgresql94, and qemu), Oracle (kernel), SUSE (firefox, libarchive, libgit2, libreoffice, ncurses, openssl-1_0_0, squid, and tiff), and Ubuntu (ghostscript, openssl, openssl1.0, and wavpack).
---------------------------------------------
https://lwn.net/Articles/774270/
∗∗∗ Multiple vulnerabilities in multiple SEIKO EPSON printers and scanners ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN89767228/
∗∗∗ IBM Security Bulletin: Potential information disclosure in WebSphere Application Server (CVE-2018-1957) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-information…
∗∗∗ IBM Security Bulletin: IBM QRadar Network Security is affected by multiple openssl vulnerabilities. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-qradar-network-se…
∗∗∗ IBM Security Bulletin: IBM QRadar Network Security is affected by a CPU vulnerability (CVE-2018-3620) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-qradar-network-se…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Security SiteProtector System ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: IBM Social Program Management Design System contains an HTML injection vulnerability (CVE-2018-1671) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-social-program-ma…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 05-12-2018 18:00 − Donnerstag 06-12-2018 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Adventures in Video Conferencing Part 2: Fun with FaceTime ∗∗∗
---------------------------------------------
FaceTime is Apple’s video conferencing application for iOS and Mac. It is closed source, and does not appear to use any third-party libraries for its core functionality. I wondered whether fuzzing the ..
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferen…
∗∗∗ Data Exfiltration in Penetration Tests ∗∗∗
---------------------------------------------
In many penetration tests, therell be a point where you need to exfiltrate some data. Sometimes this is a situation of "OK, we got the crown jewels, lets get the data off premise". Or sometimes in ..
---------------------------------------------
https://isc.sans.edu/forums/diary/Data+Exfiltration+in+Penetration+Tests/24…
∗∗∗ Campaign evolution: Hancitor changes its Word macros ∗∗∗
---------------------------------------------
Todays diary reviews trends in recent malicious spam (malspam) pushing Hancitor.
---------------------------------------------
https://isc.sans.edu/forums/diary/Campaign+evolution+Hancitor+changes+its+W…
∗∗∗ MikroTik: Hunderttausende Router schürfen heimlich Kryptogeld ∗∗∗
---------------------------------------------
Eine im August bekannt gewordenen Schwachstelle in den Geräten wird momentan öfter angegriffen denn je.
---------------------------------------------
http://heise.de/-4243857
∗∗∗ Linux: Besserer Spectre-V2-Schutz jetzt im Kernel, kaum Geschwindigkeitsverlust ∗∗∗
---------------------------------------------
Nach einem abgelehnten Patch haben die Linux-Entwickler den Schutz gegen die CPU-Lücke Spectre V2 in den Kerneln 4.14.86 und 4.19.7 verbessert.
---------------------------------------------
http://heise.de/-4244052
∗∗∗ Betrügerischer Sicherheitsalarm im Postfach ∗∗∗
---------------------------------------------
Konsument/innen finden in ihrem E-Mailpostfach eine Nachricht mit dem Betreff „Sicherheitsalarm. Hacker kennen das Passwort vom (E-Mailadresse)“. In dem Schreiben behaupten Kriminelle ..
---------------------------------------------
https://www.watchlist-internet.at/index.php?id=71&tx_news_pi1[news]=3205&tx…
∗∗∗ konsolensultan.de ist ein Fake-Shop ∗∗∗
---------------------------------------------
Bestellen Sie nicht bei konsolensultan.de, es handelt sich um einen unseriösen Anbieter. Die gewünschten Spielkonsolen und Controller werden Sie nie erreichen. Sie verlieren Ihr Geld.
---------------------------------------------
https://www.watchlist-internet.at/news/konsolensultande-ist-ein-fake-shop/
∗∗∗ A botnet of over 20,000 WordPress sites is attacking other WordPress sites ∗∗∗
---------------------------------------------
Botnet is still up and running but law enforcement has been notified.
---------------------------------------------
https://www.zdnet.com/article/a-botnet-of-over-20000-wordpress-sites-is-att…
=====================
= Vulnerabilities =
=====================
∗∗∗ Upcoming Security Updates for Adobe Acrobat and Reader (APSB18-41) ∗∗∗
---------------------------------------------
A prenotification security advisory (APSB18-41) has been posted regarding upcoming Adobe Acrobat and Reader updates scheduled for Tuesday, December 11, 2018. We will continue to provide updates on the ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1669
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Mageia (kio-extras), Red Hat (flash-plugin and openstack-neutron), Slackware (gnutls and nettle), SUSE ( aphp53, apache2, apache2-mod_jk, compat-openssl097g, firefox, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss, glib2, kvm, mariadb, ncurses, openssl-1_0_0, openssl1, pam, php5, php7, qemu, rubygem-activejob-5_1, tomcat, and wireshark), and Ubuntu (libraw and spamassassin).
---------------------------------------------
https://lwn.net/Articles/774089/
∗∗∗ MISP 2.4.99 released (aka API/UI fixes and critical security vulnerability fixed) ∗∗∗
---------------------------------------------
A new version of MISP (2.4.99) has been released with improvements in the UI, API, STIX import and a fixed critical security vulnerability.Thanks to Francois-Xavier Stellamans from NCI Agency Cyber Security who reported a critical vulnerability in the STIX 1 import code. The vulnerability allows a malicious authenticated user to inject commands via ..
---------------------------------------------
https://www.misp-project.org/2018/12/06/MISP.2.4.99.released.html
∗∗∗ Apple Releases Multiple Security Updates ∗∗∗
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/12/05/Apple-Releases-Mul…
∗∗∗ IBM Security Bulletin: IBM Cloud Kubernetes Service is affected by a privilege escalation vulnerability in Kubernetes API server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-cloud-kubernetes-…
∗∗∗ IBM Security Bulletin: Vulnerabilities CVE-2018-5407 and CVE-2018-0734 in OpenSSL affect IBM i ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-cve-2…
∗∗∗ IBM Security Bulletin: IBM Connections Security Refresh (CVE-2018-1896) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-connections-secur…
∗∗∗ IBM Security Bulletin: IBM MQ Console could allow an attacker to execute a denial of service attack. (CVE-2018-1883) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-console-could-…
∗∗∗ IBM Security Bulletin: Code execution vulnerability with OpenID connect in WebSphere Application Server Liberty affects IBM WebSphere Application Server in IBM Cloud (CVE-2018-1851) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-code-execution-vulner…
∗∗∗ IBM Security Bulletin: IBM DataPower Gateways is affected by a downgrade vulnerability (CVE-2018-1663) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-datapower-gateway…
∗∗∗ IBM Security Bulletin: Multiple Db2 vulnerabilities affect the IBM Spectrum Protect Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-db2-vulnerab…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 04-12-2018 18:00 − Mittwoch 05-12-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Adventures in Video Conferencing Part 1: The Wild World of WebRTC ∗∗∗
---------------------------------------------
Over the past five years, video conferencing support in websites and applications has exploded. Facebook, WhatsApp, FaceTime and Signal are just a few of the many ways that users can make audio and video calls across networks. While a lot of research has been done into the cryptographic and privacy properties of video conferencing, there is limited information available about the attack surface of these platforms [...]
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferen…
∗∗∗ Notfallpatch: Exploit-Code für kritische Flash-Lücke im Umlauf ∗∗∗
---------------------------------------------
Es gibt ein wichtiges Sicherheitsupdate für Adobes Flash Player. Nutzer sollten es dringend installieren.
---------------------------------------------
http://heise.de/-4242328
∗∗∗ SplitSpectre: Neue Methode macht Prozessor-Angriffe einfacher ∗∗∗
---------------------------------------------
Eine neue Abwandlung des Spectre-V1-Angriffs macht solche Attacken auf CPUs realistischer. Sie lässt sich über die JavaScript-Engine eines Browsers ausführen.
---------------------------------------------
http://heise.de/-4241478
∗∗∗ Achtung Dynamit-Phishing: Gefährliche Trojaner-Welle legt ganze Firmen lahm ∗∗∗
---------------------------------------------
BSI, CERT-Bund und Cybercrime-Spezialisten der LKAs sehen eine akute Welle von Infektionen mit Emotet, die Millionenschäden anrichtet.
---------------------------------------------
http://heise.de/-4241424
∗∗∗ The Dark Side of the ForSSHe ∗∗∗
---------------------------------------------
ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, "The Dark Side of the ForSSHe", they release analysis of 21 malware families to improve the prevention, detection and remediation of such threats
---------------------------------------------
https://www.welivesecurity.com/2018/12/05/dark-side-of-the-forsshe/
∗∗∗ Achtung: Gefälschte PayPal-Rechnungen im Umlauf ∗∗∗
---------------------------------------------
Konsument/innen wird per E-Mail eine angebliche Rechnung von PayPal zugesandt - für ein Produkt, das nie bestellt wurde. Um die Rechnung zu stornieren, soll man einem Link folgen und dort seine persönlichen Daten und Zahlungsinformationen bekannt geben. Wer der Aufforderung nachkommt, wird Opfer eines Datendiebstahls und ermöglicht Kriminellen Zahlungen im eigenen Namen!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-gefaelschte-paypal-rechnunge…
∗∗∗ It looked like a Citrix ShareFile phishing attack, but wasn’t ∗∗∗
---------------------------------------------
Guest contributor Bob Covello isn’t happy about a password reset email that Citrix has been sending its customers.If you’re a company contacting your customers via email, please make sure it doesn’t look phishy.
---------------------------------------------
https://www.grahamcluley.com/citrix-sharefile-not-phishing-email/
=====================
= Vulnerabilities =
=====================
∗∗∗ Omron CX-One ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow and use after free vulnerabilities in Omrons CX-One software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01
∗∗∗ SpiderControl SCADA WebServer ∗∗∗
---------------------------------------------
This advisory includes mitigations for a reflected cross-site scripting vulnerability in SpiderControls SCADA WebServer software management platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-02
∗∗∗ Apache Struts Commons FileUpload Library Remote Code Execution Vulnerability Affecting Cisco Products: November 2018 ∗∗∗
---------------------------------------------
Version 1.15: Final
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Inadequate cryptography implementation in Kerio Control VPN protocol ∗∗∗
---------------------------------------------
A vulnerability in the Kerio Control VPN protocol allowed an attacker to modify data transferred through the VPN.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/inadequate-cryptography-impl…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (suricata), Fedora (cobbler), Oracle (ghostscript), Red Hat (ansible), and Scientific Linux (ghostscript and ruby).
---------------------------------------------
https://lwn.net/Articles/773964/
∗∗∗ IBM Security Bulletin: IBM Connections Security Refresh (CVE-2018-1935) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-connections-secur…
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for ACH Services for Multi-Platform is affected by vulnerabilities in IBM Java Runtime ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-financial-transaction…
∗∗∗ IBM Security Bulletin: A vulnerability in IBM Java Runtime affect Rational Asset Analyzer (RAA). ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-vulnerability-in-ib…
∗∗∗ IBM Security Bulletin: IBM Financial Transaction Manager for Check Services ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-17/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM QRadar SIEM ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Java Vulnerability Impacts IBM Control Center (CVE-2018-1656) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-java-vulnerability-im…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Rational Asset Analyzer (RAA). ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Rational Asset Analyzer (RAA) is affected by a XSS vulnerability. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-rational-asset-analyz…
∗∗∗ IBM Security Bulletin: Rational Asset Analyzer (RAA) is affected by a WAS Liberty vulnerability. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-rational-asset-analyz…
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities exist in IBM Cognos TM1 (CVE-2018-1656, CVE-2018-0732, CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-security-vul…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 03-12-2018 18:00 − Dienstag 04-12-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ KoffeyMaker: notebook vs. ATM ∗∗∗
---------------------------------------------
Kaspersky Lab’ experts investigated one such toolkit, dubbed KoffeyMaker, in 2017-2018, when a number of Eastern European banks turned to us for assistance after their ATMs were quickly and almost freely raided. It soon became clear that we were dealing with a black box attack.
---------------------------------------------
https://securelist.com/koffeymaker-notebook-vs-atm/89161/
∗∗∗ SamSam Ransomware ∗∗∗
---------------------------------------------
Original release date: December 03, 2018 The Department of Homeland Security and the Federal Bureau of Investigation have identified cyber threat actors using SamSam ransomware—also known as MSIL/SAMAS.A—to target industries in the United States and worldwide.NCCIC encourages users and administrators to review Alert AA18-337A: SamSam Ransomware and Malware Analysis Reports AR18-337A, AR18-337B, AR18-337C, and AR18-337D for more information. This product is provided subject to this
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/12/03/SamSam-Ransomware
∗∗∗ App-Store-Betrug mit Touch-ID-Geräten ∗∗∗
---------------------------------------------
Verschiedene Entwickler versuchen, Nutzer zum Kauf teurer In-App-Angebote zu bringen – mittels "Fingerabdruckklau". Apple reagiert.
---------------------------------------------
http://heise.de/-4239342
∗∗∗ Kubernetes: Kritisches Update für Container-Verwaltung ∗∗∗
---------------------------------------------
In Kubernetes steckt eine gefährliche Sicherheitslücke, über die unangemeldete Angreifer Code mit Admin-Rechten im Cluster ausführen können.
---------------------------------------------
http://heise.de/-4240804
∗∗∗ Gebietskörperschaften erhalten gefälschte Geschäftskorrespondenz ∗∗∗
---------------------------------------------
Betrüger/innen schreiben Gebietskörperschaften an und geben sich als Geschäftspartner/innen des Bundes, der Länder oder der Gemeinden aus. Sie erfinden einen Grund, der es angeblich notwendig macht, dass sie die Vertragskopie für ein Rechtsgeschäft erhalten. In diese fügen sie neue Bankdaten ein und fordern die Geldüberweisung auf ein neues Konto. Beamt/innen und Vertragsbedienstete, die die Transaktion durchführen, überweisen Geld an Kriminelle.
---------------------------------------------
https://www.watchlist-internet.at/news/gebietskoerperschaften-erhalten-gefa…
∗∗∗ In Latest Magecart Evolution, Group 11 Stole More Than Just Card Data From Vision Direct ∗∗∗
---------------------------------------------
Since we began reporting on online card skimming, we have noted consistent evolutions in modus operandi of the various Magecart groups, and even the Magecart phenomenon itself. The web-skimming ecosystem has exploded, spawning multiple groups that want a piece of the action, many of which we reported on in our recent report “Inside Magecart.” […]The post In Latest Magecart Evolution, Group 11 Stole More Than Just Card Data From Vision Direct appeared first on RiskIQ.
---------------------------------------------
https://www.riskiq.com/blog/labs/magecart-vision-direct/
=====================
= Vulnerabilities =
=====================
∗∗∗ Android Security Bulletin - December 2018 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Security patch levels of 2018-12-05 or later address all of these issues.
---------------------------------------------
https://source.android.com/security/bulletin/2018-12-01.html
∗∗∗ Vulnerability Spotlight: Netgate pfSense system_advanced_misc.php powerd_normal_mode Command Injection Vulnerability ∗∗∗
---------------------------------------------
Today, Cisco Talos is disclosing a command injection vulnerability in Netgate pfSense system_advanced_misc.php powerd_normal_mode. pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more.In accordance with our coordinated disclosure policy, Cisco Talos worked with Netgate to ensure that these issues are resolved and that an update is [...]
---------------------------------------------
https://blog.talosintelligence.com/2018/12/Netgate-pfsense-command-injectio…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (glibc, qemu, and tmux), Mageia (messagelib), Oracle (ghostscript), Red Hat (ghostscript, OpenShift Container Platform 3.10, OpenShift Container Platform 3.11, OpenShift Container Platform 3.2, OpenShift Container Platform 3.3, OpenShift Container Platform 3.4, OpenShift Container Platform 3.5, OpenShift Container Platform 3.6, and OpenShift Container Platform 3.8), Slackware (mozilla), and Ubuntu (linux, linux-gcp, linux-kvm, linux-raspi2, linux-hwe, [...]
---------------------------------------------
https://lwn.net/Articles/773826/
∗∗∗ Cisco Energy Management Suite Default PostgreSQL Password Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ TMM vulnerability CVE-2018-5535 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K19634255
∗∗∗ IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU – Oct 2018 – Includes Oracle Oct 2018 CPU affects IBM Tivoli Composite Application Manager for Transactions-Robotic Response Time ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-sdk-java-technolo…
∗∗∗ IBM Security Bulletin: IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-qradar-siem-is-vu…
∗∗∗ IBM Security Bulletin: IBM WebSphere Portal ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-15/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM SDK Java Technology Edition affect IBM Cloud App Management V2018 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Transparent Cloud Tiering ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-14/
∗∗∗ IBM Security Bulletin: IBM QRadar SIEM is vulnerable to XML External Entity Injection (CVE-2018-1730) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-qradar-siem-is-vu…
∗∗∗ IBM Security Bulletin: IBM QRadar SIEM is vulnerable to Cross-Site Scripting (CVE-2018-1728) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-qradar-siem-is-vu…
∗∗∗ IBM Security Bulletin: QRadar Advisor with Watson ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-13/
∗∗∗ IBM Security Bulletin: Apache Tomcat as used in IBM QRadar SIEM is vulnerable to publicly disclosed vulnerability. (CVE-2018-8034, CVE-2018-8037) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-apache-tomcat-as-used…
∗∗∗ IBM Security Bulletin: Apache PDFBox as used in IBM QRadar Incident Forensics is vulnerable to Publicly disclosed vulnerability. (CVE-2018-8036) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-apache-pdfbox-as-used…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 30-11-2018 18:00 − Montag 03-12-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Who Is Targeting Industrial Facilities and ICS Equipment, and How? ∗∗∗
---------------------------------------------
Industrial Control Systems (ICS) are expected to be installed and left
isolated for a long time. Technical changes and the necessity of
reducing operating costs led to this equipment being left in operation
longer than expected, exposing it to a broad range of cyber-threats.
Malware designed to compromise [...]
---------------------------------------------
https://resources.infosecinstitute.com/who-is-targeting-industrial-faciliti…
∗∗∗ DeepSec 2018 Wrap-Up ∗∗∗
---------------------------------------------
I’m writing this quick wrap-up in Vienna, Austria where I attended my
first DeepSec conference. This event was already on my schedule for a
while but I never had a chance to come. This year, I submitted a
training and I was accepted! Good opportunity to visit the beautiful
city [...]
---------------------------------------------
https://blog.rootshell.be/2018/11/30/deepsec-2018-wrap-up/
∗∗∗ The 9 Lives of Bleichenbachers CAT: New Cache ATtacks on TLS
Implementations ∗∗∗
---------------------------------------------
In this whitepaper*, nine different implementations of TLS were tested
against cache attacks and seven were found to be vulnerable: [...]
---------------------------------------------
https://www.nccgroup.trust/us/our-research/the-9-lives-of-bleichenbachers-c…
∗∗∗ Injecting Code into Windows Protected Processes using COM - Part 2 ∗∗∗
---------------------------------------------
In my previous blog I discussed a technique which combined numerous
issues I’ve previously reported to Microsoft to inject arbitrary code
into a PPL-WindowsTCB process. The techniques presented don’t work for
exploiting the older, stronger Protected Processes (PP) for a few
different reasons. This blog seeks to remedy this omission and provide
details of how I was able to also hijack a full PP-WindowsTCB process
without requiring administrator privileges.
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/11/injecting-code-into-windows-…
∗∗∗ What the Marriott Breach Says About Security ∗∗∗
---------------------------------------------
We dont yet know the root cause(s) that forced Marriott this week to
disclose a four-year-long breach involving the personal and financial
information of 500 million guests of its Starwood hotel properties. But
anytime we see such a colossal intrusion go undetected for so long, the
ultimate cause is usually a failure to adopt the most important
principle in cybersecurity defense that applies to both corporations and
consumers: Assume you are compromised.
---------------------------------------------
https://krebsonsecurity.com/2018/12/what-the-marriott-breach-says-about-sec…
∗∗∗ Gefälschte iPhone-Gewinn-SMS von Billa im Umlauf ∗∗∗
---------------------------------------------
Betrüger/innen versenden SMS-Nachrichten im Namen von Billa an
Konsument/innen. Wer die Nachricht öffnet, soll einige Fragen
beantworten und kann anschließend den Gewinn, ein iPhone XS im Wert von
über 1200 Euro, auswählen. Für den Erhalt sollen 1,50 Euro per
Kreditkarte bezahlt werden. Betroffene dürfen Ihre Daten nicht eingeben,
denn es handelt sich um eine Abo-Falle und das versprochene iPhone wird
nie verschickt!
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-iphone-gewinn-sms-von-bi…
=====================
= Vulnerabilities =
=====================
∗∗∗ Multiple Vulnerabilities in Siglent Technologies SDS 1202X-E Digital
Oscilloscope ∗∗∗
---------------------------------------------
A digital oscilloscope by Siglent Technologies is affected by multiple
vulnerabilities such as hardcoded backdoor accounts or missing
authentication. The vendor was unresponsive and did not provide a patch.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libarchive, perl, and
qemu), Fedora (glibc, glusterfs, links, and moodle), Gentoo (libsndfile
and postgresql), openSUSE (openssh, rubygem-loofah, and tiff), Oracle
(ruby), Red Hat (ruby), and Ubuntu (libssh and linux-aws).
---------------------------------------------
https://lwn.net/Articles/773437/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (nsis, openssl, poppler, and
tiff), Fedora (dnsdist, drupal7, kernel, kernel-headers, kernel-tools,
net-snmp, perl, php-Smarty2, and samba), Gentoo (connman, nagios-core,
php, and webkit-gtk), Mageia (apache-mod_perl, kdeconnect-kde, and
python-requests), Red Hat (rh-postgresql10-postgresql), and SUSE (kernel).
---------------------------------------------
https://lwn.net/Articles/773650/
∗∗∗ Vuln: NUUO NVRmini Products CVE-2018-15716 Incomplete Fix Remote
Command Injection Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106059
∗∗∗ IBM Security Bulletin: There are multiple vulnerabilities in IBM®
SDK Java™ Technology Edition, Version 6, Version 7, Version 8, that is
used by IBM Workload Scheduler. These issues were disclosed as part of
the IBM Java SDK updates in [...] ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-there-are-multiple-vu…
∗∗∗ Ruby on Rails: Mehrere Schwachstellen ermöglichen Umgehen von
Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1138
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 30-11-2018 18:00 − Montag 03-12-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Who Is Targeting Industrial Facilities and ICS Equipment, and How? ∗∗∗
---------------------------------------------
Industrial Control Systems (ICS) are expected to be installed and left isolated for a long time. Technical changes and the necessity of reducing operating costs led to this equipment being left in operation longer than expected, exposing it to a broad range of cyber-threats. Malware designed to compromise [...]
---------------------------------------------
https://resources.infosecinstitute.com/who-is-targeting-industrial-faciliti…
∗∗∗ DeepSec 2018 Wrap-Up ∗∗∗
---------------------------------------------
I’m writing this quick wrap-up in Vienna, Austria where I attended my first DeepSec conference. This event was already on my schedule for a while but I never had a chance to come. This year, I submitted a training and I was accepted! Good opportunity to visit the beautiful city [...]
---------------------------------------------
https://blog.rootshell.be/2018/11/30/deepsec-2018-wrap-up/
∗∗∗ The 9 Lives of Bleichenbachers CAT: New Cache ATtacks on TLS Implementations ∗∗∗
---------------------------------------------
In this whitepaper*, nine different implementations of TLS were tested against cache attacks and seven were found to be vulnerable: [...]
---------------------------------------------
https://www.nccgroup.trust/us/our-research/the-9-lives-of-bleichenbachers-c…
∗∗∗ Injecting Code into Windows Protected Processes using COM - Part 2 ∗∗∗
---------------------------------------------
In my previous blog I discussed a technique which combined numerous issues I’ve previously reported to Microsoft to inject arbitrary code into a PPL-WindowsTCB process. The techniques presented don’t work for exploiting the older, stronger Protected Processes (PP) for a few different reasons. This blog seeks to remedy this omission and provide details of how I was able to also hijack a full PP-WindowsTCB process without requiring administrator privileges.
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/11/injecting-code-into-windows-…
∗∗∗ What the Marriott Breach Says About Security ∗∗∗
---------------------------------------------
We dont yet know the root cause(s) that forced Marriott this week to disclose a four-year-long breach involving the personal and financial information of 500 million guests of its Starwood hotel properties. But anytime we see such a colossal intrusion go undetected for so long, the ultimate cause is usually a failure to adopt the most important principle in cybersecurity defense that applies to both corporations and consumers: Assume you are compromised.
---------------------------------------------
https://krebsonsecurity.com/2018/12/what-the-marriott-breach-says-about-sec…
∗∗∗ Gefälschte iPhone-Gewinn-SMS von Billa im Umlauf ∗∗∗
---------------------------------------------
Betrüger/innen versenden SMS-Nachrichten im Namen von Billa an Konsument/innen. Wer die Nachricht öffnet, soll einige Fragen beantworten und kann anschließend den Gewinn, ein iPhone XS im Wert von über 1200 Euro, auswählen. Für den Erhalt sollen 1,50 Euro per Kreditkarte bezahlt werden. Betroffene dürfen Ihre Daten nicht eingeben, denn es handelt sich um eine Abo-Falle und das versprochene iPhone wird nie verschickt!
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-iphone-gewinn-sms-von-bi…
=====================
= Vulnerabilities =
=====================
∗∗∗ Multiple Vulnerabilities in Siglent Technologies SDS 1202X-E Digital Oscilloscope ∗∗∗
---------------------------------------------
A digital oscilloscope by Siglent Technologies is affected by multiple vulnerabilities such as hardcoded backdoor accounts or missing authentication. The vendor was unresponsive and did not provide a patch.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libarchive, perl, and qemu), Fedora (glibc, glusterfs, links, and moodle), Gentoo (libsndfile and postgresql), openSUSE (openssh, rubygem-loofah, and tiff), Oracle (ruby), Red Hat (ruby), and Ubuntu (libssh and linux-aws).
---------------------------------------------
https://lwn.net/Articles/773437/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (nsis, openssl, poppler, and tiff), Fedora (dnsdist, drupal7, kernel, kernel-headers, kernel-tools, net-snmp, perl, php-Smarty2, and samba), Gentoo (connman, nagios-core, php, and webkit-gtk), Mageia (apache-mod_perl, kdeconnect-kde, and python-requests), Red Hat (rh-postgresql10-postgresql), and SUSE (kernel).
---------------------------------------------
https://lwn.net/Articles/773650/
∗∗∗ Vuln: NUUO NVRmini Products CVE-2018-15716 Incomplete Fix Remote Command Injection Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106059
∗∗∗ IBM Security Bulletin: There are multiple vulnerabilities in IBM® SDK Java™ Technology Edition, Version 6, Version 7, Version 8, that is used by IBM Workload Scheduler. These issues were disclosed as part of the IBM Java SDK updates in [...] ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-there-are-multiple-vu…
∗∗∗ Ruby on Rails: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1138
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 29-11-2018 18:00 − Freitag 30-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Here are another 45,000 reasons to patch Windows systems against old NSA exploits ∗∗∗
---------------------------------------------
Its 2018 and UPnP is still opening up networks - this time to leaked SMB cyber-weapons Earlier this year, Akamai warned that vulnerabilities in Universal PlugNPlay (UPnP) had been exploited by scumbags to hijack 65,000 home routers. In follow-up research released this week, it revealed little has changed.…
---------------------------------------------
https://www.theregister.co.uk/2018/11/30/akamai_routerwreckers_active/
∗∗∗ Good practices for identifying and assessing cybersecurity interdependencies ∗∗∗
---------------------------------------------
A glance at the interdependency landscape reveals several emerging interdependencies between operators of essential services (OES) and digital service providers (DSP), at both system and service level. Due to these interdependencies, there is an increasing number of cybersecurity incidents that either propagated across organisations (often across borders), or had a cascading effect at the level of essential services.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/good-practices-for-identifying-…
∗∗∗ Gezielte Angriffe gegen Firmen mit Trojaner in AutoCAD-Dateien ∗∗∗
---------------------------------------------
Echte CAD-Pläne mit beigefügten Skripten kopieren unbemerkt Firmengeheimnisse, warnen Sicherheitsforscher.
---------------------------------------------
http://heise.de/-4236488
∗∗∗ Hackers in Hot Water. Pwning smart hot tubs, yes really ∗∗∗
---------------------------------------------
We were given a tip by the awesome Ceri Coburn that something was amiss with the Balboa Water App, a mobile app used for controlling >30,000 hot tubs. You can remotely control your tub, so you can heat it up for when you’re ready, saving […]
---------------------------------------------
https://www.pentestpartners.com/security-blog/hackers-in-hot-water-pwning-s…
=====================
= Vulnerabilities =
=====================
∗∗∗ Critical Zoom Flaw Lets Hackers Hijack Conference Meetings ∗∗∗
---------------------------------------------
Hackers can spoof messages, hijack screen controls and kick others out of meetings.
---------------------------------------------
https://threatpost.com/critical-zoom-flaw-lets-hackers-hijack-conference-me…
∗∗∗ GatherContent - Moderately critical - Access bypass - SA-CONTRIB-2018-075 ∗∗∗
---------------------------------------------
Project: GatherContent
Date: 2018-November-28
Security risk: Moderately critical 13∕25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:All
Vulnerability: Access bypass
Description: This module enables you to import and export data from the GatherContent service.The module didnt properly protect its administrative paths.
Solution: Install the latest version:If you use the gathercontent module for Drupal 7.x, upgrade to gathercontent 7.x-3.5Also see the GatherContent project page.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-075
∗∗∗ DSA-4347 perl - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4347
∗∗∗ INVT Electric VT-Designer ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-333-01
∗∗∗ IBM Security Bulletin: Potential Privilege escalation vulnerability in WebSphere Application Server (CVE-2018-1840) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-privilege-e…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Monitoring ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ OpenSSL and Intel processor SMT side-channel vulnerability (PortSmash) CVE-2018-5407 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K49711130
∗∗∗ USN-3833-1: Linux kernel (AWS) vulnerabilities ∗∗∗
---------------------------------------------
https://usn.ubuntu.com/3833-1/
∗∗∗ USN-3832-1: Linux kernel (AWS) vulnerabilities ∗∗∗
---------------------------------------------
https://usn.ubuntu.com/3832-1/
∗∗∗ HPESBHF03906 rev.1 - HPE Intelligent Management Center (IMC), Remote Buffer Overflow, Code Execution, Denial of Service ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 28-11-2018 18:00 − Donnerstag 29-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Sicherheitsvorfall: Dell setzt Kennwörter von Kunden zurück ∗∗∗
---------------------------------------------
Unbekannte hatten Zugriff auf Dell.com und waren auf der Suche nach Kundendaten.
---------------------------------------------
http://heise.de/-4235101
∗∗∗ PayPal-Käuferschutz-Falle bei Kleinanzeigenkauf ∗∗∗
---------------------------------------------
PayPal genießt hohes Vertrauen bei seinen Nutzer/innen aufgrund des angebotenen Käuferschutzes. Dennoch ist hier Vorsicht geboten, denn nicht immer kommt der Käuferschutz zum Tragen. Nutzen Sie beim Einkauf über Willhaben, Ebay, Geizhals und Co nicht die Funktion "Geld an Freunde oder Familie senden" bei PayPal. Der Käuferschutz gilt nicht und Ihr Geld ist verloren.
---------------------------------------------
https://www.watchlist-internet.at/news/paypal-kaeuferschutz-falle-bei-klein…
∗∗∗ Achtung bei Anrufen von Microsoft ∗∗∗
---------------------------------------------
Aktuell häufen sich wieder betrügerische Anrufe von angeblichen Microsoft-Mitarbeiter/innen, die Sie auf Probleme mit Ihrem Computer aufmerksam machen. Im Zuge eine Fernwartung übernehmen Kriminelle Ihren Computer und fangen sensible Daten ab. Es handelt sich um eine Betrugsmasche. Legen Sie gleich auf!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-bei-anrufen-von-microsoft/
∗∗∗ Fake-Shop-Alarm bei modchips24.com ∗∗∗
---------------------------------------------
Modchips24.com bietet neben R4-Karten für diverse Konsolen, wie die Nintendo 3DS oder die Nintendo Switch, auch Playstations, Xboxen und unterschiedlichstes Zubehör an. Sie sollten hier auf keinen Fall bestellen, denn uns erreichen zahlreiche Meldungen über ausbleibende Lieferungen. Bezahlen müssen Sie per Vorkasse, Ihr Geld wäre also verloren.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-shop-alarm-bei-modchips24com/
∗∗∗ Not A Security Boundary: Breaking Forest Trusts ∗∗∗
---------------------------------------------
For years Microsoft has stated that the forest was the security boundary in Active Directory. For example, Microsoft's "What Are Domains and Forests?" document (last updated in 2014) has a "Forests as Security Boundaries" section which states (emphasis added):
---------------------------------------------
https://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Bootstrap - Moderately critical - Cross site scripting - SA-CONTRIB-2018-074 ∗∗∗
---------------------------------------------
Project: BootstrapVersion: 7.x-3.228.x-3.14Date: 2018-November-28Security risk: Moderately critical 11∕25 AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Cross site scriptingDescription: This base theme bridges the gap between Drupal and the Bootstrap Framework.The theme doesnt sufficiently filter valid targets under the scenario of opening modals, popovers, and tooltips.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-074
∗∗∗ Norton and SEP Multiple Issues ∗∗∗
---------------------------------------------
Symantec has released updates to address issues that were discovered in the Norton, Symantec Endpoint Protection (SEP), Symantec Endpoint Protection Small Business Edition (SEP SBE) and Symantec Endpoint Protection Cloud (SEP Cloud) products.
---------------------------------------------
https://support.symantec.com/content/unifiedweb/en_US/article.SYMSA1468.html
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Gentoo (openssl and rpm), Mageia (icecast and yaml-cpp), Oracle (kernel and sos-collector), Red Hat (rh-ruby23-ruby, rh-ruby24-ruby, and rh-ruby25-ruby), Slackware (samba), SUSE (tomcat6), and Ubuntu (ghostscript).
---------------------------------------------
https://lwn.net/Articles/773296/
∗∗∗ 2018-11-26: Vulnerability in CP400 Panel Builder TextEditor 2.0 - Improper Input Validation Vulnerability ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=3BSE091042&Language…
∗∗∗ jQuery vulnerability CVE-2012-6708 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K62532311
∗∗∗ SNMPv2 vulnerability CVE-1999-0517 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K04463175
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 27-11-2018 18:00 − Mittwoch 28-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ The Nature of Mass Exploitation Campaigns ∗∗∗
---------------------------------------------
Examples of how attackers carry out mass exploitation campaigns and how to defend against them.
---------------------------------------------
https://threatpost.com/the-nature-of-mass-exploitation-campaigns/139428/
∗∗∗ TA18-331A: 3ve – Major Online Ad Fraud Operation ∗∗∗
---------------------------------------------
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). DHS and FBI are releasing this TA to provide information about a major online ad fraud operation—referred to by the U.S. Government as "3ve"—involving the control of over 1.7 million unique Internet Protocol (IP) addresses
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA18-331A
∗∗∗ Windows 10 1809: Update gegen Spectre-NG-Lücken ∗∗∗
---------------------------------------------
Mit dem Update KB4465065 liefert Microsoft Microcode-Updates für einige Intel-Prozessortypen zum Schutz gegen L1TF sowie Spectre V3a und V4.
---------------------------------------------
http://heise.de/-4234362
=====================
= Vulnerabilities =
=====================
∗∗∗ AVEVA Vijeo Citect and Citect SCADA ∗∗∗
---------------------------------------------
This advisory includes mitigations for an uncontrolled search path element vulnerability in Schneider Electrics Software Update utility affecting AVEVAs Vijeo Citect and Citect SCADA products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-331-01
∗∗∗ Cisco Prime License Manager SQL Injection Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the web framework code of Cisco Prime License Manager(PLM) could allow an unauthenticated, remote attacker to execute arbitrary SQL queries.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ FreeBSD: Multiple vulnerabilities in NFS server code ∗∗∗
---------------------------------------------
Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet.
---------------------------------------------
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:13.nfs.asc
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (powerdns-recursor and samba), Debian (ghostscript), Fedora (community-mysql, flatpak, gettext, git, php-PHPMailer, php-phpmailer6, and wireshark), Oracle (kernel and NetworkManager), Scientific Linux (ghostscript, kernel, NetworkManager, and sos-collector), SUSE (dpdk, java-1_7_1-ibm, kernel, python-oslo.cache, python-oslo.concurrency, python-oslo.db, python-oslo.log, python-oslo.messaging, python-oslo.middleware, python-oslo.serialization, [...]
---------------------------------------------
https://lwn.net/Articles/773179/
∗∗∗ Synology-SA-18:60 Samba AD DC ∗∗∗
---------------------------------------------
CVE-2018-16841 and CVE-2018-16851 allow remote authenticated users to conduct denial-of-service attacks via a susceptible version of Synology Active Directory Server.None of Synology products are affected by CVE-2018-14629, CVE-2018-16852, CVE-2018-16853, and CVE-2018-16857 as these vulnerabilities only affect Samba 4.9.0 and later.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_60
∗∗∗ Microsoft Windows: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1128
∗∗∗ Security Advisory - Out-of-bounds Write Vulnerability on Several Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181128-…
∗∗∗ IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM Spectrum Scale packaged in IBM Elastic Storage Server (CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-vulnerability-in-ib…
∗∗∗ IBM Security Bulletin: Vulnerability in IBM Java Runtime affect IBM SONAS (CVE-2016-0705) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-ibm-…
∗∗∗ IBM Security Bulletin: The Elastic Storage Server is affected by a vulnerability in IBM Spectrum Scale (CVE-2018-1783) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-the-elastic-storage-s…
∗∗∗ IBM Security Bulletin: The Elastic Storage Server is affected by a vulnerability in IBM Spectrum Scale (CVE-2018-1782) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-the-elastic-storage-s…
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability affects multiple IBM Rational products based on IBM Jazz technology ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-…
∗∗∗ IBM Security Bulletin: IBM® Db2® LUW on AIX and Linux Affected by a Vulnerability in IBM® Spectrum Scale (CVE-2018-1723). CVE-2018-1723, gpfs, spectrum scale Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-db2-luw-on-aix-an…
∗∗∗ IBM Security Bulletin: This Power System firmware update is being released to address DHCP issue number CVE-2018-5732 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-this-power-system-fir…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 26-11-2018 18:00 − Dienstag 27-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor ∗∗∗
---------------------------------------------
BLADABINDI, also known as njRAT/Njw0rm, is a remote access tool (RAT) with a myriad of backdoor capabilities - from keylogging to carrying out distributed denial of service (DDoS) — and has been rehashed and reused in various cyberespionage campaigns since it first emerged. Indeed, BLADABINDI's customizability and seeming availability in the underground make it a prevalent threat.
---------------------------------------------
https://blog.trendmicro.com/trendlabs-security-intelligence/autoit-compiled…
∗∗∗ NPM-Paket EventStream mit Bitcoin-Miner infiziert ∗∗∗
---------------------------------------------
In die Code-Bibliothek EventStream hat sich Schadcode eingeschlichen, der das Bitcoin Wallet Copay für Angreifer öffnet.
---------------------------------------------
http://heise.de/-4233171
∗∗∗ Lux-Codex nicht bestellen! ∗∗∗
---------------------------------------------
Auf lux-codex.com und wideally.com wird Ihnen der Lux-Codex - eine LED-Lampe in ausgefallenem Design - angeboten. Sie sollten hier nicht bestellen, denn Konsument/innen berichten uns von ausbleibender Lieferung trotz erfolgter Bezahlung!
---------------------------------------------
https://www.watchlist-internet.at/news/lux-codex-nicht-bestellen/
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Webex Meetings Desktop App Update Service Command Injection Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ SSB-439005: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP ∗∗∗
---------------------------------------------
Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the current firmware version V2.6.0 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP. These GNU/Linux vulnerabilities have been externally identified and will be fixed with the next firmware version.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssb-439005.txt
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (gnuplot and samba), Fedora (flatpak, kernel-headers, kernel-tools, mariadb-connector-c, php-PHPMailer, php-phpmailer6, and xml-security-c), Gentoo (binutils, libav, mupdf, spice-gtk, strongswan, and tablib), Mageia (libpng(12), mariadb, and openssl), Oracle (ghostscript), Red Hat (.NET Core, ghostscript, java-1.7.1-ibm, kernel, kernel-alt, kernel-rt, NetworkManager, rh-nginx112-nginx, rh-nginx114-nginx, and sos-collector), Scientific Linux [...]
---------------------------------------------
https://lwn.net/Articles/773100/
∗∗∗ Vuln: Multiple Pivotal Cloud Foundry Products CVE-2018-15759 Access Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106019
∗∗∗ Vuln: TIBCO Statistica Server CVE-2018-18807 Cross Site Scripting Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/106021
∗∗∗ ZDI-18-1362: (ODay) Juuko DATA Packet Command Injection Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1362/
∗∗∗ IBM Security Bulletin: Vulnerabilities identified in IBM® Java SDK affect WebSphere Service Registry and Repository and WebSphere Service Registry and Repository Studio (CVE-2018-3139 and CVE-2018-3180) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-ident…
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities affect Liberty for Java for IBM Cloud ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-security-vul…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Developer for i and Rational Developer for AIX and Linux – July 2018 Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: IBM Spectrum Scale for IBM Elastic Storage Server is affected by a vulnerability which could allow an unprivileged, authenticated user with access to a GPFS node to read arbitrary files available on this node (CVE-2018-1723) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-spectrum-scale-fo…
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to cross site scripting (CVE-2018-1584) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-maximo-asset-mana…
∗∗∗ Samba: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1123
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 23-11-2018 18:00 − Montag 26-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ His phone went dark, then $1m was sucked out in SIM-swap crypto-heist ∗∗∗
---------------------------------------------
A 21-year-old allegedly SIM-swapped Silicon Valley execs' phones to steal cryptocurrency, including one mans $1m tuition fund for his kids.
---------------------------------------------
https://nakedsecurity.sophos.com/2018/11/26/his-phone-went-dark-then-1m-was…
∗∗∗ Unseriöse Handwerker aus dem Internet ∗∗∗
---------------------------------------------
Konsument/innen, die in der Nacht Probleme mit ihren Heizkörpern, ihrem Schloss oder ihrer Elektronik haben, können über das Internet unseriöse Installateur/innen, Schlosser/innen oder Elektriker/innen finden. Sie werben auf Websites mit günstigen Angeboten. Vor Ort verlangen die Unternehmen jedoch ein Vielfaches des vereinbarten Preises. Nachträgliche Beanstandungen sind nicht möglich, weil sie Kund/innen erfundene Daten nennen.
---------------------------------------------
https://www.watchlist-internet.at/news/unserioese-handwerker-aus-dem-intern…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (gnuplot5, icecast2, liblivemedia, otrs2, phpbb3, roundcube, squid3, and xml-security-c), Fedora (kio-extras, tmux, and xen), Gentoo (asterisk, chromium, exiv2, ghostscript-gpl, and thunderbird), openSUSE (libwpd, openssl, openssl-1_1, postgresql10, and SDL2_image), Red Hat (chromium-browser, rh-mysql57-mysql, rh-nginx110-nginx, and rh-nginx18-nginx), SUSE (exiv2, libgcrypt, rpm, and tiff), and Ubuntu (firefox and qemu).
---------------------------------------------
https://lwn.net/Articles/772954/
∗∗∗ ZDI-18-1361: (0Day) INVT Electric VT-Designer PM3 File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1361/
∗∗∗ ZDI-18-1360: (0Day) INVT Electric VT-Designer File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1360/
∗∗∗ IBM Security Bulletin: Vulnerability in IBM Java Runtime affects IBM Storwize V7000 Unified (CVE-2016-0705) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-ibm-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Spectrum Protect Snapshot for VMware (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Content Collector for Email is affected by spoofing attack vulnerability in WAS Logout Form ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-content-collector-for…
∗∗∗ IBM Security Bulletin: Content Collector for Email is affected by java deserialization vulnerability resulting in execution of untrusted data via the application server’s SOAP port ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-content-collector-for…
∗∗∗ IBM Security Bulletin: Information Disclosure in IBM WebSphere Application Server Liberty affects IBM Spectrum Protect Snapshot for VMware (CVE-2018-1553) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-information-disclosur…
∗∗∗ git: Schwachstelle ermöglicht Privilegieneskalation ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K18-1120
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 22-11-2018 18:00 − Freitag 23-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Aurora / Zorro Ransomware Actively Being Distributed ∗∗∗
---------------------------------------------
A ransomware that has been distributed since the summer of 2018 has started to pick up steam in the latest variant. This new variant is currently being called Zorro Ransomware, but has also been called Aurora Ransomware in the past.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/aurora-zorro-ransomware-acti…
∗∗∗ Old Printer Vulnerabilities Die Hard ∗∗∗
---------------------------------------------
New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.
---------------------------------------------
https://threatpost.com/old-printer-vulnerabilities-die-hard/139318/
∗∗∗ Sicherheitsupdate: VMware Fusion und Workstation anfällig für Schadcode ∗∗∗
---------------------------------------------
Aktualisierte Versionen von Fusion und Workstation schließen eine kritische Sicherheitslücke.
---------------------------------------------
http://heise.de/-4231452
∗∗∗ l+f: Hacker ärgern Hacker ∗∗∗
---------------------------------------------
Online-Kreditkarten-Skimmer fechten Revierkämpfe aus.
---------------------------------------------
http://heise.de/-4231527
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletin: A Vulnerability in IBM Java SDK (April 2018) affecting IBM Application Delivery Intelligence V5.0.5 and V5.0.4 (CVE-2018-2783) ∗∗∗
---------------------------------------------
A vulnerability is identified in IBM® SDK Java Technology Edition Version 1.7 and Version 1.8 that are used by IBM Application Delivery Intelligence V5.0.4 and V5.0.5 respectively. This issue was disclosed as part of the IBM Java SDK updates in April 2018.CVE(s): CVE-2018-2783Affected product(s) and affected version(s):IBM Application Delivery Intelligence V5.0.4IBM Application Delivery Intelligence V5.0.5Refer to the following reference URLs for remediation and additional vulnerability [...]
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-vulnerability-in-ib…
∗∗∗ VMSA-2018-0030 ∗∗∗
---------------------------------------------
VMware Workstation and Fusion updates address an integer overflow issue.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0030.html
∗∗∗ Security updates for (US) Thanksgiving Day ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ceph, openssl, and pixman), Fedora (kernel-headers, kernel-tools, libconfuse, python-urllib3, and xen), Mageia (gettext and roundcubemail), openSUSE (GraphicsMagick and libwpd), Oracle (thunderbird), Slackware (openssl), and Ubuntu (libapache2-mod-perl2).
---------------------------------------------
https://lwn.net/Articles/772811/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (flashplugin, lib32-libtiff, and webkit2gtk), Debian (libphp-phpmailer and openjdk-7), Mageia (flash-player-plugin, Ghostscript, and poppler), openSUSE (chromium and virtualbox), and SUSE (java-1_8_0-ibm, libwpd, openssl, openssl-1_1, realtime-kernel, salt, and SDL_image).
---------------------------------------------
https://lwn.net/Articles/772851/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 21-11-2018 18:00 − Donnerstag 22-11-2018 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ New mining Trojan for Linux removes anti-viruses ∗∗∗
---------------------------------------------
November 20, 2018 One of today’s most common ways of obtaining illegal earnings is to mine cryptocurrency covertly, using the resources of a computer without the owner’s consent. Doctor Web recently discovered a ..
---------------------------------------------
https://news.drweb.com/show/?i=12942&lng=en&c=9
∗∗∗ ECCploit: Rowhammer-Angriff funktioniert auch mit ECC ∗∗∗
---------------------------------------------
Ein Forscherteam konnte zeigen, dass Angriffe mit Bitflips im Arbeitsspeicher auch dann möglich sind, wenn man Speichermodule mit Fehlerkorrektur verwendet.
---------------------------------------------
https://www.golem.de/news/eccploit-rowhammer-angriff-funktioniert-auch-mit-…
∗∗∗ Malware scum want to build a Linux botnet using Mirai ∗∗∗
---------------------------------------------
Hadoop YARN is the attack vector, so lock it away Diligent hackers ..
---------------------------------------------
www.theregister.co.uk/2018/11/22/mirai_for_linux_on_x86/
∗∗∗ Markenfälschungen auf rmc-bad-grosspertholz.at ∗∗∗
---------------------------------------------
Bei rmc-bad-grosspertholz.at finden Sie Markenkleidung, Schuhe und Accessoires zu sagenhaften Preisen. Erwarten Sie sich jedoch nicht viel von Ihrer Bestellung, Sie werden – falls überhaupt – minderwertige Waren ..
---------------------------------------------
https://www.watchlist-internet.at/news/markenfaelschungen-auf-rmc-bad-gross…
∗∗∗ Achtung: Betrug über den Amazon Marketplace ∗∗∗
---------------------------------------------
Kriminelle übernehmen Amazon-Händlerkonten und bieten günstige Waren an. Ihre Bestellung wird zunächst angenommen, dann aber grundlos storniert. Kontaktieren Sie die Anbieter per E-Mail, erhalten Sie ..
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-betrug-ueber-den-amazon-mark…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletin: Java Vulnerability Affects IBM Sterling Connect:Direct Browser User Interface (CVE-2018-1656) ∗∗∗
---------------------------------------------
There is a vulnerability in IBM® Runtime Environment Java Technology Edition, Version 8 that is used by IBM Sterling Connect:Direct Browser User Interface. These issues were disclosed as part of the ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-java-vulnerability-af…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in Apache Tomcat, Open SSL, and Apache HTTPD affects Rational Build Forge ∗∗∗
---------------------------------------------
Apache Tomcat, Open SSL, and Apache Tomcat have multiple security vulnerabilities that could allow a remote attacker to exploit the Rational Build Forge application. Respective security vulnerabilities are discussed in ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium) is affected by OpenSSL vulnerability CVE-2018-0732 ∗∗∗
---------------------------------------------
Security Bulletin: WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium) is affected by OpenSSL vulnerability CVE-2018-0732CVE(s): CVE-2018-0732Affected product(s) and affected version(s):WebSphere ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-websphere-mq-v5-3-for…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Integration Bus, IBM App Connect Enterpise v11 and WebSphere Message Broker ∗∗∗
---------------------------------------------
Summary There are multiple vulnerabilities in IBM® SDK Java Technology Edition, Version 8.0.5.5 & 8.0.5.15 and IBM® Runtime Environment Java Versions 7.0.10.15 & 7.0.10.25 used by IBM Integration ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium) is affected by OpenSSL vulnerability CVE-2018-0737 ∗∗∗
---------------------------------------------
WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium) has addressed the following vulnerability: CVE-2018-0737 CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE(s): CVE-2018-0737Affected ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-websphere-mq-v5-3-for…
∗∗∗ Download WP-DBManager <= 2.79.1 - Arbitrary File Delete ∗∗∗
---------------------------------------------
https://wpvulndb.com/vulnerabilities/9151
∗∗∗ Security Advisory - Smart SMS Verification Code Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181121-…
∗∗∗ Moodle Login Access Control Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1042154
∗∗∗ WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0008 ∗∗∗
---------------------------------------------
https://webkitgtk.org/security/WSA-2018-0008.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 20-11-2018 18:00 − Mittwoch 21-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Governikus: Personalausweis-Webanwendungen lassen sich austricksen ∗∗∗
---------------------------------------------
Mit einem relativ simplen Trick lässt sich die Authentifizierung von Webanwendungen mit dem elektronischen Personalausweis austricksen. Der Hersteller Governikus behauptet, dass dies in realen Anwendungen nicht funktioniert, kann aber nicht erklären, warum. (E-Personalausweis, Java)
---------------------------------------------
https://www.golem.de/news/governikus-personalausweis-webanwendungen-lassen-…
∗∗∗ Werbe-Malware für macOS ∗∗∗
---------------------------------------------
Ein unter "SearchAwesome" und "SearchPageInjector" bekannter Datenschädling macht jetzt auf Macs die Runde. Er manipuliert Reklame und kann CPU-Zeit klauen.
---------------------------------------------
http://heise.de/-4227303
∗∗∗ Dell und VMware teilen sich Sicherheitslücken und servieren Patches ∗∗∗
---------------------------------------------
In Dell EMC Avamar Virtual Edition und VMware vSphere Data Protection klafft eine kritische Sicherheitslücke.
---------------------------------------------
http://heise.de/-4228698
∗∗∗ XSS Injection Campaign Exploits WordPress AMP Plugin ∗∗∗
---------------------------------------------
News broke last week disclosing a number of vulnerabilities in the AMP For WP plugin, installed on over 100,000 WordPress sites. WordPress contributor Sybre Waaijer identified the security issue and confidentially disclosed it to the WordPress plugins team. To exploit the flaw, an attacker needs to have a minimum of subscriber-level access on a vulnerable site.
---------------------------------------------
https://www.wordfence.com/blog/2018/11/xss-injection-campaign-exploits-word…
∗∗∗ Warnung vor gefälschter PayLife-Sicherheits-App ∗∗∗
---------------------------------------------
Kriminelle versenden eine gefälschte PayLife-Nachricht. Darin fordern sie Kund/innen dazu auf, dass sie sich eine vermeintliche Sicherheits-App auf ihrem Smartphone installieren. Sie ist angeblich für die weitere Nutzung von PayLife-Kreditkarten notwendig. In Wahrheit ist die gefälschte PayLife-Sicherheits-App Schadsoftware, die wichtige Daten von Kund/innen stiehlt. Dadurch können Kriminelle Geld ihrer Opfer stehlen.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-gefaelschter-paylife-sic…
=====================
= Vulnerabilities =
=====================
∗∗∗ Teledyne DALSA Sherlock ∗∗∗
---------------------------------------------
This advisory includes mitigations for a stack-based buffer overflow vulnerability in Teledyne DALSAs Sherlock machine vision software interface.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-324-01
∗∗∗ Schneider Electric Modicon M221 ∗∗∗
---------------------------------------------
This advisory includes mitigations for an insufficient verification of data authenticity vulnerability in the Schneider Electric Modicon M221 product.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-324-02
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (libtiff), CentOS (java-1.7.0-openjdk, spice-server, and thunderbird), Debian (jasper, liblivemedia, ruby-i18n, and ruby-rack), Fedora (curl, elfutils, firefox, kde-connect, kio-extras, libarchive, poppler, and webkit2gtk3), openSUSE (chromium, GraphicsMagick, kernel, libmatroska, mkvtoolnix, SDL2_image, and squid), Oracle (qemu), and Red Hat (flash-plugin and kernel).
---------------------------------------------
https://lwn.net/Articles/772718/
∗∗∗ Security Advisory - Information Leak Vulnerability in Some Huawei Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181121-…
∗∗∗ IBM Security Bulletin: The Community Edition of IBM ILOG CPLEX Optimization Studio is affected by a vulnerability in libcurl (CVE-2018-16840) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-the-community-edition…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime IBM affect IBM Decision Optimization Center and IBM ILOG ODM Enterprise ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Potential XML External Entity (XXE) Injection Vulnerability in WebSphere Application Server (CVE-2018-1905) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-xml-externa…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Guardium Data Redaction ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Vulnerabilities in Python affect IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2018-1061, CVE-2018-1060) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-py…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM Integration Bus & IBM App Connect Enterprise V11 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect WebSphere Message Broker , IBM Integration Bus and IBM App Connect ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: IBM Integration Bus affected by a JDBC XA switch load files Vulnerability(CVE-2017-1418) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-integration-bus-a…
∗∗∗ IBM Security Bulletin: Security vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-security-vulnerabilit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 19-11-2018 18:00 − Dienstag 20-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Datendiebstahl durch FinanzOnline-Phishing-Mails ∗∗∗
---------------------------------------------
Kriminelle versenden im Namen des Bundesministeriums für Finanzen (BMF) betrügerische Phishing-Mails. Darin werden Sie dazu aufgefordert, Ihre Daten zu aktualisieren, um eine Steuerrückzahlung zu ermöglichen. Folgen Sie den Anweisungen nicht, denn Sie könnten erheblichen finanziellen Schaden erleiden! Es handelt sich um einen Versuch, Ihre persönlichen Daten und Kontoinformationen zu stehlen.
---------------------------------------------
https://www.watchlist-internet.at/news/datendiebstahl-durch-finanzonline-ph…
∗∗∗ Internet Domain Services Austria-Mahnung nicht bezahlen ∗∗∗
---------------------------------------------
Unternehmen erhalten von Internet Domain Services Austria (IDSA) einen Payment Reminder. Darin heißt es, dass es unbeglichene Rechnungen gebe und der Betrag in Höhe von 237 Euro innerhalb von 5 Tagen bezahlt werden müsse. Empfänger/innen müssen den Betrag nicht bezahlen, denn dafür gibt es keinen Rechtsgrund.
---------------------------------------------
https://www.watchlist-internet.at/news/internet-domain-services-austria-mah…
∗∗∗ TP-Link-Router TL-R600VPN vielfältig angreifbar ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für einen VPN-Router von TP-Link.
---------------------------------------------
http://heise.de/-4225979
∗∗∗ Notfall-Patch: Adobe sichert Flash außer der Reihe ab ∗∗∗
---------------------------------------------
Eigentlich veröffentlicht Adobe nur ein Mal im Monat Sicherheitsupdates für seine Produkte. Für eine gefährliche Flash-Lücke macht der Hersteller eine Ausnahme.
---------------------------------------------
http://heise.de/-4227033
=====================
= Vulnerabilities =
=====================
∗∗∗ VMSA-2018-0029 ∗∗∗
---------------------------------------------
vSphere Data Protection (VDP) updates address multiple security issues.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0029.html
∗∗∗ Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Atlantis Word Processor ∗∗∗
---------------------------------------------
Today, Cisco Talos is disclosing three remote code execution vulnerabilities in the Atlantis Word Processor. Atlantis Word Processor is a traditional word processor that provides a number of basic features for users, in line with what is in other similar types of software.
---------------------------------------------
https://blog.talosintelligence.com/2018/11/Atlantis-Word-Processor-RCE-vuln…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (chromium), Debian (mariadb-10.1, openjpeg2, systemd, and uriparser), Mageia (389-ds-base, apache, and soundtouch), SUSE (libwpd, py26-compat-salt, salt, and SMS3.1), and Ubuntu (systemd).
---------------------------------------------
https://lwn.net/Articles/772621/
∗∗∗ x86: DoS from attempting to use INVPCID with a non-canonical addresses ∗∗∗
---------------------------------------------
A buggy or malicious PV guest can crash the host.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-279.html
∗∗∗ Fix for XSA-240 conflicts with shadow paging ∗∗∗
---------------------------------------------
A malicious or buggy x86 PV guest may cause Xen to crash, resulting in a DoS (Denial of Service) affecting the entire host. Privilege escalation as well as information leaks cannot be ruled out.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-280.html
∗∗∗ Insufficient TLB flushing / improper large page mappings with AMD IOMMUs ∗∗∗
---------------------------------------------
A malicious or buggy guest may be able to escalate its privileges, may cause a Denial of Service (DoS) affecting the entire host, or may be able to access data it is not supposed to access (information leak).
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-275.html
∗∗∗ Resource accounting issues in x86 IOREQ server handling ∗∗∗
---------------------------------------------
A compromised DM stubdomain may cause Xen to crash, resulting in a DoS (Denial of Service) affecting the entire host. Privilege escalation as well as information leaks cannot be ruled out.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-276.html
∗∗∗ x86: incorrect error handling for guest p2m page removals ∗∗∗
---------------------------------------------
A malicious or buggy guest may cause a deadlock, resulting in a DoS (Denial of Service) affecting the entire host.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-277.html
∗∗∗ Ricoh myPrint Hardcoded Credentials / Information Disclosure ∗∗∗
---------------------------------------------
https://cxsecurity.com/issue/WLB-2018110154
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM® Java SDK affect WebSphere Application Server October 2018 CPU ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: A Security Vulnerability affects IBM® Cloud Private Cloud Foundry (CVE-2018-14645) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-security-vulnerabil…
∗∗∗ IBM Security Bulletin: A Security Vulnerability affects IBM® Cloud Private (CVE-2018-1843) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-security-vulnerabil…
∗∗∗ IBM Security Bulletin: A Security Vulnerability affects IBM® Cloud Private (CVE-2015-9251) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-security-vulnerabil…
∗∗∗ IBM Security Bulletin: A Security Vulnerability could affect IBM® Cloud Private (CVE-2017-7526) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-security-vulnerabil…
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities affect IBM® Cloud Private Cloud Foundry (CVE-2018-3646, CVE-2018-3615, CVE-2018-3620) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-security-vul…
∗∗∗ IBM Security Bulletin: Vulnerabilities in IBM Java SDK (July 2018) affecting IBM Application Delivery Intelligence V5.0.5 and V5.0.4 (CVE-2016-0705, CVE 2017-3732, CVE 2017-3736, and CVE-2018-2973) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-ib…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime Affect IBM Sterling Connect:Direct FTP+ ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime Affect IBM Sterling Connect:Direct for UNIX ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime Affect IBM Sterling Connect:Direct for Microsoft Windows ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 16-11-2018 18:00 − Montag 19-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Schwere Sicherheitslücken in GPS-Kinderuhren ∗∗∗
---------------------------------------------
Eigentlich sollten GPS-Uhren die Sicherheit der Kinder erhöhen. Nun werden sie selbst zum Risiko.
---------------------------------------------
https://futurezone.at/digital-life/schwere-sicherheitsluecken-in-gps-kinder…
=====================
= Vulnerabilities =
=====================
∗∗∗ Synaccess netBooter NP-0801DU 7.4 CSRF Add Admin Exploit ∗∗∗
---------------------------------------------
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5501.php
∗∗∗ Synaccess netBooter NP-02x/NP-08x 6.8 Authentication Bypass ∗∗∗
---------------------------------------------
netBooter suffers from an authentication bypass vulnerability due to missing control check when calling webNewAcct.cgi script while creating users. This allows an unauthenticated attacker to create admin user account and bypass authentication giving her the power to turn off a power supply to a resource.
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5500.php
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (grafana and patch), Debian (chromium-browser), Fedora (cabextract, curl, elfutils, firefox, flatpak, glusterfs, kernel, kernel-headers, kernel-tools, kio-extras, libmspack, mariadb, mupdf, poppler, suricata, and wireshark), Mageia (hylafax+, jhead, libmspack/cabextract, nginx, sdl2/mingw-SDL2, and squid), openSUSE (amanda, apache-pdfbox, chromium, ImageMagick, LibreOffice and dependency libraries, libxkbcommon, openssh, systemd, and [...]
---------------------------------------------
https://lwn.net/Articles/772522/
∗∗∗ Serial number disclosure in the FortiOS PPTP server hostname protocol field ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/FG-IR-18-101
∗∗∗ Cross-site scripting (XSS) vulnerability via DHCP Hostname parameter ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/FG-IR-18-121
∗∗∗ IBM Security Bulletin: Vulnerability in IBM Java SDK Affects IBM Algo Credit Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-ibm-…
∗∗∗ IBM Security Bulletin: IBM API Connect is affected by a denial of service vulnerability via large JSON payloads (CVE-2018-1779) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-af…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Performance Management products ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM® SDK, Java™ Technology Edition affect IBM Operational Decision Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Host On-Demand ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in WebSphere Application Server affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1683, CVE-2018-8039) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Tivoli Storage Manager FastBack (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 15-11-2018 18:00 − Freitag 16-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Serverüberwachungssoftware Nagios XI: Mehrere Schlupflöcher für Angreifer ∗∗∗
---------------------------------------------
Nagios XI ist angreifbar und gefährdet IT-Infrastrukturen. Eine abgesicherte Version ist verfügbar.
---------------------------------------------
http://heise.de/-4222806
∗∗∗ Warnung vor Gelenkcreme Artrovex ∗∗∗
---------------------------------------------
Kriminelle geben sich als Bundesministerium für Arbeit, Soziales, Gesundheit und Konsumentenschutz aus und behaupten, dass die österreichische Regierung bei Gelenkschmerzen die Creme Artrovex empfiehlt. Das ist erfunden. Konsument/innen dürfen Artrovex nicht bestellen, denn die Creme hat keine medizinische Wirkung. Ebenso übermitteln Käufer/innen damit persönliche Daten an Unbekannte.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-gelenkcreme-artrovex/
∗∗∗ tRat Emerges as New Pet for APT Group TA505 ∗∗∗
---------------------------------------------
The modular malware seems to be in a testing phase, but TA505s interest made researchers take note.
---------------------------------------------
https://threatpost.com/trat-emerges-as-new-pet-for-apt-group-ta505/139136/
∗∗∗ Lock-Screen Bypass Bug Quietly Patched in Handsets ∗∗∗
---------------------------------------------
The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.
---------------------------------------------
https://threatpost.com/lock-screen-bypass-bug-quietly-patched-in-handsets/1…
∗∗∗ Hacking Connected Home Alarm Systems – The Expensive [part 2] ∗∗∗
---------------------------------------------
TL;DR: We were wondering whether price affects the security of IoT appliances. So we verified the security of two differently priced connected home alarm systems. Both IoT alarms are marketed as an easy solution to protect your home. Unfortunately we find this not to be the case as we identified multiple critical vulnerabilities in both systems.
---------------------------------------------
https://blog.nviso.be/2018/11/15/hacking-connected-home-alarm-systems-the-e…
∗∗∗ 0-Day in ELBA5's Network Installation: Overtaking your company's bank account ∗∗∗
---------------------------------------------
This blog post is about a previously unknown critical vulnerability in the Austrian electronic banking application ELBA5. The issue discussed here could be abused to gain full control over any ELBA5 database server as well as the underlying operating system. It has a confirmed CVSSv3 score of 10.0.
---------------------------------------------
https://bogner.sh/2018/11/0-day-in-elba5s-network-installation-overtaking-y…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (lldpad, pdns, and php), Mageia (flash-player-plugin, gdal, mutt, patch, php-pear-CAS, postgresql9.4|6, ruby-rack, and teeworlds), SUSE (kernel-rt, postgresql10, and squid), and Ubuntu (openjdk-7).
---------------------------------------------
https://lwn.net/Articles/772259/
∗∗∗ Multiple critical vulnerabilities in Miss Marple Enterprise Edition ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabil…
∗∗∗ IBM Security Bulletin: Rational Build Forge Security Advisory for Apache Tomcat and Apache HTTP Server (CVE-2018-11763; CVE-2018-11784) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-rational-build-forge-…
∗∗∗ IBM Security Bulletin: A Security Vulnerability could affect IBM® Cloud Private (CVE-2018-1841) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-security-vulnerabil…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Content Collector for Email, IBM Content Collector for File Systems, IBM Content Collector for SharePoint and IBM Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime Version 8 SR4FP10 affect IBM Notes and Domino ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: A Security Vulnerability could affect IBM® Cloud Private (CVE-2018-10892) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-security-vulnerabil…
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Rational ClearCase (CVE-2018-0732) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-open…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 14-11-2018 18:00 − Donnerstag 15-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Popular AMP Plugin for WordPress Patches Critical Flaw – Update Now ∗∗∗
---------------------------------------------
A security researcher has discovered a critical vulnerability in one of the popular and widely active plugins for WordPress that could allow a low-privileged attacker to inject malicious code on AMP pages of the targeted website. The vulnerable WordPress plugin in question is "AMP for WP – Accelerated Mobile Pages" that lets websites automatically generate valid accelerated mobile pages for
---------------------------------------------
https://thehackernews.com/2018/11/amp-plugin-for-WordPress.html
∗∗∗ Patchday: Schwerwiegende Sicherheitslücke in SAP HANA Streaming Analytics ∗∗∗
---------------------------------------------
SAP hat Updates veröffentlicht, die unter anderem eine kritische Schwachstelle im Software-Portfolio des Herstellers schließen.
---------------------------------------------
http://heise.de/-4221574
∗∗∗ Achtung: Rechnungs-Trojaner vom Kollegen ∗∗∗
---------------------------------------------
Mit einem miesen Trick versuchen Kriminelle, unvorsichtige Anwender mit Online-Banking-Trojanern zu infizieren.
---------------------------------------------
http://heise.de/-4221813
∗∗∗ Sicherheitsupdate: Skype kann an Emojis ersticken ∗∗∗
---------------------------------------------
Zu viele Emojis in Chat-Nachrichten können Skype for Business und Lync 2013 zum Erliegen bringen.
---------------------------------------------
http://heise.de/-4221978
∗∗∗ Kauf bei potenzmittel-apotheke.eu schädigt Brieftasche und Gesundheit ∗∗∗
---------------------------------------------
Bei potenzmittel-apotheke.eu finden Kund/innen rezeptfreie Potenzmittel und ersparen sich die unangenehme Erfahrung, dieses Medikament auf herkömmlichen Weg, nämlich über Rezept, zu erwerben. potenzmittel-apotheke.eu ist jedoch eine illegale Versandapotheke, Sie verlieren Ihr Geld und spielen Betrüger/innen persönliche Daten in die Hände!
---------------------------------------------
https://www.watchlist-internet.at/news/kauf-bei-potenzmittel-apothekeeu-sch…
∗∗∗ Gefälschte Gemeinde-Rechnungen verbreiten Schadsoftware ∗∗∗
---------------------------------------------
Kriminelle versenden gefälschte Gemeinde-Rechnungen mit der Adress-Endung gv.at. Darin behaupten sie, dass Unternehmen eine offene Rechnung haben und der Verwaltung noch Geld schulden. Weiterführende Informationen dazu finden sich angeblich in einem Dateianhang. Er verbirgt Schadsoftware und darf nicht geöffnet werden.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-gemeinde-rechnungen-verb…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (kde-connect, mingw-SDL2_image, SDL2_image, and subscription-manager), Red Hat (flash-plugin), SUSE (openssh-openssl1, systemd, and thunderbird), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2, linux, linux-aws, linux-gcp, linux-kvm, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-azure, linux-hwe, linux-azure, linux-gcp, linux-lts-trusty, linux-lts-xenial, linux-aws, [...]
---------------------------------------------
https://lwn.net/Articles/772103/
∗∗∗ Digium Asterisk: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2347/
∗∗∗ IBM Security Bulletin: Potential directory traversal vulnerability in WebSphere Application Server (CVE-2018-1797) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-directory-t…
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities affect IBM® Cloud Private (CVE-2018-0732, CVE-2018-12115, CVE-2018-7166, CVE-2018-0737) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-security-vul…
∗∗∗ IBM Security Bulletin: Security vulnerability affects the Report Builder that is shipped with Jazz Reporting Service (CVE-2018-1639) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-security-vulnerabilit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 13-11-2018 18:00 − Mittwoch 14-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hackers Change WordPress Siteurl to Pastebin ∗∗∗
---------------------------------------------
Last Friday, we reported on a hack that used a vulnerability in the popular WP GDPR Compliance plugin to change WordPress siteurl settings to erealitatea[.]net. At that time it was not clear who was behind the massive attack, since the erealitatea[.]net domain didn't work and the infection simply broke the compromised sites. Our SiteCheck scanner detected the infection on about 700 sites over the weekend [...]
---------------------------------------------
https://blog.sucuri.net/2018/11/hackers-change-wordpress-siteurl-to-pastebi…
∗∗∗ Want to hack an ATM for free cash? Its as easy as Windows XP ∗∗∗
---------------------------------------------
Bank machines pen testing reveals alarming results ATM machines are vulnerable to an array of basic attack techniques that would allow hackers to lift thousands in cash.
---------------------------------------------
https://www.theregister.co.uk/2018/11/14/atm_security_lousy/
∗∗∗ November 2018 Microsoft Patch Tuesday ∗∗∗
---------------------------------------------
This month, Microsoft patches two issues that have already been disclosed publically. One is related to BitLocker trusting SSDs with faulty encryption. [...] The second publicly disclosed vulnerability is the ALPC elevation of privilege issue that was disclosed by SandboxEscaper via Twitter. [...] Finally, these updates address a Win32k elevation of privilege vulnerability (cve:2018-8589) which has been exploited in the wild.
---------------------------------------------
https://isc.sans.edu/forums/diary/November+2018+Microsoft+Patch+Tuesday/243…
∗∗∗ Patchday bei Adobe: Nicht kritisch, aber wichtig ∗∗∗
---------------------------------------------
Sicherheitsupdates von Adobe schließen Lücken in Acrobat, Flash, Photoshop CC und Reader. Keine Schwachstelle gilt als "kritisch".
---------------------------------------------
http://heise.de/-4220586
∗∗∗ Generalschlüssel für Fingerabdruckscanner: Master-Prints entsperren Smartphones ∗∗∗
---------------------------------------------
Mit KI-Methoden erstellten Forscher Fingerabdrücke, die als eine Art Generalschlüssel für Fingerabdruckscanner fungieren und damit etwa Smartphones entsperren.
---------------------------------------------
http://heise.de/-4220782
∗∗∗ Prozessor-Sicherheit: Sieben neue Varianten von Spectre-Lücken ∗∗∗
---------------------------------------------
Die Spectre-Sicherheitslücken in Prozessoren lassen sich angeblich noch anders nutzen, als bisher bekannt; Intel gibt allerdings Entwarnung.
---------------------------------------------
http://heise.de/-4220854
∗∗∗ Add-ons, Extensions and CSP Violations: Playing Nice with Content Security Policies ∗∗∗
---------------------------------------------
You know what I really like? A nice, slick, clean set of violation reports from the content security policy (CSP) I run on Have I Been Pwned (HIBP). You know what I really dont like? Logging on to Report URI and being greeted with something like this: [...]
---------------------------------------------
https://www.troyhunt.com/add-ons-extensions-and-csp-violations-playing-nice…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Advisory 2018-10: Security Update for OTRS Framework ∗∗∗
---------------------------------------------
This advisory covers a problem with a data migration discovered in the OTRS framework.
---------------------------------------------
https://community.otrs.com/security-advisory-2018-10-security-update-for-ot…
∗∗∗ VMSA-2018-0028 ∗∗∗
---------------------------------------------
VMware vRealize Log Insight updates address an authorization bypass vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0028.html
∗∗∗ November 2018 Office Update Release ∗∗∗
---------------------------------------------
The November 2018 Public Update releases for Office are now available! This month, there are 29 security updates and 16 non-security updates. All of the security and non-security updates are listed in KB article 4469617.
---------------------------------------------
https://blogs.technet.microsoft.com/office_sustained_engineering/2018/11/13…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (powerdns and powerdns-recursor), Debian (ceph and spamassassin), Fedora (feh, flatpak, and xen), Red Hat (kernel, kernel-rt, openstack-cinder, python-cryptography, and Red Hat Single Sign-On 7.2.5), and Ubuntu (python2.7, python3.4, python3.5).
---------------------------------------------
https://lwn.net/Articles/771881/
∗∗∗ Security Advisory - Information Leakage Vulnerability on Several Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181114-…
∗∗∗ Security Advisory - Two Vulnerabilities in Huawei eSpace Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181114-…
∗∗∗ Security Advisory - Anonymous TLS Cipher Suite Supported Vulnerability in Huawei eSpace Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181114-…
∗∗∗ Security Advisory - FRP Bypass Vulnerability on Several Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181114-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Spectrum Conductor ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli System Automation Application Manager (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: IBM Planning Analytics Local is affected by multiple Node.js vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-planning-analytic…
∗∗∗ Denial of Service Vulnerability in Microsoft Skype for Business / Lync ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/vulnerability-in-skype-for-b…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 12-11-2018 18:00 − Dienstag 13-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Trojaner: Der Banking-Trojaner Trickbot hat neue Tricks gelernt ∗∗∗
---------------------------------------------
Vor zwei Jahren hatte es Trickbot nur auf Bankdaten abgesehen. Nun ist eine neue Variante des Trojaners im Umlauf, die auch Passwörter aus anderen Anwendungen abgreifen kann. (Malware, Spam)
---------------------------------------------
https://www.golem.de/news/trojaner-der-banking-trojaner-trickbot-hat-neue-t…
∗∗∗ Blockverschlüsselung: Verschlüsselungsmodus OCB2 gebrochen ∗∗∗
---------------------------------------------
Im Verschlüsselungsmodus OCB2 wurden in kurzer Abfolge zahlreiche Sicherheitsprobleme gefunden. Breite Verwendung findet dieser Modus nicht, obwohl er Teil eines ISO-Standards ist. (Verschlüsselung, Applikationen)
---------------------------------------------
https://www.golem.de/news/blockverschluesselung-verschluesselungsmodus-ocb2…
∗∗∗ Should You Send Your Pen Test Report to the MSRC? ∗∗∗
---------------------------------------------
Every day, the Microsoft Security Response Center (MSRC) receives vulnerability reports from security researchers, technology/industry partners, and customers. We want those reports, because they help us make our products and services more secure. High-quality reports that include proof of concept, details of an attack or demonstration of a vulnerability, and a detailed writeup of the...
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2018/11/12/should-you-send-your-pe…
∗∗∗ Why Google Internet Traffic Rerouted Through China and Russia ∗∗∗
---------------------------------------------
For two hours Monday, Google internet traffic rerouted through China, Russia, and elsewhere. Heres why.
---------------------------------------------
https://www.wired.com/story/google-internet-traffic-china-russia-rerouted
∗∗∗ TLS-Aufschlüsselung: Malware und Angriffe in verschlüsselten Datenströmen erkennen ∗∗∗
---------------------------------------------
Die Schlacht um Aufschlüsselungs-Optionen für TLS haben Strafverfolger und Provider verloren. Eine Forschungsgruppe soll nun die Gefahrenabwehr ausloten.
---------------------------------------------
http://heise.de/-4219047
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
Adobe has published security bulletins for Adobe Flash Player (APSB18-39), Adobe Acrobat and Reader (APSB18-40) and Adobe Photoshop CC (APSB18-43). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1648
∗∗∗ SAP Security Patch Day - November 2018 ∗∗∗
---------------------------------------------
On 13th of November 2018, SAP Security Patch Day saw the release of 11 Security Notes. Additionally, there were 3 updates to previously released security notes.
---------------------------------------------
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firmware-nonfree and imagemagick), Fedora (cabextract, icecast, and libmspack), openSUSE (icecast), Red Hat (httpd24), Slackware (libtiff), SUSE (apache-pdfbox, firefox, ImageMagick, and kernel), and Ubuntu (clamav, spamassassin, and systemd).
---------------------------------------------
https://lwn.net/Articles/771697/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli System Automation for Multiplatforms (CVE-2018-1656 , CVE-2018-12539 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Installation Manager and IBM Packaging Utility ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability in Installation Verification Tool of WebSphere Application Server (CVE-2018-1643) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-cross-site-scripting-…
∗∗∗ RSA BSAFE Micro Edition Suite Lets Remote Users Cause the Target Service to Crash ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1042057
∗∗∗ SSA-113131 (Last Update: 2018-11-13): Denial-of-Service Vulnerabilities in S7-400 CPUs ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-113131.txt
∗∗∗ SSA-233109 (Last Update: 2018-11-13): Web Vulnerabilities in SIMATIC Panels ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-233109.txt
∗∗∗ SSA-242982 (Last Update: 2018-11-13): Cross-Site Scripting Vulnerability in SCALANCE S ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-242982.txt
∗∗∗ SSA-584286 (Last Update: 2018-11-13): Denial-of-Service Vulnerability in SIMATIC S7-1200 CPU and SIMATIC S7-1500 CPU ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-584286.txt
∗∗∗ SSA-621493 (Last Update: 2018-11-13): Password Storage Vulnerability in SIMATIC STEP7 (TIA Portal) ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-621493.txt
∗∗∗ SSA-886615 (Last Update: 2018-11-13): Vulnerability in SIMATIC IT Production Suite ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-886615.txt
∗∗∗ SSA-944083 (Last Update: 2018-11-13): HTTP Header Injection in SIMATIC Panels and SIMATIC WinCC (TIA Portal) ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-944083.txt
∗∗∗ SSA-168644 (Last Update: 2018-11-13): Spectre and Meltdown Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-168644.txt
∗∗∗ SSA-179516 (Last Update: 2018-11-13): OpenSSL Vulnerability in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-179516.txt
∗∗∗ SSA-254686 (Last Update: 2018-11-13): Foreshadow / L1 Terminal Fault Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-254686.txt
∗∗∗ SSA-268644 (Last Update: 2018-11-13): Spectre-NG (Variants 3a and 4) Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-268644.txt
∗∗∗ SSA-293562 (Last Update: 2018-11-13): Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-293562.txt
∗∗∗ SSA-346262 (Last Update: 2018-11-13): Denial-of-Service in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-346262.txt
∗∗∗ SSA-348629 (Last Update: 2018-11-13): Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional and SIMATIC NET PC Software ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-348629.txt
∗∗∗ SSA-901333 (Last Update: 2018-11-13): KRACK Attacks Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-901333.txt
∗∗∗ SSA-159860 (Last Update: 2018-11-13): Access Control Vulnerability in IEC 61850 system configurator, DIGSI 5, DIGSI 4, SICAM PAS/PQS, SICAM PQ Analyzer, and SICAM SCC ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-159860.txt
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 09-11-2018 18:00 − Montag 12-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Linux CryptoMiners Are Now Using Rootkits to Stay Hidden ∗∗∗
---------------------------------------------
To make it harder to spot a cryptominer process that is utilizing all of the CPU, a new variant has been discovered for Linux that attempts to hide its presence by utilizing a rootkit.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/linux-cryptominers-are-now-u…
∗∗∗ DSGVO: Sicherheitslücke in Wordpress-Addon ermöglicht Admin-Rechte ∗∗∗
---------------------------------------------
Durch eine fehlende Identitätsabfrage in einem DSGVO-Plugin für Wordpress können sich Angreifer Administratorkonten für Webseiten anlegen und dann beliebige Schadsoftware verteilen. Die Lücke wird bereits ausgenutzt. (Wordpress, PHP)
---------------------------------------------
https://www.golem.de/news/dsgvo-sicherheitsluecke-in-wordpress-addon-ermoeg…
∗∗∗ Virtualisierung: Update behebt Schwachstelle in VMware Player und Workstation ∗∗∗
---------------------------------------------
Eine Sicherheitslücke betrifft die beliebten Virtualisierungsprogramme VMware Player und Workstation. Angreifer können darüber Code auf dem Hostsystem ausführen, was die Lücken recht kritisch macht. Das von VMware verteilte Update sollte schnell installiert werden. (VMware, Virtualisierung)
---------------------------------------------
https://www.golem.de/news/virtualisierung-update-behebt-schwachstelle-in-vm…
∗∗∗ Trojaner: Achtung bei angeblichen Rechnungen ∗∗∗
---------------------------------------------
Vetrauenswürdiger Absender, glaubhafter Text in gutem Deutsch – und trotzdem handelt es sich bei der angehängten Rechnung um einen Trojaner.
---------------------------------------------
http://heise.de/-4219043
∗∗∗ Triton Malware Spearheads Latest Generation of Attacks on Industrial Systems ∗∗∗
---------------------------------------------
Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber sabotage can spy on, disrupt, or destroy systems that manage large-scale industrial processes. An essential danger in this threat is that it moves from mere digital damage to risking human lives.
---------------------------------------------
https://securingtomorrow.mcafee.com/mcafee-labs/triton-malware-spearheads-l…
∗∗∗ Betrugsversuch beim Privatverkauf ∗∗∗
---------------------------------------------
Kriminelle senden Privatverkäufer/innen über WhatsApp Kaufangebote. Sie geben vor, dass sie im Ausland sind und schlagen die Vertragsabwicklung über eine Spedition vor. Dazu versenden sie gefälschte Überweisungsbelege. Verkäufer/innen sollen sowohl die Ware als auch zu viel transferierte Geldbeträge ins Ausland überweisen. Sie verlieren beides und erhalten nicht den Kaufpreis.
---------------------------------------------
https://www.watchlist-internet.at/news/betrugsversuch-beim-privatverkauf/
∗∗∗ Schadsoftware-Mails von Paymorrow Gbr und Volkswagen VTI GmbH! ∗∗∗
---------------------------------------------
Unternehmen aufgepasst: Betrüger/innen versenden Mails mit angeblichen Rechnungen im .zip-Dateiformat. Die enthaltenen ausführbaren Files dürfen auf keinen Fall geöffnet werden, denn sie infizieren Ihr Gerät oder das Firmennetzwerk mit Schadsoftware.
---------------------------------------------
https://www.watchlist-internet.at/news/schadsoftware-mails-von-paymorrow-gb…
∗∗∗ How my personal Bug Bounty Program turned into a Free Security Audit for the Serendipity Blog ∗∗∗
---------------------------------------------
HackerOne is currently one of the most popular bug bounty program platforms. While the usual providers of bug bounty programs are companies, w while ago I noted that some people were running bug bounty programs on Hacker One for their private projects without payouts. It made me curious, so I decided to start one with some of my private web pages in scope.
---------------------------------------------
https://blog.hboeck.de:443/archives/896-How-my-personal-Bug-Bounty-Program-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (curl, lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, libcurl-gnutls, systemd, and thunderbird), Debian (ansible, ghostscript, qemu, thunderbird, and xen), Fedora (community-mysql, gettext, links, mysql-connector-java, xen, and zchunk), Gentoo (icecast, libde265, okular, pango, and PHProjekt), Mageia (ansible, audiofile, iniparser, libtiff, mercurial, opencc, and python-dulwich), openSUSE (accountsservice, apache2, [...]
---------------------------------------------
https://lwn.net/Articles/771574/
∗∗∗ IBM Security Bulletin: IBM MQ can allow an attacker to execute a privilege escalation attack on a local machine. (CVE-2018-1792) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-can-allow-an-a…
∗∗∗ IBM Security Bulletin: Content Collector for Email, File Systems, Microsoft SharePoint and IBM Connections are affected by a publicly disclosed vulnerability found by vFinder: Eclipse Jetty ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-content-collector-for…
∗∗∗ IBM Security Bulletin: IBM Network Performance Insight (CVE-2018-11771) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-network-performan…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Network Performance Insight ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ BIG-IP iControl and tmsh vulnerability CVE-2018-15325 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K77313277
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 08-11-2018 18:00 − Freitag 09-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Root-Zertifikat: Sennheiser-Software hebelt HTTPS-Sicherheit aus ∗∗∗
---------------------------------------------
Eine Software für Headsets des Herstellers Sennheiser installiert ein Root-Zertifikat und sorgt damit dafür, dass HTTPS-Verbindungen nicht mehr sicher sind. In neueren Versionen ist die Lücke etwas weniger schlimm, einen Fix gibt es bisher nicht. (TLS, Sound-Hardware)
---------------------------------------------
https://www.golem.de/news/root-zertifikat-sennheiser-software-hebelt-https-…
∗∗∗ Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets ∗∗∗
---------------------------------------------
Our analysis of a targeted attack that used a language-specific word processor shows why its important to understand and protect against small-scale and localized attacks as well as broad-scale malware campaigns. The attack exploited a vulnerability in InPage, a word processor software for specific languages like Urdu, Persian, Pashto, and Arabic. More than 75% of [...]
---------------------------------------------
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/08/attack-uses-mal…
∗∗∗ AR18-312A: JexBoss – JBoss Verify and EXploitation Tool ∗∗∗
---------------------------------------------
JBoss Verify and EXploitation tool (JexBoss) is an open-source tool used by cybersecurity hunt teams (sometimes referred to as "red teams") and auditors to conduct authorized security assessments. Threat actors use this tool maliciously to test and exploit vulnerabilities in JBoss Application Server [...]
---------------------------------------------
https://www.us-cert.gov/ncas/analysis-reports/AR18-312A
∗∗∗ Passive DNS for the Bad ∗∗∗
---------------------------------------------
Passive DNS is not a new technique but, for the last months, there was more and more noise around it. Passive DNS is a technique used to record all resolution requests performed by DNS resolvers (bigger they are, bigger they will collect) and then allow to search for historical data.
---------------------------------------------
https://blog.rootshell.be/2018/11/09/passive-dns-for-the-bad/
∗∗∗ UAC Bypass by Mocking Trusted Directories ∗∗∗
---------------------------------------------
During research for some new User Account Control (UAC) bypass techniques, I discovered what I believe to be a new bypass method (at the time of this writing). It is worth mentioning that Microsoft doesnt consider UAC a security boundary, however we still reported the bug to Microsoft and want to share its details here.
---------------------------------------------
https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directori…
=====================
= Vulnerabilities =
=====================
∗∗∗ Philips iSite and IntelliSpace PACS ∗∗∗
---------------------------------------------
This medical device advisory includes mitigations for a weak password Requirements vulnerability in the Philips iSite and IntelliSpace PACS.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-312-01
∗∗∗ PostgreSQL 11.1, 10.6, 9.6.11, 9.5.15, 9.4.20, and 9.3.25 released ∗∗∗
---------------------------------------------
There is a whole new set of PostgreSQL releases out there, the main purpose of which is to include an important security fix. "Using a purpose-crafted trigger definition, an attacker can run arbitrary SQL statements with superuser privileges when a superuser runs `pg_upgrade` on the database or during a pg_dump dump/restore cycle. This attack requires [...]
---------------------------------------------
https://lwn.net/Articles/771145/
∗∗∗ VMSA-2018-0027 ∗∗∗
---------------------------------------------
VMware ESXi, Workstation, and Fusion updates address uninitialized stack memory usage
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0027.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (nginx), Fedora (icu, java-1.8.0-openjdk-aarch32, libgit2, php-pear-CAS, roundcubemail, and ruby), Gentoo (firefox, libX11, openssl, and python), openSUSE (thunderbird), Oracle (java-11-openjdk, kernel, and spice-server), Red Hat (java-1.8.0-ibm and thunderbird), Scientific Linux (spice-server), SUSE (curl, libepubgen, liblangtag, libmwaw, libnumbertext, libreoffice, libstaroffice, libwps, myspell-dictionaries, xmlsec1, libxkbcommon, openssh, and [...]
---------------------------------------------
https://lwn.net/Articles/771324/
∗∗∗ Upcoming Security Updates for Adobe Acrobat and Reader (APSB18-40) ∗∗∗
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1654
∗∗∗ Roche Diagnostics Point of Care Handheld Medical Devices (Update A) ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01
∗∗∗ Security Updates for OTRS Framework ∗∗∗
---------------------------------------------
https://community.otrs.com/security-advisory-2018-09-security-update-for-ot…https://community.otrs.com/security-advisory-2018-08-security-update-for-ot…https://community.otrs.com/security-advisory-2018-07-security-update-for-ot…
∗∗∗ Field Notice: FN - 70319 - ASA and FXOS Software - Change in Root Certificate Might Affect Smart Licensing and Smart Call Home Functionality - Software Upgrade Recommended ∗∗∗
---------------------------------------------
https://www.cisco.com/c/en/us/support/docs/field-notices/703/fn70319.html
∗∗∗ IBM Security Bulletin: Denial of Service vulnerability affects IBM Spectrum Protect Client and IBM Spectrum Protect for Virtual Environments (CVE-2018-1786) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-denial-of-service-vul…
∗∗∗ IBM Security Bulletin: Vulnerability in FreeBSD affects AIX (CVE-2018-6922) Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-free…
∗∗∗ IBM Security Bulletin: Potential cross-site scripting vulnerability in WebSphere Application Server using SIBMsgMigration Utility (CVE-2018-1798) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-potential-cross-site-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Spectrum Protect for Virtual Environments (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in Oracle Outside In Technology Affect IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: Security Bulletin: A Zip Slip vulnerability is exposed in Case Manager (CVE-2018-1884) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-security-bulletin-a-z…
∗∗∗ IBM Security Bulletin: Information Disclosure in IBM WebSphere Application Server Liberty affects IBM Spectrum Protect for Virtual Environments (CVE-2018-1553) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-information-disclosur…
∗∗∗ IBM Security Bulletin: OpenSSL Vulnerability Affects IBM Contact Optimization (CVE-2016-8610) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-openssl-vulnerability…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 07-11-2018 18:00 − Donnerstag 08-11-2018 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Beginner’s Guide to Open Source Intrusion Detection (IDS) Tools ∗∗∗
---------------------------------------------
Originally written by Joe Schreiber Re-written and edited by Trevor Giffen (Editorial Contractor) Re-re edited and expanded by Rich Langston Whether you need to monitor hosts or the networks connecting them to identify the ..
---------------------------------------------
https://feeds.feedblitz.com/~/579108152/0/alienvault-blogs~Beginner%e2%80%9…
∗∗∗ DJI Patches Forum Bug That Allowed Drone Account Takeovers ∗∗∗
---------------------------------------------
Bug opened door for malicious link attack, giving hacker access to stored DJI drone data of commercial and consumer customers.
---------------------------------------------
https://threatpost.com/dji-patches-forum-bug-that-allowed-drone-account-tak…
∗∗∗ Sicherheitsupdates: Cisco entfernt Backdoor aus Business Switches ∗∗∗
---------------------------------------------
Es gibt wichtige Patches zu Absicherung von Hard- und Software von Cisco.
---------------------------------------------
http://heise.de/-4216400
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (python-paramiko and thunderbird), Debian (firefox-esr, libdatetime-timezone-perl, and mariadb-10.0), Fedora (curl, NetworkManager, and xorg-x11-server), openSUSE (kernel), Oracle (java-1.7.0-openjdk, ..
---------------------------------------------
https://lwn.net/Articles/771129/
∗∗∗ Synology-SA-18:58 Surveillance Station ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to execute arbitrary code via a susceptible version of Surveillance Station.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_58
∗∗∗ Synology-SA-18:59 VS960HD ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to execute arbitrary code via a susceptible version of VS960HD.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_59
∗∗∗ BlackBerry powered by Android Security Bulletin - November 2018 ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ WP GDPR Compliance <= 1.4.2 - Unauthenticated Call Any Action or Update Any Option ∗∗∗
---------------------------------------------
https://wpvulndb.com/vulnerabilities/9144
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to cross-site scripting (CVE-2018-1872) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-maximo-asset-mana…
∗∗∗ IBM Security Bulletin: IBM i is affected by networking BIND vulnerability CVE-2018-5740 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-i-is-affected-by-…
∗∗∗ IBM Security Bulletin: Node.js as used in IBM QRadar Packet Capture is susceptible to multiple vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-node-js-as-used-in-ib…
∗∗∗ IBM Security Bulletin: An XML External Entity (XXE) processing vulnerability is exposed in Case Manager administration client (CVE-2018-1844) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-an-xml-external-entit…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 06-11-2018 18:00 − Mittwoch 07-11-2018 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Oracle: Verärgerter Forscher veröffentlicht Exploit für Virtualbox ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat eine Zero-Day-Lücke für Virtualbox veröffentlicht, die einen Ausbruch aus dem Gastsystem auf das Host-System ermöglicht. Der Forscher sei frustriert darüber, ..
---------------------------------------------
https://www.golem.de/news/oracle-veraergerter-forscher-veroeffentlicht-expl…
∗∗∗ BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers ∗∗∗
---------------------------------------------
This article was co-authored by Hui Wang and RootKiter.Since September 2018, 360Netlab Scanmon has detected multiple scan spikes on TCP port 5431, each time the system logged more than 100k scan ..
---------------------------------------------
http://blog.netlab.360.com/bcmpupnp_hunter-a-100k-botnet-turns-home-routers…
∗∗∗ ADV180028 | Guidance for configuring BitLocker to enforce software encryption ∗∗∗
---------------------------------------------
Microsoft is aware of reports of vulnerabilities in the hardware encryption of certain ..
---------------------------------------------
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028
∗∗∗ WordPress Design Flaw Leads to WooCommerce RCE ∗∗∗
---------------------------------------------
A flaw in the way WordPress handles privileges can lead to a privilege escalation in WordPress plugins. This affects for example WooCommerce, the most popular e-commerce plugin with over 4 million ..
---------------------------------------------
https://blog.ripstech.com/2018/wordpress-design-flaw-leads-to-woocommerce-r…
∗∗∗ Vorsicht! Neue betrügerische Bewerbungsmail mit Erpressungstrojaner im Umlauf ∗∗∗
---------------------------------------------
Derzeit kursiert eine gefakte Bewerbung von "Peter Reif" im Internet. Nach dem Öffnen des Dateianhangs verschlüsselt ein Schädling Daten und fordert Lösegeld.
---------------------------------------------
http://heise.de/-4214191
∗∗∗ Attackers breached Statcounter to steal cryptocurrency from gate.io users ∗∗∗
---------------------------------------------
Web analytics company Statcounter and cryptocurrency exchange gate.io have been compromised in another supply-chain attack, which resulted in an unknown number of gate.io customers getting their money stolen,..
---------------------------------------------
https://www.helpnetsecurity.com/2018/11/07/statcounter-gate-io-compromised/
∗∗∗ Keine FLIXGLADE und FLIX FORGE LTD- Rechnungen bezahlen! ∗∗∗
---------------------------------------------
Auf der Suche nach kostenlosen Filmen im Internet stoßen Konsument/innen auf flixman.de und inflix.de. Es handelt sich um kriminelle Plattformen, die ihren Opfern keine Leistung erbringen, ..
---------------------------------------------
https://www.watchlist-internet.at/news/keine-flixglade-und-flix-forge-ltd-r…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software Denial of Service Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the Session Initiation Protocol (SIP) inspectionengine of Cisco Adaptive Security Appliance (ASA) Software and CiscoFirepower Threat Defense (FTD) Software could allow an unauthenticated, ..
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletin:Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system and The IBM Java Runtime Environment’s Diagnostic Tooling Framework for Java does not protect against CVE-2018-1656 and CVE-2018-12539 ∗∗∗
---------------------------------------------
The IBM Java Runtime Environment’s Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletineclipse-openj9-could-a…
∗∗∗ IBM Security Bulletin: Vulnerability in Apache Cassandra affects IBM Operations Analytics Predictive Insights (CVE-2018-8016) ∗∗∗
---------------------------------------------
Apache Cassandra is used by IBM Operations Analytics Predictive Insights. IBM Operations Analytics Predictive Insights has addressed the applicable CVE. Note that the usage of Apache Cassandra within IBM Operations ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-in-apac…
∗∗∗ IBM Security Bulletin: Vulnerabilities in Python affect IBM Operations Analytics Predictive Insights (CVE-2018-1060, CVE-2018-1061) ∗∗∗
---------------------------------------------
Python is used by IBM Operations Analytics Predictive Insights. IBM Operations Analytics Predictive Insights has addressed the applicable CVEs. Note that the usage of Python within IBM Operations Analytics ..
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-py…
∗∗∗ Roche Point of Care Handheld Medical Devices ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01
∗∗∗ Cisco Integrated Management Controller Supervisor SQL Injection Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Unity Express Arbitrary Command Execution Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Xen Security Advisory 282 - guest use of HLE constructs may lock up host ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-282.html
∗∗∗ Red Hat JBoss EAP RichFaces Access Control Bug Lets Remote Users Execute Arbitrary Code on the Target System ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1042037
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 05-11-2018 18:00 − Dienstag 06-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ SSD: Forscher umgehen Passwörter bei verschlüsselten Festplatten ∗∗∗
---------------------------------------------
Bei manchen SSDs mit Hardwareverschlüsselung konnten Forscher die Firmware so manipulieren, dass sie beliebige Passwörter akzeptierte. Das war nicht das einzige Problem, das sie fanden. (Solid State Drive, Speichermedien)
---------------------------------------------
https://www.golem.de/news/ssd-forscher-umgehen-passwoerter-bei-verschluesse…
∗∗∗ Malicious Powershell Script Dissection, (Tue, Nov 6th) ∗∗∗
---------------------------------------------
Here is another example of malicious Powershell script found while hunting. Such scripts remain a common attack vector and many of them can be easily detected just by looking for some specific strings. Here is an example of YARA rule [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/24282
∗∗∗ Struts 2.3 Vulnerable to Two Year old File Upload Flaw ∗∗∗
---------------------------------------------
Apache today released an advisory, urging users who run Apache Struts 2.3.x to update the commons-fileupload component [1]. Struts 2.3.x uses by default the old 1.3.2 version of commons-fileupload. In November of 2016, a deserialization vulnerability was disclosed and patched in commons-fileupload [2]. The vulnerability can lead to arbitrary remote code execution.
---------------------------------------------
https://isc.sans.edu/forums/diary/Struts+23+Vulnerable+to+Two+Year+old+File…
∗∗∗ GPU side channel attacks can enable spying on web activity, password stealing ∗∗∗
---------------------------------------------
Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer’s graphics processing unit, or GPU, to spy on web activity, steal passwords, and break into cloud-based applications.
---------------------------------------------
https://www.helpnetsecurity.com/2018/11/06/gpu-side-channel-attacks/
∗∗∗ Gefälschte Zahlungsanweisung an die Buchhaltung ∗∗∗
---------------------------------------------
Kriminelle geben sich als Geschäftsführung eines Unternehmens aus und versenden eine E-Mail an die Buchhaltung. Darin fordern sie die Mitarbeiter/innen dazu auf, dass sie einen hohen Geldbetrag ins Ausland überweisen. Angestellte, die die Zahlungsanweisung nicht als betrügerisch erkennen, transferieren die geforderte Summe an Kriminelle.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-zahlungsanweisung-an-die…
=====================
= Vulnerabilities =
=====================
∗∗∗ Android Security Bulletin - November 2018 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Security patch levels of 2018-11-05 or later address all of these issues. [...] The most severe vulnerability in this section could enable a proximate attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.
---------------------------------------------
https://source.android.com/security/bulletin/2018-11-01.html
∗∗∗ libssh Authentication Bypass Vulnerability Affecting Cisco Products: October 2018 ∗∗∗
---------------------------------------------
Cisco has investigated its product line and has determined that no products or services are known to be affected by this vulnerability.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (glusterfs, gthumb, and mysql-5.5), Red Hat (389-ds-base, kernel, and xerces-c), Slackware (mariadb), SUSE (accountsservice, curl, icinga, kernel, and opensc), and Ubuntu (libxkbcommon, openssh, and ruby1.9.1, ruby2.0, ruby2.3, ruby2.5).
---------------------------------------------
https://lwn.net/Articles/770856/
∗∗∗ IBM Security Bulletin: IBM API Connect is vulnerable to CSV Injection (CVE-2018-1774) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-vu…
∗∗∗ IBM Security Bulletin: IBM MQ can cause a Denial of Service attack to connecting MQTT clients (CVE-2018-1684) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-can-cause-a-de…
∗∗∗ IBM Security Bulletin: IBM Data Science Experience Local is affected by a Use of Hard-coded Password vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-data-science-expe…
∗∗∗ IBM Security Bulletin: OpenSSL Vulnerability Affects IBM Sterling Connect:Express for UNIX (CVE-2018-0737) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-openssl-vulnerability…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Cognos Analytics ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: A Server Side Input Validation Vulnerability Affects IBM Campaign (CVE-2016-9749) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-server-side-input-v…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 02-11-2018 18:00 − Montag 05-11-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New Microsoft Edge Browser Zero-Day RCE Exploit in the Works ∗∗∗
---------------------------------------------
Details are about to emerge about a zero-day remote code execution vulnerability in the Microsoft Edge web browser, as two researchers plan to reveal a proof-of-concept and publish a general write up. Microsoft has not been told the details of this vulnerability. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-microsoft-edge-browser-z…
∗∗∗ Neue Schwachstelle in Intel-CPUs: Hyper-Threading anfällig für Datenleck ∗∗∗
---------------------------------------------
Forscher demonstrieren einen neuen CPU-Bug bei aktuellen Intel-Prozessoren, über den sich Daten aus einem benachbarten Thread auslesen lassen.
---------------------------------------------
http://heise.de/-4210282
∗∗∗ Streaming-Server Icecast: Angreifer könnten Online-Radiosender ausknipsen ∗∗∗
---------------------------------------------
In der aktuellen Version von Icecast haben die Entwickler eine Sicherheitslücke geschlossen.
---------------------------------------------
http://heise.de/-4210875
∗∗∗ Heres Why [Insert Thing Here] Is Not a Password Killer ∗∗∗
---------------------------------------------
These days, I get a lot of messages from people on security related things. Often its related to data breaches or sloppy behaviour on behalf of some online service playing fast and loose with HTTPS or passwords or some other easily observable security posture. But on a fairly regular basis, [...]
---------------------------------------------
https://www.troyhunt.com/heres-why-insert-thing-here-is-not-a-password-kill…
∗∗∗ Finger weg vom Fake-Shop gaming-ez.com! ∗∗∗
---------------------------------------------
Kaufen Sie nicht auf gaming-ez.com ein. Die Playstation 4 Pro-, Xbox One- oder Nintendo Switch- Angebote sind zwar verlockend, werden aber nie geliefert. Überwiesenes Geld ist verloren.
---------------------------------------------
https://www.watchlist-internet.at/news/finger-weg-vom-fake-shop-gaming-ezco…
∗∗∗ Datendiebstahl mit gefälschtem AirAsia-Ticket ∗∗∗
---------------------------------------------
Konsument/innen erhalten ein gefälschtes AirAsia-Ticket für einen Flug von Hong Kong nach Kuala Lumpur. Sie können es stornieren, indem sie die Website eines Payment Center aufrufen. Dieses fragt PayPal-Zugangsdaten sowie Kreditkarten- und Bankinformationen ab. Ebenfalls ist eine persönliche Identifizierung vorgesehen. Kund/innen, die die gewünschten Informationen bekannt geben, werden Opfer eines Daten- und Identitätsdiebstahls.
---------------------------------------------
https://www.watchlist-internet.at/news/datendiebstahl-mit-gefaelschtem-aira…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in the IBM SDK, Java Technology Edition affect IBM Performance Management products ∗∗∗
---------------------------------------------
Affected product(s) and affected version(s):IBM Cloud Application Performance Management, Base Private IBM Cloud Application Performance Management, Advanced Private IBM Cloud Application Performance Management
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilit…
∗∗∗ IBM Security Bulletin: IBM Lotus Protector for Mail Security has released fixes in response to the public disclosed vulnerability found by vFinder (CVE-2018-14883 and CVE-2018-14851) ∗∗∗
---------------------------------------------
Affected product(s) and affected version(s):Affected Product NameAffected VersionsIBM Lotus Protector for Mail Security2.8.3.0IBM Lotus Protector for Mail Security2.8.1.0
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-lotus-protector-f…
∗∗∗ IBM Security Bulletin: A vulnerability in Apache Zookeeper could affect IBM Performance Management products (CVE-2018-8012) ∗∗∗
---------------------------------------------
Apache Zookeeper could allow a remote attacker to bypass security restrictions, caused by the failure to enforce authentication or authorization when a server attempts to join a quorum. An attacker could exploit this vulnerability to join the cluster and begin propagating counterfeit changes to the leader.
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-a-vulnerability-in-ap…
∗∗∗ IBM Security Bulletin: Vulnerabilities in IBM Java Runtime affect Rational Publishing Engine ∗∗∗
---------------------------------------------
Affected product(s) and affected version(s):Rational Publishing Engine 2.1.0 Rational Publishing Engine 2.1.1 Rational Publishing Engine 2.1.2 Rational Publishing Engine 6.0.5 Rational Publishing Engine 6.0.6
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerabilities-in-ib…
∗∗∗ IBM Security Bulletin: Security vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology ∗∗∗
---------------------------------------------
Security vulnerabilities affect multiple products: Collaborative Lifecycle Management (CLM), Rational DOORS Next Generation (RDNG), Rational Engineering Lifecycle Manager (RELM), Rational Team Concert (RTC), Rational Quality Manager (RQM), Rational Rhapsody Design Manager (Rhapsody DM) and Rational Software Architect Design Manager (RSA DM).
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-security-vulnerabilit…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (curl, icecast2, mupdf, and ruby2.3), Fedora (lldpad, NetworkManager, python-django, roundcubemail, thunderbird, webkit2gtk3, xen, and xorg-x11-server), Mageia (axis, cimg, gmic, dnsmasq, gitolite, gnutls, java-1.8.0-openjdk, lighttpd, mbedtls, mediawiki, perl-Dancer2, python-cryptography, and virtualbox), Red Hat (openvswitch, Red Hat Virtualization, and thunderbird), SUSE (curl, ffmpeg, and soundtouch), and Ubuntu (network-manager and systemd).
---------------------------------------------
https://lwn.net/Articles/770744/
∗∗∗ ZDI-18-1336: (0Day) Juuko JK-800 Replay Attack Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1336/
∗∗∗ Security Advisory - Lock-screen Bypass Vulnerability in Huawei Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181105-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 31-10-2018 18:00 − Freitag 02-11-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Utilities, Energy Sector Attacked Mainly Via IT, Not ICS ∗∗∗
---------------------------------------------
Stealing administrative credentials to carry out months-long spy campaigns is a top threat.
---------------------------------------------
https://threatpost.com/utilities-energy-sector-attacked-mainly-via-it-not-i…
∗∗∗ Intel CPUs impacted by new PortSmash side-channel vulnerability ∗∗∗
---------------------------------------------
Intel processors are impacted by a new vulnerability that can allow attackers to leak encrypted data from the CPUs internal processes.
---------------------------------------------
https://www.zdnet.com/article/intel-cpus-impacted-by-new-portsmash-side-cha…
∗∗∗ Zero-Day-Lücke in Cisco Adaptive Security Appliance und Firepower Threat Defense ∗∗∗
---------------------------------------------
Unbekannte Angreifer attackieren derzeit Firewalls und Sicherheitslösungen von Cisco. Für die Sicherheitslücke gibt es noch keinen Patch.
---------------------------------------------
http://heise.de/-4208546
∗∗∗ Bleedingbit: Sicherheitslücken in Bluetooth LE gefährden Access Points ∗∗∗
---------------------------------------------
Sicherheitsforscher skizzieren eine ihrer Einschätzung nach kritische Schwachstelle in einigen Bluetooth-Low-Energy-Chips. Es gibt bereits erste Updates.
---------------------------------------------
http://heise.de/-4209343
∗∗∗ Gefälschte iTunes Store-Rechnung im Umlauf ∗∗∗
---------------------------------------------
Kriminelle versenden eine gefälschte iTunes Store-Rechnung. Darin behaupten sie, dass Empfänger/innen einen Einkauf getätigt haben. Diesen können sie angeblich unter Bekanntgabe persönlicher Daten und ihrer Kreditkarteninformationen stornieren. Konsument/innen, die den erfundenen Einkauf rückgängig machen wollen, übermitteln Verbrecher/innen sensible Angaben und werden Opfer eines Datendiebstahls.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-itunes-store-rechnung-im…
∗∗∗ Coinhive & MikroTik ∗∗∗
---------------------------------------------
Wir haben in den uns zur Verfügung stehenden Shodan Daten nach Systemen gesucht, die von der Krypto-Mining Kampagne gegen MikroTik Geräte betroffen sind. Dabei sind wir auf ca 330 IP-Adressen aus Österreich gestoßen und haben die entsprechenden Abuse-Kontakte informiert.
---------------------------------------------
https://www.cert.at/services/blog/20181102151919-2302.html
=====================
= Vulnerabilities =
=====================
∗∗∗ AVEVA InduSoft Web Studio and InTouch Edge HMI (formerly InTouch Machine Edition) ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow and empty password in configuration file vulnerabilities in AVEVA’s InduSoft Web Studio and InTouch Edge HMI (formerly InTouch Machine Edition) products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-305-01
∗∗∗ Schneider Electric Software Update (SESU) ∗∗∗
---------------------------------------------
This advisory includes mitigations for a DLL hijacking vulnerability in the Schneider Electric Software Update (SESU).
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02
∗∗∗ Circontrol CirCarLife ∗∗∗
---------------------------------------------
This advisory includes mitigations for authentication bypass using an alternate path or channel and insufficiently protected credentials vulnerabilities in Circontrol’s CirCarLife, an electric vehicle charging station.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-305-03
∗∗∗ Fr. Sauter AG CASE Suite ∗∗∗
---------------------------------------------
This advisory includes mitigations for an improper restriction of XML External Entity Reference vulnerability in Fr. Sauter AGs CASE Suite software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-305-04
∗∗∗ Anviz AIM CrossChex Standard 4.3 Excel Macro Injection ∗∗∗
---------------------------------------------
CSV (XLS) Injection (Excel Macro Injection or Formula Injection) exists in the AIM CrossChex 4.3 when importing or exporting users using xls Excel file. This can be exploited to execute arbitrary commands on the affected system via SE attacks when an attacker inserts formula payload in the Name field when adding a user or using the custom fields Gender, Position, Phone, Birthday, Employ Date and Address.
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5498.php
∗∗∗ GitLab Critical Security Release: 11.4.4, 11.3.9, 11.2.8 ∗∗∗
---------------------------------------------
These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.
---------------------------------------------
https://about.gitlab.com/2018/11/01/critical-security-release-gitlab-11-dot…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (phpldapadmin, poppler, and tzdata), Fedora (firefox, java-11-openjdk, libarchive, sos-collector, and teeworlds), Scientific Linux (java-1.7.0-openjdk, python-paramiko, and thunderbird), Slackware (curl), and SUSE (kernel, MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss, and wireshark).
---------------------------------------------
https://lwn.net/Articles/770367/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (kernel and linux-lts), Debian (chromium-browser and mono), Oracle (firefox), and Ubuntu (curl).
---------------------------------------------
https://lwn.net/Articles/770473/
∗∗∗ Session Limit - Critical - Insecure Session Management - SA-CONTRIB-2018-072 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-072
∗∗∗ Decoupled Router - Critical - Access bypass - SA-CONTRIB-2018- 071 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-071
∗∗∗ Paragraphs - Moderately critical - Access Bypass - SA-CONTRIB-2018-073 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-073
∗∗∗ NextCloud Server: Mehrere Schwachstellen ermöglichen u. a. das Ausspähen von Informationen ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2238/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security Advisory - Authentication Bypass Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181101-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-10-2018 18:00 − Mittwoch 31-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
Next End-of-Day report: 2018-11-02
=====================
= News =
=====================
∗∗∗ Square, PayPal POS Hardware Open to Multiple Attack Vectors ∗∗∗
---------------------------------------------
Popular card readers like Square and PayPal have various flaws that allow attacks ranging from fraud to card data theft.
---------------------------------------------
https://threatpost.com/square-paypal-pos-hardware-open-to-multiple-attack-v…
∗∗∗ Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims ∗∗∗
---------------------------------------------
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. Rising from the deep, Kraken Cryptor ransomware has had a notable development path in recent months. The first signs of Kraken came in mid-August on a popular underground forum. In mid-September it was reported that [...]
---------------------------------------------
https://securingtomorrow.mcafee.com/mcafee-labs/fallout-exploit-kit-release…
∗∗∗ Using PHP 5 Becomes Dangerous in 2 Months ∗∗∗
---------------------------------------------
WordPress, Joomla, Drupal and many other popular website CMSs were written in a programming language called PHP. PHP version 5 is about to reach end-of-life and will stop receiving security updates in two months. Many WordPress and other PHP websites remain on version 5.6 or older.
---------------------------------------------
https://www.wordfence.com/blog/2018/10/php5-dangerous/
∗∗∗ 5 Types of Malware Currently Affecting macOS ∗∗∗
---------------------------------------------
Mac malware, or macOS malware, exists contrary to the popular belief that Apple’s operating system is immune to online threats. Cybersecurity researchers have been closely observing the threat landscape only to conclude that malware infections targeting Mac devices have increased in 2018.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-awareness/5-types-of-ma…
∗∗∗ Wenn Sie in eine Abo-Falle getappt sind… ∗∗∗
---------------------------------------------
Auf der Suche nach kostenlosen Angeboten und gratis Dienstleistungen werden Sie im Internet schnell fündig. Doch Vorsicht: Hier ist nicht alles Gold, was glänzt! Oft handelt es sich nämlich um Abo-Fallen, bei denen Ihnen unbegründet Rechnungen zugeschickt werden und man Ihnen mit Inkassobüro oder Rechtsanwaltsschreiben droht. Die Lösung? Auf gar keinen Fall bezahlen!
---------------------------------------------
https://www.watchlist-internet.at/news/wenn-sie-in-eine-abo-falle-getappt-s…
∗∗∗ Warnung vor sierrasport-berlin.de ∗∗∗
---------------------------------------------
Der Online-Shop sierrasport-berlin.de vertreibt Markenfälschungen. Das können Konsument/innen daran erkennen, dass sämtliche Produkte stark rabattiert und lagernd sind. Kaufen sie bei sierrasport-berlin.de ein, müssen sie mit hohen Zusatzkosten, rechtlichen Konsequenzen und einem Identitätsdiebstahl rechnen. Von einem Einkauf bei sierrasport-berlin.de wird dringend abgeraten!
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-sierrasport-berlinde/
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability ∗∗∗
---------------------------------------------
Integrated Data Protection Appliance (iDPA) contains undocumented accounts with limited access which may potentially be used by a malicious user to compromise the affected system.
---------------------------------------------
https://seclists.org/fulldisclosure/2018/Oct/53
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (gitlab), Debian (gnutls28), Fedora (audiofile, coreutils, firefox, hesiod, kernel, kernel-headers, kernel-tools, libssh, lighttpd, mosquitto, opencc, patch, php-horde-nag, sos-collector, strongswan, and thunderbird), Gentoo (libxkbcommon, mutt-1.10, postgresql, systemd, xen, and xorg-server), Mageia (curl, libtiff, samba, spamassassin, and unzip), Oracle (java-1.7.0-openjdk and python-paramiko), Red Hat (git, glusterfs, java-1.7.0-openjdk, [...]
---------------------------------------------
https://lwn.net/Articles/770203/
∗∗∗ VMSA-2015-0008.2 ∗∗∗
---------------------------------------------
VMware product updates address information disclosure issue.
Updated advisory to add vCloud Director fixes for 9.0.0.x and 9.1.0.x versions that now address CVE-2015-3269.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2015-0008.html
∗∗∗ HPESBHF03894 rev.1 - HPE Integrated Lights-Out 5 (iLO 5) Firmware Updates, Local Bypass of Security Restrictions ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ ElegantThemes (divi, extra, divi-builder) - Authenticated Stored Cross-Site Scripting (XSS) ∗∗∗
---------------------------------------------
https://wpvulndb.com/vulnerabilities/9140
∗∗∗ Apple security updates ∗∗∗
---------------------------------------------
https://support.apple.com/en-us/HT201222
∗∗∗ Security Advisory - SegmentSmack Vulnerability in Linux Kernel ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181031-…
∗∗∗ Security Advisory - Improper Authorization Vulnerability in Huawei Watches ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181031-…
∗∗∗ IBM Security Bulletin: IBM Robotic Process Automation could disclose sensitive information in a web request (CVE-2018-1878) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735977
∗∗∗ IBM Security Bulletin: Passwords are unencrypted locally in IBM Robotic Process Automation with Automation Anywhere (CVE-2018-1877) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735973
∗∗∗ IBM Security Bulletin: Passwords printed to log files in IBM Robotic Process Automation with Automation Anywhere (CVE-2018-1876) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735967
∗∗∗ IBM Security Bulletin: ViewONE is vulnerable to XXE attack when opening PDF documents ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733815
∗∗∗ IBM Security Bulletin: IBM RackSwitch firmware products are affected by vulnerabilities in Python (CVE-2016-5636 CVE-2017-1000158) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737147
∗∗∗ IBM Security Bulletin: IBM Flex System switch firmware products are affected by vulnerabilities in Python (CVE-2016-5636 CVE-2017-1000158) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737125
∗∗∗ IBM Security Bulletin: IBM BladeCenter Switch Modules are affected by vulnerabilities in python (CVE-2016-5636 CVE-2017-1000158) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10736105
∗∗∗ IBM Security Bulletin: Remote Code Execution vulnerability in IBM Robotic Process Automation with Automation Anywhere (CVE-2018-1552) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22016247
∗∗∗ XSS vulnerability in undisclosed TMUI page CVE-2018-15314 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K04524282
∗∗∗ XSS vulnerability in undisclosed TMUI page CVE-2018-15313 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K21042153
∗∗∗ TMM vulnerability CVE-2018-15320 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K72442354
∗∗∗ BIG-IP tmsh vulnerability CVE-2018-15321 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K01067037
∗∗∗ MQTT vulnerability CVE-2018-15323 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K26583415
∗∗∗ BIG-IP Configuration utility vulnerability CVE-2018-15327 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20222812
∗∗∗ tmsh utility vulnerability CVE-2018-15322 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K28003839
∗∗∗ BIG-IP APM portal access vulnerability CVE-2018-15324 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K52206731
∗∗∗ TMM vulnerability CVE-2018-15319 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K64208870
∗∗∗ BIG-IP iControl & tmsh vulnerability CVE-2018-15325 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K77313277
∗∗∗ BIG-IP APM CRL vulnerability CVE-2018-15326 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K34652116
∗∗∗ TMM vulnerability CVE-2018-15318 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K16248201
∗∗∗ TMM vulnerability CVE-2018-15317 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K43625118
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-10-2018 18:00 − Dienstag 30-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ CommonRansom Ransomware Demands RDP Access to Decrypt Files ∗∗∗
---------------------------------------------
A new ransomware called CommonRansom was discovered that has a very bizarre request. In order to decrypt a computer after a payment is made, they require the victim to open up Remote Desktop Services on the affected computer and send them admin credentials in order to decrypt the victims files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/commonransom-ransomware-dema…
∗∗∗ Krankenkassen: Vivy-App gibt Daten preis ∗∗∗
---------------------------------------------
Sicherheitsforscher haben einige gravierende Lücken in der Krankenkassen-App Vivy gefunden. Unter anderem konnte auf Dokumente, die man mit dem Arzt teilte, unberechtigt zugegriffen werden. (Medizin, Verschlüsselung)
---------------------------------------------
https://www.golem.de/news/krankenkassen-vivy-app-gibt-daten-preis-1810-1373…
∗∗∗ Disrupting the Flow: Exposed and Vulnerable Water and Energy Infrastructures ∗∗∗
---------------------------------------------
by Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Cedric Pernet, and Roel Reyes Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected [...]
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/5LDw-xUlnAw/
∗∗∗ Sicherheitsupdates: Multifunktionsgeräte von Lexmark anfällig für "böse" Faxe ∗∗∗
---------------------------------------------
Sicherheitspatches für Drucker-Fax-Kopier-Kombinationen von Lexmark schließen zwei Lücken. Eine davon gilt als kritisch.
---------------------------------------------
http://heise.de/-4206719
∗∗∗ Systemd: DHCPv6-Pakete können Linux-Rechner kapern ∗∗∗
---------------------------------------------
Eine Systemd-Komponente in vielen modernen Linux-Systemen kann missbraucht werden, um den Rechner übers Netz zu kapern.
---------------------------------------------
http://heise.de/-4206800
∗∗∗ Erpresserische E-Mails drohen mit Masturbationsvideo ∗∗∗
---------------------------------------------
Kriminelle versenden betrügerische Nachrichten. Darin behaupten sie, dass sie das Passwort der Empfänger/innen kennen, angeblich Zugriff auf ihren Computer haben und deshalb über Masturbationsvideos verfügen. Die Adressat/innen sollen Bitcoins bezahlen, damit es zu keiner Veröffentlichung der Aufnahmen kommt. Konsument/innen können das Schreiben ignorieren, denn es ist erfunden. Eine Reaktion ist nicht erforderlich.
---------------------------------------------
https://www.watchlist-internet.at/news/erpresserische-e-mails-drohen-mit-ma…
=====================
= Vulnerabilities =
=====================
∗∗∗ Squid Proxy Cache Security Update Advisory SQUID-2018:4 ∗∗∗
---------------------------------------------
Due to incorrect input handling, Squid is vulnerable to a Cross-Site Scripting vulnerability when generating HTTPS response messages about TLS errors.
---------------------------------------------
http://www.squid-cache.org/Advisories/SQUID-2018_4.txt
∗∗∗ Squid Proxy Cache Security Update Advisory SQUID-2018:5 ∗∗∗
---------------------------------------------
Due to a memory leak in SNMP query rejection code, Squid is vulnerable to a denial of service attack.
---------------------------------------------
http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (xorg-x11-server), Debian (xen), Red Hat (389-ds-base, binutils, curl and nss-pem, fuse, glibc, glusterfs, GNOME, gnutls, jasper, java-1.7.0-openjdk, kernel, kernel-alt, kernel-rt, krb5, libcdio, libkdcraw, libmspack, libreoffice, libvirt, openssl, ovmf, python, python-paramiko, qemu-kvm, qemu-kvm-ma, samba, setup, sssd, wget, wpa_supplicant, X.org X11, xerces-c, zsh, and zziplib), and SUSE (ardana-monasca, ardana-spark, kafka, kafka-kit, [...]
---------------------------------------------
https://lwn.net/Articles/770031/
∗∗∗ Sandbox Bypass in Script Security and Pipeline Groovy Plugins ∗∗∗
---------------------------------------------
https://jenkins.io/security/advisory/2018-10-29/
∗∗∗ GitLab Security Release: 11.4.3, 11.3.8, and 11.2.7 ∗∗∗
---------------------------------------------
https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-…
∗∗∗ IBM Security Bulletin: Code execution vulnerability with OpenID connect in WebSphere Application Server Liberty (CVE-2018-1851) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735105
∗∗∗ IBM Security Bulletin: Vulnerability in the IBM FlashSystem model V840 ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732968
∗∗∗ IBM Security Bulletin: A vulnerability in Samba affects IBM Spectrum Scale SMB protocol access method (CVE-2018-10858) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732876
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for SAP Applications ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10737813
∗∗∗ IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM Spectrum Scale ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735169
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK affect IBM Integration Designer ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733845
∗∗∗ reposync vulnerability CVE-2018-10897 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K23200408
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-10-2018 18:00 − Montag 29-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Windows 10 Bug Allowed UWP Apps Full Access to File System ∗∗∗
---------------------------------------------
A bug in Windows 10 allowed UWP apps (Universal Windows Platform) to have access to the entire file system in Windows without permission from the user. This could have allowed a malicious app to access any data stored on the computer without the knowledge or consent of the user.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/windows-10-bug-allowed-uwp-a…
∗∗∗ Linux und BSD: Sicherheitslücke in X.org ermöglicht Root-Rechte ∗∗∗
---------------------------------------------
Eine Sicherheitslücke im Displayserver X.org erlaubt unter bestimmten Umständen das Überschreiben von Dateien und das Ausweiten der Benutzerrechte. Der passende Exploit passt in einen Tweet. (Sicherheitslücke, OpenBSD)
---------------------------------------------
https://www.golem.de/news/linux-und-bsd-sicherheitsluecke-in-x-org-ermoegli…
∗∗∗ Sicherheitslücke: Steuerung von Bau-Kran lässt sich übernehmen ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in der kabellosen Kransteuerung Telecrane F25 ermöglicht es, Signale mitzuschneiden und mit diesen anschließend den Kran fernzusteuern. Ein Sicherheitsupdate steht bereit. (Sicherheitslücke, Mobil)
---------------------------------------------
https://www.golem.de/news/sicherheitsluecke-steuerung-von-bau-kran-laesst-s…
∗∗∗ OWASP Top 10 Security Risks – Part II ∗∗∗
---------------------------------------------
It is National Cyber Security Awareness Month and in order to bring awareness to what threatens the integrity of websites, we have started a series of posts on the OWASP top 10 security risks.
---------------------------------------------
https://blog.sucuri.net/2018/10/owasp-top-10-security-risks-part-ii.html
∗∗∗ The D in Systemd stands for Dammmmit! A nasty DHCPv6 packet can pwn a vulnerable Linux box ∗∗∗
---------------------------------------------
Hole opens up remote-code execution to miscreants – or a crash, if youre lucky A security bug in Systemd can be exploited over the network to, at best, potentially crash a vulnerable Linux machine, or, at worst, execute malicious code on the box.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/10/26/systemd_dhc…
∗∗∗ Google schreibt Android-Herstellern zwei Jahre Sicherheitspatches vor ∗∗∗
---------------------------------------------
In einem Vertrag schreibt Google Herstellern von Android-Smartphones regelmäßige Sicherheitsupdates vor. Diese Verpflichtung gilt bereits seit dem Sommer.
---------------------------------------------
http://heise.de/-4203113
∗∗∗ Ransomware and the enterprise: A new white paper ∗∗∗
---------------------------------------------
Ransomware remains a serious threat and this new white paper explains what enterprises need to know, and do, to reduce risk The post Ransomware and the enterprise: A new white paper appeared first on WeLiveSecurity
---------------------------------------------
https://www.welivesecurity.com/2018/10/29/ransomware-enterprise-new-white-p…
=====================
= Vulnerabilities =
=====================
∗∗∗ GEOVAP Reliance 4 SCADA/HMI ∗∗∗
---------------------------------------------
This advisory includes mitigations for a cross-site scripting vulnerability in GEOVAPs Reliance 4 SCADA/HMI system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-298-01
∗∗∗ Advantech WebAccess ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow, and improper access control vulnerabilities in Advantechs WebAccess.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-298-02
∗∗∗ Cisco Advanced Malware Protection for Endpoints on Windows DLL Preloading Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the DLL loading component of Cisco Advanced Malware Protection (AMP) for Endpoints on Windows could allow an authenticated, local attacker to disable system scanning services or take other actions to prevent detection of unauthorized intrusions.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (firefox), CentOS (firefox), Debian (389-ds-base, openjdk-8, thunderbird, and xorg-server), Fedora (firefox), openSUSE (GraphicsMagick, jhead, mysql-community-server, ntp, postgresql96, python-cryptography, rust, tomcat, webkit2gtk3, and zziplib), Scientific Linux (firefox), and SUSE (clamav, firefox, ImageMagick, libgit2, net-snmp, smt, wpa_supplicant, and xorg-x11-server).
---------------------------------------------
https://lwn.net/Articles/769613/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (xorg-server), Debian (graphicsmagick, libmspack, paramiko, ruby2.1, teeworlds, and tiff), Fedora (lldpad), Mageia (bitcoin, blueman, busybox, dhcp, exempi, firefox, kernel, kernel-linus, kernel-tmb, lilypond, ruby, and x11-server), openSUSE (audiofile, clamav, hostapd, ImageMagick, lcms2, libgit2, mercurial, net-snmp, and wpa_supplicant), SUSE (audiofile, binutils, kdelibs3, lcms2, mysql, openssh, and xen), and Ubuntu (mysql-5.5 and xorg-server, [...]
---------------------------------------------
https://lwn.net/Articles/769891/
∗∗∗ WebKitGTK+ 2.22.3 released! ∗∗∗
---------------------------------------------
This is a bug fix release in the stable 2.22 series. What’s new in the WebKitGTK+ 2.22.3 release? [...] Fix a memory leak during media playback when using playbin3. Fix portions of Web views not being rendered after resizing. Fix Resource Timing reporting for elements. Fix the build with the remote Web Inspector [...]
---------------------------------------------
https://webkitgtk.org/2018/10/29/webkitgtk2.22.3-released.html
∗∗∗ OpenSSL: Eine Schwachstelle ermöglicht das Ausspähen des privaten Schlüssels ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2188/
∗∗∗ IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Release 1801r ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737409
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability affects IBM® Rational® Team Concert ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737301
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability in CacheMonitor for WebSphere Application Server (CVE-2018-1767) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729547
∗∗∗ Microsoft Skype for Business Audio File Processing Flaw Lets Remote Users Execute Arbitrary Code ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041956
∗∗∗ Apache Tomcat vulnerability CVE-2018-11784 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K64921482
∗∗∗ Mozilla NSS vulnerability CVE-2018-12384 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41738501
∗∗∗ HPESBMU03895 rev.1 - HPE Real Time Management System (RTMS), Multiple Remote Security Issues ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03869 rev.1 - HPE Windows Firmware Installer for certain HPE Gen9,Gen8, G7, and G6 Servers, Local Disclosure of Privileged Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-10-2018 18:00 − Donnerstag 25-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ sLoad Banking Trojan Downloader Displays Sophisticated Recon and Targeting ∗∗∗
---------------------------------------------
The sLoad downloader is an example of the stealthy, smart malware trend.
---------------------------------------------
https://threatpost.com/sload-banking-trojan-downloader-displays-sophisticat…
∗∗∗ Magecart Cybergang Targets 0days in Third-Party Magento Extensions ∗∗∗
---------------------------------------------
Over two dozen third-party ecommerce plugins contain zero-day vulnerabilities being exploited in a recent Magecart campaign.
---------------------------------------------
https://threatpost.com/magecart-cybergang-targets-0days-in-third-party-mage…
∗∗∗ BSI-Mindeststandard zur Protokollierung und Detektion von Cyber-Angriffen ∗∗∗
---------------------------------------------
Cyber-Angriffe auf die IT-Systeme der Bundesverwaltung finden täglich statt. Neben ungezielten Massenangriffen sind die Netze des Bundes auch gezielten Angriffskampagnen ausgesetzt. Um die Detektion von Cyber-Angriffen zu verbessern, hat das Bundesamt für Sicherheit in der Informationstechnik (BSI) einen Mindeststandard zur Protokollierung und der darauf basierenden Erkennung von Cyber-Angriffen definiert.
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Mindeststan…
∗∗∗ EU-Kommission will Zertifizierung für sichere Internetgeräte schaffen ∗∗∗
---------------------------------------------
Die EU arbeitet an einer Verordnung zur Sicherheitszertifizierung, die insbesondere die Geräte im Internet of Things in den Blick nimmt.
---------------------------------------------
http://heise.de/-4202642
∗∗∗ Sicherheitsupdate: Gefährliche Lücke in Cisco Webex Meetings ∗∗∗
---------------------------------------------
Angreifer könnten den Update-Mechanismus von Webex missbrauchen, um eigenen Code auszuführen. Ein Sicherheitsupdate schließt die Schwachstelle.
---------------------------------------------
http://heise.de/-4202886
∗∗∗ Gandcrab: Aktualisiertes Entschlüsselungstool für Erpressungstrojaner ∗∗∗
---------------------------------------------
Opfer der Ransomware Gandcrab in den Versionen 1, 4 und 5 können ihre Daten nun kostenlos entschlüsseln.
---------------------------------------------
http://heise.de/-4203283
∗∗∗ Sextortion emails: They're probably not watching you ∗∗∗
---------------------------------------------
Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.
---------------------------------------------
https://blog.malwarebytes.com/101/2018/10/sextortion-emails-theyre-probably…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Webex Meetings Desktop App Update Service Command Injection Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Xen Security Advisory 278 v1 - x86: Nested VT-x usable even when disabled ∗∗∗
---------------------------------------------
When running HVM guests, virtual extensions are enabled in hardware because Xen is using them. As a result, a guest can blindly execute the virtualisation instructions, and will exit to Xen for processing.
---------------------------------------------
https://lists.xenproject.org/archives/html/xen-announce/2018-10/msg00000.ht…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (389-ds-base, clamav, firefox-esr, and mosquitto), openSUSE (Chromium and firefox), Oracle (firefox and kernel), Red Hat (chromium-browser, firefox, java-1.6.0-sun, java-1.7.0-oracle, and java-1.8.0-oracle), SUSE (dom4j, exempi, mercurial, ntp, python-cryptography, tiff, tomcat, and webkit2gtk3), and Ubuntu (audiofile and firefox).
---------------------------------------------
https://lwn.net/Articles/769529/
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSH affects AIX (CVE-2018-15473) Security Bulletin ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733751
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM OS Image for Red Hat Linux Systems on IBM PureApplication ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728607
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Platform Symphony and IBM Spectrum Symphony ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10732846
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in WebSphere Application Server Admin Console affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1770, CVE-2018-1777) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737065
∗∗∗ IBM Security Bulletin: Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/support/docview.wss?uid=ibm10735863
∗∗∗ IBM Security Bulletin: A vulnerability in Samba affects IBM OS Image for Red Hat Linux Systems on IBM PureApplication (CVE-2018-1050) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728649
∗∗∗ IBM Security Bulletin : IBM Storwize V7000 Unified is affected by multiple GSKit vulnerabilities in GPFS ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734249
∗∗∗ IBM Security Bulletin: IBM Security Access Manager is affected by multiple vulnerabilities in GSKit ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22016890
∗∗∗ IBM Security Bulletin: IBM WebSphere Commerce could allow some server-side code injection (CVE-2018-1808) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735905
∗∗∗ Reflected XSS vulnerability in an undisclosed Configuration utility page CVE-2018-15315 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41704442
Next End-of-Day report: 2018-10-29
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-10-2018 18:00 − Mittwoch 24-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ The Key New Security Features & Capabilities to Know in Windows 10 ∗∗∗
---------------------------------------------
Last year's WannaCry and Petya malware outbreaks couldn't breach Windows 10's latest security defenses, but companies still running outdated [...]
---------------------------------------------
https://www.beyondtrust.com/blog/key-new-security-features-in-windows-10/
∗∗∗ Hacker Discloses New Windows Zero-Day Exploit On Twitter ∗∗∗
---------------------------------------------
A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released another proof-of-concept exploit for a new Windows zero-day vulnerability.
---------------------------------------------
https://thehackernews.com/2018/10/windows-zero-day-exploit.html
∗∗∗ Sicherheitsupdates: Backup-Software von Arcserve kann Daten leaken ∗∗∗
---------------------------------------------
Angreifer könnten unberechtigt auf Daten von Host-Systemen, auf denen die Backup-Lösung Arcserve Unified Data Protection läuft, zugreifen.
---------------------------------------------
http://heise.de/-4202167
∗∗∗ Einkaufsbetrug mit gefälschten Smile Bank-Nachrichten ∗∗∗
---------------------------------------------
Privatverkäufer/innen erhalten Nachrichten von Kriminellen. Sie geben vor, im Ausland zu sein und wollen die angebotene Ware kaufen. Sie überweisen angeblich einen überhöhten Geldbetrag an ihre Vertragspartner/innen. Das sollen gefälschte Smile Bank-Nachrichten belegen. Schließlich sollen Verkäufer/innen den Differenzbetrag und die Ware ins Ausland senden. Dadurch verlieren sie ihre personenbezogenen Daten, ihr Geld und ihre Produkte an Betrüger/innen.
---------------------------------------------
https://www.watchlist-internet.at/news/einkaufsbetrug-mit-gefaelschten-smil…
∗∗∗ Nike-Markenfälscher auf coldenemy.com ∗∗∗
---------------------------------------------
Die neuesten Schuhe von Nike um 70 Prozent vergünstigt? Das gibt's auf coldenemy.com. Wer hier bestellt, erhält minderwertige Ware, die nichts mit dem gekauften Produkt zu tun hat. Außerdem gelangen Kredit- und Personendaten in die Hände von Kriminellen.
---------------------------------------------
https://www.watchlist-internet.at/news/nike-markenfaelscher-auf-coldenemyco…
=====================
= Vulnerabilities =
=====================
∗∗∗ Advantech WebAccess ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow, external control of file name or path, improper privilege management, and path traversal vulnerabilities in Advantechs WebAccess.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-01
∗∗∗ GAIN Electronic Co. Ltd SAGA1-L Series ∗∗∗
---------------------------------------------
This advisory includes mitigations for authentication bypass by capture-relay, improper access control, and improper authentication vulnerabilities in GAIN Electronics SAGA1-L series transmitters.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-02
∗∗∗ Telecrane F25 Series ∗∗∗
---------------------------------------------
This advisory includes mitigations for an authentication bypass by capture-replay vulnerability in the Telecrane F25 Series software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-03
∗∗∗ BitDefender Digital Signature Bypass Lets Remote Users Execute Arbitrary Code ∗∗∗
---------------------------------------------
A remote user can cause arbitrary code that is located elsewhere to be executed on the target users system due to a bypass of the digital signature GravityZone verification tools. Additional information is available at: https://labs.nettitude.com/blog/cve-2018-8955-bitdefender-gravityzone-arbit…
---------------------------------------------
https://www.securitytracker.com/id/1041940
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (hesiod, lighttpd, and opencc), openSUSE (apache-pdfbox, net-snmp, pam_pkcs11, rpm, tiff, udisks2, and wireshark), SUSE (dhcp, ghostscript-library, ImageMagick, libraw, net-snmp, ntp, postgresql96, rust, tiff, xen, and zziplib), and Ubuntu (mysql-5.5, mysql-5.7).
---------------------------------------------
https://lwn.net/Articles/769415/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ October 23, 2018 TNS-2018-13 [R1] LCE 5.1.1 Fixes Multiple Third-party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2018-13
∗∗∗ October 23, 2018 TNS-2018-14 [R1] Nessus 8.0.0 Fixes Multiple Third-party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2018-14
∗∗∗ Security vulnerabilities fixed in Firefox ESR 60.3 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-27/
∗∗∗ Security vulnerabilities fixed in Firefox 63 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-26/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 22-10-2018 18:00 − Dienstag 23-10-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malicious Powershell using a Decoy Picture ∗∗∗
---------------------------------------------
I found another interesting piece of malicious Powershell while hunting. The file size is 1.3MB and most of the file is a PE file Base64 encoded. You can immediately detect it by checking the first characters of the string: [...]
---------------------------------------------
https://isc.sans.edu/forums/diary/Malicious+Powershell+using+a+Decoy+Pictur…
∗∗∗ Jetzt patchen! Scanner und Exploits für kritische libssh-Lücke aufgetaucht ∗∗∗
---------------------------------------------
Da das Angriffsrisiko wächst, sollten Admins zügig die aktuelle libssh-Version auf Servern installieren.
---------------------------------------------
http://heise.de/-4198976
∗∗∗ Serverless botnets could soon become reality ∗∗∗
---------------------------------------------
We have been accustomed to think about botnets as a network of compromised machines – personal devices, IoT devices, servers – waiting for their masters' orders to begin their attack, but Protego researchers say that many compromised machines are definitely not a requirement: botnets can quite as easily be comprised of serverless functions.
---------------------------------------------
https://www.helpnetsecurity.com/2018/10/23/serverless-botnets/
∗∗∗ Who Is Agent Tesla? ∗∗∗
---------------------------------------------
A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity - attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malwares apparent creator seems to have done little to hide his real-life identity.
---------------------------------------------
https://krebsonsecurity.com/2018/10/who-is-agent-tesla/
∗∗∗ Betrug mit Euro-Lottosystem & Goggins-Transport ∗∗∗
---------------------------------------------
Konsument/innen erhalten eine betrügerische E-Mail, in der es heißt, dass sie bei einem Euro-Lottosystem 97.000 Euro gewonnen haben. Sie sollen Geld an Goggings-Transport bezahlen, damit sie den Preis ausbezahlt bekommen. Es folgen weitere Zahlungsaufforderungen. Mit jeder Bezahlung verliert das Opfer Geld, denn den Gewinn gibt es nicht.
---------------------------------------------
https://www.watchlist-internet.at/news/betrug-mit-euro-lottosystem-goggins-…
∗∗∗ Konsolen-kobold.de liefert keine Ware! ∗∗∗
---------------------------------------------
Kaufen Sie nicht auf konsolen-kobold.de ein. Die dort angebotenen Playstations, Xboxen, Nintendos und Spiele sind zwar verlockend günstig, werden aber auch nicht geliefert! Bezahlt wird per Vorkasse und Ihr Geld ist somit weg.
---------------------------------------------
https://www.watchlist-internet.at/news/konsolen-koboldde-liefert-keine-ware/
∗∗∗ CVE-2018–8414: A Case Study in Responsible Disclosure ∗∗∗
---------------------------------------------
The process of vulnerability disclosure can be riddled with frustrations, concerns about ethics, and communication failure. I have had tons of bugs go well. I have had tons of bugs go poorly.
---------------------------------------------
https://posts.specterops.io/cve-2018-8414-a-case-study-in-responsible-discl…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (java-1.8.0-openjdk), Fedora (mosquitto), openSUSE (binutils, clamav, exiv2, fuse, haproxy, singularity, and zziplib), Slackware (firefox), SUSE (apache-pdfbox, net-snmp, pam_pkcs11, postgresql94, rpm, tiff, and wireshark), and Ubuntu (kernel, libssh, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-azure, linux-lts-trusty, linux-lts-xenial, linux-aws, net-snmp, paramiko, requests, and texlive-bin).
---------------------------------------------
https://lwn.net/Articles/769300/
∗∗∗ IBM Security Bulletin: IBM BladeCenter Switch Modules are affected by information disclosure vulnerability (CVE-2014-8730) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10736107
∗∗∗ IBM Security Bulletin: IBM Integrated Management Module II (IMM2) is affected by vulnerability in OpenSLP (CVE-2017-17833) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735359
∗∗∗ IBM Security Bulletin: Vulnerabilities in GNU OpenSSL affect IBM Netezza Analytics ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734825
∗∗∗ IBM Security Bulletin: IBM WebSphere Commerce could allow a remote attacker to obtain sensitive information (CVE-2018-1811) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735589
∗∗∗ IBM Security Bulletin: An Information Disclosure Vulnerability affects WebSphere Commerce (CVE-2018-1809) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732972
∗∗∗ IBM Security Bulletin: A authenticated open redirect vulnerability affects IBM WebSphere Commerce Accelerator Tool (CVE-2018-1807) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735581
∗∗∗ IBM Security Bulletin: An Information Disclosure Vulnerability affects WebSphere Commerce (CVE-2018-1806) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733149
∗∗∗ IBM Security Bulletin: A cross site scripting vulnerability affects IBM WebSphere Commerce Accelerator tool (CVE-2018-1541) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731225
∗∗∗ IPsec IKEv1 vulnerability CVE-2018-5389 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K42378447
∗∗∗ Linux kernel vulnerability CVE-2018-14634 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20934447
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 19-10-2018 18:00 − Montag 22-10-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Remote Code Execution Flaws Found in FreeRTOS - Popular OS for Embedded Systems ∗∗∗
---------------------------------------------
FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/remote-code-execution-flaws-…
∗∗∗ Sicherheitsupdate: Ein Klick zu viel und Microsoft Yammer führt Schadcode aus ∗∗∗
---------------------------------------------
Es gibt einen wichtigen Patch für die Desktop-Anwendung von Yammer.
---------------------------------------------
http://heise.de/-4198055
∗∗∗ Jetzt patchen! Kritische Lücke in den Mediaplayern VLC und MPlayer ∗∗∗
---------------------------------------------
Angreifer könnten Nutzer der Medienabspieler VLC und MPlayer mit vergleichsweise wenig Aufwand attackieren.
---------------------------------------------
http://heise.de/-4198129
∗∗∗ l+f: Snackautomaten-Flatrate ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher wird zum Snackosaurus.
---------------------------------------------
http://heise.de/-4198336
∗∗∗ TCP/IP, Sockets, and SIGPIPE ∗∗∗
---------------------------------------------
There is a spectre haunting the Internet - the spectre of SIGPIPE errors. Its a bug in the original design of Unix networking from 1981 that is perpetuated by college textbooks, which teach students to ignore it. As a consequence, sometimes software unexpectedly crashes. This is particularly acute on industrial and medical networks, where security professionals cant run port/security scans for fear of crashing critical devices.
---------------------------------------------
https://blog.erratasec.com/2018/10/tcpip-sockets-and-sigpipe.html
∗∗∗ Warnung vor verda-maehroboter.de ∗∗∗
---------------------------------------------
Der betrügerische Online-Shop verda-maehroboter.de verkauft günstige Mähroboter und Rasentraktoren. Wer bei ihm einkauft, verliert sein Geld und seine Identität an Verbrecher/innen. Zu einer Warenlieferung kommt es nicht. Der Fake-Shop verda-maehroboter.de ist mithilfe einer Internetrecherche, eines Preisvergleichs und einer Überprüfung der Zahlungsmethoden erkennbar.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-verda-maehroboterde/
∗∗∗ Let's talk about PAKE ∗∗∗
---------------------------------------------
The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password Authenticated Key Exchange — is actually one of the most useful technologies that (almost) never gets used. It should be deployed everywhere, and yet it isn't.
---------------------------------------------
https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/
=====================
= Vulnerabilities =
=====================
∗∗∗ libssh Authentication Bypass Vulnerability Affecting Cisco Products: October 2018 ∗∗∗
---------------------------------------------
A vulnerability in libssh could allow an unauthenticated, remote attacker to bypass authentication on a targeted system.The vulnerability is due to improper authentication operations by the server-side state machine of the affected software. An attacker could exploit this vulnerability by presenting a SSH2_MSG_USERAUTH_SUCCESS message to a targeted system. A successful exploit could allow the attacker to bypass authentication and gain unauthorized access to a targeted system.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ SECURITY BULLETIN: Trend Micro Antivirus for Mac (Consumer) Privilege Escalation Vulnerabilities ∗∗∗
---------------------------------------------
Trend Micro has released fixes for the Trend Micro Antivirus for Mac family of consumer products which resolve vulnerabilities that could allow an attacker to escalate privileges on a vulnerable system that they otherwise would not have had access to.
---------------------------------------------
https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (thunderbird), Debian (drupal7, exiv2, and ghostscript), Fedora (apache-commons-compress, git, libssh, and patch), Mageia (389-ds-base, calibre, clamav, docker, ghostscript, glib2.0, libtiff, mgetty, php-smarty, rust, tcpflow, and vlc), openSUSE (Chromium, icinga, and libssh), and SUSE (clamav, fuse, GraphicsMagick, haproxy, libssh, thunderbird, tomcat, udisks2, and Xerces-c).
---------------------------------------------
https://lwn.net/Articles/769163/
∗∗∗ IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU – Jul 2018 – Includes Oracle Jul 2018 CPU affects IBM Tivoli Composite Application Manager for Transactions ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735807
∗∗∗ IBM Security Bulletin: Vulnerabilities in GNU binutils affect IBM Netezza Analytics ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733785
∗∗∗ BIG-IP-reflected XSS vulnerability in an undisclosed Configuration utility page CVE-2018-15315 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41704442
∗∗∗ PEPPERL+FUCHS ecom Mobile devices prone to Android privilege elevation vulnerability ∗∗∗
---------------------------------------------
https://cert.vde.com/de-de/advisories/vde-2018-016
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 18-10-2018 18:00 − Freitag 19-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ SSH Key Management Overview & 6 Best Practices ∗∗∗
---------------------------------------------
Secure Socket Shell (SSH), also called Secure Shell, is a special network protocol leveraging ..
---------------------------------------------
https://www.beyondtrust.com/blog/ssh-key-management-overview-6-best-practic…
∗∗∗ How we discovered a Ukranian cybercrime hotspot ∗∗∗
---------------------------------------------
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/10/31187-ukranian-cybercrime-hotspo…
∗∗∗ The Underground Job Market ∗∗∗
---------------------------------------------
"Leave your ego at the door every morning, and just do some truly great work. Few things will make you feel better than a job brilliantly done." Robin S. Sharma The last time we visited the ..
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/The-Underground-Job-Market/
∗∗∗ Hack.lu 2018 Wrap-Up Day #3 ∗∗∗
---------------------------------------------
Here we go with the last wrap-up of the 2018 edition! The first presentation was about worms: “Worms that turn: nematodes and neotodes” by Matt Wixey. The first slide contained the mention: “for educational purposes only”. What could we ..
---------------------------------------------
https://blog.rootshell.be/2018/10/18/hack-lu-2018-wrap-up-day-3/
∗∗∗ Jetzt patchen! Kritische Lücken in Drupal gefährden ganze Websites ∗∗∗
---------------------------------------------
Aufgrund von mehreren Schwachstellen sollten Web-Admins zügig ihre Drupal-Installation auf den aktuellen Stand bringen.
---------------------------------------------
http://heise.de/-4196243
∗∗∗ Sicherheitslücke in jQuery-File-Upload Plug-in macht unzählige Server verwundbar ∗∗∗
---------------------------------------------
Es ist ein wichtiges Sicherheitsupdate für das jQuery-File-Upload-Plug-in erschienen. Eine globale Installation ist jedoch utopisch.
---------------------------------------------
http://heise.de/-4196771
∗∗∗ Encrypted SNI Comes to Firefox Nightly ∗∗∗
---------------------------------------------
TL;DR: Firefox Nightly now supports encrypting the TLS Server Name Indication (SNI) extension, which helps prevent attackers on your network from learning your browsing history. You can enable encrypted SNI today and ..
---------------------------------------------
https://blog.mozilla.org/security/2018/10/18/encrypted-sni-comes-to-firefox…
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4323 drupal7 - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4323
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 17-10-2018 18:00 − Donnerstag 18-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hack.lu 2018 Wrap-Up Day #2 ∗∗∗
---------------------------------------------
The second day started early with an eye-opener talk: “IPC – the broken dream of inherent security” by Thanh Bui. IPC or “Inter-Process Communications” are everywhere. You can compare them as a network connection between a ..
---------------------------------------------
https://blog.rootshell.be/2018/10/17/hack-lu-2018-wrap-up-day-2/
∗∗∗ Sicherheitslücken-Cocktail bringt D-Link-Router zu Fall ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher kombiniert drei Sicherheitslücken und erlangt die volle Kontrolle über D-Link-Router. Patches gibt es noch nicht.
---------------------------------------------
http://heise.de/-4195134
∗∗∗ Distrust of the Symantec PKI: Immediate action needed by site operators ∗∗∗
---------------------------------------------
Chrome 70 has now been released to the Stable Channel, and users will start to see full screen interstitials on sites which still use certificates issues by the Legacy Symantec ..
---------------------------------------------
https://security.googleblog.com/2018/03/distrust-of-symantec-pki-immediate.…
∗∗∗ VestaCP compromised in a new supply-chain attack ∗∗∗
---------------------------------------------
Customers see their admin credentials stolen and their servers infected with ..
---------------------------------------------
https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-dist…
=====================
= Vulnerabilities =
=====================
∗∗∗ TYPO3-PSA-2018-001: By-passing Protection of PharStreamWrapper Interceptor ∗∗∗
---------------------------------------------
It has been discovered that the protection against insecure deserialization can be by-passed in PharStreamWrapper component.
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2018-001/
∗∗∗ Drupal Core - Multiple Vulnerabilities - SA-CORE-2018-006 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-core-2018-006
∗∗∗ Drupal Core - 3rd-party libraries -SA-CORE-2018-005 ∗∗∗
---------------------------------------------
https://www.drupal.org/SA-CORE-2018-005
∗∗∗ HTML Mail - Critical - Remote Code Execution - SA-CONTRIB-2018-069 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-069
∗∗∗ Mime Mail - Critical - Remote Code Execution - SA-CONTRIB-2018-068 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-068
∗∗∗ Cisco Wireless LAN Controller Software Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 16-10-2018 18:00 − Mittwoch 17-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Injecting Code into Windows Protected Processes using COM - Part 1 ∗∗∗
---------------------------------------------
Posted by James Forshaw, Google Project ZeroAt Recon Montreal 2018 I presented "Unknown Known DLLs and other Code Integrity Trust Violations" with Alex Ionescu. We described the implementation of Microsoft Windows' Code Integrity mechanisms and how Microsoft implemented Protected Processes (PP). As part of that I demonstrated various ways of bypassing Protected Process Light (PPL), some requiring administrator privileges, others not.
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/10/injecting-code-into-windows-…
∗∗∗ Multiple D-Link Routers Open to Complete Takeover with Simple Attack ∗∗∗
---------------------------------------------
The vendor only plans to patch two of the eight impacted devices, according to a researcher.
---------------------------------------------
https://threatpost.com/multiple-d-link-routers-open-to-complete-takeover-wi…
∗∗∗ Party like its 1987... SVGA code bug haunts VMwares house, lets guests flee to host OS ∗∗∗
---------------------------------------------
Malicious code in VMs can leap over ESXi, Workstation, Fusion hypervisor security Get busy, VMware admins and users: the virtualisation virtuoso has patched a programming blunder in ESXi, Workstation Pro and Player, and Fusion and Fusion Pro products that can be exploited by malicious code to jump from guest OS to host machine.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/10/17/vmware_svga…
∗∗∗ Warnung vor gefälschtem A1-Update ∗∗∗
---------------------------------------------
Konsument/innen erhalten eine angebliche Nachricht von A1, in der es heißt, dass der Mobilfunkanbieter ein Update für sie bereit stellt. Kund/innen sollen es installieren, damit sie weiterhin das Mobilfunknetz des Anbieters nutzen können. Kommen sie der Aufforderung nach, installieren sie Schadsoftware auf ihrem Smartphone.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-gefaelschtem-a1-update/
∗∗∗ IT-Sicherheit - 100.000 Geräte: "Netter" Hacker entfernt ungefragt Sicherheitslücken ∗∗∗
---------------------------------------------
Seit April sind verheerende Sicherheitslücken bei Routern der Marke Mikrotik bekannt - vom Hersteller gibt es kein Update
---------------------------------------------
https://derstandard.at/2000089517357/Netter-Hacker-entfernt-ungefragt-Siche…
∗∗∗ Persistent Credential Theft with Authorization Plugins ∗∗∗
---------------------------------------------
Credential theft is often one of the first tactics leveraged by attackers once they’ve escalated privileges on a victim’s machine. Credential theft on OSX has become more difficult with the introduction of System Integrity Protection (SIP). Attackers can no longer use methods such as extracting the master keys from the securityd process and decrypting the victim’s login keychain. An example of this can be seen here.
---------------------------------------------
https://posts.specterops.io/persistent-credential-theft-with-authorization-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Omron CX-Supervisor ∗∗∗
---------------------------------------------
This advisory includes mitigations for improper restriction of operations within the bounds of a memory buffer, out-of-bounds read, use-after-free, and incorrect type conversion or cast vulnerabilities in Omrons CX-Supervisor software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01
∗∗∗ Authentication bypass in server code in libssh ∗∗∗
---------------------------------------------
There is a vulnerability within the server code which can enable a client to bypass the authentication process and set the internal state machine maintained by the library to authenticated, enabling the (otherwise prohibited) creation of channels.
---------------------------------------------
https://www.libssh.org/security/advisories/CVE-2018-10933.txt
∗∗∗ VMSA-2018-0026 ∗∗∗
---------------------------------------------
VMware ESXi, Workstation, and Fusion updates address an out-of-bounds read vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0026.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (tomcat), Debian (asterisk, graphicsmagick, and libpdfbox-java), openSUSE (apache2 and git), Oracle (tomcat), Red Hat (kernel and Satellite 6.4), Slackware (libssh), SUSE (binutils, ImageMagick, and libssh), and Ubuntu (clamav, libssh, moin, and paramiko).
---------------------------------------------
https://lwn.net/Articles/768617/
∗∗∗ Synology-SA-18:55 DSM ∗∗∗
---------------------------------------------
A vulnerability allows remote authenticated users to obtain sensitive information via a susceptible version of Synology Diskstation Manager (DSM).
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_55
∗∗∗ Oracle Critical Patch Update Advisory - October 2018 ∗∗∗
---------------------------------------------
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
∗∗∗ Solaris Third Party Bulletin - October 2018 ∗∗∗
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/bulletinoct2018-5139632.h…
∗∗∗ Security Advisory - Information Leak Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181017-…
∗∗∗ HPESBHF03891 rev.1 - HPE UIoT, Remote Unauthorized Access ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 15-10-2018 18:00 − Dienstag 16-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ pEp-Foundation hat Sicherheitslücke in Enigmail/pEp geschlossen ∗∗∗
---------------------------------------------
Die pEp-Foundation hat eine Sicherheitslücke gestopft: Das Add-on Enigmail unter Windows hatte vorgeblich verschlüsselte Mails im Klartext verschickt.
---------------------------------------------
http://heise.de/-4191426
∗∗∗ Android 9 Pie: Google knüpft Backup-Verschlüsselung an gerätespezifische Passcodes ∗∗∗
---------------------------------------------
Der Zugriff auf Anwendungsdaten in Androids Cloud-Backups erfordert künftig einen Entschlüsselungskey, den selbst Google nicht kennt.
---------------------------------------------
http://heise.de/-4191017
∗∗∗ Old dog, new tricks - Analysing new RTF-based campaign distributing Agent Tesla, Loki with PyREbox ∗∗∗
---------------------------------------------
Cisco Talos has discovered a new malware campaign that drops the sophisticated information-stealing trojan called "Agent Tesla," and other malware such as the Loki information stealer. Initially, Talos telemetry systems detected a ..
---------------------------------------------
https://blog.talosintelligence.com/2018/10/old-dog-new-tricks-analysing-new…
∗∗∗ Phishers are after something unusual in ploy targeting book publishers ∗∗∗
---------------------------------------------
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other ..
---------------------------------------------
http://feedproxy.google.com/~r/eset/blog/~3/lABhPeu59as/
∗∗∗ Fake-Shop-Alarm auf macbooks-billiger.de ∗∗∗
---------------------------------------------
Auf macbooks-billiger.de werden Apple-Produkte, wie MacBooks, iPhones, Apple Watches und iPads zu konkurrenzlos günstigen Preisen angeboten. Wie das geht, fragen Sie? Die Antwort lautet „Betrug!“. Sie ..
---------------------------------------------
https://www.watchlist-internet.at/index.php?id=71&tx_news_pi1[news]=3169&tx…
∗∗∗ Removing Old Versions of TLS ∗∗∗
---------------------------------------------
In March of 2020, Firefox will disable support for TLS 1.0 and TLS 1.1. On the Internet, 20 years is an eternity. TLS 1.0 will be 20 years old in January 2019. In that time, TLS has protected ..
---------------------------------------------
https://blog.mozilla.org/security/2018/10/15/removing-old-versions-of-tls/
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4319 spice - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4319
∗∗∗ DSA-4318 moin - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4318
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 12-10-2018 18:00 − Montag 15-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: Dimitri Robl
=====================
= News =
=====================
∗∗∗ l+f: Krypto-Miner hegt und pflegt Flash ∗∗∗
---------------------------------------------
Ein Trojaner tut erst Gutes und dann Böses.
---------------------------------------------
http://heise.de/-4190878
∗∗∗ Patching, Re-Patching and Meta-Patching the Jet Database Engine RCE (CVE-2018-8423) ∗∗∗
---------------------------------------------
Flawed Patches Will Always Happen, But We Can Change How They Get Fixed by Mitja Kolsek, the 0patch TeamTL;DR: Microsoft patched CVE-2018-8423 eighteen days after we had micropatched it. Their official patch turned out to be incomplete so we re-micropatched it.This is a story about a Windows vulnerability that was reported to Microsoft, published as "0day" before the official patch was available, micropatched by us one day later, subsequently patched by Microsoft, found to be [...]
---------------------------------------------
https://blog.0patch.com/2018/10/patching-re-patching-and-meta-patching.html
∗∗∗ Datendiebstahl mit gefälschter WhatsApp-Rechnung ∗∗∗
---------------------------------------------
Datendiebe versenden eine gefälschte WhatsApp-Rechnung per E-Mail. Darin behaupten sie in betrügerischer Absicht, dass Konsument/innen für den Messenger bezahlen müssen. Dazu sollen sie auf einer Website ihre Kreditkartendaten und ihren TAN-Code bekannt geben. Das führt zur Übermittlung der Informationen an Kriminelle. Dadurch verlieren Opfer ihr Geld und ihre Identität an Datendiebe.
---------------------------------------------
https://www.watchlist-internet.at/news/datendiebstahl-mit-gefaelschter-what…
∗∗∗ IT-Security - "PHP-Zeitbombe": 62 Prozent aller Internetseiten sind bald unsicher ∗∗∗
---------------------------------------------
Mit Ende des Jahres endet der Support für PHP 5.6, das immer noch vielfach genutzt wird
---------------------------------------------
https://derstandard.at/2000089376436/PHP-Zeitbombe-62-Prozent-aller-Interne…
=====================
= Vulnerabilities =
=====================
∗∗∗ MS-ISAC Releases Advisory on PHP Vulnerabilities ∗∗∗
---------------------------------------------
The Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an advisory on multiple Hypertext Preprocessor (PHP) vulnerabilities. An attacker could exploit some of these vulnerabilities to take control of an affected system.NCCIC encourages users and administrators to review MS-ISAC Advisory 2018-113 and the PHP Downloads page and apply the necessary updates.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/10/12/MS-ISAC-Releases-A…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (wireshark-cli), Debian (imagemagick, otrs2, tomcat7, and wireshark), Fedora (ca-certificates, dislocker, dolphin-emu, kernel-headers, kernel-tools, libgit2, mbedtls, mingw-openjpeg2, nekovm, openjpeg2, patch, strongswan, and thunderbird), Mageia (firefox, git, nextcloud, and texlive), Oracle (kernel and openssl), Scientific Linux (spamassassin), SUSE (libtirpc), and Ubuntu (requests).
---------------------------------------------
https://lwn.net/Articles/768406/
∗∗∗ Security Advisory - Arbitrary Memory Read Write Vulnerability in Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170306-…
∗∗∗ IBM Security Bulletin: Vulnerability CVE-2018-11763 in the IBM i HTTP Server affects IBM i. ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735045
∗∗∗ IBM Security Bulletin: Potential cross-site scripting vulnerability in the WebSphere Application Server Admin Console (CVE-2018-1777) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730631
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 11-10-2018 18:00 − Freitag 12-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Jetzt patchen! Proof-of-Concept-Code für Windows-Lücke veröffentlicht ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher zeigt, wie er mit einem vergleichsweise simplen Skript aus dem Browser Edge heraus eine andere Anwendung startet.
---------------------------------------------
http://heise.de/-4189565
∗∗∗ Adaptable, All-in-One Android Trojan Shows the Future of Malware ∗∗∗
---------------------------------------------
GPlayed may be the new face of malware -- flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.
---------------------------------------------
https://threatpost.com/adaptable-all-in-one-android-trojan-shows-the-future…
∗∗∗ New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors ∗∗∗
---------------------------------------------
Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.
---------------------------------------------
https://threatpost.com/new-drupalgeddon-attacks-enlist-shellbot-to-open-bac…
∗∗∗ Google Adds Control-Flow Integrity to Beef up Android Kernel Security ∗∗∗
---------------------------------------------
Google has added a new security feature to the latest Linux kernels for Android devices to prevent it against code reuse attacks that allow attackers to achieve arbitrary code execution by exploiting control-flow hijacking vulnerabilities.
---------------------------------------------
https://thehackernews.com/2018/10/android-linux-kernel-cfi.html
∗∗∗ AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide ∗∗∗
---------------------------------------------
This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States. In it we highlight the use of five publicly available tools, which have been used for malicious purposes in recent cyber incidents around the world.
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/AA18-284A
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (net-snmp), Fedora (php-horde-nag), openSUSE (git, java-1_8_0-openjdk, libxml2, mgetty, moinmoin-wiki, postgresql10, and soundtouch), Oracle (spamassassin), Red Hat (spamassassin), SUSE (apache2, axis, kernel, libX11 and libxcb, and texlive), and Ubuntu (clamav, git, and texlive-bin).
---------------------------------------------
https://lwn.net/Articles/768244/
∗∗∗ NUUO NVRmini2 and NVRsolo ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow and leftover debug code vulnerabilities in NUUOs NVRmini2 and NVRsolo network video recorders.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-284-01
∗∗∗ NUUO CMS ∗∗∗
---------------------------------------------
This advisory includes mitigations for use of insufficiently random values, use of obsolete function, incorrect permission assignment for critical resource, and use of hard-coded credentials vulnerabilities in a NUUOs CMS software management platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02-NUUO-CMS
∗∗∗ Delta Industrial Automation TPEditor ∗∗∗
---------------------------------------------
This advisory includes mitigations for out-of-bounds write and stack-based buffer overflow vulnerabilities in the Delta Industrial Automation TPEditor software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-284-03
∗∗∗ Critical Patch Update - October 2018 - Pre-Release Announcement ∗∗∗
---------------------------------------------
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
∗∗∗ IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by a vulnerability in glibc (CVE-2018-11236) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734721
∗∗∗ IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by vulnerabilities in OpenSSH ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734739
∗∗∗ IBM Security Bulletin: Vulnerabilities in procps affect IBM BladeCenter Advanced Management Module (AMM) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733895
∗∗∗ IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by vulnerabilities in procps ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734741
∗∗∗ IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by a vulnerability in OpenSLP (CVE-2017-17833) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734657
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to Path Traversal (CVE-2018-1744) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733353
∗∗∗ IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by vulnerabilities in libjpeg ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734731
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to a XML External Entity Injection (XXE) attack (CVE-2018-1747) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733429
∗∗∗ IBM Security Bulletin: Vulnerabilities in Python affect IBM BladeCenter Advanced Management Module (AMM) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733909
∗∗∗ IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by vulnerabilities in ICU ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734727
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 10-10-2018 18:00 − Donnerstag 11-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ 5 Endpoint Threats Impacting Security ∗∗∗
---------------------------------------------
Introduction Endpoint threats pose serious security risks to many organizations. Companies are reporting attacks ranging from ransomware to phishing attacks. These attacks lead to the loss of customer data, resulting in massive damage to the company’s reputation, finances and structure.
---------------------------------------------
https://resources.infosecinstitute.com/5-endpoint-threats-impacting-securit…
∗∗∗ ICS Tactical Security Trends: Analysis of the Most Frequent SecurityRisks Observed in the Field ∗∗∗
---------------------------------------------
Introduction FireEye iSIGHT Intelligence compiled extensive data from dozens of ICS security health assessment engagements (ICS Healthcheck) performed by Mandiant, FireEyes consulting team, to identify the most pervasive and highest priority security risks in industrial facilities. The information was acquired from hands-on assessments carried out over the last few years across a broad range of industries [...]
---------------------------------------------
http://www.fireeye.com/blog/threat-research/2018/10/ics-tactical-security-t…
∗∗∗ DNS-Schlüsselwechsel: Wie man DNS-Ausfälle erkennt, was dagegen hilft ∗∗∗
---------------------------------------------
Am 11.10. wechselt die ICANN den DNS-Vertrauensanker. Dabei kann es zu Ausfällen von Internet-Diensten kommen. Wir fassen zusammen, was dagegen hilft.
---------------------------------------------
https://heise.de/-4187064
∗∗∗ Sicherheitsupdates: Junipers Junos OS offen für Fernzugriff ohne Passwort ∗∗∗
---------------------------------------------
In Junos OS klaffen zum Teil kritische Sicherheitslücken. Aktualisierte Versionen des Betriebssystems schließen die Schwachstellen.
---------------------------------------------
http://heise.de/-4188397
∗∗∗ Nicht bei saturn-media.net einkaufen ∗∗∗
---------------------------------------------
Saturn-media.net lockt mit günstigen Technikangeboten und versucht durch den Domain eine Verbindung zu den seriösen Anbietern Media Markt und Saturn herzustellen. Saturn-media.net hat jedoch nichts mit den genannten Anbietern zu tun, es handelt sich um einen Fakeshop. Sie erhalten keine Ware und verlieren ihr Geld!
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-bei-saturn-medianet-einkaufen/
=====================
= Vulnerabilities =
=====================
∗∗∗ Juniper Networks Releases Security Updates ∗∗∗
---------------------------------------------
Original release date: October 10, 2018 Juniper Networks has released security updates to address vulnerabilities affecting multiple Junos OS versions. An attacker could exploit some of these vulnerabilities to take control of an affected system.NCCIC encourages users and administrators to review the Juniper Security Advisories website and apply the necessary updates and workarounds. This product is provided subject to this Notification and this Privacy & Use policy.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/10/10/Juniper-Networks-R…
∗∗∗ NVP field - Moderately critical - Cross Site Scripting - SA-CONTRIB-2018-066 ∗∗∗
---------------------------------------------
Project: NVP fieldDate: 2018-October-10Security risk: Moderately critical 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescription: NVP field module allows you to create a field type of name/value pairs, with customtitles and easily editable rendering with customizable HTML/text surrounding the pairs.The module doesnt sufficiently handle sanitization of its field formatters output.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-066
∗∗∗ Search API Solr Search - Moderately critical - Access bypass - SA-CONTRIB-2018-065 ∗∗∗
---------------------------------------------
Project: Search API Solr SearchVersion: 7.x-1.13Date: 2018-October-10Security risk: Moderately critical 10∕25 AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypassDescription: This module provides support for creating searches using the Apache Solr search engine and the Search API Drupal module.The module doesnt sufficiently take the searched fulltext fields into account when creating a search excerpt.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-065
∗∗∗ Lightbox2 - Critical - Cross Site Scripting - SA-CONTRIB-2018-064 ∗∗∗
---------------------------------------------
Project: Lightbox2Version: 7.x-2.x-devDate: 2018-October-10Security risk: Critical 18∕25 AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescription: The Lightbox2 module enables you to overlay images on the current page.The module did not sanitize some inputs when used in combination with a custom view leading to potential Cross Site Scripting (XSS).Solution: Install the latest version [...]
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-064
∗∗∗ Teltonika RUT9XX Unauthenticated OS Command Injection ∗∗∗
---------------------------------------------
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.
---------------------------------------------
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319…
∗∗∗ Teltonika RUT9XX Reflected Cross-Site Scripting (XSS) ∗∗∗
---------------------------------------------
Teltonika RUT9XX routers with firmware before 00.05.01.1 are prone to cross-site scripting vulnerabilities in hotspotlogin.cgi due to insufficient user input sanitization.
---------------------------------------------
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180410…
∗∗∗ Teltonika RUT9XX Missing Access Control to UART Root Terminal ∗∗∗
---------------------------------------------
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
---------------------------------------------
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (dnsruby, gnulib, and jekyll), Fedora (calamares, fawkes, git, kernel-headers, librime, and pdns), openSUSE (ImageMagick), Oracle (kernel), Scientific Linux (glusterfs, kernel, and nss), Slackware (git), SUSE (ImageMagick), and Ubuntu (tomcat7, tomcat8).
---------------------------------------------
https://lwn.net/Articles/768145/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in GNU Binutils affect IBM Netezza Platform Software clients. ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728795
∗∗∗ IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Release 1801q ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731217
∗∗∗ IBM Security Bulletin: Potential bypass security vulnerability in Expression Language library used by WebSphere Application Server (CVE-2014-7810) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729557
∗∗∗ IBM Security Bulletin: Potential traversal vulnerability in IBM WebSphere Application Server Admin Console (CVE-2018-1770) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729521
∗∗∗ IBM Security Bulletin: IBM FileNet Content Manager component FileNet Deployment Manager security vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/support/docview.wss?uid=ibm10732755
∗∗∗ IBM Security Bulletin: Remote code execution vulnerability (CVE-2018-1260) affects IBM Spectrum Symphony 7.2.0.2 and 7.2.1 ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10731859
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerabilities affect Rational Publishing Engine ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734697
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 09-10-2018 18:00 − Mittwoch 10-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Zero-day exploit (CVE-2018-8453) used in targeted attacks ∗∗∗
---------------------------------------------
Yesterday, Microsoft published their security bulletin, which patches CVE-2018-8453, among others. It is a vulnerability in win32k.sys discovered by Kaspersky Lab in August. Microsoft confirmed the vulnerability and designated it CVE-2018-8453.
---------------------------------------------
https://securelist.com/cve-2018-8453-used-in-targeted-attacks/88151/
∗∗∗ Patchday: Zero-Day-Fix für Windows, kritische Exchange-Lücke ∗∗∗
---------------------------------------------
Im Oktober behebt Microsoft knapp 50 Sicherheitsprobleme. Darunter kritische Lücken in Windows-Komponenten und im Exchange Mail-Server.
---------------------------------------------
http://heise.de/-4186268
∗∗∗ Kritische Sicherheitslücke gefährdet Milliarden WhatsApp-Nutzer ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in WhatsApp ermöglicht es, ein Smartphone mit einem einzigen Video-Call zu kapern. Potentiell betroffen sind Milliarden WhatsApp-Nutzer.
---------------------------------------------
http://heise.de/-4186365
∗∗∗ Patchday: Adobe stopft kritische Lücke in Digital Editions ∗∗∗
---------------------------------------------
Ein Sicherheitsupdate für Flash, das keins ist, und die Abwesenheit von Reader-Patches sorgen bei Adobe für einen eher untypischen Patchday.
---------------------------------------------
http://heise.de/-4186327
∗∗∗ IIS attacks surge from 2,000 to 1.7 million over last quarter ∗∗∗
---------------------------------------------
IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive increase, from 2,000 to 1.7 million, since last quarter.
---------------------------------------------
https://www.helpnetsecurity.com/2018/10/10/iis-attacks-surge/
∗∗∗ Magecart hacks Shopper Approved to simultaneously hit many e-commerce sites ∗∗∗
---------------------------------------------
The cybercriminal groups under the Magecart umbrella strike again and again, and one of them has apparently specialized in compromising third parties to more easily get in as many online shops as possible. The latest target of Magecart Group 5, as it has been dubbed by RiskIQ researcher Yonathan Klijnsma, is Shopper Approved, an organization that provides rating seals for online stores.
---------------------------------------------
https://www.helpnetsecurity.com/2018/10/10/magecart-hacks-shopper-approved/
∗∗∗ Kleinanzeigenbetrug mit Western Union Überweisungen ∗∗∗
---------------------------------------------
Vorsicht beim Kleinanzeigenverkauf! BetrügerInnen, die sich als KaufinteressentInnen ausgeben, behaupten, ihren Opfern überhöhte Geldbeträge überwiesen zu haben, die nur durch eine Western Union Transaktion an ein Speditionsunternehmen freigeschalten werden können. Führen Sie diese Transaktion nicht durch, denn Ihr Geld wäre verloren und die freizuschaltende Überweisung gibt es nicht!
---------------------------------------------
https://www.watchlist-internet.at/news/kleinanzeigenbetrug-mit-western-unio…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
Adobe has published security bulletins for Adobe Digital Editions (APSB18-27), Adobe Experience Manager (APSB18-36), Adobe Framemaker (APSB18-37) and Adobe Technical Communications Suite (APSB18-38). Adobe recommends users update their product installations to the latest versions using the instructions referenced [...]
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1633
∗∗∗ jQuery-File-Upload < = v9.22.0 unauthenticated arbitrary file upload vulnerability ∗∗∗
---------------------------------------------
Topic: jQuery-File-Upload < = v9.22.0 unauthenticated arbitrary file upload vulnerability Risk: Medium Text:Title: jQuery-File-Upload < = v9.22.0 unauthenticated arbitrary file upload vulnerability Author: Larry W. Cashdollar [...]
---------------------------------------------
https://cxsecurity.com/issue/WLB-2018100094
∗∗∗ GE iFix ∗∗∗
---------------------------------------------
This advisory includes mitigations for an unsafe ActiveX control marked safe for scripting vulnerability in a Gigasoft component affecting GE’s iFix HMI products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-282-01
∗∗∗ Fuji Electric Energy Savings Estimator ∗∗∗
---------------------------------------------
This advisory includes mitigations for an uncontrolled search path element (DLL Hijacking) vulnerability in the Fuji Electric Energy Savings Estimator software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-282-07
∗∗∗ October 2018 Security Update Release ∗∗∗
---------------------------------------------
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found in the Security Update Guide.
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2018/10/09/october-2018-security-u…
∗∗∗ October 2018 Microsoft Patch Tuesday, (Tue, Oct 9th) ∗∗∗
---------------------------------------------
Microsoft released patches for 48 vulnerabilities today and one advisory regarding a defense in depth update for Office. No Adobe updates are included so far, but Adobe has released updates to PDF Reader / Acrobat about a week ago.
---------------------------------------------
https://isc.sans.edu/diary/rss/24186
∗∗∗ VMSA-2018-0025 ∗∗∗
---------------------------------------------
VMware ESXi, Workstation, and Fusion workarounds address a denial-of-service vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0025.html
∗∗∗ USN-3787-1: Tomcat vulnerability ∗∗∗
---------------------------------------------
tomcat7, tomcat8 vulnerabilityA security issue affects these releases of Ubuntu and its derivatives:Ubuntu 16.04 LTSUbuntu 14.04 LTSSummaryTomcat could be made to redirect to arbitrary locations.Software Descriptiontomcat8 - Servlet and JSP enginetomcat7 - Servlet and JSP engineDetailsIt was discovered that Tomcat incorrectly handled returning redirects to adirectory. A remote attacker could possibly use this issue with a speciallycrafted URL to redirect to arbitrary URIs.
---------------------------------------------
https://usn.ubuntu.com/3787-1/
∗∗∗ October 2018 Office Update Release ∗∗∗
---------------------------------------------
The October 2018 Public Update releases for Office are now available! This month, there are 23 security updates and 17 non-security updates. All of the security and non-security updates are listed in KB article 4464656. A new version of Office 2013 Click-To-Run is available: 15.0.5075.1001 A new version of Office 2010 Click-To-Run is available: 14.0.7214.5000
---------------------------------------------
https://blogs.technet.microsoft.com/office_sustained_engineering/2018/10/09…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (patch), CentOS (firefox, glusterfs, kernel, and nss), Debian (net-snmp), Oracle (firefox, glusterfs, kernel, and nss), Red Hat (glusterfs, kernel, and nss), Scientific Linux (firefox), SUSE (kernel), and Ubuntu (webkit2gtk).
---------------------------------------------
https://lwn.net/Articles/768041/
∗∗∗ BSRT 2018-004 Information Disclosure Vulnerability in Management Console Impacts UEM ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Security Advisory - Improper Authentication Vulnerability on Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181010-…
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in WebSphere Application Server in IBM Cloud July 2018 CPU ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734161
∗∗∗ IBM Security Bulletin: IBM FileNet Content Manager affected by Apache PDFBox security vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/support/docview.wss?uid=ibm10716315
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities affect IBM WebSphere Application Server in IBM Cloud ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734167
∗∗∗ IBM Security Bulletin: Server Automation is affected by the following GSKit vulnerabilities (CVE-2018-1447, CVE-2018-1427, CVE-2018-1428) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718773
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 08-10-2018 18:00 − Dienstag 09-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Millionen Xiongmai-Überwachungskameras durch Cloud-Feature unsicher (XMEye P2P Coud) ∗∗∗
---------------------------------------------
Über 9 Millionen IoT-Geräte des chinesischem OEM-Herstellers "Xiongmai" sind unsicher (selbst jene hinter einer Firewall), weil sie ein unsicheres Cloud-Feature namens "XMEye P2P cloud" standardmäßig aktiv haben.
---------------------------------------------
https://www.sec-consult.com/blog/2018/10/millionen-xiongmai-ueberwachungska…
∗∗∗ Sicherheitsupdates: Kritische Lücken in Cisco DNA gefährden ganze Netzwerke ∗∗∗
---------------------------------------------
Cisco stellt Patches für verschiedene Produkte bereit und schließt damit viele Sicherheitslücken.
---------------------------------------------
http://heise.de/-4184517
∗∗∗ Oktober ist Europäischer Monat der Cyber-Sicherheit! ∗∗∗
---------------------------------------------
Auch diesen Oktober nimmt Österreich wieder an der EU-weiten Kampagne European Cyber Security Month (ECSM) teil. Im Fokus steht dabei die Bewusstseinsbildung für Risiken im Netz.
---------------------------------------------
https://www.watchlist-internet.at/news/oktober-ist-europaeischer-monat-der-…
=====================
= Vulnerabilities =
=====================
∗∗∗ [20181005] - Core - CSRF hardening in com_installer ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS Impact: Moderate Severity: Low Versions: 2.5.0 through 3.8.12 Exploit type: CSRF Reported Date: 2018-September-26 Fixed Date: 2018-October-02 CVE Number: CVE-2018-17858 Description Added additional CSRF hardening in com_installer actions in the backend. Affected Installs Joomla! CMS versions 2.5.0 through 3.8.12 Solution Upgrade to version 3.8.13 Contact The JSST at the Joomla! Security Centre. Reported By: Raviraj A. Powar
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/nfI3_UnJIrM/755-20181005-c…
∗∗∗ [20181004] - Core - ACL Violation in com_users for the admin verification ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS Impact: Moderate Severity: Low Versions: 1.5.0 through 3.8.12 Exploit type: ACL Violation Reported Date: 2017-December-27 Fixed Date: 2018-October-02 CVE Number: CVE-2018-17855 Description In case that an attacker gets access to the mail account of an user who can approve admin verifications in the registration process he can activate himself. Affected Installs Joomla! CMS versions 1.5.0 through 3.8.12 Solution Upgrade to version 3.8.13
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/qGhSucxwoZo/754-20181004-c…
∗∗∗ [20181003] - Core - Access level Violation in com_tags ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS Impact: Moderate Severity: Low Versions: 3.1.0 through 3.8.12 Exploit type: ACL Violation Reported Date: 2018-June-20 Fixed Date: 2018-October-02 CVE Number: CVE-2018-17857 Description Inadequate checks on the tags search fields can lead to an access level violation. Affected Installs Joomla! CMS versions 3.1.0 through 3.8.12 Solution Upgrade to version 3.8.13 Contact The JSST at the Joomla! Security Centre.
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/nIIfD6jUDgU/753-20181003-c…
∗∗∗ [20181002] - Core - Inadequate default access level for com_joomlaupdate ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS Impact: High Severity: Low Versions: 2.5.4 through 3.8.12 Exploit type: Object Injection Reported Date: 2018-June-21 Fixed Date: 2018-October-02 CVE Number: CVE-2018-17856 Description Joomla’s com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled access of Administrator-level users to access com_joomlaupdate and trigger a code execution. Affected Installs Joomla! CMS versions 2.5.4 through 3.8.12
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/MptbHWIJjXM/752-20181002-c…
∗∗∗ [20181001] - Core - Hardening com_contact contact form ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS Impact: Moderate Severity: Low Versions: 2.5.0 through 3.8.12 Exploit type: Incorrect Access Control Reported Date: 2018-September-17 Fixed Date: 2018-October-02 CVE Number: CVE-2018-17859 Description Inadequate checks in com_contact could allowed mail submission in disabled forms. Affected Installs Joomla! CMS versions 2.5.0 through 3.8.12 Solution Upgrade to version 3.8.13 Contact The JSST at the Joomla! Security Centre. Reported By: David Jardin (JSST)
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/lkwPYx4JflE/751-20181001-c…
∗∗∗ SAP Security Patch Day - October 2018 ∗∗∗
---------------------------------------------
On 9th of October 2018, SAP Security Patch Day saw the release of 11 Security Notes. Additionally, there were 4 updates to previously released security notes.
---------------------------------------------
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095
∗∗∗ SSA-347726: Denial-of-Service Vulnerability in SIMATIC S7-1500, SIMATIC S7-1500 Software Controller and SIMATIC ET 200SP Open Controller ∗∗∗
---------------------------------------------
Versions of SIMATIC S7-1500, SIMATIC S7-1500 Software Controller and SIMATIC ET 200 SP Open Controller are affected by a denial-of-service vulnerability. An attacker with network access to the PLC can cause a Denial-of-Service condition on the network stack.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-347726.txt
∗∗∗ SSA-254686: Foreshadow / L1 Terminal Fault Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
Security researchers published information on vulnerabilities known as Foreshadow and L1 Terminal Fault (L1TF). These vulnerabilities affect many modern processors from different vendors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerabilities.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-254686.txt
∗∗∗ SSA-464260: TLS ROBOT vulnerability in SCALANCE W1750D ∗∗∗
---------------------------------------------
The latest update for SCALANCE W1750D addresses a vulnerability known as _ROBOT Attack_. The vulnerability could allow an attacker to decrypt TLS traffic. Siemens provides a firmware update and recommends users to update to the new version.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-464260.txt
∗∗∗ SSA-493830: Privilege Escalation in ROX II ∗∗∗
---------------------------------------------
The latest update for ROX II fixes two vulnerabilities. One vulnerability could allow an attacker with a low-privileged user account to execute arbitrary commands. The other vulnerability could allow an attacker with a low-privileged user account to escalate his privileges.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-493830.txt
∗∗∗ SSA-507847: Cross-Site Request Forgery Vulnerability in SIMATIC S7-1200 CPU Family ∗∗∗
---------------------------------------------
The latest firmware update for S7-1200 CPU family version 4 fixes a Cross-Site Request Forgery vulnerability. Siemens recommends to update affected devices as soon as possible.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-507847.txt
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (git), Debian (kernel, samba, and tinc), Fedora (kernel-headers), Oracle (firefox), Red Hat (firefox and qemu-kvm-rhev), Scientific Linux (firefox), SUSE (java-1_8_0-ibm, kubernetes-salt, velum, libxml2, and postgresql10), and Ubuntu (libxkbcommon).
---------------------------------------------
https://lwn.net/Articles/767948/
∗∗∗ iCloud for Windows 7.7 ∗∗∗
---------------------------------------------
https://support.apple.com/kb/HT209141
∗∗∗ iOS 12.0.1 ∗∗∗
---------------------------------------------
https://support.apple.com/kb/HT209162
∗∗∗ Zimbra Collaboration Suite: Eine Schwachstelle ermöglicht das Darstellen falscher Informationen ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2038/
∗∗∗ IBM Security Bulletin: IBM Netcool/OMNIbus Probe DSL Factory Framework is affected by Apache Camel’s Core vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731893
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in WebSphere application server affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10734305
∗∗∗ Remote Code Execution via XMeye P2P Cloud in Xiongmai IP Cameras, NVRs and DVRs ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/vulnerabilities-xiongmai-ip-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 05-10-2018 18:00 − Montag 08-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Git Project Patches Remote Code Execution Vulnerability in Git ∗∗∗
---------------------------------------------
The Git Project announced yesterday a critical arbitrary code execution vulnerability in the Git command line client, Git Desktop, and Atom that could allow malicious repositories to remotely execute commands on a vulnerable machine.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/git-project-patches-remote-c…
∗∗∗ Sony Smart TV Bug Allows Remote Access, Root Privileges ∗∗∗
---------------------------------------------
Software patching becomes a new reality for smart TV owners.
---------------------------------------------
https://threatpost.com/sony-smart-tv-bug-allows-remote-access-root-privileg…
∗∗∗ ENISA publishes annual report on trust services security incidents 2017 ∗∗∗
---------------------------------------------
ENISA publishes the first full-year annual report on security incidents with electronic trust services, covering 2017.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/enisa-publishes-annual-report-o…
∗∗∗ Sicherheitsupdate: D-Link Central WiFi Manager anfällig für Schadcode ∗∗∗
---------------------------------------------
In der Windows-Version von D-Link Central WiFi Manager klaffen mehrere Sicherheitslücken. Mindestens eine davon gilt als kritisch. Ein Patch schafft Abhilfe.
---------------------------------------------
http://heise.de/-4183206
∗∗∗ macOS: Code-Signing teilweise aushebelbar ∗∗∗
---------------------------------------------
Gatekeeper soll dafür sorgen, dass bekannte Malware auf dem Mac nicht startet. Überprüft wird aber oft nur ein Mal, warnt ein Sicherheitsforscher.
---------------------------------------------
http://heise.de/-4182870
=====================
= Vulnerabilities =
=====================
∗∗∗ VU#176301: Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App ∗∗∗
---------------------------------------------
Vulnerability Note VU#176301 Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App Original Release date: 06 Oct 2018 | Last revised: 08 Oct 2018 Overview Auto-Maskin RP remote panels and DCU controls units are used to monitor and control ship engines. The units have several authentication and encryption vulnerabilities which can allow attackers to access the units and control connected engines. Description CWE 798: Use of Hard-Coded Credentials - CVE–2018-5399 [...]
---------------------------------------------
http://www.kb.cert.org/vuls/id/176301
∗∗∗ FLIR Systems FLIR Thermal Traffic Cameras Websocket Device Manipulation ∗∗∗
---------------------------------------------
FLIR thermal traffic cameras suffer from an unauthenticated device manipulation vulnerability utilizing the websocket protocol. The affected FLIR Intelligent Transportation Systems - ITS models use an insecure implementation of websocket communication used for administering the device. Authentication and authorization bypass via referencing a direct object allows an attacker to directly modify running configurations, disclose information or initiate a denial of service (DoS) scenario with [...]
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5490.php
∗∗∗ FLIR Systems FLIR Thermal Traffic Cameras RTSP Stream Disclosure ∗∗∗
---------------------------------------------
FLIR thermal traffic cameras suffer from an unauthenticated and unauthorized live RTSP video stream access.
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5489.php
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (adplug, git, php-horde, php-horde-core, and php-horde-kronolith), Fedora (firefox, liblouis, libmad, mediawiki, opensc, php-horde-horde, php-horde-Horde-Core, php-horde-kronolith, and rust), Gentoo (imagemagick, openssh, and sox), openSUSE (ghostscript, gitolite, java-1_8_0-openjdk, kernel, php5, php7, python, thunderbird, tomcat, and unzip), Red Hat (firefox and rh-haproxy18-haproxy), and SUSE (ImageMagick, java-1_8_0-openjdk, kernel, qpdf, [...]
---------------------------------------------
https://lwn.net/Articles/767873/
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager Misses Authentication for Critical Function (CVE-2018-1745) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733355
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to Improper Authentication (CVE-2018-1738) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733309
∗∗∗ IBM Security Bulletin: IBM Tivoli Netcool Impact is affected by an Information disclosure of stack trace vulnerability (CVE-2018-1553) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733541
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Netcool Impact ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733543
∗∗∗ IBM Security Bulletin: Vulnerabilities in NTP, OpenSSL and Intel CPU’s affect IBM Netezza Firmware Diagnostics. ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016330
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 04-10-2018 18:00 − Freitag 05-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stefan Lenzhofer
=====================
= News =
=====================
∗∗∗ Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware ∗∗∗
---------------------------------------------
The Fallout Exploit has been distributing the GandCrab Ransomware for the past few weeks, but has now switched its payload to the Kraken Cryptor Ransomware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fallout-exploit-kit-now-inst…
∗∗∗ 365 Days Later: Finding and Exploiting Safari Bugs using Publicly Available Tools ∗∗∗
---------------------------------------------
Posted by Ivan Fratric, Google Project ZeroAround a year ago, we published the results of research about the resilience of modern browsers against DOM fuzzing, a well-known technique for finding browser bugs. Together with the bug statistics we also published Domato, our DOM fuzzing tool that was used to find those bugs.Given that in the previous research, Apple Safari, or more specifically, WebKit (its DOM engine) did noticeably worse than other browsers, we decided to revisit it after a year [...]
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/10/365-days-later-finding-and-e…
∗∗∗ ThreatList: 83% of Routers Contain Vulnerable Code ∗∗∗
---------------------------------------------
Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.
---------------------------------------------
https://threatpost.com/threatlist-83-of-routers-contain-vulnerable-code/137…
∗∗∗ Domain Name System: Vorsichtsmaßnahmen für den DNS-Schlüsseltausch ∗∗∗
---------------------------------------------
Der kryptografische Hauptschlüssel des DNS wird in einer Woche gewechselt. Für unvorbereitete Provider kann das fatale Folgen haben.
---------------------------------------------
http://heise.de/-4179793
=====================
= Vulnerabilities =
=====================
∗∗∗ Carestream Vue RIS ∗∗∗
---------------------------------------------
This advisory includes mitigations for an information exposure through an error message vulnerability in the Carestream Vue RIS, a web-based radiology information system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-277-01
∗∗∗ Change Healthcare PeerVue Web Server ∗∗∗
---------------------------------------------
This advisory includes mitigations for an information exposure through an error message vulnerability in the Change Healthcare PeerVue Web Server.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-277-02
∗∗∗ WECON PI Studio ∗∗∗
---------------------------------------------
This advisory includes information on stack-based buffer overflow, out-of-bounds write, and out-of-bounds read vulnerabilities in WECON’s PI Studio HMI project programmer.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01
∗∗∗ Security Advisory 2018-06: Security Update for OTRS Framework ∗∗∗
---------------------------------------------
October 05, 2018 — Please read carefully and check if the version of your OTRS system is affected by this vulnerability. Please send information regarding vulnerabilities in OTRS to: security(a)otrs.org PGP Key pub 2048R/9C227C6B 2011-03-21 [expires at: 2020-11-16] uid OTRS Security Team GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22The post Security Advisory 2018-06: Security Update for OTRS Framework appeared first on | community.otrs.com.
---------------------------------------------
https://community.otrs.com/security-advisory-2018-06-security-update-for-ot…
∗∗∗ VMSA-2018-0024.1 ∗∗∗
---------------------------------------------
VMware Workspace ONE Unified Endpoint Management Console (AirWatch Console) update resolves SAML authentication bypass vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0024.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel), Fedora (lcms2, php-tcpdf, and udisks2), openSUSE (ImageMagick, libX11, openssl-1_0_0, openssl-1_1, and otrs), SUSE (kernel, php5, php53, php7, and python), and Ubuntu (apparmor and imagemagick).
---------------------------------------------
https://lwn.net/Articles/767689/
∗∗∗ IBM Security Bulletin: A vulnerability in yum-utils affects PowerKVM ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728307
∗∗∗ IBM Security Bulletin: Vulnerabilities in docker affect PowerKVM ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10725649
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Rational DOORS Web Access ∗∗∗
---------------------------------------------
https://www.ibm.com/support/docview.wss?uid=ibm10733857
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Rational Application Developer for WebSphere Software ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733905
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager generates Application Error (CVE-2018-1753) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733359
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to Incorrect Permission Assignment for Critical Resource (CVE-2018-1750) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733311
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to Hazardous Input Validation ( CVE-2018-1749) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733303
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to Information Exposure (CVE-2018-1743) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733351
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager Uses Hard-coded Credentials (CVE-2018-1742) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733419
∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager is vulnerable to Improper Control of Interaction Frequency (CVE-2018-1741) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733425
∗∗∗ Security vulnerabilities fixed in Thunderbird 60.2.1 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-25/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 03-10-2018 18:00 − Donnerstag 04-10-2018 18:00
Handler: Stephan Richter
Co-Handler: Dimitri Robl
=====================
= News =
=====================
∗∗∗ Phishing Attacks Distributed Through CloudFlares IPFS Gateway ∗∗∗
---------------------------------------------
Yesterday we reported on a phishing attack that utilizes Azure Blob storage in order to have login forms secured by a Microsoft issued SSL certificate. After reviewing the URLs used by the same attacker, BleepingComputer has discovered that these same bad actors are utilizing the Cloudflare IPFS gateway for the same purpose.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/phishing-attacks-distributed…
∗∗∗ Nicht bei conquerconsoles.com, konsolenkammer24.de oder konsolenstation24.com kaufen ∗∗∗
---------------------------------------------
Die Fakeshops conquerconsoles.com, konsolenkammer24.de und konsolenstation24.com vertreiben Spielkonsolen und Spiele zu unschlagbaren Preisen. Die Fakeshops locken mit Angeboten, wo Sie eine PlayStation 4 samt Spiel und Controller kostengünstig erwerben können. Sie können nur im Voraus per Banküberweisung bezahlen, erhalten aber keine Ware!
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-bei-conquerconsolescom-konsole…
=====================
= Vulnerabilities =
=====================
∗∗∗ Printer, email and PDF versions - Highly critical - Remote Code Execution - SA-CONTRIB-2018-063 ∗∗∗
---------------------------------------------
Project: Printer, email and PDF versionsVersion: 7.x-2.x-devDate: 2018-October-03Security risk: Highly critical 20∕25 AC:None/A:None/CI:All/II:All/E:Theoretical/TD:UncommonVulnerability: Remote Code ExecutionDescription: This module provides printer-friendly versions of content, including send by e-mail and PDF versions.The module doesnt sufficiently sanitize the arguments passed to the wkhtmltopdf executable, allowing a remote attacker to execute arbitrary shell commands.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-063
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (firefox and python-django), Debian (dnsmasq, firefox-esr, imagemagick, and linux-4.9), Fedora (haproxy), openSUSE (bitcoin, firefox, and texlive), SUSE (openslp), and Ubuntu (apache2).
---------------------------------------------
https://lwn.net/Articles/767611/
∗∗∗ Cisco Digital Network Architecture Center Unauthenticated Access Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and have direct unauthorized access to critical management functions.The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Digital Network Architecture Center Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the identity management service of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and take complete control of identity management functions.The vulnerability is due to insufficient security restrictions for critical management functions. An attacker could exploit this vulnerability by sending a valid identity management request to the affected system.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ More Cisco Security Advisories ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/publicationListing.x
∗∗∗ Red Hat JBoss Web Server: Eine Schwachstelle ermöglicht das Erlangen von Benutzerrechten ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1992/
∗∗∗ Apache Tomcat: Eine Schwachstelle ermöglicht das Darstellen falscher Informationen ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2000/
∗∗∗ ClamAV: Mehrere Schwachstellen ermöglichen verschiedene Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2008/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 02-10-2018 18:00 − Mittwoch 03-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft ∗∗∗
---------------------------------------------
A new Office 365 phishing attack utilizes an interesting method of storing their phishing form hosted on Azure Blob Storage in order to be secured by a Microsoft SSL certificate.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/phishing-attack-uses-azure-b…
∗∗∗ ct deckt auf: Enigmail verschickt Krypto-Mails im Klartext ∗∗∗
---------------------------------------------
In der verbreiteten Thunderbird-Erweiterung Enigmail steckt ein fataler Fehler. Das Problem betrifft den Junior-Modus, der seit April standardmäßig aktiv ist.
---------------------------------------------
https://heise.de/-4180405
∗∗∗ Popular TP-Link wireless home router open to remote hijacking ∗∗∗
---------------------------------------------
By concatenating a known improper authentication flaw with a newly discovered CSRF vulnerability, remote unauthenticated attackers can obtain full control over TP-Link TL-WR841N, a popular wireless consumer router used worldwide. "This type of remote attack can also compromise routers behind a network address translator (NAT) and those not exposed to the public wide area network (WAN) as the vulnerability is remotely reflected off a locally connected host, rather than coming directly over [...]
---------------------------------------------
https://www.helpnetsecurity.com/2018/10/03/tp-link-wireless-home-router-hij…
=====================
= Vulnerabilities =
=====================
∗∗∗ Delta Electronics ISPSoft ∗∗∗
---------------------------------------------
This advisory includes mitigations for a stack-based buffer overflow vulnerability in the Delta Electronics ISPSoft software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-275-01
∗∗∗ GE Communicator ∗∗∗
---------------------------------------------
This advisory includes mitigations for a heap-based buffer overflow vulnerability in GEs Communicator, an application for programming and monitoring supported metering devices.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02
∗∗∗ Entes EMG 12 ∗∗∗
---------------------------------------------
This advisory includes mitigations for improper authentication and information exposure through query strings in GET request vulnerabilities in the Entes EMG 12 Ethernet Modbus Gateway.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (elfutils), Gentoo (firefox), Red Hat (instack-undercloud, openstack-tripleo-heat-templates and openstack-nova), Slackware (mozilla), SUSE (ghostscript, ImageMagick, kernel, mgetty, qemu, and unzip), and Ubuntu (firefox, haproxy, kernel, liblouis, and webkit2gtk).
---------------------------------------------
https://lwn.net/Articles/767539/
∗∗∗ ZDI-18-1107: (0Day) Wecon PIStudio screendata HSC Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1107/
∗∗∗ ZDI-18-1106: (0Day) Wecon PIStudio xmlparser LoadXMLFile XML External Entity Processing Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1106/
∗∗∗ ZDI-18-1109: (0Day) Wecon PIStudio basedll TextContent Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1109/
∗∗∗ ZDI-18-1108: (0Day) Wecon PIStudio cximageu Image Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1108/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ HPESBGN03900 rev.1 - HPE enhanced Internet Usage Manager (eIUM) Remote Unauthorized Disclosure of Information vulnerability and Remote Bypass Security Restrictions ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ Security vulnerabilities fixed in Firefox 62.0.3 and Firefox ESR 60.2.2 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 01-10-2018 18:00 − Dienstag 02-10-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Security Update for Foxit PDF Reader Fixes 118 Vulnerabilities ∗∗∗
---------------------------------------------
It has not been a good week for PDF programs. We had an Adobe Acrobat & Reader update released yesterday that fixed 86 vulnerabilities, including numerous critical ones. Not to be beaten, an update for Foxit PDF Reader and Foxit PhantomPDF was released last Friday that fixes a whopping 116 vulnerabilities.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/security-update-for-foxit-pd…
∗∗∗ Nine NAS Bugs Open LenovoEMC, Iomega Devices to Attack ∗∗∗
---------------------------------------------
Rated as high-risk vulnerabilities, these privilege-escalation flaws could allow an unauthenticated attacker to access protected content.
---------------------------------------------
https://threatpost.com/nine-nas-bugs-open-lenovoemc-iomega-devices-to-attac…
∗∗∗ Keine Rechnung von ibostream.de und sobastream.de zahlen ∗∗∗
---------------------------------------------
Die Abo-Fallen ibostream.de und sobastream.de sehen für ihre Nutzung eine kostenlose Registrierung vor. Fünf Tagen nach der Registrierung erhalten Konsument/innen von der Ibo Das Limited oder der Stream It Limited eine Rechnung von 359,88- Euro. Nutzer/innen müssen die Summe nicht bezahlen, denn zwischen ihnen und ibostream.de oder sobastream.de gibt es keinen Vertrag.
---------------------------------------------
https://www.watchlist-internet.at/news/keine-rechnung-von-ibostreamde-und-s…
=====================
= Vulnerabilities =
=====================
∗∗∗ Kritische Sicherheitslücken in Adobe Acrobat und Reader - Patches verfügbar ∗∗∗
---------------------------------------------
Adobe hat ausserhalb des monatlichen Patch-Zyklus Updates für Acrobat und Reader veröffentlicht, mit denen teils kritische Sicherheitslücken geschlossen werden.
---------------------------------------------
https://www.cert.at/warnings/all/20181002.html
∗∗∗ Android Security Bulletin - October 2018 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. [...] The most severe of these issues is a critical security vulnerability in Framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.
---------------------------------------------
https://source.android.com/security/bulletin/2018-10-01.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (lib32-libxml2, libxml2, mosquitto, and ntp), Debian (kernel and strongswan), Fedora (firefox), openSUSE (zsh), Oracle (kernel), Red Hat (ceph-iscsi-cli), SUSE (openssl-1_0_0), and Ubuntu (kernel, linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-hwe, linux-gcp, linux-lts-trusty, linux-lts-xenial, linux-aws, and strongswan).
---------------------------------------------
https://lwn.net/Articles/767467/
∗∗∗ Vuln: LibTIFF CVE-2018-17795 Heap Based Buffer Overflow Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105445
∗∗∗ Red Hat JBoss A-MQ, Red Hat JBoss Fuse: Eine Schwachstelle ermöglicht das Erlangen von Benutzerrechten ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1989/
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities in GSKit used by Edge Caching proxy of WebSphere Application Server ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732391
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability in OAuth ear in WebSphere Application Server (CVE-2018-1794) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729571
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability in SAML ear in WebSphere Application Server (CVE-2018-1793) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729563
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities affect IBM® Cloud Private (CVE-2018-0739,CVE-2017-17512, CVE-2018-1000122) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719199
∗∗∗ IBM Security Bulletin: IBM b-type Network/Storage switches are affected by Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN (openssl ,redhat,openVPN) vulnerabilities. ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ssg1S1010724
∗∗∗ Password disclosure vulnerability & XSS in PTC ThingWorx ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/password-disclosure-vulnerab…
∗∗∗ HPESBHF03897 rev.1 - HPE Switches and Routers using OpenSSL, and Intelligent Management Center (iMC) PLAT, Remote Denial of Service ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 28-09-2018 18:00 − Montag 01-10-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ IC3 Issues Alert Regarding Remote Desktop Protocol (RDP) Attacks ∗∗∗
---------------------------------------------
The Internet Crime Complaint Center (IC3), in collaboration with the Department of Homeland Security and the FBI, have issued a security alert regarding attacks being conducted through the Windows Remote Desktop Protocol.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ic3-issues-alert-regarding-r…
∗∗∗ FBI löst Rätsel um 15 Jahre alte Malware ∗∗∗
---------------------------------------------
Jahrelang spionierte die Fruitfly-Malware unbemerkt Mac-User aus. Nun wurde bekannt, wie die Schadsoftware verbreitet wurde.
---------------------------------------------
https://futurezone.at/digital-life/fbi-loest-raetsel-um-15-jahre-alte-malwa…
∗∗∗ Dark Web Azorult Generator Offers Free Binaries to Cybercrooks ∗∗∗
---------------------------------------------
The Gazorp online builder makes it easy to start stealing passwords, credit-card information, cryptocurrency wallet data and more.
---------------------------------------------
https://threatpost.com/dark-web-azorult-generator-offers-free-binaries-to-c…
∗∗∗ 70+ different types of home routers(all together 100,000+) are being hijacked by GhostDNS ∗∗∗
---------------------------------------------
note:We have informed various ISPs on the IoC list, and OVH, ORACLE, Google have taken down the related IPs and some others are working on it (Thanks!)Background introductionDNSchanger is not something new and was quite active years ago [1], we occasionally encountered one every once in a [...]
---------------------------------------------
http://blog.netlab.360.com/70-different-types-of-home-routers-all-together-…
∗∗∗ Oktober ist Cyber Security-Monat! ∗∗∗
---------------------------------------------
Unter dem Titel "Cyber Security is a Shared Responsibility" findet im Oktober die inzwischen 7. Kampagne der EU zur Verbesserung der allgemeinen Informationssicherheit statt: Der Europäische Cybersicherheitsmonat (ECSM) ist ein breit koordiniertes und umfangreich aufgestelltes Veranstaltungsformat, das Bewusstsein fördern und Kenntnisse vermitteln will. So werden Schritte aufzeigt, die alle Bürger*innen und Organisationen zum Schutz von persönlichen, finanziellen [...]
---------------------------------------------
https://www.ikarussecurity.com/at/ueber-ikarus/security-blog/oktober-ist-cy…
∗∗∗ Facebook-Hack: Kombination aus mehreren Software-Lücken war schuld ∗∗∗
---------------------------------------------
Drei Lücken exponierten Millionen Facebook-Konten, darunter das von Mark Zuckerberg. Womöglich waren auch Drittanbieter-Dienste per Facebook-Login betroffen.
---------------------------------------------
https://heise.de/-4178569
∗∗∗ Explosion of look-alike domains aims to steal sensitive data from online shoppers ∗∗∗
---------------------------------------------
Venafi released research on the explosion of look-alike domains, which are routinely used to steal sensitive data from online shoppers. Venafi's research analyzed suspicious domains targeting the top 20 retailers in five key markets: the U.S., U.K., France, Germany and Australia.
---------------------------------------------
https://www.helpnetsecurity.com/2018/10/01/look-alike-domains/
∗∗∗ Erpressung mit intimen Videomaterial ∗∗∗
---------------------------------------------
Kriminelle versenden eine E-Mail, in der es heißt, dass sie das Empfänger/innen-Konto übernommen haben und sein Passwort kennen. Opfer sollen 600 US-Dollar in Bitcoins zahlen, damit die Verbrecher/innen kein intimes Videomaterial veröffentlichen. Konsument/innen können die Nachricht ignorieren und müssen nur ihr Passwort ändern. Eine Zahlung ist nicht erforderlich.
---------------------------------------------
https://www.watchlist-internet.at/news/erpressung-mit-intimen-videomaterial/
=====================
= Vulnerabilities =
=====================
∗∗∗ Skype On Debian Microsoft Apt Repo Addition ∗∗∗
---------------------------------------------
Topic: Skype On Debian Microsoft Apt Repo Addition Risk: High Text:Level: Critical Description: The Skype debian packege for Skype (even when not installed via their offical repo) [...]
---------------------------------------------
https://cxsecurity.com/issue/WLB-2018090274
∗∗∗ UPDATED: Security Bulletins Posted ∗∗∗
---------------------------------------------
[...] UPDATE: As of September 28, Adobe is aware of a report that CVE-2018-15961 is being actively exploited in the wild. The updates for ColdFusion 2018 and ColdFusion 2016 announced in APSB18-33 have been elevated to Priority 1, and Adobe recommends customers update to the latest version as soon as possible.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1607
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (mediawiki), CentOS (389-ds-base, firefox, flatpak, kernel, mod_perl, nss, spice and spice-gtk, and spice-gtk and spice-server), Debian (389-ds-base, ghostscript, mosquitto, and python3.5), Fedora (ca-certificates, firefox, glusterfs, kernel-headers, kernel-tools, libxkbcommon, udisks2, and zchunk), Mageia (firefox), openSUSE (gd, gnutls, mgetty, openssl, and yast2-smt), Oracle (firefox and kernel), Scientific Linux (firefox), SUSE (libX11 and [...]
---------------------------------------------
https://lwn.net/Articles/767373/
∗∗∗ Security Advisory - FRP Bypass Vulnerability in MyCloud APP of Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180930-…
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Publicly disclosed Apache Struts vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732783
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM i ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731329
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Guardium ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732785
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10732477
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Tivoli Netcool/OMNIbus (Multiple CVEs) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733457
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730313
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Improper Certificate Validation vulnerability ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730321
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Using Components with Known Vulnerabilities vulnerabilities ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730329
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Missing Security Control vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730323
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Password in Clear Text vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730317
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 27-09-2018 18:00 − Freitag 28-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ New Iot Botnet Torii Uses Six Methods for Persistence, Has No Clear Purpose ∗∗∗
---------------------------------------------
Security researchers discovered a new IoT botnet that is in a league superior to the Mirai variants ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-iot-botnet-torii-uses-si…
∗∗∗ Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV ∗∗∗
---------------------------------------------
Removing the need for files is the next progression of attacker techniques. While fileless techniques used to be employed almost exclusively in sophisticated cyberattacks, they are now becoming widespread in common malware, ..
---------------------------------------------
https://cloudblogs.microsoft.com/microsoftsecure/2018/09/27/out-of-sight-bu…
∗∗∗ Credential Leak Flaws in Windows PureVPN Client ∗∗∗
---------------------------------------------
Using a VPN (Virtual Private Network) can bring many advantages, particularly when you want to ..
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/Credential-Leak-Flaws-in-Wi…
∗∗∗ DNSSEC Key Signing Key Rollover ∗∗∗
---------------------------------------------
Original release date: September 27, 2018 On October 11, 2018, the Internet Corporation for Assigned Names and Numbers (ICANN) will be changing the Root Zone Key Signing Key (KSK) used in the Domain Name System (DNS) Security ..
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/09/27/DNSSEC-Key-Signing…
∗∗∗ [SANS ISC] More Excel DDE Code Injection ∗∗∗
---------------------------------------------
I published the following diary on isc.sans.edu: “More Excel DDE Code Injection“: The “DDE code injection” technique is not brand new. DDE stands for “Dynamic Data Exchange”. It has already been discussed by many security researchers. Just a quick ..
---------------------------------------------
https://blog.rootshell.be/2018/09/28/sans-isc-more-excel-dde-code-injection/
∗∗∗ Stellungnahme des BSI zur Schadsoftware "LoJax" ∗∗∗
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/LoJax-Schad…
=====================
= Vulnerabilities =
=====================
∗∗∗ Emerson AMS Device Manager ∗∗∗
---------------------------------------------
This advisory includes mitigations for improper access control and improper privilege management vulnerabilities in the Emerson AMS Device Manager software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-270-01
∗∗∗ Fuji Electric Alpha5 Smart Loader ∗∗∗
---------------------------------------------
This advisory includes information on classic buffer overflow and heap-based buffer overflow vulnerabilities in Fuji Electrics Alpha5 Smart Loader servo drive.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-270-02
∗∗∗ Fuji Electric FRENIC Devices ∗∗∗
---------------------------------------------
This advisory includes information on buffer over-read, out-of-bounds read, and stack-based buffer overflow vulnerabilities in Fuji Electrics FRENIC HVAC drive devices.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-270-03
∗∗∗ OpenSSH vulnerability CVE-2018-15473 ∗∗∗
---------------------------------------------
OpenSSH vulnerability CVE-2018-15473. Security Advisory. Security Advisory Description. OpenSSH through 7.7 is prone ...
---------------------------------------------
https://support.f5.com/csp/article/K28942395
∗∗∗ ZDI-18-1093: Delta Industrial Automation PMSoft rtl60 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1093/
∗∗∗ Foxit Reader, Foxit PhantomPDF: Mehrere Schwachstellen ermöglichen u. a. die Ausführung beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1972/
∗∗∗ IBM Security Bulletin: PowerKVM has released fixes in response to the vulnerabilities known as Foreshadow ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733108
∗∗∗ IBM Security Bulletin: Security Misconfiguration during Combined Cumulative Fix Installation Affects IBM WebSphere Portal (CVE-2018-1420) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22014276
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 25-09-2018 18:00 − Mittwoch 26-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Der nächste Meilenstein: [CERT.at #1000000] ∗∗∗
---------------------------------------------
Für unsere Kommunikation per E-Mail verwenden wir (wie viele Firmen) ein Ticketsystem, damit a) die Kommunikation für alle Teammitglieder nachvollziehbar ist, dass b) möglichst keine Anfragen unbeantwortet bleiben und c) der Workflow mit Meldung/Vorfall/Nachforschung abgebildet werden kann.
---------------------------------------------
http://www.cert.at/services/blog/20180926100651-2293.html
∗∗∗ Nach Safari und Chrome: Firefox ins Jenseits befördern ∗∗∗
---------------------------------------------
Mit einem präparierten Link kann Mozillas Firefox zum Absturz gebracht werden. Ähnliches hat ein Sicherheitsforscher zuvor mit Apples Safari und Googles Chrome gezeigt. Auf einer Webseite sammelt er die Lücken - mitsamt Absturz-Button.
---------------------------------------------
https://www.golem.de/news/nach-safari-und-chrome-firefox-ins-jenseits-befoe…
∗∗∗ New CVE-2018-8373 Exploit Spotted ∗∗∗
---------------------------------------------
On September 18, 2018, more than a month after we published a blog revealing the details of a use-after-free (UAF) vulnerability CVE-2018-8373 that affects the VBScript engine in newer Windows versions, we spotted another exploit that uses the same vulnerability. Its important to note that this exploit doesnt work on systems with updated Internet Explorer versions.
---------------------------------------------
https://blog.trendmicro.com/trendlabs-security-intelligence/new-cve-2018-83…
∗∗∗ Full compliance with the PCI DSS drops for the first time in six years ∗∗∗
---------------------------------------------
After documenting improvements in Payment Card Industry Data Security Standard (PCI DSS) compliance over the past six years (2010 – 2016), Verizon’s 2018 Payment Security Report (PSR) now reveals a concerning downward trend with companies failing compliance assessments and perhaps, more importantly, not maintaining – full compliance.
---------------------------------------------
https://www.helpnetsecurity.com/2018/09/26/pci-dss-compliance-drop/
∗∗∗ Gefälschte kabelplus-Phishingmail im Umlauf ∗∗∗
---------------------------------------------
Kriminelle versenden eine gefälschte kabelplus-Nachricht. Darin behaupten sie, dass „ihr Kabelplus Webmail (kabsi.at) Nachrichtenspeicher das Limit-Kontingent in unserer Datenbank erreicht“ hat. Aus diesem Grund sollen Kund/innen eine externe Website aufrufen und persönliche Daten bekannt geben. Diese übermitteln sie nicht an kabelplus, sondern an Kriminelle.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-kabelplus-phishingmail-i…
=====================
= Vulnerabilities =
=====================
∗∗∗ Magecart Attacks Grow Rampant in September ∗∗∗
---------------------------------------------
Attacks that compromise websites with scripts that steal payment card data from checkout pages have increased to hundreds of thousands of attempts in little over a month.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/magecart-attacks-grow-rampan…
∗∗∗ VU#581311: TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks ∗∗∗
---------------------------------------------
TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks
The TP-LINK EAP Controller is TP-LINKs software for remotely controlling wireless access point devices. EAP Controller for Linux lacks user authentication for RMI service commands, as well as utilizes an outdated vulnerable version of Apache commons-collections, which may allow an attacker to implement deserialization attacks and control the EAP Controller server.
---------------------------------------------
http://www.kb.cert.org/vuls/id/581311
∗∗∗ One Emotet infection leads to three follow-up malware infections, (Wed, Sep 26th) ∗∗∗
---------------------------------------------
In recent weeks, I've generally seen Emotet retrieve Trickbot, the IcedID banking Trojan, or spambot malware for its follow-up infection. I rarely see Emotet retrieve more than one type of follow-up malware. But on Tuesday 2018-09-25, my infected lab host retrieved Trickbot and IcedID immediately after an Emotet infection. Then IcedID caused another infection with AZORult on the same host.
---------------------------------------------
https://isc.sans.edu/diary/rss/24140
∗∗∗ eDirectory 9.1.1 Hot Patch 1 ∗∗∗
---------------------------------------------
This patch is an update to eDirectory 9.1 Support Pack 1 (9.1.1).
This update is being provided to resolve potential critical issues found since the latest patch
Architecture: x86-64
Security patch: Yes
Priority: Mandatory
---------------------------------------------
https://download.novell.com/Download?buildid=vP3nS-Hctkk~
∗∗∗ Stored Cross-Site Scripting in Kendo UI Editor ∗∗∗
---------------------------------------------
A cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application which allows attackers in the worst case to take over user sessions.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (python2.7 and python3.4), openSUSE (php5-smarty3), Oracle (389-ds-base, flatpak, kernel, and nss), Red Hat (389-ds-base, chromium-browser, flatpak, kernel, kernel-alt, kernel-rt, nss, and qemu-kvm-ma), and SUSE (ant, dom4j, kernel, and wireshark).
---------------------------------------------
https://lwn.net/Articles/766746/
∗∗∗ IBM Security Bulletin: Cross-Site Scripting Vulnerability Affects IBM WebSphere Portal (CVE-2018-1820) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732287
∗∗∗ IBM Security Bulletin: Security Vulnerability in Apache Batik Affects IBM WebSphere Portal (CVE-2018-8013) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731435
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK Affect IBM Algo Credit Manager ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728567
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Runtime Environments Java Technology Edition, Versions 7 & 8 Affect Transformation Extender ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720173
∗∗∗ IBM Security Bulletin: Open Redirect Vulnerability in IBM WebSphere Portal (CVE-2018-1736) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729683
∗∗∗ IBM Security Bulletin: Cross-Site Scripting Vulnerability in IBM WebSphere Portal (CVE-2018-1716) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729323
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities affect Liberty for Java for IBM Cloud ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732916
∗∗∗ IBM Security Bulletin: Open Source Libvorbis, Patch and Python-paramiko vulnerabilities affect IBM Netezza Host Management ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10729297
∗∗∗ IBM Security Bulletin: Cross-Site Scripting Vulnerability in IBM WebSphere Portal (CVE-2018-1660) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10715923
∗∗∗ IBM Security Bulletin: Publicly disclosed vulnerability from BIND affect IBM Netezza Host Management ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10729637
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 24-09-2018 18:00 − Dienstag 25-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Android Trojan reads Whatsapp-Messages ∗∗∗
---------------------------------------------
A spyware still in development can read users Whatsapp-Messages and other sensitive data. G DATA researchers analysed the Malware to protect our customers.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/09/31122-android-trojan-reads-whats…
∗∗∗ OpenPGP/GnuPG: Signaturen fälschen mit HTML und Bildern ∗∗∗
---------------------------------------------
PGP-Signaturen sollen gewährleisten, dass eine E-Mail tatsächlich vom korrekten Absender kommt. Mit einem simplen Trick kann man bei vielen Mailclients scheinbar signierte Nachrichten erstellen - indem man die entsprechende Anzeige mittels HTML fälscht. (OpenPGP, E-Mail)
---------------------------------------------
https://www.golem.de/news/openpgp-gnupg-signaturen-faelschen-mit-html-und-b…
∗∗∗ Analyzing Encoded Shellcode with scdbg, (Mon, Sep 24th) ∗∗∗
---------------------------------------------
Reader Jason analyzed a malicious RTF file: using OfficeMalScanner and xorsearch he was able to extract and find the entry point of the shellcode, but scdbg was not able to emulate the shellcode.
---------------------------------------------
https://isc.sans.edu/diary/rss/24134
=====================
= Vulnerabilities =
=====================
∗∗∗ Multiple Vulnerabilities in Cisco Identity Services Engine ∗∗∗
---------------------------------------------
Cisco Identity Services Engine (ISE) contains the following vulnerabilities: Cisco ISE Authenticated Arbitrary Command Execution Vulnerability Cisco ISE Support Information Download Authentication Bypass Vulnerability These ..
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
∗∗∗ DSA-4305 strongswan - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4305
∗∗∗ ZDI-18-1083: Apple Safari Array Concat Uninitialized Buffer Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1083/
∗∗∗ ZDI-18-1082: Apple Safari Subframe Same-Origin Policy Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1082/
∗∗∗ ZDI-18-1081: Apple Safari performProxyCall Internal Object Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1081/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 21-09-2018 18:00 − Montag 24-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malware Disguised as Job Offers Distributed on Freelance Sites ∗∗∗
---------------------------------------------
Attackers are using freelance job sites such as fiverr and Freelancer to distribute malware disguised as job offers. These job offers contain attachments that pretends to be the job brief, but are actually ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malware-disguised-as-job-off…
∗∗∗ Security: Curl bekommt eigenes Bug-Bounty-Programm ∗∗∗
---------------------------------------------
Das kleine Kommandozeilenwerkzeug Curl und dessen Bibliothek finden sich in nahezu allen vernetzten Geräten. Sicherheitsforscher erhalten künftig eine Bug-Bounty, also Geld für das Auffinden von Sicherheitslücken in der ..
---------------------------------------------
https://www.golem.de/news/security-curl-bekommt-eigenes-bug-bounty-programm…
∗∗∗ Adwind Dodges AV via DDE ∗∗∗
---------------------------------------------
Cisco Talos, along with fellow cybersecurity firm ReversingLabs, recently discovered a ..
---------------------------------------------
https://blog.talosintelligence.com/2018/09/adwind-dodgesav-dde.html
∗∗∗ Security - Android: Immer mehr Hersteller liefern Sicherheits-Updates ∗∗∗
---------------------------------------------
Mittlerweile 250 Modelle mit Patch Level aus den letzten 90 Tagen – Google zahlt 3 Millionen Dollar für Bug Bounties
---------------------------------------------
https://derstandard.at/2000087981052/Android-Immer-mehr-Hersteller-liefern-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Video Surveillance Manager Appliance Default Password Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote ..
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ DSA-4301 mediawiki - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4301
∗∗∗ DSA-4302 openafs - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4302
∗∗∗ ZDI-18-1079: Cisco WebEx Network Recording Player NMVC RtpConfig Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1079/
∗∗∗ ZDI-18-1078: Cisco WebEx Network Recording Player NMVC RtpConfig Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1078/
∗∗∗ Multiple vulnerabilities in Citrix StorageZones Controller ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-cit…
∗∗∗ Security vulnerabilities fixed in Firefox ESR 60.2.1 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-23/
∗∗∗ Security vulnerabilities fixed in Firefox 62.0.2 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-22/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 20-09-2018 18:00 − Freitag 21-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Unwiped Drives and Servers from NCIX Retailer for Sale on Craigslist ∗∗∗
---------------------------------------------
Servers and storage disks filled with millions of unencrypted confidential records of employees, customers ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/unwiped-drives-and-servers-f…
∗∗∗ Pre-Pwned AMI Images in Amazons AWS public instance store, (Fri, Sep 21st) ∗∗∗
---------------------------------------------
I keep getting reports about AMI images in Amazon&#;x26;#;39;s AWS, which come "pre-pwned." These images ..
---------------------------------------------
https://isc.sans.edu/diary/rss/24126
∗∗∗ AES Resulted in a $250-Billion Economic Benefit ∗∗∗
---------------------------------------------
NIST has released a new study concluding that the AES encryption standard has resulted in a $250-billion worldwide economic benefit over the past 20 years. I have no idea how to even begin to assess the quality of the ..
---------------------------------------------
https://www.schneier.com/blog/archives/2018/09/aes_resulted_in.html
∗∗∗ DanaBot shifts its targeting to Europe, adds new features ∗∗∗
---------------------------------------------
Recently, we have spotted a surge in activity of DanaBot, a stealthy banking Trojan discovered earlier this year. The malware, first observed in campaigns targeting Australia and later Poland, has apparently ..
---------------------------------------------
https://www.welivesecurity.com/2018/09/21/danabot-targeting-europe-adds-new…
∗∗∗ Cyber - USA und Großbritannien rüsten im Cyberspace auf ∗∗∗
---------------------------------------------
Größerer Fokus auf eigene Offensiven gegen Angreifer von außen
---------------------------------------------
https://derstandard.at/2000087842532/USA-und-Grossbritannien-ruesten-im-Cyb…
=====================
= Vulnerabilities =
=====================
∗∗∗ Tec4Data SmartCooler ∗∗∗
---------------------------------------------
This advisory includes mitigations for a missing authentication for critical function vulnerability in Tec4Datas SmartCooler, a cooling appliance.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-01
∗∗∗ Rockwell Automation RSLinx Classic ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow, heap-based buffer overflow, and resource exhaustion vulnerabilities in Rockwell Automation’s RSLinx Classic.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02
∗∗∗ Security Advisory 2018-05: Security Update for OTRS Framework ∗∗∗
---------------------------------------------
https://community.otrs.com/security-advisory-2018-05-security-update-for-ot…
∗∗∗ Security Advisory 2018-04: Security Update for OTRS Framework ∗∗∗
---------------------------------------------
https://community.otrs.com/security-advisory-2018-04-security-update-for-ot…
∗∗∗ Vuln: Microsoft Windows JET Database Engine Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105376
∗∗∗ Wireshark Bugs in Multiple Dissectors Let Remote Users Cause the Application to Crash or Consume Excessive CPU Resources ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041608
∗∗∗ MediaWiki Multiple Flaws Let Remote Authenticated Users Bypass Security Restrictions and Obtain Potentially Sensitive Information ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041695
∗∗∗ Asterisk Stack Overflow in HTTP Websocket Upgrade Lets Remote Users Cause the Target Service to Crash ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041694
∗∗∗ RSA Authentication Manager Input Validation Flaws Let Remote Users Conduct Cross-Site Scripting Attacks ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041697
∗∗∗ HPESBST03881 rev.1 - HPE Command View Advanced Edition (CVAE), Local and Remote Access Restriction Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03879 rev.1 - HPE StorageWorks XP7 Automation Director (AutoDir), Local and Remote Authentication Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03882 rev.1 - HPE Command View Advance Edition (CVAE) using JDK, Local and Remote Authentication Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 19-09-2018 18:00 − Donnerstag 20-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hunderttausende Überwachungskameras wegen Linux-Schwachstelle angreifbar ∗∗∗
---------------------------------------------
Die Angreifer können die Aufzeichnungen live ansehen, Material löschen oder Videos in Dauerschleife abspielen, um Einbrüche zu verschleiern.
---------------------------------------------
https://futurezone.at/digital-life/hunderttausende-ueberwachungskameras-weg…
∗∗∗ BSI veröffentlicht Übersicht qualifizierter DDoS-Mitigation-Dienstleister ∗∗∗
---------------------------------------------
Basierend auf den ebenfalls veröffentlichten Auswahlkriterien für qualifizierte Dienstleister wurde ein wettbewerbsneutrales Verfahren entwickelt, durch das erste geeignete DDoS-Mitigation-Dienstleister identifiziert werden konnten.
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/DDos-Mitiga…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (glusterfs, php5, reportbug, and suricata), openSUSE (chromium and exempi), Red Hat (openstack-rabbitmq-container), SUSE (couchdb, crowbar, crowbar-core, crowbar-ha, crowbar-init, crowbar-openstack, crowbar-ui, gdm, OpenStack, pango, and webkit2gtk3), and Ubuntu (bind9, lcms, lcms2, and lcms2).
---------------------------------------------
https://lwn.net/Articles/765814/
∗∗∗ Vuln: Symantec Messaging Gateway CVE-2018-12243 XML External Entity Injection Vulnerability ∗∗∗
---------------------------------------------
Symantec Messaging Gateway is prone to an XML External Entity injection vulnerability.
Attackers can exploit this issue to gain access to sensitive information or cause denial-of-service conditions.
Versions prior to Messaging Gateway 10.6.6 are vulnerable
---------------------------------------------
http://www.securityfocus.com/bid/105330
∗∗∗ Vuln: Symantec Messaging Gateway CVE-2018-12242 Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
Symantec Messaging Gateway is prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks.
Versions prior to Messaging Gateway 10.6.6 are vulnerable
---------------------------------------------
http://www.securityfocus.com/bid/105329
∗∗∗ Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX Security Bulletin ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=ibm10730909
∗∗∗ IBM Security Bulletin: A Security Vulnerability affects IBM Cloud Private Cloud Foundry (CVE-2018-11047) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731715
∗∗∗ IBM Security Bulletin: Privilege escalation vulnerability affects IBM Db2 Administrative Task Scheduler (CVE-2018-1711). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729983
∗∗∗ IBM Security Bulletin: Buffer overflow in IBM Db2 tool db2licm (CVE-2018-1710). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729981
∗∗∗ IBM Security Bulletin: Privilege escalation in IBM Db2 tool db2cacpy (CVE-2018-1685). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729979
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSL affects AIX (CVE-2018-0732) Security Bulletin ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731039
∗∗∗ IBM Security Bulletin: IBM Cloud Private Cloud Foundry is vulnerable to a security vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731705
∗∗∗ IBM Security Bulletin: Vulnerabilities in GSKit affect IBM Spectrum Scale used by DB2 pureScale (CVE-2018-1431, CVE-2018-1447, CVE-2017-3732, CVE-2016-0705) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731657
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 18-09-2018 18:00 − Mittwoch 19-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Western Digitals My Cloud NAS Devices Turn Out to Be Easily Hacked ∗∗∗
---------------------------------------------
Security researchers have discovered an authentication bypass vulnerability in Western Digitals My Cloud NAS devices that potentially allows an unauthenticated attacker to gain admin-level control to the affected devices.
---------------------------------------------
https://thehackernews.com/2018/09/wd-my-cloud-nas-hacking.html
∗∗∗ XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins ∗∗∗
---------------------------------------------
It appears that on Windows, Xbash will focus on malicious cryptomining functions and self-propagation techniques, while on Linux systems, the malware will flaunt its data destructive tendencies; as the malware triggers a downloader to execute a coinminer on Windows, while on Linux it flaunts ransomware functions.
---------------------------------------------
https://threatpost.com/xbash-malware-packs-double-punch-destroys-data-and-m…
∗∗∗ TIPs to Securely Deploy Industrial Control Systems ∗∗∗
---------------------------------------------
Schneider Electric has authored a whitepaper “Effective Implementation of Cybersecurity Countermeasures in Industrial Control Systems” that takes asset owners through the system deployment process. In this blog article, I will provide a brief overview of the concepts presented in the whitepaper.
---------------------------------------------
https://blog.schneider-electric.com/cyber-security/2018/09/18/tips-to-secur…
∗∗∗ Fake finance apps on Google Play target users from around the world ∗∗∗
---------------------------------------------
Another set of fake finance apps has found its way into the official Google Play store. This time, the apps have impersonated six banks from New Zealand, Australia, the United Kingdom, Switzerland and Poland, and the Austrian cryptocurrency exchange Bitpanda. Using bogus forms, the malicious fakes phish for credit card details and/or login credentials to the impersonated legitimate services.
---------------------------------------------
https://www.welivesecurity.com/2018/09/19/fake-finance-apps-google-play-tar…
∗∗∗ Multi-Vector WordPress Infection from Examhome ∗∗∗
---------------------------------------------
This September, we’ve been seeing a massive infection wave that injects malicious JavaScript code into .js, .php files and the WordPress database.
---------------------------------------------
http://labs.sucuri.net/?note=2018-09-18
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Updates available for Adobe Acrobat and Reader (APSB18-34) ∗∗∗
---------------------------------------------
Adobe has published security bulletin for Adobe Acrobat and Reader (APSB18-34) for Windows and MacOS. These updates address critical and important vulnerabilities, and Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1617
∗∗∗ BSRT-2018-003 Directory traversal vulnerability impacts the Connect Service of the BlackBerry Enterprise Mobility Server ∗∗∗
---------------------------------------------
This advisory addresses a directory traversal vulnerability that has been discovered in the Connect Service of the BlackBerry Enterprise Mobility Server (BEMS). BlackBerry is not aware of any exploitation of this vulnerability. Customer risk is limited ...
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Google Chrome, Chromium: Eine Schwachstelle ermöglicht nicht spezifizierte Angriffe ∗∗∗
---------------------------------------------
Ein Angreifer kann aufgrund einer Schwachstelle welche mit dem Schweregrad 'high' bewertet wird nicht weiter spezifizierte Angriffe ausführen. In der Vergangenheit konnten derartige Schwachstellen zumeist von einem entfernten und nicht authentisierten Angreifer ausgenutzt werden.
Google stellt die Chrome und Chromium Version 69.0.3497.100 als Sicherheitsupdate bereit.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1886/
∗∗∗ Xcode: Eine Schwachstelle ermöglicht die Übernahme des Systems ∗∗∗
---------------------------------------------
Ein lokaler, einfach authentifizierter Angreifer kann die Schwachstelle mit Hilfe einer speziell präparierten Anwendung ausnutzen, um beliebigen Programmcode mit Kernelprivilegien auszuführen und dadurch das komplette System zu übernehmen.
Apple stellt Xcode 10 für macOS High Sierra 10.13.6 und später zur Behebung der Schwachstelle bereit.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1885/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium-browser and libapache2-mod-perl2), Oracle (kernel), and Ubuntu (ghostscript, glib2.0, and php5).
---------------------------------------------
https://lwn.net/Articles/765573/
∗∗∗ WECON PLC Editor ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-261-01
∗∗∗ Vuln: Apache Camel CVE-2018-8041 Directory Traversal Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105352
∗∗∗ Security Advisory - Sensitive Information Leak Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180919-…
∗∗∗ IBM Security Bulletin: Information Disclosure Security Vulnerability Affects IBM Sterling B2B Integrator (CVE-2018-1800) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731379
∗∗∗ IBM Security Bulletin: Blind SQL injection vulnerability in IBM Business Automation Workflow and IBM Business Process Manager (CVE-2018-1674) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720035
∗∗∗ IBM Security Bulletin: IBM Data Science Experience Local is affected by a cryptography vulnerability ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10720161
∗∗∗ The BIG-IP ASM system may stop enforcing attack signatures after activating a security policy that includes a new signature ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K83093212
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 17-09-2018 18:00 − Dienstag 18-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Public Shaming of Companies for Bad Security ∗∗∗
---------------------------------------------
Troy Hunt makes some good points, with good examples.
---------------------------------------------
https://www.schneier.com/blog/archives/2018/09/public_shaming_.html
∗∗∗ New XBash malware combines features from ransomware, cryptocurrency miners, botnets, and worms ∗∗∗
---------------------------------------------
Palo Alto Network researchers discovered a new malware, tracked as XBash, that combines features from ransomware, cryptocurrency miners, botnets, and worms Security researchers at Palo Alto Networks have ..
---------------------------------------------
https://securityaffairs.co/wordpress/76305/malware/xbash-malware.html
∗∗∗ Extended Validation Certificates are Dead ∗∗∗
---------------------------------------------
Thats it - Im calling it - extended validation certificates are dead. Sure, you can still buy them (and there are companies out there that would just love to sell them to you!), but their usefulness has now descended from ..
---------------------------------------------
https://www.troyhunt.com/extended-validation-certificates-are-dead/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Advisory: CVE-2018-13982: Smarty 3.1.32 or below Trusted-Directory Bypass via Path Traversal ∗∗∗
---------------------------------------------
Smarty 3.1.32 or below is prone to a path traversal vulnerability due to insufficient sanitization of code in Smarty templates. This allows attackers controlling the Smarty template to bypass the trusted directory security restriction and read arbitrary files. Full security advisory
---------------------------------------------
https://www.sba-research.org/2018/09/18/security-advisory-cve-2018-13982-sm…
∗∗∗ VMSA-2018-0015.1 ∗∗∗
---------------------------------------------
VMware AirWatch Agent updates resolve remote code execution vulnerability.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0015.html
∗∗∗ iOS 12 is out today - Updates for Safari, watchOS, tvOS, iOS. Full details here https://support.apple.com/en-ca/HT201222, (Tue, Sep 18th) ∗∗∗
---------------------------------------------
https://isc.sans.edu/diary/rss/24112
∗∗∗ IBM Security Bulletin: IBM Connections Security Refresh for Apache Struts Remote Code Execution (RCE) Vulnerability (CVE-2018-11776) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10731343
∗∗∗ IBM Security Bulletin: IBM Cloud Manager with OpenStack is affected by a OpenSSL vulnerabilities (CVE-2018-0739) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10725849
∗∗∗ Remote Code Execution in Moodle ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-un…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 14-09-2018 18:00 − Montag 17-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Upcoming Security Updates for Adobe Acrobat and Reader (APSB18-34) ∗∗∗
---------------------------------------------
A prenotification security advisory (APSB18-34) has been posted regarding upcoming Adobe Acrobat and Reader updates scheduled for Wednesday, September 19, 2018. We will continue to provide updates on the upcoming release via the Security Bulletins and Advisories page as well [...]
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1609
∗∗∗ CSS-basierte Web-Attacke bringt iPhones zum Absturz ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat eine Schwachstelle in iOS entdeckt, mit der iPhones zum Absturz gebracht und neu gestartet werden können.
---------------------------------------------
https://futurezone.at/digital-life/css-basierte-web-attacke-bringt-iphones-…
∗∗∗ Fbot, A Satori Related Botnet Using Block-chain DNS System ∗∗∗
---------------------------------------------
Since 2018-09-13 11:30 UTC, a new botnet (we call it Fbot) popped up in our radar which really caught our attention.There are 3 interesting aspects about this new botnet:First, so far the only purpose of this botnet looks to be just going after and removing another botnet
---------------------------------------------
http://blog.netlab.360.com/threat-alert-a-new-worm-fbot-cleaning-adbminer-i…
∗∗∗ Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows ∗∗∗
---------------------------------------------
Unit 42 researchers discover Xbash, a new malware family tied to the Iron Group targeting Linux and Microsoft Servers
---------------------------------------------
https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-b…
∗∗∗ User Agent String "$ua.tools.random()" ? :-) ! ∗∗∗
---------------------------------------------
For many years I've observed requests for page license.php on my webservers, from various IPs and with various User Agent Strings: [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/24102
∗∗∗ Outdated Duplicator Plugin RCE Abused ∗∗∗
---------------------------------------------
We’re seeing an increase in the number of cases where attackers are disabling WordPress sites by removing or rewriting its wp-config.php file. These cases are all linked to the same vulnerable software: WordPress Duplicator Plugin. Versions lower than 1.2.42 of Snap Creek Duplicator plugin are vulnerable to a Remote Code Execution attack, where the malicious visitor is able to run any arbitrary code on the target site.
---------------------------------------------
https://blog.sucuri.net/2018/09/outdated-duplicator-plugin-rce-abused.html
∗∗∗ Erlang Authenticated Remote Code Execution ∗∗∗
---------------------------------------------
Erlang is a programming language that I have tried to learn a few times in the past but never really dug in, that is, until recently.Erlange is an interesting language because it has “built-in concurrency, distribution, and fault tolerence”. To me, this means that it does job queing and distributed tasks right out of the gate.
---------------------------------------------
https://malicious.link/post/2018/erlang-arce/
∗∗∗ Bewerbungsschreiben verbreiten Schadsoftware ∗∗∗
---------------------------------------------
Unternehmen erhalten von Arbeitssuchenden elektronische Bewerbungsschreiben. Für die ausführlichen und angehängten Bewerbungsunterlagen der Kandidat/innen sollen sie einen Dateianhang im ZIP-Format öffnen. Er beinhaltet ausführbare Microsoft Windows-Anwendungen, die Schadsoftware sind. Diese Anwendungen dürfen Mitarbeiter/innen nicht öffnen, denn damit installieren sie die Schadsoftware.
---------------------------------------------
https://www.watchlist-internet.at/news/bewerbungsschreiben-verbreiten-schad…
∗∗∗ gymondi.com ist ein Fakeshop ∗∗∗
---------------------------------------------
Gymondi.com ist ein sehr aufwendig aufgesetzter Onlineshop, der das Herz von Sportler/innen höherschlagen lässt. Konsument/innen finden bei gymondi.com Fitnessgeräte zu günstigeren Preisen als bei der Konkurrenz. Zusätzlich zum Preisvorteil kann ein 20% Rabattgutschein eingelöst werden, was den Gesamtpreis erheblich mindert. Wir raten von einem Einkauf ab! Sie werden lediglich um einen hohen Geldbetrag betrogen und gehen leer aus.
---------------------------------------------
https://www.watchlist-internet.at/news/gymondicom-ist-ein-fakeshop/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (discount, ghostscript, intel-microcode, mbedtls, thunderbird, and zutils), Fedora (ghostscript, java-1.8.0-openjdk-aarch32, kernel-headers, kernel-tools, libzypp, matrix-synapse, nspr, nss, nss-softokn, nss-util, zsh, and zypper), Mageia (kernel, kernel-linus, and kernel-tmb), openSUSE (chromium, curl, ffmpeg-4, GraphicsMagick, kernel, libzypp, zypper, okular, python3, spice-gtk, tomcat, and zsh), Oracle (kernel), Slackware (php), SUSE (curl, [...]
---------------------------------------------
https://lwn.net/Articles/765048/
∗∗∗ BlackBerry Powered by Android Security Bulletin - September 2018 ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Moodle: Mehrere Schwachstellen ermöglichen u. a. die Ausführung beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1871/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 13-09-2018 18:00 − Freitag 14-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Interesting approach: Skill Squatting with Amazon Echo ∗∗∗
---------------------------------------------
Mishearing something every once in a while is a normal thing for humans. In that respect, Amazon Echo has some human characteristics as well. A research team from the University of Illinois has taken a closer look at Echo, Alexa and the abuse potential for malicious Alexa skills. They have presented their findings at the Usenix conference.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/09/31112-skill-squatting-amazon-echo
∗∗∗ Windows, Linux Kodi Users Infected With Cryptomining Malware ∗∗∗
---------------------------------------------
An anonymous reader quotes a report from ZDNet: Users of Kodi, a popular media player and platform designed for TVs and online streaming, have been the targets of a malware campaign, ZDNet has learned from cyber-security firm ..
---------------------------------------------
https://it.slashdot.org/story/18/09/13/2118233/windows-linux-kodi-users-inf…
∗∗∗ Apple Has Started Paying Hackers for iPhone Exploits ∗∗∗
---------------------------------------------
Lorenzo Franceschi-Bicchierai, reporting for Motherboard: In 2016, Apples head of security surprised the attendees of one of the biggest security conference in the world by announcing a bug bounty program for Apples mobile operating ..
---------------------------------------------
https://it.slashdot.org/story/18/09/14/1441201/apple-has-started-paying-hac…
∗∗∗ Unsuccessfully Defaced Websites ∗∗∗
---------------------------------------------
Defaced websites are a type of hack that is easy to notice and a pain for website owners. Recently, we came across some defacement pages with a peculiar JavaScript injection included in the source code. What is a ..
---------------------------------------------
https://blog.sucuri.net/2018/09/unsuccessfully-defaced-websites.html
∗∗∗ DarkCloud Bootkit ∗∗∗
---------------------------------------------
In an earlier blog about crypto-malware, we described different techniques used by cybercriminals, such as cryptomining and wallet stealing. In this blog, we will provide a technical analysis of yet another type of ..
---------------------------------------------
https://www.zscaler.com/blogs/research/darkcloud-bootkit
∗∗∗ Bug in Intels ME-Firmware: Wieder BIOS-Updates nötig ∗∗∗
---------------------------------------------
Die russischen Experten von PTE haben erneut einen schwerwiegenden Bug bei kryptografischen Schlüsseln in Intels Management Engine (ME) entdeckt.
---------------------------------------------
https://heise.de/-4165732
∗∗∗ GlobeImposter use new ways to spread to the globe: How to prevent falling victims? ∗∗∗
---------------------------------------------
Recently, there have been many incidents of ransomware attacks. Once users are ..
---------------------------------------------
https://blog.360totalsecurity.com/en/globeimposter-use-new-ways-to-spread-t…
∗∗∗ Hacking an assault tank… A Nerf one ∗∗∗
---------------------------------------------
TL;DR A complex, challenging reverse and hijack of a toy tank Nerf gun camera, but the result was we got to shoot the 44Con conference organiser with it! Why A remote-controlled Nerf gun with ..
---------------------------------------------
https://www.pentestpartners.com/security-blog/hacking-an-assault-tank-a-ner…
=====================
= Vulnerabilities =
=====================
∗∗∗ Honeywell Mobile Computers with Android Operating Systems ∗∗∗
---------------------------------------------
This advisory includes mitigations for an improper privilege management vulnerability in the Honeywell mobile computers running the Android Operating System.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01
∗∗∗ CVE-2018-16962: Webroot SecureAnywhere macOS Kernel Level Memory Corruption ∗∗∗
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-16962--Webroot-Sec…
∗∗∗ HPESBHF03866 rev.1 - HPE Integrated Lights-Out 3,4,5 using SSH, Remote Execution of Arbitrary Code and Disclosure of Sensitive Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 12-09-2018 18:00 − Donnerstag 13-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Office VBA + AMSI: Parting the veil on malicious macros ∗∗∗
---------------------------------------------
As part of our continued efforts to tackle entire classes of threats, Office 365 client applications now integrate with Antimalware Scan Interface (AMSI), enabling antivirus and other security solutions to scan macros and other scripts at runtime to check for malicious behavior.
---------------------------------------------
https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi…
∗∗∗ A New Mining Botnet Blends Its C2s into ngrok Service ∗∗∗
---------------------------------------------
These days, it feels like new mining malwares are popping up almost daily and we have pretty much stopped blogging the regular ones so we don’t flood our readers’ feed. With that being said, one did have our attention recently. This botnet hides its C2s(Downloader and Reporter [...]
---------------------------------------------
http://blog.netlab.360.com/a-new-mining-botnet-blends-its-c2s-into-ngrok-se…
∗∗∗ Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars ∗∗∗
---------------------------------------------
High-end vehicles are often equipped with a Passive Keyless Entry and Start (PKES) system. These PKES systems allow to unlock and start the vehicle based on the physical proximity of a paired key fob; no user interaction is required.
---------------------------------------------
https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyles…
∗∗∗ The 42M Record kayo.moe Credential Stuffing Data ∗∗∗
---------------------------------------------
This is going to be a brief blog post but its a necessary one because I cant load the data Im about to publish into Have I Been Pwned (HIBP) without providing more context than what I can in a single short breach description. Heres the story: [...]
---------------------------------------------
https://www.troyhunt.com/the-42m-record-kayo-moe-credential-stuffing-data/
∗∗∗ Keine 359,88 Euro an Streaming-Plattformen zahlen ∗∗∗
---------------------------------------------
Die Streaming-Plattformen borastream.de und matostream.de verlangen von Besucher/innen eine kostenlose Registrierung. Sie führt ohne Hinweis zu einer Premium-Mitgliedschaft um 359,88 Euro pro Jahr. Konsument/innen müssen die Rechnung der Website-Betreiberinnen Roxo Films Ltd bzw. Filmser Ltd27 nicht bezahlen, denn ihre Angebote sind unseriöse Abo-Fallen.
---------------------------------------------
https://www.watchlist-internet.at/news/keine-35988-euro-an-streaming-plattf…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ghostscript and openssh), Oracle (firefox), Scientific Linux (firefox and OpenAFS), SUSE (tomcat), and Ubuntu (openjdk-lts).
---------------------------------------------
https://lwn.net/Articles/764713/
∗∗∗ ZDI-18-1046: (0Day) PoDoFo Library ParseToUnicode Memory Corruption Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1046/
∗∗∗ Intel Baseboard Management Controller (BMC) Firmware: Eine Schwachstelle ermöglicht die Eskalation von Privilegien ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1861/
∗∗∗ IBM Security Bulletin: IBM Connections Security Refresh (CVE-2018-1791) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731207
∗∗∗ IBM Security Bulletin: Vulnerabilities identified in IBM® Java SDK affect WebSphere Service Registry and Repository and WebSphere Service Registry and Repository Studio (CVE-2018-1656 and CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728399
∗∗∗ IBM Security Bulletin: Weaker than expected security in WebSphere Application Server (CVE-2018-1719) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718837
∗∗∗ IBM Security Bulletin: A Vulnerability in the Java runtime environment that IBM provides affects WebSphere DataPower XC10 Appliance ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718653
∗∗∗ IBM Security Bulletin: A Vulnerability in Java runtime environment that IBM provides affects WebSphere eXtreme Scale ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718453
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSH affects QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731317
∗∗∗ IBM Security Bulletin: WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium) is affected by OpenSSL vulnerability CVE-2018-0739 ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731019
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 11-09-2018 18:00 − Mittwoch 12-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ British Airways Breach Caused By the Same Group That Hit Ticketmaster ∗∗∗
---------------------------------------------
A cyber-criminal operation known as Magecart is believed to have been behind the recent card breach announced last week by British Airways. The operation has been active since 2015 when RisqIQ and ClearSky researchers spotted the malware for the first time. The groups regular mode of operation involves hacking into online stores and hiding JavaScript code that steals payment card information entered into store checkout pages, [...]
---------------------------------------------
https://it.slashdot.org/story/18/09/11/1116221/british-airways-breach-cause…
∗∗∗ When is a patch not a patch? When its for this McAfee password bug ∗∗∗
---------------------------------------------
Vulnerability still open to all despite multiple fixes A privilege escalation flaw in McAfees True Key software remains open to exploitation despite multiple attempts to patch it.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/09/11/mcafee_flaw…
∗∗∗ Back up a minute: Veeam database config snafu exposed millions of customer records ∗∗∗
---------------------------------------------
Firm helps self with own disaster recovery A misconfigured server at data recovery and backup firm Veeam exposed millions of email addresses.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/09/12/veeam_datab…
∗∗∗ Erpresserische E-Mail droht mit Masturbationsvideo ∗∗∗
---------------------------------------------
Unternehmen erhalten eine erpresserische E-Mail, die angeblich von ihrer eigenen Adresse stammt. Darin behaupten Kriminelle, dass sie Zugriff auf den fremden Computer haben und über Masturbationsvideos der Empfänger/innen verfügen. Opfer sollen Bitcoins zahlen, damit es zu keiner Veröffentlichung kommt. Der Inhalt der Nachricht ist erfunden. Eine Zahlung ist nicht erforderlich.
---------------------------------------------
https://www.watchlist-internet.at/news/erpresserische-e-mail-droht-mit-mast…
∗∗∗ Warnung vor telmo24.de ∗∗∗
---------------------------------------------
Der Fake-Shop telmo24.de vertreibt günstige Handys und Tablets. Trotz Bezahlung liefert er keine Ware. Konsument/innen können den Fake-Shop daran erkennen, dass er über sehr niedrige Preise verfügt und ausschließlich eine Bezahlung im Voraus akzeptiert. Vor einem Einkauf ist dringend abzuraten!
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-telmo24de/
∗∗∗ Sicherheit - Microsoft schließt drei gefährliche Zero-Day-Lücken bei Windows ∗∗∗
---------------------------------------------
Eine davon auch bereits aktiv ausgenutzt - Insgesamt 17 kritische Lücken behoben
---------------------------------------------
https://derstandard.at/2000087198816/Microsoft-schliesst-drei-gefaehrliche-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kamailio, libextractor, and mgetty), Fedora (community-mysql, ghostscript, glusterfs, iniparser, okular, and zsh), openSUSE (compat-openssl098, php5, and qemu), Red Hat (firefox), SUSE (libzypp, zypper, python3, spark, and zsh), and Ubuntu (zsh).
---------------------------------------------
https://lwn.net/Articles/764645/
∗∗∗ OpenAFS: Mehrere Schwachstellen ermöglichen u. a. die Manipulation von Daten ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1854/
∗∗∗ INTEL-SA-00125: A potential security vulnerability in Intel CSME, Intel Server Platform Services and Intel Trusted Execution Engine Firmware may allow information disclosure ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ Security Advisory - FRP Bypass Vulnerability on Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180912-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2018 CPU that is bundled with IBM WebSphere Application Server Patterns ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729745
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management could allow an authenticated attacker to obtain sensitive information. (CVE-2018-1698) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728857
∗∗∗ IBM Security Bulletin: Potential spoofing attack in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1695) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730979
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities affect IBM® SDK for Node.js™ in IBM Cloud ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22012749
∗∗∗ IBM Security Bulletin: Code execution vulnerability in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1567) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730983
∗∗∗ IBM Security Bulletin: Vulnerabilities in OpenSSL affect GCM16 & GCM32 KVM Switch Firmware ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10731205
∗∗∗ libidn vulnerability CVE-2016-6263 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K25353544
∗∗∗ HPESBHF03893 rev.1 - HPE Intelligent Management Center (iMC) Wireless Services Manager Software, Remote Code Execution ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03876 rev.1 - HPE ProLiant ML10 Gen9 Servers with Intel-based Processors using Active Management Technology (AMT), Multiple Local Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03873 rev.1 - Certain HPE Gen10 Servers with Intel-based Processors using Converged Security and Management Engine (CSME), and Power Management Controller (PMC) Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 10-09-2018 18:00 − Dienstag 11-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Mongo Lock Attack Ransoming Deleted MongoDB Databases ∗∗∗
---------------------------------------------
An attack called Mongo Lock is targeting remotely accessible and unprotected MongoDB databases, wiping them, and then demanding a ransom in order to get the contents back.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/mongo-lock-attack-ransoming-…
∗∗∗ OpenSSL 1.1.1 Is Released ∗∗∗
---------------------------------------------
Since 1.1.1 is our new LTS release we are strongly advising all users to upgrade as soon as possible. For most applications this should be straight forward if they are written to work with OpenSSL 1.1.0.
---------------------------------------------
https://www.openssl.org/blog/blog/2018/09/11/release111/
∗∗∗ "Google Fonts" popup leads to malware ∗∗∗
---------------------------------------------
A recent malware injection in a client's WordPress file was found to be targeting website visitors that were using the Google Chrome browser to access the infected website. It uses Javascript to detect the visitor's use of Google Chrome and then upon the visitor clicking it generates a popup notification which falsely claims that the visitor's Google Chrome is missing the "HoeflerText" font ...
---------------------------------------------
http://labs.sucuri.net/?note=2018-09-10
∗∗∗ Nicht auf gamingkoenig.org reinfallen ∗∗∗
---------------------------------------------
Bei gamingkoenig.org wird Computerzubehör zu Schnäppchenpreisen angeboten. Konsument/innen dürfen bei dem Anbieter auf keinen Fall bestellen, denn es handelt sich um einen Fakeshop. Die bestellte Ware wird sie nie erreichen und Konsument/innen verlieren einen hohen Geldbetrag.
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-auf-gamingkoenigorg-reinfallen/
∗∗∗ Anwaltsschreiben mit Schadsoftware im Umlauf ∗∗∗
---------------------------------------------
Kriminelle versenden unter dem Namen von erfundenden Anwaltskanzleien betrügerische E-Mails. Darin behauten sie, dass Empfänger/innen einen pornografischen Film angesehen und damit eine Urheberrechtsverletzung begangen haben. Weiterführende Informationen dazu finden sich angeblich in einem Dateianhang. Er verbirgt Schadsoftware und darf nicht geöffnet werden.
---------------------------------------------
https://www.watchlist-internet.at/news/anwaltsschreiben-mit-schadsoftware-i…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
Adobe has published security bulletins for Adobe ColdFusion(APSB18-33) and Adobe Flash Player (APSB18-31). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1607
∗∗∗ eDirectory 9.1.1 Hot Patch 1 ∗∗∗
---------------------------------------------
This update is being provided to resolve potential critical issues found since the latest patch:
- Open unvalidated redirect vulnerability in iMonitor (Bug 1082040) (CVE-2018-7692)
---------------------------------------------
https://download.novell.com/Download?buildid=vP3nS-Hctkk~
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libextractor), Fedora (godot and iniparser), Oracle (kernel), Red Hat (chromium-browser and Fuse 7.1), SUSE (compat-openssl098, openssh, php5, php53, qemu, and tiff), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2, and linux-hwe, linux-azure, linux-gcp).
---------------------------------------------
https://lwn.net/Articles/764575/
∗∗∗ Vuln: SAP Business One For Android CVE-2018-2460 Certificate Validation Security Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105309
∗∗∗ Vuln: SAP NetWeaver WebDynpro Java CVE-2018-2464 Cross Site Scripting Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105308
∗∗∗ Vuln: SAP Business One CVE-2018-2458 Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105307
∗∗∗ Cisco Email Security Appliance and Content Security Management Appliance HTTP Response Splitting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Advisory - Two Insufficient Input Validation Vulnerabilities in Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180911-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730799
∗∗∗ IBM Security Bulletin: IBM API Connect is impacted by a Drupal 8 vulnerability (CVE-2018-14773) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10719697
∗∗∗ IBM Security Bulletin: Datacap Taskmaster Capture, Datacap Fastdoc Capture and Datacap Navigator is affected by vulnerability due to unexpected authentication behavior ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729013
∗∗∗ IBM Security Bulletin: Rational Asset Analyzer (RAA) is affected by a WAS Liberty vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720295
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM QRadar SIEM ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729699
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-0732, CVE-2018-0737) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730811
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by a Denial of Service vulnerability (CVE-2018-0739) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10726053
∗∗∗ IBM Security Bulletin: IBM BladeCenter Advanced Management Module (AMM) is affected by a vulnerability in bind (CVE-2017-3145) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719051
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities in Apache Geronimo Affect IBM Sterling B2B Integrator ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728841
∗∗∗ SSA-268644 (Last Update: 2018-09-11): Spectre-NG (Variants 3a and 4) Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
∗∗∗ SSA-346256 (Last Update: 2018-09-11): Vulnerability in SIMATIC WinCC OA V3.14 and prior ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-346256.pdf
∗∗∗ SSA-198330 (Last Update: 2018-09-11): Local Privilege Escalation in TD Keypad Designer ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-198330.pdf
∗∗∗ SSA-447396 (Last Update: 2018-09-11): Denial-of-Service in SCALANCE X300, SCALANCE X408 and SCALANCE X414 ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-447396.pdf
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 07-09-2018 18:00 − Montag 10-09-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ VLAN Hopping and Mitigation ∗∗∗
---------------------------------------------
We'll start with a few concepts: VLAN A VLAN is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices. Security is one of the many reasons network administrators configure VLANs. However, with an exploit known as VLAN Hopping, an attacker is able to bypass these security implementations.
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/vlan-hopping-and-mitig…
∗∗∗ Keybase Browser Extension Could Allow Sites to See Messages ∗∗∗
---------------------------------------------
The browser extension for the Keybase app fails to keep the end-to-end encryption promised by its desktop variant as sites could see the text being types into the chat area.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/keybase-browser-extension-co…
∗∗∗ Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall ∗∗∗
---------------------------------------------
Unit 42 has uncovered new variants of the well-known IoT botnets Mirai and Gafgyt. These are the IoT botnets associated with unprecedented Distributed Denial of Service attacks in November 2016 and since.
---------------------------------------------
https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-io…
∗∗∗ Knuddels.de: Millionen Nutzerdaten mit Passwörtern geleakt ∗∗∗
---------------------------------------------
Bei der deutschen Chat-Community Knuddels.de gab es ein immenses Datenleck: Die Accountdaten fast aller Nutzer standen im Netz.
---------------------------------------------
https://heise.de/-4158265
∗∗∗ Apps that steal users' browser histories kicked out of the Mac App store ∗∗∗
---------------------------------------------
Apple has removed "Adware Doctor" from the macOS App Store amid claims that the program was uploading browser histories to China. And it turns out that wasnt the only popular app stealing users private information.
---------------------------------------------
https://www.tripwire.com/state-of-security/featured/apps-that-steal-users-b…
∗∗∗ Irreführende Rechnung von ITR Register ∗∗∗
---------------------------------------------
Unternehmen, die ihre Marke oder ihr Geschmacksmuster beim Amt der Europäischen Union für Geistiges Eigentum (EuIPO) registrieren, erhalten eine Rechnung von ITR Register. Sie sollen 1.380 Euro für einen Eintrag auf itr-service.com bezahlen. Die Zahlungsaufforderung von ITR Register ist ein irreführendes Vertragsangebot. Unternehmen müssen den Geldbetrag nicht bezahlen.
---------------------------------------------
https://www.watchlist-internet.at/news/irrefuehrende-rechnung-von-itr-regis…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium-browser, curl, discount, firefox-esr, ghostscript, and openssh), Fedora (curl, firefox, ghostscript, glibc, mod_perl, thunderbird, and unixODBC), openSUSE (chromium, firefox, GraphicsMagick, nodejs4, and thunderbird), Oracle (kernel), and SUSE (java-1_7_1-ibm and kvm).
---------------------------------------------
https://lwn.net/Articles/764511/
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by multiple issues ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10726039
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by a Denial of Service vulnerability (CVE-2018-0732) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730341
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect DataPower Gateways ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10726009
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by a vulnerability in OpenSSL (CVE-2018-0737) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730515
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM HTTP Server affects Netezza Performance Portal ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728351
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM HTTP Server affects Netezza Performance Portal ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718249
∗∗∗ RSA BSAFE Crypto-J Crypto Timing Error Lets Remote Users Obtain Keys ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041615
∗∗∗ RSA BSAFE SSL-J Crypto Timing and Memory Access Errors Let Remote or Physically Local Users Obtain Keys ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041614
∗∗∗ QNAP Storage Devices PHP Buffer Error Lets Remote Users Deny Service ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041607
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 06-09-2018 18:00 − Freitag 07-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ New Chainshot Malware Found By Cracking 512-Bit RSA Key ∗∗∗
---------------------------------------------
Security researchers exploited a threat actors poor choice for encryption and discovered a new piece of malware along with network infrastructure that links to various targeted attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-chainshot-malware-found-…
∗∗∗ Hotspot Honeypot ∗∗∗
---------------------------------------------
Introduction The Hotspot Honeypot is an illegitimate Wi-Fi access point which can appear as an authorized and secure hotspot. Despite appearances, it is actually set up by black-hat attackers or malicious hackers to steal your bank and credit card details, passwords and other personal information.
---------------------------------------------
https://resources.infosecinstitute.com/hotspot-honeypot/
∗∗∗ British Airways Website, Mobile App Breach Compromises 380k ∗∗∗
---------------------------------------------
The airline said information like name, address and bank card details like CVC code were compromised.
---------------------------------------------
https://threatpost.com/british-airways-website-mobile-app-breach-compromise…
∗∗∗ 2018 CEF Telecom Call - €13 million to reinforce the EUs Cybersecurity capacity ∗∗∗
---------------------------------------------
The European Commission calls for proposals under the Connecting Europe Facility (CEF) to reinforce the EUs cybersecurity capacity, with up to €13 million available in grant funding, open until the 22 November 2018.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/2018-cef-telecom-call2013-20ac1…
∗∗∗ Jetzt patchen! Die Ransomware Gandcrab schlüpft durch Flash- und Windows-Lücken ∗∗∗
---------------------------------------------
Auf einigen kompromittierten Webseiten lauert ein Exploit Kit, das nach Sicherheitslücken in Flash und Windows Ausschau hält.
---------------------------------------------
https://heise.de/-4157172
∗∗∗ Vulnerability Spotlight: CVE-2018-3952 / CVE-2018-4010 - Multi-provider VPN Client Privilege Escalation Vulnerabilities ∗∗∗
---------------------------------------------
Cisco Talos has discovered two similar vulnerabilities in the ProtonVPN and NordVPN VPN clients. The vulnerabilities allow attackers to execute code as an administrator on Microsoft Windows operating systems from a standard user.
---------------------------------------------
https://blog.talosintelligence.com/2018/09/vulnerability-spotlight-Multi-pr…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMSA-2018-0017.3 - VMware Tools update addresses an out-of-bounds read vulnerability ∗∗∗
---------------------------------------------
[...] VMware Tools 10.3.0 is is discontinued because of a functional issue with 10.3.0 in ESXi 6.5, please refer to KB55796 for more information.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0017.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (qemu and xen), Mageia (libxkbcommon, sleuthkit, and wireshark), openSUSE (apache-pdfbox, dovecot22, and php7), SUSE (enigmail, kernel, nodejs4, and php7), and Ubuntu (firefox and transfig).
---------------------------------------------
https://lwn.net/Articles/764386/
∗∗∗ (0Day) Remote Code Execution Vulnerabilities in Hewlett Packard Enterprise Intelligent Management Center ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-999/http://www.zerodayinitiative.com/advisories/ZDI-18-1000/http://www.zerodayinitiative.com/advisories/ZDI-18-1001/http://www.zerodayinitiative.com/advisories/ZDI-18-1002/http://www.zerodayinitiative.com/advisories/ZDI-18-1003/http://www.zerodayinitiative.com/advisories/ZDI-18-1004/http://www.zerodayinitiative.com/advisories/ZDI-18-1005/http://www.zerodayinitiative.com/advisories/ZDI-18-1006/http://www.zerodayinitiative.com/advisories/ZDI-18-1007/
---------------------------------------------
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSL affects QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730727
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Bouncy Castle vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016006
∗∗∗ IBM Security Bulletin: Vulnerabilities in NTP affect QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter and IBM Flex System FC3171 8Gb SAN Switch & SAN Pass-thru ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730717
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Public disclosed vulnerability from Bouncy Castle ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016292
∗∗∗ IBM Security Bulletin: IBM OpenPages GRC Platform is affected by an Information disclosure vulnerability (CVE-2017-1679) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728737
∗∗∗ Apache Tomcat vulnerability CVE-2018-1336 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K73008537
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 05-09-2018 18:00 − Donnerstag 06-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Nicht bestellen bei apothekerezeptfrei.com ∗∗∗
---------------------------------------------
KonsumentInnen, die auf der Suche nach Medikamenten und insbesondere Potenzmitteln sind, finden auf apothekerezeptfrei.com ein großes Angebot an teils verschreibungspflichtigen Medikamenten. InteressentInnen sollten hier auf keinen Fall bestellen, denn es handelt sich um einen Fake-Shop, der trotz Bezahlung keine Ware liefert. Zusätzlich sollten verschreibungspflichtige Medikamente nicht ohne entsprechende Verschreibung gekauft werden.
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-bestellen-bei-apothekerezeptfr…
∗∗∗ Browser Extensions: Are They Worth the Risk? ∗∗∗
---------------------------------------------
Popular file-sharing site Mega.nz is warning users that cybercriminals hacked its browser extension for Google Chrome so that any usernames and passwords submitted through the browser were copied and forwarded to a rogue server in Ukraine. This attack serves as a fresh reminder that legitimate browser extensions can and periodically do fall into the wrong hands, and that it makes good security sense to limit your exposure to such attacks by getting rid of extensions that are no longer useful or
---------------------------------------------
https://krebsonsecurity.com/2018/09/browser-extensions-are-they-worth-the-r…
∗∗∗ Malicious PowerShell Compiling C# Code on the Fly, (Wed, Sep 5th) ∗∗∗
---------------------------------------------
What I like when hunting is to discover how attackers are creative to find new ways to infect their victims computers. I came across a Powershell sample that looked new and interesting to me.
---------------------------------------------
https://isc.sans.edu/diary/rss/24072
∗∗∗ Using just a laptop, boffins sniff, spoof and pry – without busting browser padlock ∗∗∗
---------------------------------------------
In a paper seen by The Register, to be presented at the ACM's Conference on Computer and Communications Security (Toronto in October), Dr Shulman's team wrote:
"The attack exploits DNS Cache Poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own – namely certificates binding the attacker's public key to a victim domain."
---------------------------------------------
https://www.theregister.co.uk/2018/09/06/boffins_break_cas_domain_validatio…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Releases Security Updates ∗∗∗
---------------------------------------------
Original release date: September 05, 2018 Cisco has released updates to address multiple vulnerabilities affecting Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. NCCIC encourages users and administrators to review the Cisco Security Advisories and Alerts website and apply the necessary updates.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/09/05/Cisco-Releases-Sec…
∗∗∗ DokuWiki CSV Formula Injection Vulnerability ∗∗∗
---------------------------------------------
The administration panel of the application has a “CSV export of users” feature which allows the export of user data (username, real name, email address and user groups) as a CSV file. On the registration page, it is possible for an attacker to set certain values in the Real Name field that – when exported and opened with a spreadsheet application (Microsoft Excel, Open Office, etc.) – will be interpreted as a formula.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/dokuwiki-csv-formula-injecti…
∗∗∗ VMSA-2018-0023: AirWatch Agent and VMware Content Locker updates resolve data protection vulnerabilities ∗∗∗
---------------------------------------------
* The AirWatch Agent for iOS devices contains a data protection vulnerability whereby the files and keychain entries in the Agent are not encrypted. CVE-2018-6975
* The VMware Content Locker for iOS devices contains a data protection vulnerability in the SQLite database. This vulnerability relates to unencrypted filenames and associated metadata in SQLite database for the Content Locker. CVE-2018-6976
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0023.html
∗∗∗ Vulnerability Spotlight: TALOS-2018-0560 - ERPNext SQL Injection Vulnerabilities ∗∗∗
---------------------------------------------
Talos is disclosing multiple SQL injection vulnerabilities in the Frappe ERPNext Version 10.1.6 application. Frappe ERPNext is an open-source enterprise resource planning (ERP) cloud application. These vulnerabilities enable an attacker to bypass authentication and get unauthenticated access to sensitive data. An attacker can use a normal web browser to trigger these vulnerabilities — no special tools are required.
---------------------------------------------
https://blog.talosintelligence.com/2018/09/vulnerability-spotlight-talos-20…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (curl, gdm3, git-annex, lcms2, and sympa), Fedora (discount, dolphin-emu, gd, obs-build, osc, tcpflow, and yara), openSUSE (wireshark), Slackware (curl, firefox, ghostscript, and thunderbird), SUSE (apache-pdfbox, curl, dovecot22, and libvirt), and Ubuntu (libtirpc).
---------------------------------------------
https://lwn.net/Articles/764300/
∗∗∗ IBM Security Bulletin: Vulnerabilities in Kerberos affect Power Hardware Management Console (CVE-2017-11368, CVE-2017-7562) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10717893
∗∗∗ IBM Security Bulletin: IBM Lotus Protector for Mail Security has released fixes in response to the public disclosed vulnerability from PHP ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10719483
∗∗∗ IBM Security Bulletin: Vulnerabilities in Oracle Outside In Technology Affect IBM WebSphere Portal (CVE-2018-2768, CVE-2018-2801, CVE-2018-2806) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10715935
∗∗∗ IBM Security Bulletin: Code execution vulnerability in WebSphere Application Server (CVE-2018-1567) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016254
∗∗∗ Apache Tomcat vulnerability CVE-2018-8034 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K34468163
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 04-09-2018 18:00 − Mittwoch 05-09-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Verschlüsselung: NSA-Chiffre Speck fliegt aus dem Linux-Kernel ∗∗∗
---------------------------------------------
Mit der NSA-Chiffre Speck wollte Google ursprünglich den Speicher von Low-End-Android-Smartphones verschlüsseln, doch nun hat das Unternehmen seine Unterstützung dafür zurückgezogen. Die umstrittene Verschlüsselung wird deshalb wieder aus dem Linux-Kernel entfernt. (Linux-Kernel, Verschlüsselung)
---------------------------------------------
https://www.golem.de/news/verschluesselung-nsa-chiffre-speck-fliegt-aus-dem…
∗∗∗ Multiple Remote Code-Execution Flaws Patched in Opsview Monitor ∗∗∗
---------------------------------------------
Five flaws were disclosed Tuesday in monitoring software Opsview Monitor.
---------------------------------------------
https://threatpost.com/multiple-remote-code-execution-flaws-patched-in-opsv…
∗∗∗ WordPress Database Upgrade Phishing Campaign ∗∗∗
---------------------------------------------
We have recently been notified of phishing emails that target WordPress users. The content informs site owners that their database requires an update and looks like this: The email’s appearance resembles that of a legitimate WordPress update message, however the content includes typos and uses an older messaging style. Another suspicious item in the content is the deadline.
---------------------------------------------
https://blog.sucuri.net/2018/09/wordpress-database-upgrade-phishing-campaig…
∗∗∗ PowerPool malware exploits ALPC LPE zero-day vulnerability ∗∗∗
---------------------------------------------
Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure
---------------------------------------------
https://www.welivesecurity.com/2018/09/05/powerpool-malware-exploits-zero-d…
∗∗∗ Lets Trade: You Read My Email, Ill Read Your Password! ∗∗∗
---------------------------------------------
Its been a while, but my last few posts have been on password spraying, which is great approach if your customer has an userid / password interface that faces the internet. I also ran a walk-through on using responder and LLMNR. But what if you are on the outside, and your customer is wise enough to front all of those interfaces with two-factor authentication, or mutual certificate authentication?
---------------------------------------------
https://isc.sans.edu/forums/diary/Lets+Trade+You+Read+My+Email+Ill+Read+You…
=====================
= Vulnerabilities =
=====================
∗∗∗ VU#598349: Problems with automatic DNS registration and autodiscovery ∗∗∗
---------------------------------------------
Problems with automatic DNS registration and autodiscovery. If an attacker with access to the network adds a malicious device to the network with the name WPAD, such an attacker may be able to utilize DNS autoregistration and autodiscovery to act as a proxy for victims on the network, resulting in a loss of confidentiality and [...]
---------------------------------------------
http://www.kb.cert.org/vuls/id/598349
∗∗∗ Opto22 PAC Control Basic and PAC Control Professional ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for a stack-based buffer overflow vulnerability in Opto22s PAC Control software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-247-01
∗∗∗ Android Security Bulletin - September 2018 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. [...] The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.
---------------------------------------------
https://source.android.com/security/bulletin/2018-09-01
∗∗∗ (0Day) Cisco WebEx Network Recording Player Improper Access Control Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Cisco WebEx Network Recording Player. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-18-998/
∗∗∗ Remote Code Execution Vulnerabilities in WECON LeviStudioU ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-989/http://www.zerodayinitiative.com/advisories/ZDI-18-990/http://www.zerodayinitiative.com/advisories/ZDI-18-991/http://www.zerodayinitiative.com/advisories/ZDI-18-992/http://www.zerodayinitiative.com/advisories/ZDI-18-993/http://www.zerodayinitiative.com/advisories/ZDI-18-994/http://www.zerodayinitiative.com/advisories/ZDI-18-995/http://www.zerodayinitiative.com/advisories/ZDI-18-996/http://www.zerodayinitiative.com/advisories/ZDI-18-997/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (lcms2), openSUSE (yubico-piv-tool), Oracle (kernel), and SUSE (cobbler and kvm).
---------------------------------------------
https://lwn.net/Articles/764182/
∗∗∗ Synology-SA-18:52 Android Moments ∗∗∗
---------------------------------------------
A vulnerability allows man-in-the-middle attackers to execute arbitrary code via a susceptible version of Android Moments.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_52
∗∗∗ Red Hat Gluster Storage Wed Administration, tendrl-api: Eine Schwachstelle ermöglicht das Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1790/
∗∗∗ Red Hat Virtualization: Mehrere Schwachstellen ermöglichen u. a. das Ausführen beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1798/
∗∗∗ cURL: Eine Schwachstelle ermöglicht u. a. einen Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1796/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security Advisory - FRP Bypass Vulnerability in Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180905-…
∗∗∗ Security Advisory - DoS Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180905-…
∗∗∗ Python vulnerability CVE-2014-9365 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K11068141
∗∗∗ HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service Processor, Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 03-09-2018 18:00 − Dienstag 04-09-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Thousands of Compromised MikroTik Routers Send Traffic to Attackers ∗∗∗
---------------------------------------------
Attackers compromising MikroTik routers have configured the devices to forward network traffic to a handful of IP addresses under their control.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/thousands-of-compromised-mik…
∗∗∗ New Banking Trojan Poses As A Security Module ∗∗∗
---------------------------------------------
A newly discovered banking Trojan departs from the regular tactics observed by malware researchers by choosing visible installation and by adding social engineering components.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-banking-trojan-poses-as-…
∗∗∗ Credit card gobbling code found piggybacking on ecommerce sites ∗∗∗
---------------------------------------------
Be careful! If crooks can upload malicious JavaScript to your ecommerce server, then youre helping the them rip off your own customers.
---------------------------------------------
https://nakedsecurity.sophos.com/2018/09/04/credit-card-gobbling-code-found…
∗∗∗ You cant contain me! :: Analyzing and Exploiting an Elevation of Privilege Vulnerability in Docker for Windows ∗∗∗
---------------------------------------------
I have been continuing my journey of searching for windows breakout vulnerabilities in popular applications and one that I discovered in March I found interesting enough to share. Whilst kernel vulnerabilities are fun to discover, there are many core windows and third party applications that are fundamentally broken in regards to logic [...]
---------------------------------------------
https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-expl…
∗∗∗ Googles Doors Hacked Wide Open By Own Employee ∗∗∗
---------------------------------------------
Last July, in Google’s Sunnyvale offices, a hacker found a way to trick doors into opening without the requisite RFID keycard. Luckily for Google, it was David Tomaschik, an employee at the tech giant, who only had good intentions.
---------------------------------------------
https://www.forbes.com/sites/thomasbrewster/2018/09/03/googles-doors-hacked…
∗∗∗ Erpressungstrojaner Gandcrab verbreitet sich über gefälschte Bewerbungsmails ∗∗∗
---------------------------------------------
Momentan sind vermehrt Fake-Bewerbungen als Mail in Umlauf, die einen gefährlichen Trojaner als Dateianhang haben.
---------------------------------------------
http://heise.de/-4154167
∗∗∗ Sicherheitsforscher warnt vor Browser-Angriffen auf dem Mac ∗∗∗
---------------------------------------------
Mittels URL-Schemata ist es unter macOS möglich, Programme zu aktivieren, die ein Nutzer nicht ausgelöst haben möchte.
---------------------------------------------
http://heise.de/-4154059
∗∗∗ Of ML and malware: What’s in store? ∗∗∗
---------------------------------------------
All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme The post Of ML and malware: What’s in store? appeared first on WeLiveSecurity
---------------------------------------------
https://www.welivesecurity.com/2018/09/04/ml-malware-whats-in-store/
∗∗∗ Gefälschte Microsoft-Nachricht im Umlauf ∗∗∗
---------------------------------------------
Datendiebe versenden eine gefälschte Microsoft-Nachricht. Darin behaupten sie, dass das E-Mailkonto von Empfänger/innen gesperrt sei. Damit Nutzer/innen wieder auf ihr Postfach zugreifen können, sollen sie ihre Identität auf einer unbekannten Website bestätigen. Das führt zur Datenübermittlung an Kriminelle. Diese können dadurch Verbrechen unter dem Namen ihrer Opfer begehen.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-microsoft-nachricht-im-u…
=====================
= Vulnerabilities =
=====================
∗∗∗ Lenovo Computer: Schwachstelle ermöglicht Offenlegung von Informationen ∗∗∗
---------------------------------------------
Es existiert eine Schwachstelle in Lenovo Computern mit Intel Prozessoren und Intel Optane Speichermodulen bezüglich der Festplattenverschlüsselung. Wenn die Optane Speichermodule konfiguriert werden, bevor die Festplattenverschlüsselung aktiviert wird, bleiben Teile des Speichers unverschlüsselt.
---------------------------------------------
https://www.bsi-fuer-buerger.de/SharedDocs/Warnmeldungen/DE/TW/2018/09/warn…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by openSUSE (ImageMagick, libressl, postgresql10, spice, and spice-gtk), Red Hat (collectd, kernel, Red Hat Gluster Storage, Red Hat Virtualization, RHGS WA, rhvm-appliance, and samba), and SUSE (crowbar, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, kernel, spice, and spice-gtk).
---------------------------------------------
https://lwn.net/Articles/764130/
∗∗∗ Red Hat Gluster Storage, collectd: Zwei Schwachstellen ermöglichen Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1787/
∗∗∗ Red Hat Gluster Storage, Samba: Mehrere Schwachstellen ermöglichen u. a. die Manipulation von Dateien ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1786/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 31-08-2018 18:00 − Montag 03-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ CryptoNar Ransomware Discovered and Quickly Decrypted ∗∗∗
---------------------------------------------
This week a new CryptoJoker ransomware variant was discovered called CryptoNar that has infected victims. The good news, is that a free decryptor was quickly released so that these victims can get their files back for free.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cryptonar-ransomware-discove…
∗∗∗ Kostenpflichtige Gratisproben von BeautyShop International ∗∗∗
---------------------------------------------
Konsument/innen bestellen von BeautyShop International Kosmetika als kostenlose Produktproben. Diese erhalten sie mit einer Rechnung von AB Commerce Collect. Bezahlen sie den geforderten Geldbetrag nicht, folgen hohe Mahnungen. Nachdem zwischen Konsument/innen und BeautyShop International kein kostenpflichtiger Vertrag zustande kommt, müssen sie den geforderten Betrag nicht bezahlen.
---------------------------------------------
https://www.watchlist-internet.at/news/kostenpflichtige-gratisproben-von-be…
=====================
= Vulnerabilities =
=====================
∗∗∗ [20180802] - Core - Stored XSS vulnerability in the frontend profile ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS
Impact: Low
Severity: Low
Versions: 1.5.0 through 3.8.11
Exploit type: XSS
CVE Number: CVE-2018-15880
Inadequate output filtering on the user profile page could lead to a stored XSS attack. Affected Installs Joomla! CMS versions 1.5.0 through 3.8.11 Solution Upgrade to version 3.8.12 Contact The JSST at the Joomla! Security Centre. Reported By: Fouad Maakor
---------------------------------------------
https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-v…
∗∗∗ CA Release Automation Object Deserialization Error Lets Remote Users Execute Arbitrary Code on the Target System ∗∗∗
---------------------------------------------
Version(s): 6.3, 6.4, 6.5; possibly older versions
Description: A vulnerability was reported in CA Release Automation. A remote user can execute arbitrary code on the target system.
A remote user can send specially crafted data to trigger an object deserialization error and execute arbitrary code on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1041591
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (dojo, libtirpc, mariadb-10.0, php5, ruby-json-jwt, spice, spice-gtk, tomcat8, and trafficserver), Fedora (ghc-hakyll, ghc-hs-bibutils, ghostscript, mariadb, pandoc-citeproc, phpMyAdmin, and xen), Mageia (java-1.8.0-openjdk, libarchive, libgd, libraw, libxcursor, mariadb, mercurial, openssh, openssl, poppler, quazip, squirrelmail, and virtualbox), openSUSE (cobbler, libressl, wireshark, and zutils), and SUSE (couchdb, java-1_7_0-ibm, java-1_7_1-ibm, spice).
---------------------------------------------
https://lwn.net/Articles/764046/
∗∗∗ Cisco: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Notice - Statement About the Vulnerability in Huawei B315s-22 Products Disclosed by Security Researcher ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2018/huawei-sn-20180903-01-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 30-08-2018 18:00 − Freitag 31-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Firework: Leveraging Microsoft Workspaces in a Penetration Test ∗∗∗
---------------------------------------------
WCX files can be used to configure a Microsoft Workplace on a system with a couple of clicks. The enrollment process could disclose credentials in the form of a NetNTLM hash. Authentication will either take place automatically on older [...]
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/Firework--Leveraging-Micros…
∗∗∗ BEC fraud burgeoning despite training ∗∗∗
---------------------------------------------
Business email compromises (BEC) - commonly referred to as CEO Fraud because the CEOs identity is being impersonated - continues to grow and, more significantly, succeed due to the simplicity and urgency of the attacks, according to recent study from Barracuda of some 3,000 attacks.
---------------------------------------------
https://www.scmagazine.com/bec-fraud-burgeoning-despite-training/article/79…
∗∗∗ John McAfees "unhackbares" Bitcoin-Wallet Bitfi gehackt – mehrmals ∗∗∗
---------------------------------------------
Zum wiederholten Male haben Sicherheitsforscher eigentlich geheime Passphrasen aus dem Bitcoin-Wallet Bitfi ausgelesen.
---------------------------------------------
http://heise.de/-4152116
∗∗∗ How We Micropatched a Publicly Dropped 0day in Task Scheduler (CVE-UNKNOWN) ∗∗∗
---------------------------------------------
[...] Earlier this week security researcher SandboxEscaper published details and proof-of-concept (POC) for a "0day" local privilege escalation vulnerability in Windows Task Scheduler service, which allows a local unprivileged user to change permissions of any file on the system - and thus subsequently replace or modify that file. As the researchers POC demonstrates, one can use this vulnerability [...]
---------------------------------------------
https://blog.0patch.com/2018/08/how-we-micropatched-publicly-dropped.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Philips e-Alert Unit ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for numerous vulnerabilities in Phillips e-Alert Unit, a non-medical device.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (389-ds-base, bind9, and squirrelmail), Fedora (dolphin-emu), openSUSE (libX11), SUSE (cobbler, GraphicsMagick, ImageMagick, liblouis, postgresql10, qemu, and spice), and Ubuntu (libx11).
---------------------------------------------
https://lwn.net/Articles/763906/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 29-08-2018 18:00 − Donnerstag 30-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ What are botnets downloading? ∗∗∗
---------------------------------------------
Every day we intercept numerous file-download commands sent to bots of various types and families. Here we present the results of our botnet activity analysis for H2 2017 and H1 2018.
---------------------------------------------
https://securelist.com/what-are-botnets-downloading/87658/
∗∗∗ Crypto Mining Is More Popular Than Ever!, (Thu, Aug 30th) ∗∗∗
---------------------------------------------
We already wrote some diaries about crypto miners and they remain more popular than ever. Based on my daily hunting statistics, we can see that malicious scripts performing crypto mining operations ..
---------------------------------------------
https://isc.sans.edu/diary/rss/24050
∗∗∗ Kritische Lücke in der Klinik: Netzwerk-Gateways am Krankenbett angreifbar ∗∗∗
---------------------------------------------
Capsule-Netzwerkgeräte der Firma Qualcomm Life verbinden Geräte am Krankenbett mit dem Krankenhaus-Netzwerk. Hier klafft eine kritische Sicherheitslücke.
---------------------------------------------
http://heise.de/-4151345
∗∗∗ Intel entwickelt Spezial-Linux für sicherheitskritische Einsätze ∗∗∗
---------------------------------------------
Das Intel Safety Critical Project for Linux OS soll autonome Roboter, Drohnen und selbstfahrende Autos sicher machen.
---------------------------------------------
http://heise.de/-4151374
∗∗∗ Rocke: The Champion of Monero Miners ∗∗∗
---------------------------------------------
Cryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised devices to mine ..
---------------------------------------------
https://blog.talosintelligence.com/2018/08/rocke-champion-of-monero-miners.…
∗∗∗ Cyberkriminalität - Schwedischer Wahlkampf vermehrt Cyberangriffen ausgesetzt ∗∗∗
---------------------------------------------
Gefälschte Social-Media-Accounts verbreiten vermehrt falsche Informationen
---------------------------------------------
https://derstandard.at/2000086347410/Schwedischer-Wahlkampf-vermehrt-Cybera…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libx11), Fedora (bouncycastle, libxkbcommon, libzypp, nodejs, ntp, openssh, tomcat, xen, and zypper), Red Hat (ansible, kernel, and opendaylight), and SUSE (apache2, cobbler, ImageMagick, libtirpc, libzypp, zypper, and qemu).
---------------------------------------------
https://lwn.net/Articles/763824/
∗∗∗ BlackBerry Powered by Android Security Bulletin - August 2018 ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Bing Autosuggest API - Moderately critical - Cross Site Scripting - SA-CONTRIB-2018-058 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-058
∗∗∗ Drupal Commerce - Moderately critical - Access bypass - SA-CONTRIB-2018-057 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-057
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 28-08-2018 18:00 − Mittwoch 29-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Active Attacks Detected Using Apache Struts Vulnerability CVE-2018-11776 ∗∗∗
---------------------------------------------
After last week a security researcher revealed a vulnerability in Apache Struts, a piece of very popular enterprise software, active exploitation attempts have started this week.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/active-attacks-detected-usin…
∗∗∗ OpenSSH Versions Since 2011 Vulnerable to Oracle Attack ∗∗∗
---------------------------------------------
OpenSSH continues to be vulnerable to oracle attacks, and the issue affects all versions of the suite since September 2011. Developers fixed a similar bug less than a week ago.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/openssh-versions-since-2011-…
∗∗∗ Loki Bot: On a hunt for corporate passwords ∗∗∗
---------------------------------------------
Starting in early July, we have seen malicious spam activity that has targeted corporate mailboxes. Messages ..
---------------------------------------------
https://securelist.com/loki-bot-stealing-corporate-passwords/87595/
∗∗∗ 3D Printers in The Wild, What Can Go Wrong?, (Wed, Aug 29th) ∗∗∗
---------------------------------------------
Richard wrote a quick diary yesterday about an interesting information that we received from one of our readers. It&#;x26;#;39;s about a huge amount of OctoPrint interfaces that are publicly facing the Internet. Octoprint[1] is a web interface for ..
---------------------------------------------
https://isc.sans.edu/diary/rss/24044
∗∗∗ PHP-Paket-Repository Packagist.org war für Schadcode anfällig ∗∗∗
---------------------------------------------
In der Webseite Packagist.org klaffte eine gefährliche Sicherheitslücke. Angreifer hätten mit vergleichsweise wenig Aufwand Schadcode ausführen können.
---------------------------------------------
http://heise.de/-4149216
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4281 tomcat8 - security update ∗∗∗
---------------------------------------------
Several issues were discovered in the Tomcat servlet and JSPengine. They could lead to unauthorized access to protected resources, denial-of-service, or information leak.
---------------------------------------------
https://www.debian.org/security/2018/dsa-4281
∗∗∗ Cisco Data Center Network Manager Path Traversal Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system.The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending ..
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 24-08-2018 18:00 − Montag 27-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ PoC Code Surfaces to Exploit Apache Struts 2 Vulnerability ∗∗∗
---------------------------------------------
Researchers find proof-of-concept code that can take advantage of the recently identified Apache Struts framework (CVE-2018-11776) vulnerability.
---------------------------------------------
https://threatpost.com/poc-code-surfaces-to-exploit-apache-struts-2-vulnera…
∗∗∗ Password Protected Word Document Delivers HERMES Ransomware ∗∗∗
---------------------------------------------
Evading AV detection is part of a malware authors routine in crafting spam campaigns and an old and effective way of achieving this is spamming a password protected document. Recently, we observed such a ..
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/Password-Protected-Word-Doc…
∗∗∗ Well, cant get hacked if your PC doesnt work... McAfee yanks BSoDing Endpoint Security patch ∗∗∗
---------------------------------------------
Dont install August update, world+dog warned McAfee has pulled a version of its Endpoint Security software after folks reported the antivirus software was crashing their ..
---------------------------------------------
www.theregister.co.uk/2018/08/24/mcafee_blue_screen_of_death/
∗∗∗ A new issue of our SWITCH Security Report is available! ∗∗∗
---------------------------------------------
Dear Reader! A new issue of our bi-monthly SWITCH Security Report is available! The topics covered in this report are: An own goal and serious foul: Spanish football league’s app turns 10 million users into involuntarily ..
---------------------------------------------
https://securityblog.switch.ch/2018/08/27/a-new-issue-of-our-switch-securit…
∗∗∗ Schwachstelle Royale: Fortnite-Installer für Android offen für freies Nachladen ∗∗∗
---------------------------------------------
Bei der Android-Version von Fortnite Battle Royale umging Epic Games den Play Store und lieferte einen eigenen Installer – mit gravierender Sicherheitslücke.
---------------------------------------------
http://heise.de/-4145876
∗∗∗ Who’s Behind the Screencam Extortion Scam? ∗∗∗
---------------------------------------------
The sextortion email scam last month that invoked a real password used by each recipient and threatened to release embarrassing Webcam videos almost certainly was not the work of one criminal or even one group of criminals. Rather, its likely that additional spammers and scammers piled on with their own versions of the phishing email after ..
---------------------------------------------
https://krebsonsecurity.com/2018/08/whos-behind-the-screencam-extortion-sca…
∗∗∗ Verschlüsselung - Wenn Paypal und Co plötzlich nicht mehr funktionieren ∗∗∗
---------------------------------------------
Mozilla und Google vertrauen Symantec-Zertifikaten in Entwicklungsversionen ihrer Browser nicht mehr
---------------------------------------------
https://derstandard.at/2000086139348/Wenn-Paypal-und-Co-ploetzlich-nicht-me…
=====================
= Vulnerabilities =
=====================
∗∗∗ Synology-SA-18:50 Drive ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to obtain sensitive information via a susceptible version of Drive.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_50
∗∗∗ File (Field) Paths - Critical - Remote Code Execution - SA-CONTRIB-2018-056 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-056
∗∗∗ Multiple Cross Site Scripting on FortiCloud Web Interface Login ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/FG-IR-18-026
∗∗∗ Forgot password link doesnt expire after use ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/FG-IR-18-074
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 23-08-2018 18:00 − Freitag 24-08-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Botnetz: Mirai-Malware gefährdet durch Cross-Compiling noch mehr Systeme ∗∗∗
---------------------------------------------
Eine neue Mirai-Variante kann mittels Aboriginal Linux nun u.a. auch Android- und Debian-Systeme infizieren und in ein Botnetz einspannen.
---------------------------------------------
http://heise.de/-4144912
∗∗∗ Warnung vor hoverboardmarkt.at ∗∗∗
---------------------------------------------
Auf hoverboardmarkt.at finden Konsument/innen stark rabattierte Hoverboards. Es ist unbekannt, wer den Online-Shop betreibt. Es zeigen sich weitere Auffälligkeiten bei dem Anbieter. Aus diesem Grund ist es am sichersten, wenn Konsument/innen nicht bei hoverboardmarkt.at einkaufen.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-hoverboardmarktat/
=====================
= Vulnerabilities =
=====================
∗∗∗ VMware Virtual Appliances, L1 Terminal Fault (L1TF): Eine Schwachstelle ermöglicht das Ausspähen von Informationen ∗∗∗
---------------------------------------------
Ein lokaler, nicht authentisierter Angreifer kann diese Schwachstelle über einen Terminal Seitenfehler (Terminal Page Fault) ausnutzen, um in einem Seitenkanalangriff (Side-Channel Analysis) unautorisiert Informationen aus dem L1 Data Cache auszuspähen.
Die Schwachstelle betrifft auch eine Reihe von VMware Produkten, unter anderem vCenter Server (vCSA) 6.0, 6.5 und 6.7 und vSphere Data Protection (VDP) 6.x.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1622/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (kernel-headers), Mageia (bind, cgit, dpkg, sssd, and thunderbird), openSUSE (libXcursor and python-Django), Oracle (postgresql), Red Hat (postgresql), Scientific Linux (postgresql), SUSE (libreoffice, openssl, and xen), and Ubuntu (kernel, linux, linux-aws, linux-gcp, linux-kvm, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-hwe, linux-lts-xenial, linux-aws, and spice, spice-protocol).
---------------------------------------------
https://lwn.net/Articles/763429/
∗∗∗ Apache Struts Remote Code Execution Vulnerability Affecting Cisco Products: August 2018 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco TelePresence IX5000 Series and TelePresence TX9000 Series Cross-Frame Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletin: An Information Disclosure Vulnerability When Using the RememberMe feature affects WebSphere Commerce ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728829
∗∗∗ IBM Security Bulletin: IBM Security Access Manager Appliance is affected by multiple kernel vulnerabilities ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728537
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM System Networking Switch Center (SNSC) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729112
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Cognos Business Intelligence affect Rational Insight ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=ibm10719165
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Cognos Business Intelligence affect Rational Reporting for Development Intelligence ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=ibm10719163
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 22-08-2018 18:00 − Donnerstag 23-08-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Intel erklärt Hardware-Schutz gegen Spectre- & Meltdown-Lücken ∗∗∗
---------------------------------------------
Kommende "Cascade Lake"-Xeons sind gegen Meltdown-Attacken unempfindlich und auch gegen viele Spectre-Attacken – aber Software-Patches bleiben nötig.
---------------------------------------------
http://heise.de/-4144368
∗∗∗ Tool - OpenSSH: Neue Version beseitigt 19 Jahre alte Lücke ∗∗∗
---------------------------------------------
War bereits in der allerersten Version der Software enthalten – Angreifer konnten Nutzernamen raten
---------------------------------------------
https://derstandard.at/2000085926326/OpenSSH-Neue-Version-beseitigt-19-Jahr…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel and tomcat-native), Fedora (axis, CuraEngine-lulzbot, nodejs, python-uranium-lulzbot, and sleuthkit), Gentoo (chromium, lxc, networkmanager-vpnc, and ..
---------------------------------------------
https://lwn.net/Articles/763283/
∗∗∗ Synology-SA-18:49 Ghostscript ∗∗∗
---------------------------------------------
A vulnerability allows remote authenticated users to execute arbitrary commands via a susceptible version of Synology DiskStation Manager (DSM) and Synology Router Manager (SRM) when the AirPrint feature is enabled.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_49
∗∗∗ Vuln: Multiple Symantec Products CVE-2018-5238 DLL Loading Local Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105100
∗∗∗ IBM Security Bulletin: Information disclosure in WebSphere Application Server Liberty (CVE-2018-1755) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728689
∗∗∗ IBM Security Bulletin: IBM Security Access Manager Appliance is affected by a remote command injection vulnerability (CVE-2018-1722) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10719623
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to SQL injection. (CVE-2018-1699) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10725805
∗∗∗ Side-channel processor vulnerability CVE-2018-3693 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K54252492
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 21-08-2018 18:00 − Mittwoch 22-08-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New Android Triout Malware Can Record Phone Calls, Steal Pictures ∗∗∗
---------------------------------------------
Security researchers from Bitdefender have discovered a new Android malware strain named Triout that comes equipped with intrusive spyware capabilities, such as the ability to record phone calls and steal pictures taken with the device.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-android-triout-malware-c…
∗∗∗ Unterkunft nicht bei benaco-ferienwohnungen.de buchen ∗∗∗
---------------------------------------------
Auf benaco-ferienwohunungen.de findet man günstige Unterkünfte am Gardasee. Die Inserate wurden jedoch zu betrügerischen Zwecken von echten Portalen kopiert. Die gebotenen Unterkünfte können nicht gebucht werden und Kunden werden um ihr Geld betrogen.
---------------------------------------------
https://www.watchlist-internet.at/news/unterkunft-nicht-bei-benaco-ferienwo…
=====================
= Vulnerabilities =
=====================
∗∗∗ Bislang kein Patch: Gefährliche Sicherheitslücken im PDF/Postscript-Interpreter Ghostscript ∗∗∗
---------------------------------------------
Angreifer könnten über Schwachstellen im weit verbreiteten Ghostscript-Interpreter Schadcode ausführen. Derzeit gibt es nur einen Workaround zum Schutz.
---------------------------------------------
http://heise.de/-4143153
∗∗∗ Kritische Sicherheitslücke in Apache Struts 2 - Patches verfügbar ∗∗∗
---------------------------------------------
Es wurde eine kritische Sicherheitslücke in Apache Struts 2 gefunden, die schwerwiegende Folgen für die Sicherheit von Webservern, die dieses Framework einsetzen, haben kann.
---------------------------------------------
http://www.cert.at/warnings/all/20180822.html
∗∗∗ Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades ∗∗∗
---------------------------------------------
A vulnerability affects all versions of the OpenSSH client released in the past two decades, ever since the application was released in 1999. [...]
This bug allows a remote attacker to guess the usernames registered on an OpenSSH server.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-op…
∗∗∗ Philips IntelliVue Information Center iX ∗∗∗
---------------------------------------------
This medical device advisory includes mitigation recommendations for a resource exhaustion vulnerability in Philips IntelliVue Information Center iX real-time central monitoring system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-233-01
∗∗∗ Yokogawa iDefine, STARDOM, ASTPLANNER, and TriFellows ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for stack-based buffer overflow vulnerabilities in Yokogawas iDefine, STARDOM, ASTPLANNER, and TriFellows products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-233-01
∗∗∗ PMASA-2018-5 ∗∗∗
---------------------------------------------
A Cross-Site Scripting vulnerability was found in the file import feature, where an attacker can deliver a payload to a user through importing a specially-crafted file.
Assigned CVE ids: CVE-2018-15605
---------------------------------------------
https://www.phpmyadmin.net/security/PMASA-2018-5/
∗∗∗ Adobe Photoshop CC: Zwei Schwachstellen ermöglichen das Ausführen beliebigen Programmcodes ∗∗∗
---------------------------------------------
Zwei Schwachstellen in Adobe Photoshop CC 2017 18.1.5 und CC 2018 19.1.5 sowie den jeweils früheren Versionen für Windows und macOS ermöglichen einem entfernten, nicht authentisierten Angreifer die Ausführung beliebigen Programmcodes im Sicherheitskontext des aktiven Benutzers.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1697/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (openssh and otrs2), Fedora (gifsicle, lighttpd, quazip, and samba), Red Hat (openstack-keystone), Scientific Linux (mutt), Slackware (libX11), SUSE (gtk2, ImageMagick, libcgroup, and libgit2), and Ubuntu (base-files).
---------------------------------------------
https://lwn.net/Articles/763157/
∗∗∗ IBM Security Bulletin: Vulnerabilities in GSKit affects IBM Sterling Connect:Direct for UNIX ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10726077
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Security Access Manager ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22016774
∗∗∗ IBM Security Bulletin: A Vulnerability in IBM Java Runtime Affects IBM Sterling Connect:Direct for UNIX ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10726081
∗∗∗ IBM Security Bulletin: IBM Security Access Manager Appliance is affected by a vulnerability in IBM WebSphere Application Server (CVE-2017-1788) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728345
∗∗∗ IBM Security Bulletin: IBM WebSphere Commerce Aurora Storefront Could Allow an Open Redirect Attack (CVE-2018-1739) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10725439
∗∗∗ IBM Security Bulletin: IBM Security Access Manager Appliance is affected by NTP vulnerabilities (CVE-2017-6462, CVE-2017-6463, CVE-2017-6464) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728215
∗∗∗ IBM Security Bulletin: IBM Tivoli Access Manager for e-business and IBM Security Access Manager releases are affected by a Kerberos vulnerability (CVE-2017-11462) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22015092
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 20-08-2018 18:00 − Dienstag 21-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ USB-Kabel können Computer mit Trojanern infizieren ∗∗∗
---------------------------------------------
Sicherheitsforschern ist es gelungen, USB-Ladekabel so zu modifizieren, dass sie Trojaner einschleusen können.
---------------------------------------------
https://futurezone.at/produkte/usb-kabel-koennen-computer-mit-trojanern-inf…
∗∗∗ TLS developers should ditch pseudo constant time crypto processing ∗∗∗
---------------------------------------------
Fixes for Lucky 13-type bugs could still be vulnerable More than five years after cracks started showing in the Transport Layer Security (TLS) network crypto protocol, the author of the "Lucky 13" attack has poked holes in the fixes ..
---------------------------------------------
www.theregister.co.uk/2018/08/21/tls_developers_should_ditch_pseudo_constan…
∗∗∗ Microsoft: Russische Hacker nehmen Trump-kritische Republikaner ins Visier ∗∗∗
---------------------------------------------
Im Kampf gegen mutmaßlich russische Hacker hat Microsoft weitere Erfolge verkündet: Für Phising-Angriffe auf Republikaner nutzbare Domains wurden entschärft.
---------------------------------------------
http://heise.de/-4142219
∗∗∗ How often are users’ DNS queries intercepted? ∗∗∗
---------------------------------------------
A group of Chinese researchers wanted to find out just how widespread DNS interception is and has presented the result of their large-scale study to the audience at the Usenix Security Symposium last week. The problem Most Internet connections are preceded by a DNS address lookup request, as the Domain Name System (DNS) “translates” ..
---------------------------------------------
https://www.helpnetsecurity.com/2018/08/21/dns-interception/
∗∗∗ The enemy is us: a look at insider threats ∗∗∗
---------------------------------------------
It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It ..
---------------------------------------------
https://blog.malwarebytes.com/101/2018/08/the-enemy-is-us-a-look-at-insider…
∗∗∗ Darkhotel APT is back: Zero-day vulnerability in Microsoft VBScript is exploited ∗∗∗
---------------------------------------------
VBScript is available in the latest versions of Windows and Internet Explorer 11. However, Microsoft disabled VBScript execution in the latest version of Windows ..
---------------------------------------------
https://blog.360totalsecurity.com/en/darkhotel-apt-is-back-zero-day-vulnera…
∗∗∗ Skype - Skype führt "Ende-zu-Ende-Verschlüsselung" ein ∗∗∗
---------------------------------------------
Die Verschlüsselung ist allerdings nicht automatisch aktiviert
---------------------------------------------
https://derstandard.at/2000085764456/Skype-fuehrt-Ende-zu-Ende-Verschluesse…
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4279 linux - security update ∗∗∗
---------------------------------------------
Multiple researchers have discovered a vulnerability in the way the Intel processor designs have implemented speculative execution of instructions in combination with handling of page-faults. This flaw ..
---------------------------------------------
https://www.debian.org/security/2018/dsa-4279
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 17-08-2018 18:00 − Montag 20-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ The Week in Ransomware - August 17th 2018 - Princess Evolution & Dharma ∗∗∗
---------------------------------------------
The biggest news was the release of the Princess Evolution RaaS and a new variant of the Dharma ransomware utilizing the .cmb extension for encrypted files. Otherwise, it was mostly small variants released that will not likely have many victims.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-augus…
∗∗∗ New Fox Ransomware Matrix Variant Tries Its Best to Close All File Handles ∗∗∗
---------------------------------------------
A new variant of the Matrix Ransomware has been discovered that is renaming encrypted files and then appending the .FOX extension to the file name. Of particular interest, this ransomware could have the most exhaustive process of making sure each and every file is not opened and available for encrypting.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-fox-ransomware-matrix-va…
∗∗∗ New "Turning Tables" Technique Bypasses All Windows Kernel Mitigations ∗∗∗
---------------------------------------------
Security researchers have discovered a new exploitation technique that they say can bypass the kernel protection measures present in the Windows operating systems.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-turning-tables-technique…
∗∗∗ Malspam Campaign Targets Banks Using Microsoft Publisher ∗∗∗
---------------------------------------------
Its very unusual for malware authors to utilize publishing software like Microsoft Publisher which is mainly used for fancy documents and desktop publishing tasks. So when we saw an email sample with a .pub attachment (Microsoft Office Publisher file) and [...]
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Malspam-Campaign-Target…
∗∗∗ Fake Plugins with Popuplink.js Redirect to Scam Sites ∗∗∗
---------------------------------------------
Since July, we've been observing a massive WordPress infection that is responsible for unwanted redirects to scam and ad sites. This infection involves the tiny.cc URL shortener, a fake plugin that has been called either "index" or "wp_update", and a malicious popuplink.js file.
---------------------------------------------
https://blog.sucuri.net/2018/08/fake-plugins-with-popuplink-js-redirect-to-…
∗∗∗ Fax-Lücke in HP-Druckern: Mac-Nutzer weiter angreifbar ∗∗∗
---------------------------------------------
Firmware-Updates für eine schwere Lücke in seinen Multifunktionsdruckern liefert Hewlett-Packard zum Teil nur für Windows. Es gibt aber Abhilfe.
---------------------------------------------
http://heise.de/-4141384
∗∗∗ Firefox-Add-on "Web Security": Entwickler räumen Fehler ein ∗∗∗
---------------------------------------------
Das Firefox-Add-on "Web Security" sammelte zu viele Daten und übertrug sie unverschlüsselt. Das war ein Fehler, räumen die Entwickler ein und geloben Besserung.
---------------------------------------------
http://heise.de/-4141593
∗∗∗ Banker Trojan, "TrickBot", is preparing for the next global outbreak by using new techniques ∗∗∗
---------------------------------------------
Recently, 360 Security Center detected a new variant of "TrickBot" banker Trojan. Compared to the previous "TrickBot", the functions of the latest "TrickBot" are all [...]
---------------------------------------------
https://blog.360totalsecurity.com/en/banker-trojan-trickbot-is-preparing-fo…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (confuse, jetty9, kamailio, kernel, libxcursor, and mutt), Fedora (blktrace, docker-latest, libgit2, and yubico-piv-tool), Mageia (chromium-browser-stable, flash-player-plugin, kernel, kernel-linus, kernel-tmb, microcode, openslp, and wpa_supplicant), openSUSE (apache2, curl, GraphicsMagick, perl-Archive-Zip, and xen), Oracle (kernel and mariadb), Red Hat (rh-postgresql95-postgresql), Slackware (ntp and samba), SUSE (apache2, curl, kernel, [...]
---------------------------------------------
https://lwn.net/Articles/763045/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22016776
∗∗∗ IBM Security Bulletin: IBM Security Access Manager Appliance is affected by a systemd vulnerability (CVE-2018-1049) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728209
∗∗∗ Linux kernel vulnerability (FragmentSmack) CVE-2018-5391 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K74374841
∗∗∗ HPESBHF03850 rev.5 - Certain HPE Products using Intel-based Processors, Local Disclosure of Information, Speculative Execution Side Channel Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 16-08-2018 18:00 − Freitag 17-08-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ PHP Deserialization Issue Left Unfixed in WordPress CMS ∗∗∗
---------------------------------------------
WordPress CMS installations are vulnerable to a PHP bug related to data unserialization (also known as deserialization), a security researcher has revealed at the start of the month.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/php-deserialization-issue-le…
∗∗∗ New Trickbot Variant Touts Stealthy Code-Injection Trick ∗∗∗
---------------------------------------------
Trickbot is back, this time with a stealthy code injection trick.
---------------------------------------------
https://threatpost.com/new-trickbot-variant-touts-stealthy-code-injection-t…
∗∗∗ Highly Flexible Marap Malware Enters the Financial Scene ∗∗∗
---------------------------------------------
A new downloader, which has been spotted in an array of recent email campaigns, uses anti-analysis techniques and calls in a system fingerprinting module.
---------------------------------------------
https://threatpost.com/highly-flexible-marap-malware-enters-the-financial-s…
∗∗∗ Anti-Coinminer Mining Campaign ∗∗∗
---------------------------------------------
Coinminer malware has been on the rise for some time. As more and more users become aware of this threat and try to take measures to protect themselves, cybercriminals are attempting to cash on that fear by serving crypto-miner malware from a website claiming to offer a coinminer blocker.
---------------------------------------------
https://www.zscaler.com/blogs/research/anti-coinminer-mining-campaign
∗∗∗ Detecting SSH Username Enumeration ∗∗∗
---------------------------------------------
A very quick post about a new thread which has been started yesterday on the OSS-Security mailing list. It's about a vulnerability affecting almost ALL SSH server version.
---------------------------------------------
https://blog.rootshell.be/2018/08/16/detecting-ssh-username-enumeration/
∗∗∗ Arbitrary, Unsigned Code Execution Vector in Microsoft.Workflow.Compiler.exe ∗∗∗
---------------------------------------------
Microsoft.Workflow.Compiler.exe, a utility included by default in the .NET framework, permits the execution of arbitrary, unsigned code by supplying a serialized workflow in the form of a XOML workflow file (dont worry. I had no clue what that was either) and an XML file consisting of serialized compiler arguments.
---------------------------------------------
https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-mic…
∗∗∗ Back to the 90s: FragmentSmack ∗∗∗
---------------------------------------------
As we had the previous week SegmentSmack (CVE-2018-5390) allowing remote DoS attacks by sending crafted TCP packets, this week a similar vulnerability has been reported on IP fragments.
---------------------------------------------
https://isc.sans.edu/forums/diary/Back+to+the+90s+FragmentSmack/23998/
=====================
= Vulnerabilities =
=====================
∗∗∗ Philips PageWriter TC10, TC20, TC30, TC50, and TC70 Cardiographs ∗∗∗
---------------------------------------------
This medical device advisory includes mitigation recommendations for improper input validation and use of hard-coded credentials vulnerabilities in Philips PageWriter Cardiographs.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-228-01
∗∗∗ Emerson DeltaV DCS Workstations ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for uncontrolled search path element, relative path traversal, improper privilege management, and stack-based buffer overflow vulnerabilities in Emersons Delta V workstations.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-228-01
∗∗∗ Tridium Niagara ∗∗∗
---------------------------------------------
This advisory was originally posted to the HSIN ICS-CERT library on July 10, 2018, and is being released to the NCCIC/ICS-CERT website. This advisory includes mitigation recommendations for path traversal and improper authentication vulnerabilities in Tridums Niagara systems.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-191-03
∗∗∗ WAGO 750-8xx Controller Denial of Service ∗∗∗
---------------------------------------------
The 750-8xx controller are susceptible to a Denial-of-Service attack due to a flood of network packets.
---------------------------------------------
https://cert.vde.com/de-de/advisories/vde-2018-013
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (intel-microcode, keystone, php-horde-image, and xen), Fedora (rsyslog), openSUSE (apache2, clamav, kernel, php7, qemu, samba, and Security), Oracle (mariadb and qemu-kvm), Red Hat (docker, mariadb, and qemu-kvm), Scientific Linux (mariadb and qemu-kvm), SUSE (GraphicsMagick, kernel, kgraft, mutt, perl-Archive-Zip, python, and xen), and Ubuntu (postgresql-10, postgresql-9.3, postgresql-9.5, procps, and webkit2gtk).
---------------------------------------------
https://lwn.net/Articles/762914/
∗∗∗ Jenkins: Mehrere Schwachstellen ermöglichen u. a. Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1645/
∗∗∗ Red Hat JBoss Core Services Apache HTTP Server: Mehrere Schwachstellen ermöglichen u. a. verschiedene Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1673/
∗∗∗ Red Hat JBoss Web Server: Mehrere Schwachstellen ermöglichen das Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1674/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities may affect IBM® SDK, Java™ Technology Edition ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719653
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10713739
∗∗∗ BIG-IP APM client for Linux and macOS X vulnerabilitiy CVE-2018-5546 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K54431371
∗∗∗ BIG-IP APM client for Windows vulnerability CVE-2018-5547 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K10015187
∗∗∗ BIG-IP APM client for Linux and macOS vulnerabilitiy CVE-2018-5546 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K54431371
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 14-08-2018 18:00 − Donnerstag 16-08-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ VORACLE Attack Can Recover HTTP Data From VPN Connections ∗∗∗
---------------------------------------------
A new attack named VORACLE can recover HTTP traffic sent via encrypted VPN connections under certain conditions. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/voracle-attack-can-recover-h…
∗∗∗ Microsoft Flaw Allows Full Multi-Factor Authentication Bypass ∗∗∗
---------------------------------------------
This is similar to taking a room key for a building and turning it into a skeleton key that works on every door in the building.
---------------------------------------------
https://threatpost.com/microsoft-flaw-allows-full-multi-factor-authenticati…
∗∗∗ Linux: Kernel und Distributionen schützen vor Prozessorlücke Foreshadow/L1TF ∗∗∗
---------------------------------------------
Mit neuen Kernel-Updates kann man sich vor den als Foreshadow oder L1TF genannten Prozessorlücken schützen, die viele moderne Intel-Prozessoren betreffen.
---------------------------------------------
http://heise.de/-4137264
∗∗∗ Patchday Microsoft: Angreifer attackieren Internet Explorer ∗∗∗
---------------------------------------------
In diesem Monat veröffentlicht Microsoft Sicherheitsupdates für 60 Lücken in Windows & Co. Zwei Schwachstellen sind derzeit im Fokus von Angreifern.
---------------------------------------------
http://heise.de/-4137351https://isc.sans.edu/forums/diary/Microsoft+August+2018+Patch+Tuesday/23986/
∗∗∗ August 2018 Office Update Release ∗∗∗
---------------------------------------------
The August 2018 Public Update releases for Office are now available! This month, there are 23 security updates and 23 non-security updates. All of the security and non-security updates are listed in KB article 4346823. A new version of Office 2013 Click-To-Run is available: 15.0.5059.1000 A new version of Office 2010 Click-To-Run is available: 14.0.7212.5000
---------------------------------------------
https://blogs.technet.microsoft.com/office_sustained_engineering/2018/08/14…
∗∗∗ Betrügerische E-Mail der Internet Domain Services Austria (IDSA) ∗∗∗
---------------------------------------------
Selbstständige, Vereine und Unternehmen erhalten von den Internet Domain Services Austria (IDSA) eine E-Mail. Sie sollen 197,50 Euro an idsa.at zahlen, damit Fremde keine Domain registrieren, die ihrer ähnelt. Empfänger/innen können die Nachricht ignorieren, denn ihr Inhalt ist betrügerisch und erfunden. Ebenso wenig gibt es die Internet Domain Services Austria.
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-e-mail-der-internet-d…
∗∗∗ Pfändungstermine wegen Urheberrechtsverletzung ignorieren ∗∗∗
---------------------------------------------
KonsumentInnen erhalten von der ADVOKAT RECHTSANWALT AG eine Nachricht, in der ein Pfändungstermin wegen nicht Bezahlens einer Abmahnung zu einer Urheberrechtsverletzung genannt wird. Grund sei das illegale Streamen von Filmen auf kinox.to. KonsumentInnen müssen die 426,55 Euro nicht bezahlen und die angedrohte Pfändung findet nie statt.
---------------------------------------------
https://www.watchlist-internet.at/news/pfaendungstermine-wegen-urheberrecht…
=====================
= Vulnerabilities =
=====================
∗∗∗ Philips IntelliSpace Cardiovascular Vulnerabilities ∗∗∗
---------------------------------------------
This medical advisory includes mitigation recommendations for improper privilege management and unquoted search path vulnerabilities in Philips IntelliSpace Cardiovascular (ISCV) software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-226-01
∗∗∗ File (Field) Paths - Critical - Remote Code Execution - SA-CONTRIB-2018-056 ∗∗∗
---------------------------------------------
Project: File (Field) PathsDate: 2018-August-15Security risk: Critical 15∕25 AC:Basic/A:User/CI:Some/II:All/E:Theoretical/TD:DefaultVulnerability: Remote Code ExecutionDescription: This module enables you to automatically sort and rename your uploaded files using token based replacement patterns to maintain a nice clean filesystem.The module doesnt sufficiently sanitize the path while a new file is uploading, allowing a remote attacker to execute arbitrary PHP code.
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-056
∗∗∗ VMSA-2018-0020 ∗∗∗
---------------------------------------------
VMware vSphere, Workstation, and Fusion updates enable Hypervisor-Specific Mitigations for L1 Terminal Fault - VMM vulnerability.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0020.html
∗∗∗ VMSA-2018-0021 ∗∗∗
---------------------------------------------
Operating System-Specific Mitigations address L1 Terminal Fault - OS vulnerability in VMware Virtual Appliances.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0021.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (kernel), Debian (kernel, linux-4.9, postgresql-9.4, and ruby-zip), Fedora (cgit, firefox, knot-resolver, mingw-LibRaw, php-symfony, php-symfony3, php-symfony4, php-zendframework-zend-diactoros, php-zendframework-zend-feed, php-zendframework-zend-http, python2-django1.11, quazip, sox, and thunderbird-enigmail), openSUSE (python-Django and seamonkey), Oracle (kernel), Red Hat (kernel, kernel-rt, and redhat-virtualization-host), Scientific Linux [...]
---------------------------------------------
https://lwn.net/Articles/762706/
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (fuse), Fedora (cri-o, gdm, kernel-headers, postgresql, units, and wpa_supplicant), Mageia (iceaepe, kernel-linus, kernel-tmb, and libtomcrypt), openSUSE (aubio, libheimdal, nemo-extensions, and python-Django1), Red Hat (flash-plugin), SUSE (apache2, kernel, php7, qemu, samba, and ucode-intel), and Ubuntu (gnupg).
---------------------------------------------
https://lwn.net/Articles/762804/
∗∗∗ ZDI-18-939: Foxit Reader PDF File Parsing Type Confusion Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-939/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Cisco Security Advisories ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/publicationListing.x
∗∗∗ Xen Security Advisories ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/
∗∗∗ F5 Security Advisories ∗∗∗
---------------------------------------------
https://support.f5.com/csp/new-updated-articles
∗∗∗ Security Advisory - Buffer Overflow Vulnerability on Several Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180725-…
∗∗∗ Security Advisory - Side-Channel Vulnerability Variants 3a and 4 ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180615-…
∗∗∗ Security Advisory - CPU Side Channel Vulnerability "L1TF" ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180815-…
∗∗∗ Security Notice - Statement About the Side Channel Vulnerability "L1TF" of Chips ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2018/huawei-sn-20180815-01-…
∗∗∗ VMSA-2018-0022 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0022.html
∗∗∗ VMSA-2018-0019.1 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0019.html
∗∗∗ HPESBHF03874 rev.1 - Certain HPE Products using Intel-based Processors, L1 Terminal Fault (L1TF) Speculative Side-channel Vulnerabilities, Local Disclosure of Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03875 rev.1 - HPE Integrated Lights Out 4 and 5, (iLO 4, 5), Remote Denial of Service ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 13-08-2018 18:00 − Dienstag 14-08-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Badness, Enumerated by Robots ∗∗∗
---------------------------------------------
A condensed summary of the blacklist data generated from traffic hitting bsdly.net and cooperating sites.
---------------------------------------------
https://bsdly.blogspot.com/2018/08/badness-enumerated-by-robots.html
∗∗∗ Brazilian banking customers targeted by IoT DNS hijacking attacks ∗∗∗
---------------------------------------------
Attackers launched a DNS hijacking campaign targeting Brazilian bank customer credentials through the end-user IoT devices.
---------------------------------------------
https://www.scmagazine.com/brazilian-banking-customers-targeted-by-iot-dns-…
∗∗∗ CVE? Nope. NVD? Nope. Serious must-patch type flaws skipping mainstream vuln lists - report ∗∗∗
---------------------------------------------
Infosec firm fingers decentralised reporting The first half of 2018 saw a record haul of reported software vulnerabilities yet a high proportion of these won't appear in any mainstream flaw-tracking lists, researcher Risk Based Security (RBS) has claimed.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/08/14/record_soft…
∗∗∗ Patchday: SAP kümmert sich um seine Software ∗∗∗
---------------------------------------------
Im August hat SAP zwölf neue Sicherheitshinweise für verschiedene Anwendungen veröffentlicht.
---------------------------------------------
http://heise.de/-4137050
∗∗∗ Erpresserische E-Mail nennt Telefonnummer ∗∗∗
---------------------------------------------
Kriminelle versenden eine erpresserische E-Mail. Darin nennen sie die letzten vier Ziffern einer Telefonnummer und behaupten, dass sie über intimite Aufnahmen verfügen. Empfänger/innen sollen innerhalb von 48 Stunden 1000 US-Dollar in Bitcoins bezahlen, damit es zu keiner Veröffentlichung kommt. Konsument/innen müssen keine Reaktion zeigen.
---------------------------------------------
https://www.watchlist-internet.at/news/erpresserische-e-mail-nennt-telefonn…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
Adobe has published security bulletins for Adobe Creative Cloud Desktop Application (APSB18-20), Adobe Flash Player (APSB18-25), Adobe Experience Manager (APSB18-26) and Adobe Acrobat and Reader (APSB18-29).
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1594
∗∗∗ SQL Injection, XSS & CSRF vulnerabilities in Pimcore software ∗∗∗
---------------------------------------------
Pimcore is affected by several security vulnerabilities, which can be exploited by an attacker to read data records from the database, attack other users of the web application with JavaScript code, browser exploits or Trojan horses, and perform arbitrary actions in the context of the logged-in user (CSRF).
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulne…
∗∗∗ Cisco IOS, IOS XE: Eine Schwachstelle ermöglicht das Ausspähen von Informationen ∗∗∗
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann eine Schwachstelle in Cisco IOS und IOS XE ausnutzen, indem er einen speziell präparierten Ciphertext an ein mit IKEv1 (Internet Key Exchange Version 1) konfiguriertes Gerät sendet. Dieses Gerät reagiert fehlerhaft auf dabei auftretende Entschlüsselungsfehler, wodurch verschlüsselte Nonces ausgespäht werden können.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1591/https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (thunderbird), Debian (gdm3 and samba), openSUSE (cgit and lxc), SUSE (grafana, kafka, logstash, openstack-monasca-installer and samba), and Ubuntu (gdm3 and libarchive).
---------------------------------------------
https://lwn.net/Articles/762556/
∗∗∗ Synology-SA-18:43 MailPlus Server ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to conduct denial-of-service attacks via a susceptible version of MailPlus Server.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_43
∗∗∗ Security Advisory - Multiple Vulnerabilities in IPsec IKE of Huawei Firewall Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180813-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Spectrum Conductor with Spark ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720115
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Tivoli Netcool Configuration Manager (CVE-2018-2783, CVE-2018-2800, CVE-2018-2790). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720313
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Cloud Manager with OpenStack ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718949
∗∗∗ IBM Security Bulletin: IBM Tivoli Application Dependency Discovery Manager (TADDM) is vulnerable to cross-site request forgery (CVE-2018-1455) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016659
∗∗∗ HPESBHF03868 rev.1 - HPE ML10 Gen9 using Intel Xeon Processor E3-1200 v5 with Intel Active Management Technology, multiple local and remote vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 10-08-2018 18:00 − Montag 13-08-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Popular Android Apps Vulnerable to Man-in-the-Disk Attacks ∗∗∗
---------------------------------------------
Some of the most popular Android applications installed on your phone may be vulnerable to a new type of attack named "Man-in-the-Disk" that can grant a third-party app the ability to crash them and/or run malicious code.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/popular-android-apps-vulnera…
∗∗∗ KeyPass ransomware ∗∗∗
---------------------------------------------
In the last few days, our anti-ransomware module has been detecting a new variant of malware - KeyPass ransomware. According to our information, the malware is propagated by means of fake installers that download the ransomware module.
---------------------------------------------
https://securelist.com/keypass-ransomware/87412/
∗∗∗ DEF CON 2018: Hacking Medical Protocols to Change Vital Signs ∗∗∗
---------------------------------------------
LAS VEGAS – In recent years there has been more attention paid to the security of medical devices; however, there has been little security research done on the unique protocols used by these devices. Many of the insulin pumps, heart monitors and other gadgets found in hospital rooms use aging protocol to communicate with nurses' [...]
---------------------------------------------
https://threatpost.com/def-con-2018-hacking-medical-protocols-to-change-vit…
∗∗∗ Angreifer können per Fax in Firmennetze eindringen ∗∗∗
---------------------------------------------
Sicherheitsexperten haben in Multifunktionsdruckern, wie sie in vielen Büros vorhanden sind, eine Sicherheitslücke entdeckt. Angreifer könnten sich durch Senden eines manipulierten Fax Zugang zum Firmennetzwerk verschaffen.
---------------------------------------------
https://help.orf.at/stories/2929974/
∗∗∗ Apple macOS vulnerability paves the way for system compromise with a single click ∗∗∗
---------------------------------------------
A security researcher uncovered a zero-day in Apple software by tweaking a few lines of code. Speaking at Defcon in Las Vegas last week, Patrick Wardle, Chief Research Officer of Digita Security, described his research into "synthetic" interactions with a user interface (UI) that can lead to severe macOS system security issues.
---------------------------------------------
https://www.zdnet.com/article/apple-zero-day-vulnerability-permits-attacker…
∗∗∗ Erpresser-Mails: Online-Gauner kassieren jetzt mit Handynummern ab ∗∗∗
---------------------------------------------
Online-Abzocker verschicken Mails, in denen sie behaupten, das Handy des Empfängers gehackt zu haben. Sie untermauern dies mit einem Auszug der Handynummer.
---------------------------------------------
https://heise.de/-4134298
∗∗∗ Gebäudeautomatisierung wird zur Wanze: Bugs in Crestron-Systemen ∗∗∗
---------------------------------------------
Büros, Unis, Flughäfen, Hotels, Privathäuser - Bugs in Crestron-Produkten lassen die Komponenten zu Wanzen werden - übers Internet, Kamerabilder inklusive.
---------------------------------------------
http://heise.de/-4133763
∗∗∗ Vulnerabilities in smart card drivers open systems to attackers ∗∗∗
---------------------------------------------
Security researcher Eric Sesterhenn of X41 D-SEC GmbH has unearthed a number of vulnerabilities in several smart card drivers, some of which can allow attackers to log into the target system without valid credentials and achieve root/admin privileges. "A lot of attacks against smart cards have been performed in the past but not much work has focused on hacking the driver side of the smart card stack [the piece of software that interacts with chip [...]
---------------------------------------------
https://www.helpnetsecurity.com/2018/08/13/vulnerabilities-smart-card-drive…
∗∗∗ FBI Warns of 'Unlimited' ATM Cashout Blitz ∗∗∗
---------------------------------------------
The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an "ATM cash-out," in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours.
---------------------------------------------
https://krebsonsecurity.com/2018/08/fbi-warns-of-unlimited-atm-cashout-blit…
∗∗∗ Warnung vor betrügerischen Maschinenangeboten ∗∗∗
---------------------------------------------
Auf Kleinanzeigen-Plattformen finden Interessent/innen günstige Nutzfahrzeuge und Landmaschinen. Sie führen zu den Anbietern insolvenzamt.com, maschinen-insolvenzamt.com und anbud-spzoo.eu. Bei den Händlern handelt es sich um Fake-Shops. Sie liefern trotz Bezahlung keine Ware.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-betruegerischen-maschine…
=====================
= Vulnerabilities =
=====================
∗∗∗ 2018-1581: Oracle Datenbankserver: Eine Schwachstelle ermöglicht die vollständige Kompromittierung der Software ∗∗∗
---------------------------------------------
[...] Die Schwachstelle betrifft auch Oracle Database 12.1.0.2 für Windows und jede Version der Software auf Linux- und Unix-Systemen. Die Patches für diese Systeme wurden bereits mit dem letzten Oracle Critical Patch Update im Juli 2018 ausgeliefert. Anwender, die bisher keine Patches eingespielt haben, sollten dies unverzüglich nachholen.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1581/http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-3110-503…
∗∗∗ 2018-1582: NextCloud: Zwei Schwachstellen ermöglichen Stored Cross-Site-Scripting-Angriffe ∗∗∗
---------------------------------------------
Zwei Schwachstellen in Nextcloud Server sowie Nextcloud Talk ermöglichen einem entfernten, einfach authentisierten Angreifer die Durchführung von Stored Cross-Site-Scripting (XSS)-Angriffen.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1582/https://nextcloud.com/security/advisory/?id=NC-SA-2018-008https://nextcloud.com/security/advisory/?id=NC-SA-2018-009
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (blender, openjdk-8, postgresql-9.6, and sam2p), Fedora (libmspack, mingw-glib2, mingw-glibmm24, and rsyslog), Mageia (blender, glpi, godot, kernel, lftp, libjpeg, libsndfile, libsoup, mariadb, mp3gain, openvpn, and soundtouch), openSUSE (cgit, libvirt, mailman, NetworkManager-vpnc, and sddm), Slackware (bind), and SUSE (ffmpeg, glibc, and libvirt).
---------------------------------------------
https://lwn.net/Articles/762502/
∗∗∗ 2018-08-10: Vulnerability in eSOMS LDAP Integration ∗∗∗
---------------------------------------------
https://search-ext.abb.com/library/Download.aspx?DocumentID=9AKK107046A5821…
∗∗∗ IBM Security Bulletin: eDiscovery Manager is affected by public disclosed vulnerability from Apache Poi ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719481
∗∗∗ HPESBST03861 rev.1 - HPE 3PAR Service Processor (SP), Multiple Local and Remote Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03870 rev.1 - HPE 3PAR Service Processor (SP), Local Disclosure of Privileged Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03858 rev.1 - HPE OfficeConnect 1810 Switch Series Local Disclosure of Sensitive Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 09-08-2018 18:00 − Freitag 10-08-2018 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Neue Macs können beim ersten Kontakt mit WLAN gehackt werden ∗∗∗
---------------------------------------------
Betroffen sind Firmenkunden von Apple. Die Schwachstelle wurde auf der Black Hat Konferenz präsentiert.
---------------------------------------------
https://futurezone.at/digital-life/neue-macs-koennen-beim-ersten-kontakt-mi…
∗∗∗ The 10 Best Practices for Identifying and Mitigating Phishing ∗∗∗
---------------------------------------------
Phishing (a form of social engineering) is escalating in both frequency and sophistication; consequently, it is even more challenging to defend against cyber-related attacks. These days, any industry, any workplace, any work role can be targeted by a phishing scam that is spreading beyond simple malicious email attachments and link manipulation techniques (i.e., phishers may [...]
---------------------------------------------
https://resources.infosecinstitute.com/the-10-best-practices-for-identifyin…
∗∗∗ Practical Web Cache Poisoning ∗∗∗
---------------------------------------------
Web cache poisoning has long been an elusive vulnerability, a theoretical threat used mostly to scare developers into obediently patching issues that nobody could actually exploit. In this paper Ill show you how to compromise websites by using esoteric web features to turn their caches into exploit delivery systems, targeting everyone that makes the mistake of visiting their homepage.
---------------------------------------------
https://portswigger.net/blog/practical-web-cache-poisoning
∗∗∗ VIA C3: "God Mode"-Sicherheitslücke in Prozessoren entdeckt ∗∗∗
---------------------------------------------
Ein IT-Experte hat einen schwerwiegenden Bug in alten CPUs von VIA Technologies aufgespürt und auch gleich eine Gegenmaßnahme programmiert.
---------------------------------------------
http://heise.de/-4133425
∗∗∗ Vulnerabilities in mPOS devices could lead to fraud and theft ∗∗∗
---------------------------------------------
Vulnerabilities in mPOS (mobile point-of-sale) machines could allow malicious merchants to defraud customers and attackers to steal payment card data, Positive Technologies researchers have found. The use of mPOS devices has seen huge growth over the last few years as the barriers to entry to be provided a device and start accepting card payments are effectively zero.
---------------------------------------------
https://www.helpnetsecurity.com/2018/08/10/mpos-vulnerabilities/
∗∗∗ Nicht bei shop-and-smile.com einkaufen ∗∗∗
---------------------------------------------
Auf shop-and-smile.com finden Konsument/innen Elektroartikel. Die angebotenen Produkte sind gebraucht und nicht neu. Das ist im Rahmen eines Einkaufs nicht offensichtlich. Eine Bezahlung der Ware ist entgegen anderer Aussagen nur im Voraus möglich. Die Watchlist Internet rät von einem Einkauf bei shop-and-smile.com ab.
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-bei-shop-and-smilecom-einkaufe…
=====================
= Vulnerabilities =
=====================
∗∗∗ Crestron TSW-X60 and MC3 ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for OS command injection, improper access control, and insufficiently protected credentials vulnerabilities in Crestrons TSW-X60 and MC3 devices.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-221-01
∗∗∗ NetComm Wireless 4G LTE Light Industrial M2M Router ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for information exposure, cross-site forgery, cross-site scripting, and information exposure through directory listing vulnerabilities in NetComm Wireless 4G LTE Light Industrial M2M Router.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-221-02
∗∗∗ PostgreSQL 10.5, 9.6.10, 9.5.14, 9.4.19, 9.3.24, and 11 Beta 3 Released! ∗∗∗
---------------------------------------------
Two security vulnerabilities have been closed by this release: CVE-2018-10915: Certain host connection parameters defeat client-side security defenses CVE-2018-10925: Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE
---------------------------------------------
https://www.postgresql.org/about/news/1878/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (exiv2, kernel-headers, kernel-tools, libgit2, and thunderbird-enigmail), openSUSE (blueman, cups, gdk-pixbuf, libcdio, libraw, libsoup, libtirpc, mysql-community-server, python-mitmproxy, sssd, and virtualbox), Red Hat (cobbler), SUSE (ceph, firefox, NetworkManager-vpnc, openssh, and wireshark), and Ubuntu (openjdk-7 and openjdk-8).
---------------------------------------------
https://lwn.net/Articles/762337/
∗∗∗ wpa_supplicant: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1564/
∗∗∗ Red Hat Certification: Mehrere Schwachstellen ermöglichen u. a. die Ausführung beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1571/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect ITCAM for SOA ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10720235
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearQuest ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718367
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2018-2633, CVE-2018-2603, CVE-2018-2579, CVE-2018-2602, CVE-2018-2794, & CVE-2018-2783) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10717207
∗∗∗ IBM Security Bulletin: A security vulnerability in OpenSSL affects IBM Rational ClearQuest (CVE-2018-0739) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718373
∗∗∗ IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Rational ClearCase (CVE-2018-0739) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10717211
∗∗∗ IBM Security Bulletin: Security Bulletin: IBM Data Server Driver for JDBC and SQLJ is affected by a 3RD PARTY Unsafe deserialization ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22012479
∗∗∗ IBM Security Bulletin: A security vulnerability in IBM Rational ClearQuest with SSL/TLS communications (CVE-2016-2922) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718377
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 08-08-2018 18:00 − Donnerstag 09-08-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Warnung vor Bewerbung bei webex-solutions.at ∗∗∗
---------------------------------------------
Webex Solutions ist eine betrügerische Scheinfirma. Sie sucht Mitarbeiter/innen. Auf ihrer Website webex-solutions.at fragt sie persönliche Daten von Interessent/innen ab. In Wahrheit gibt es keine zu besetzende Stelle. Kriminelle nutzen die Angaben ihrer Opfer, damit sie mit diesen ein Konto eröffnen und darüber Geldwäscherei betreiben können.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-bewerbung-bei-webex-solu…
=====================
= Vulnerabilities =
=====================
∗∗∗ Upcoming Security Updates for Adobe Acrobat and Reader (APSB18-29) ∗∗∗
---------------------------------------------
A prenotification security advisory (APSB18-29) has been posted regarding upcoming Adobe Acrobat and Reader updates scheduled for Tuesday, August 14, 2018.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1591
∗∗∗ [Drupal] PHP Configuration - Critical - Arbitrary PHP code execution - SA-CONTRIB-2018-055 ∗∗∗
---------------------------------------------
This module enables you to add or overwrite PHP configuration on a drupal website. The module doesnt sufficiently allow access to set these configurations, leading to arbitrary PHP configuration execution by an attacker.This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer phpconfig".
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-055
∗∗∗ RSYSLOG: Eine Schwachstelle ermöglicht u. a. einen Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann eine Schwachstelle in RSYSLOG ausnutzen, um einen Denial-of-Service (DoS)-Angriff durchzuführen oder möglicherweise auch beliebigen Programmcode zur Ausführung zu bringen.
Der Hersteller hat RSYSLOG 8.37.0 (v8-stable) zur Verfügung gestellt.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1558/https://www.adiscon.com/news/news-release/rsyslog-8-37-0-v8-stable-released/
∗∗∗ Vulnerabilities in multiple third party TYPO3 CMS extensions ∗∗∗
---------------------------------------------
several vulnerabilities have been found in the following third party TYPO3 extensions:
* "Heise Shariff" (rx_shariff)
* "Register to tt_address" (registeraddress)
* "Amazon AWS S3 FAL driver (CDN)" (aus_driver_amazon_s3)
* "Powermail" (powermail)
* "AWS SDK for PHP" (aws_sdk_php)
* "Front End User Registration" (sr_feuser_register)
* "Amazon Web Services SDK " (aws_sdk)
* "Frontend Treeview" (mh_treeview)
* "TemplaVoilà! Plus" (templavoilaplus)
---------------------------------------------
http://lists.typo3.org/pipermail/typo3-announce/2018/000429.html
∗∗∗ Black Hat: Windows-10-Assistent Cortana reißt Sicherheitslücken auf ∗∗∗
---------------------------------------------
Auf der Black Hat in Las Vegas haben Forscher mehrere Lücken in Cortana aufgedeckt. So lässt sich zum Beispiel Schadcode über den Sprachassistenten ausführen.
---------------------------------------------
http://heise.de/-4132425
∗∗∗ BIND deny-answer-aliases Bug Lets Remote Users Cause the Target named Service to Crash ∗∗∗
---------------------------------------------
A remote user can trigger an INSIST assertion failure in 'name.c', causing the 'named' service to stop processing.
Systems that use the "deny-answer-aliases" feature are affected.
---------------------------------------------
http://www.securitytracker.com/id/1041436
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (kernel, linux-hardened, linux-lts, and linux-zen), Debian (kamailio and wpa), Fedora (kernel-headers, kernel-tools, moodle, and vim-syntastic), and openSUSE (clamav, enigmail, and java-11-openjdk).
---------------------------------------------
https://lwn.net/Articles/762205/
∗∗∗ IBM Security Bulletin: IBM UrbanCode Deploy diagnostics files may contain confidential data (CVE-2017-1286) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg2C1000377
∗∗∗ IBM Security Bulletin: Vulnerabilities CVE-2018-1333 and CVE-2018-8011 in the IBM i HTTP Server affect IBM i. ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720141
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Application Dependency Discovery Manager (TADDM) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719933
∗∗∗ IBM Security Bulletin: Plugins can be uploaded to IBM UrbanCode Deploy without Authentication (CVE-2017-1749) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg2C1000374
∗∗∗ HPESBHF03805 rev.23 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 07-08-2018 18:00 − Mittwoch 08-08-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Update Mechanism Flaws Allow Remote Attacks on UEFI Firmware ∗∗∗
---------------------------------------------
The glitch stems from a functionality intended to allow updates to the UEFI firmware.
---------------------------------------------
https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-…
∗∗∗ Cookie Consent Script Used to Distribute Malware ∗∗∗
---------------------------------------------
Most websites today use cookies. Since May 25th, 2018, all websites that do business in the European Union (EU) had to make some changes to be compliant with the EU General Data Protection Regulation (GDPR). Even though cookie usage is mentioned only once in GDPR, any organization utilizing them to track users' browsing activity have had to add a warning about how they are using them and ask for the user consent.
---------------------------------------------
https://blog.sucuri.net/2018/08/cookie-consent-script-used-to-distribute-ma…
∗∗∗ IT-Grundschutz: Neuer Online-Kurs veröffentlicht ∗∗∗
---------------------------------------------
Ein neues Online-Angebot für den modernisierten IT-Grundschutz erleichtert Anwendern den Einstieg in die Umsetzung der IT-Grundschutz-Methodik. Basierend auf dem IT-Grundschutz-Kompendium und den BSI-Standards 200-1,-2 und -3 führt die vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte und veröffentlichte Web-Schulung die Anwender in unterschiedlichen Lektionen durch die IT-Grundschutz-Vorgehensweise.
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/IT-Grundsch…
∗∗∗ PayPal-Betrug mit eigener E-Mailadrese ∗∗∗
---------------------------------------------
Konsument/innen erhalten von PayPal eine Benachrichtigung darüber, dass sie ihre E-Mailadresse für die Eröffnung eines Kontos bestätigen sollen. Das Konto haben Kriminelle eröffnet. Sie kaufen mit der fremden E-Mailadresse und erfundenen Daten ein. Die Rechnungen und Mahnungen dafür erhalten die Opfer. Diese müssen die offenen PayPal-Forderungen nicht bezahlen.
---------------------------------------------
https://www.watchlist-internet.at/news/paypal-betrug-mit-eigener-e-mailadre…
=====================
= Vulnerabilities =
=====================
∗∗∗ Medtronic MyCareLink 24950 Patient Monitor ∗∗∗
---------------------------------------------
This medical device advisory includes mitigation recommendations for insufficient verification of data authenticity and storing passwords in a recoverable format vulnerabilities in the Medtronic MyCareLink 24950 Patient Monitor.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-219-01
∗∗∗ Medtronic MiniMed 508 Insulin Pump ∗∗∗
---------------------------------------------
This medical device advisory includes mitigation recommendations for cleartext transmission of sensitive information and authentication bypass by capture-replay vulnerabilities in the Medtronic MiniMed 508 Insulin Pump.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-219-02
∗∗∗ Delta Electronics CNCSoft and ScreenEditor ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for stack-based buffer overflow and out-of-bounds read vulnerabilities in Delta Electronics CNCSoft and ScreenEditor software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01
∗∗∗ What Do I Need To Know about "SegmentSmack", (Wed, Aug 8th) ∗∗∗
---------------------------------------------
"SegmentSmack" is yet another branded vulnerability, also known as CVE-2018-5390. It hit the "news" yesterday. Succesful exploitation may lead to a denial of service against a targeted system. At this point, not a lot is known about this vulnerability. But here are some highlights: [...]
---------------------------------------------
https://isc.sans.edu/forums/diary/What+Do+I+Need+To+Know+about+SegmentSmack…
∗∗∗ HPSBHF03589 rev. 2 - HP Ink Printers Remote Code Execution ∗∗∗
---------------------------------------------
Two security vulnerabilities have been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack or static buffer overflow, which could allow remote code execution.
---------------------------------------------
https://support.hp.com/us-en/document/c06097712
∗∗∗ Android Security Bulletin - August 2018 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Security patch levels of 2018-08-05 or later address all of these issues. [...] The most severe of these issues is a critical vulnerability that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.
---------------------------------------------
https://source.android.com/security/bulletin/2018-08-01
∗∗∗ 2018-08 Out of Cycle Security Bulletin: Junos platforms vulnerable to SegmentSmack attack [VU#962459] ∗∗∗
---------------------------------------------
[...] Crafted sequences of TCP/IP packets may allow a remote attacker to create a denial of service (DoS) condition on routing engines (REs) running Junos OS. The attack requires a successfully established two-way TCP connection to an open port. The rate of attack traffic is lower than typical thresholds for built-in Junos OS distributed denial-of-service (DDoS) protection, so additional configuration is required to defend against these issues on affected platforms.
---------------------------------------------
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10876
∗∗∗ VMSA-2018-0019 ∗∗∗
---------------------------------------------
Horizon 6, 7, and Horizon Client for Windows updates address an out-of-bounds read vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0019.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel), Fedora (ceph, exiv2, myrepos, and seamonkey), openSUSE (libofx and znc), Oracle (kernel), Red Hat (qemu-kvm-rhev), SUSE (clamav, kernel, and rubygem-sprockets-2_12), and Ubuntu (gnupg, lftp, libxcursor, linux-hwe, linux-azure, linux-gcp, linux-raspi2, and lxc).
---------------------------------------------
https://lwn.net/Articles/762022/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (slurm-llnl), Fedora (libmspack), openSUSE (cups, kernel, kernel-firmware, libcgroup, and ovmf), Oracle (kernel), and SUSE (cups, enigmail, libcdio, and pidgin).
---------------------------------------------
https://lwn.net/Articles/762098/
∗∗∗ eDirectory 9.1.1 Hot Patch 1 ∗∗∗
---------------------------------------------
https://download.novell.com/Download?buildid=vP3nS-Hctkk~
∗∗∗ IBM Security Bulletin: Security vulnerabilities in IBM® SDK for Node.js™ affect IBM® SDK for Node.js™ in IBM Cloud (CVE-2018-7158, CVE-2018-7159, CVE-2018-7160) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22011860
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Guardium Data Redaction ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718421
∗∗∗ HPESBHF03850 rev.3 - HPE ProLiant, Synergy, and Moonshot Systems: Local Disclosure of Information, CVE-2018-3639 – Speculative Store Bypass and CVE-2018-3640 – Rogue System Register Read ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0006 ∗∗∗
---------------------------------------------
https://webkitgtk.org/security/WSA-2018-0006.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 06-08-2018 18:00 − Dienstag 07-08-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Lets Encrypt Is Now Officially Trusted by All Major Root Certificates ∗∗∗
---------------------------------------------
Lets Encrypt announced yesterday that they are now directly trusted by all major root certificates including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. With this announcement, Lets Encrypt is now directly trusted by all major browsers and operating systems.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/lets-encrypt-is-now-official…
∗∗∗ DoS-Schwachstelle im Kernel - keine Panik! ∗∗∗
---------------------------------------------
In der Nacht auf heute wurde eine Schwachstelle im Linux Kernel bekannt, die einen DoS-Angriff durch spezielle TCP-Pakete ermöglicht ...
Auf den ersten Blick klingt das hochkritisch und stellt eine enorme Gefahr für Unternehmen dar, die Webauftritte und Mailserver auf Linux-Servern betreiben.
Auf den zweiten Blick gibt es jedoch einige wichtige Einschränkungen, die das Risiko minimieren.
---------------------------------------------
https://www.cert.at/services/blog/20180807131134-2285.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Multiple vulnerabilities in multiple I-O DATA network camera products ∗∗∗
---------------------------------------------
Overview: Multiple network camera products provided by I-O DATA DEVICE, INC. contain multiple vulnerabilities.
Products Affected: TS-WRLP firmware Ver.1.09.04 and earlier, TS-WRLA firmware Ver.1.09.04 and earlier, TS-WRLP/E firmware Ver.1.09.04 and earlier
---------------------------------------------
https://jvn.jp/en/jp/JVN83701666/
∗∗∗ FreeBSD: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann die Schwachstelle durch den Versand von TCP-Paketen an ein betroffenes System ausnutzen und einen Denial-of-Service (DoS)-Zustand bewirken.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1548/
∗∗∗ [openssl-announce] Forthcoming OpenSSL releases ∗∗∗
---------------------------------------------
The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.1.0i and 1.0.2p. These releases will be made available on 14th August 2018 between approximately 1200-1600 UTC. These are bug-fix releases. They also contain the fixes for two LOW severity security issues (CVE-2018-0732 and CVE-2018-0737)
---------------------------------------------
https://mta.openssl.org/pipermail/openssl-announce/2018-August/000129.html
∗∗∗ Android Patchday: Monatliches Update beseitigt zahlreiche Schwachstellen ∗∗∗
---------------------------------------------
Wie bereits im Vormonat hat Google auch beim aktuellen Patchday durchweg Sicherheitslücken mit hohem bis kritischem Schweregrad beseitigt.
---------------------------------------------
http://heise.de/-4130865
∗∗∗ Manueller Umstieg nötig: Mozilla Thunderbird 60 mit wichtigen Security-Updates ∗∗∗
---------------------------------------------
Sieht schöner aus – und ist obendrein sicherer: Thunderbird-User sollten auf Version 60 umsteigen. Dazu ist ein manuelles Update erforderlich.
---------------------------------------------
http://heise.de/-4131114
∗∗∗ IBM Security Bulletin: IBM API Connect is vulnerable to denial of service attacks via https-proxy-agent/newrelic(a)3.1.0 (CVE-2018-3739) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718999
∗∗∗ IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM Spectrum Scale packaged in IBM Elastic Storage Server ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10717301
∗∗∗ IBM Security Bulletin: IBM Flex System FC5022 16Gb SAN Scalable Switch is affected by vulnerabilities in Brocade Fabric OS (CVE-2017-6225 CVE-2017-6227) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720085
∗∗∗ JSA10876 - 2018-08 Out of Cycle Security Bulletin: Junos platforms vulnerable to SegmentSmack attack [VU#962459] ∗∗∗
---------------------------------------------
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10876&actp=RSS
∗∗∗ SSA-179516 (Last Update: 2018-08-07): OpenSSL Vulnerability in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf
∗∗∗ SSA-979106 (Last Update: 2018-08-07): Vulnerabilities in SIMATIC STEP 7 (TIA Portal) and SIMATIC WinCC (TIA Portal) ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-979106.pdf
∗∗∗ SSA-920962 (Last Update: 2018-08-07): Vulnerabilities in Automation License Manager ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-920962.pdf
∗∗∗ HPESBHF03835 rev.1 - HPE Integrated Lights-Out 3, 4, 5 (iLO 3, 4, 5), Moonshot Chassis Manager, and Moonshot Component Pack, Remote Denial of Service ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 03-08-2018 18:00 − Montag 06-08-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New Method Simplifies Cracking WPA/WPA2 Passwords on 802.11 Networks ∗∗∗
---------------------------------------------
It should be noted that this method does not make it easier to crack the password for a wireless network. It instead makes the process of acquiring a hash that can can be attacked to get the wireless password much easier.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-method-simplifies-cracki…
∗∗∗ DDoS-Angriffe: Die Bedrohung stabilisiert sich ∗∗∗
---------------------------------------------
Durch den Schlag gegen Webstresser.org haben DDoS-Angriffe im deutschsprachigen Raum klar nachgelassen. Grund zur Entwarnung ist das aber nicht.
---------------------------------------------
http://heise.de/-4128961
∗∗∗ Abmahnung der Anwalt AG wegen Urheberrechtsverletzung ∗∗∗
---------------------------------------------
Die ANWALT AG, vertreten durch Dr. Rene De La Porte, versendet eine Abmahnung wegen Urheberrechtsverletzung. Empfänger/innen sollen 426,55 Euro wegen eines Rechtsverstoßes auf kinox.to bezahlen. Das Schreiben ist betrügerisch. Konsument/innen müssen den Geldbetrag nicht bezahlen.
---------------------------------------------
https://www.watchlist-internet.at/news/abmahnung-der-anwalt-ag-wegen-urhebe…
=====================
= Vulnerabilities =
=====================
∗∗∗ Enigmail 2.0.8 released ∗∗∗
---------------------------------------------
A security issue has been fixed that allows an attacker to prepare a plain, unauthenticated HTML message in a way that it looks like its signed and/or encrypted.
---------------------------------------------
https://www.enigmail.net/index.php/en/download/changelog
∗∗∗ EMC Data Protection Advisor XML External Entity Processing Flaw Lets Remote Authenticated Users Obtain Potentially Sensitive Information ∗∗∗
---------------------------------------------
A remote authenticated user can supply specially crafted XML External Entity (XXE) data to the target REST API to read files on the target system with the privileges of the target service or cause denial of service conditions on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1041417
∗∗∗ CA API Developer Portal Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks ∗∗∗
---------------------------------------------
The developer portal does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.
---------------------------------------------
http://www.securitytracker.com/id/1041416
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (cgit, python-django, and python2-django), Debian (ant, cgit, libmspack, python-django, symfony, vim-syntastic, and xml-security-c), Fedora (kernel-headers, libao, libvorbis, mingw-gdal, mingw-xerces-c, and python-XStatic-jquery-ui), openSUSE (bouncycastle, java-10-openjdk, libgcrypt, libsndfile, mutt, nautilus, ovmf, python-dulwich, rpm, util-linux, wireshark, and xen), Oracle (kernel), Red Hat (kernel, openslp, rhvm-setup-plugins, and xmlrpc),
---------------------------------------------
https://lwn.net/Articles/761923/
∗∗∗ IBM Security Bulletin: Vulnerability in IBM Rhapsody Model Manager with potential for Cross-Site Scripting attack ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718345
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 02-08-2018 18:00 − Freitag 03-08-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Cryptominers: Binary-Process-Cron Variants and Methods of Removal ∗∗∗
---------------------------------------------
This post provides a brief overview of how to manually remove server-side cryptominers and other types of Binary-Process-Cron malware from a server. Unlike browser-based JavaScript cryptominers that have been injected into a web page, a binary server-level cryptominer abuses server resources without affecting the computers or mobile devices of site ..
---------------------------------------------
https://blog.sucuri.net/2018/08/cryptominer-variants-removal.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (busybox, graphicsmagick, and libmspack), Fedora (pam_yubico), Scientific Linux (openslp), Slackware (lftp), SUSE (cups, libtirpc, and thunderbird), and Ubuntu (clamav).
---------------------------------------------
https://lwn.net/Articles/761752/
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management could allow an authenticated user to obtain sensitive information from the WhoAmI API (CVE-2018-1528) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22017450
∗∗∗ IBM Security Bulletin: Invalid user group vulnerability in IBM MQ on Unix platform(CVE-2018-1551) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10716113
∗∗∗ IBM Security Bulletin: Vulnerabilities in Rational DOORS Next Generation with potential for Cross-Site Scripting attack (CVE-2018-1422) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719817
∗∗∗ IBM Security Bulletin:A vulnerability in GSKit and GSKit-Crypto affects IBM Performance Management products (CVE-2018-1447) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22015283
∗∗∗ HPESBHF03872 rev.1 - HPE Intelligent Management Center Platform (IMC PLAT), Remote Directory Traversal ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03841 rev.2 - Certain HPE Servers with AMD-based Processors, Multiple Vulnerabilities (Fallout/Masterkey) ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPSBGN02298 SSRT071502 rev.3 - HP Notebook PC Quick Launch Button (QLB) Software Running on Windows, Remote Execution of Arbitrary Code, Gain Privileged Access ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 01-08-2018 18:00 − Donnerstag 02-08-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Crime and Crypto: An Evolution in Cyber Threats ∗∗∗
---------------------------------------------
Cybercriminals are constantly experimenting with new ways to take money from their victims. Their tactics evolve quickly to maximize returns and minimize risk. The emergence of cryptocurrency has opened up new opportunities to do just that. To better understand today’s threat landscape, it’s worth exploring the origins of cryptocurrencies and the progress cybercriminals have made in using it to advance their own interests.
---------------------------------------------
https://www.webroot.com/blog/2018/08/02/crime-crypto-evolution-cyber-threat…
∗∗∗ Save the Date: 4th e-Health Security Conference ∗∗∗
---------------------------------------------
ENISA is organising the 4th eHealth Security workshop in cooperation with the Dutch Ministry of Health, Welfare and Sport, on the 14th of November.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/save-the-date-4th-e-health-secu…
∗∗∗ Reddit Breach Highlights Limits of SMS-Based Authentication ∗∗∗
---------------------------------------------
Reddit.com today disclosed that a data breach exposed some internal data, as well as email addresses and passwords for some Reddit users. As Web site breaches go, this one doesnt seem too severe. Whats interesting about the incident is that it showcases once again why relying on mobile text messages (SMS) for two-factor authentication (2FA) can lull companies and end users into a false sense of security.
---------------------------------------------
https://krebsonsecurity.com/2018/08/reddit-breach-highlights-limits-of-sms-…
∗∗∗ The Year Targeted Phishing Went Mainstream ∗∗∗
---------------------------------------------
A story published here on July 12 about a new sextortion-based phishing scheme that invokes a real password used by each recipient has become the most-read piece on KrebsOnSecurity since this site launched in 2009. And with good reason -- sex sells (the second most-read piece here was my 2015 scoop about the Ashley Madison hack). But beneath the lurid allure of both stories lies a more unsettling reality: It has never been easier for scam artists to launch convincing, targeted phishing and
---------------------------------------------
https://krebsonsecurity.com/2018/08/the-year-targeted-phishing-went-mainstr…
=====================
= Vulnerabilities =
=====================
∗∗∗ Drupal Core - 3rd-party libraries -SA-CORE-2018-005 ∗∗∗
---------------------------------------------
The Drupal project uses the Symfony library. The Symfony library has released a security update that impacts Drupal. Refer to the Symfony security advisory for the issue.The same vulnerability also exists in the Zend Feed and Diactoros libraries included in Drupal core; however, Drupal core does not use the vulnerable functionality.
---------------------------------------------
https://www.drupal.org/SA-CORE-2018-005
∗∗∗ Telegram: Passport-Dokumentenspeicher des Krypto-Messengers hat Schwachstellen ∗∗∗
---------------------------------------------
Geraten die von Telegram verwahrten Passwort-Hashes für Passport in falsche Hände, ließen sie sich leichter knacken, als man das eigentlich haben will.
---------------------------------------------
http://heise.de/-4127755
∗∗∗ Django Open Redirect Flaw in CommonMiddleware Lets Remote Users Redirect the Target Users Browser to an Arbitrary Site ∗∗∗
---------------------------------------------
On systems with django.middleware.common.CommonMiddleware and the APPEND_SLASH setting enabled and with a project that has a URL pattern that accepts any path ending in a slash, a remote user can create a URL that, when loaded by the target user, will redirect the target user's browser to an arbitrary site.
---------------------------------------------
http://www.securitytracker.com/id/1041403
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (busybox and mutt), Fedora (bibutils and wireshark), openSUSE (glibc and rsyslog), Slackware (blueman), SUSE (cups, ovmf, and polkit), and Ubuntu (bouncycastle, libmspack, and python-django).
---------------------------------------------
https://lwn.net/Articles/761625/
∗∗∗ Vuln: Symfony CVE-2018-14773 Security Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/104943
∗∗∗ Cisco AMP for Endpoints Mac Connector Software Denial of Service Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Web Security Appliance Reflected and Document Object Model-Based Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Unified Communications Manager Reflected Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Small Business 300 Series Managed Switches Authenticated Reflected Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Small Business 300 Series Managed Switches Persistent Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Prime Collaboration Provisioning Unauthorized Password Change Denial of Service Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletin: IBM Security Identity Manager is affected by an Apache vulnerability. ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719413
∗∗∗ IBM Security Bulletin: API Connect Developer Portal is affected by multiple PHP vulnerabilities ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10713449
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Installation Manager and IBM Packaging Utility ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016803
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management installs with a default administrator account that a remote intruder could use to gain administrator access to the system.(CVE-2018-1524) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22017452
∗∗∗ IBM Security Bulletin : Multiple vulnerabilities in IBM GSKit affect IBM Host On-Demand. ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10716977
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities have been identified in Open SSL, which is shipped with IBM Tivoli Network Manager IP Edition (CVE-2017-3737, CVE-2017-3738). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10717007
∗∗∗ HPESBST03857 rev.1 - HPE XP7 Command View Advanced Edition Products using JDK, Local and Remote Authentication Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03859 rev.1 - HPE XP P9000 Command View Advanced Edition Software (CVAE) - Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03860 rev.1 - HPE XP P9000 Command View Advanced Edition (CVAE) Software, Local and Remote Unauthorized Access to Sensitive Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily