=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 28-03-2013 18:00 − Freitag 29-03-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Sophos lädt ungefragt Datensammler nach ***
---------------------------------------------
Der Antivirenhersteller will seinen Firmenkunden in Kürze ein "kleines Zusatztool" auf den Rechner laden, das Daten über das Nutzungsverhalten einsammelt uns Sophos schickt.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/2a1abd19/l/0L0Sheise0Bde0Csec…
*** Cash Claws, Fake Fascias & Tampered Tickets ***
---------------------------------------------
Credit and debit card skimmers arent just for ATMs anymore. According to European anti-fraud experts, innovative skimming devices are being found on everything from train ticket kiosks to parking meters and a host of other unattended payment terminals.Related Posts:Beware Card- and Cash-Trapping at the ATMFun with ATM Skimmers, Part IIIATM Skimmers Get Wafer ThinCrooks Rock Audio-based ATM SkimmersAll-in-One Skimmers
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/_aHaCD9zbGc/
*** Microsoft Releases 4 updates to sysinternals and a new tool. More here: http://blogs.technet.com/b/sysinternals/archive/2013/03/27/updates-autoruns…, (Thu, Mar 28th) ***
---------------------------------------------
-- John Bambenek bambenek \at\ gmail /dot/ com Bambenek Consulting (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15502&rss
*** PayPal Sellers CMS Cross Site Scripting ***
---------------------------------------------
Topic: PayPal Sellers CMS Cross Site Scripting Risk: Low Text:Title: Paypal Bug Bounty #6 - Persistent Web Vulnerability Date: == 2013-03-27 References: == http://www...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/tJz8R2VxVKs/WLB-20…
*** PayPal GP+ Cross Site Scripting ***
---------------------------------------------
Topic: PayPal GP+ Cross Site Scripting Risk: Low Text:Title: Paypal Bug Bounty #46 - Persistent Web Vulnerability Date: == 2013-03-28 References: == http://ww...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/QJObrt3R7RI/WLB-20…
*** A peek inside the EgyPack Web malware exploitation kit ***
---------------------------------------------
By Dancho Danchev On a daily basis we process multiple malicious campaigns that, in 95%+ of cases, rely on the market leading Black Hole Exploit Kit. The fact that this Web malware exploitation kit is the kit of choice for the majority of cybercriminals, speaks for its key differentiation factors/infection rate success compared to the competing exploit [...]
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/kcBH0DcDPWc/
*** McAfee Firewall Enterprise BIND Regular Expression Handling Denial of Service Vulnerability ***
---------------------------------------------
McAfee Firewall Enterprise BIND Regular Expression Handling Denial of Service Vulnerability
---------------------------------------------
https://secunia.com/advisories/52836
*** VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability ***
---------------------------------------------
VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability
---------------------------------------------
https://secunia.com/advisories/52844
*** RoundCube Webmail generic_message_footer Arbitrary File Disclosure Vulnerability ***
---------------------------------------------
RoundCube Webmail generic_message_footer Arbitrary File Disclosure Vulnerability
---------------------------------------------
https://secunia.com/advisories/52806
*** [remote] - McAfee Virtual Technician (MVT) 6.5.0.2101 - Insecure ActiveX Method ***
---------------------------------------------
McAfee Virtual Technician (MVT) 6.5.0.2101 - Insecure ActiveX Method
---------------------------------------------
http://www.exploit-db.com/exploits/24907
*** HPSBUX02859 SSRT101144 rev.1 - HP-UX Running XNTP, Remote Denial of Service (DoS) and Execute Arbitrary Code ***
---------------------------------------------
A potential security vulnerability has been identified with HP-UX
running XNTP. The vulnerability could be exploited remotely create a
Denial of Service (DoS) or Execute Arbitrary Code.
---------------------------------------------
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispl…
*** Has Anyone Seen a Missing Scroll Bar? Phony Flash Update Redirects to Malware ***
---------------------------------------------
Microsoft said it has received 70,000 reports this week of a new Trojan disguised as an Adobe Flash Player update that will change your browser’s home page and redirect a Web session to an attacker’s page.There are several clues something is amiss, namely part of the GUI for the supposed Flash 11 update is written in Turkish, and there is no scroll bar on the EULA.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/has-anyone-seen-missing-scroll-bar-phony…
*** Security Fix Leads To PostgreSQL Lock Down ***
---------------------------------------------
hypnosec writes "The developers of the PostgreSQL have announced that they are locking down access to the PostgreSQL repositories to only committers while a fix for a "sufficiently bad" security issue applied. The lock down is temporary and will be lifted once the next release is available. The core committee has announced that they apologize in advance for any disruption adding that It seems necessary in this instance, however." Read more of this story at Slashdot.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/3JUUb-3wFnQ/story01.htm
Next End-of-Shift report on 2013-04-02
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 27-03-2013 18:00 − Donnerstag 28-03-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Microsofts new security patching routine raises concerns ***
---------------------------------------------
"For those of us accustomed to Windows Automatic Update kicking in on Black Tuesdays, Microsofts new method for applying security patches to Metro apps seems a bit awkward. Microsoft conveniently provided a real, live Metro (or should I say Windows Store?) security patch to look at yesterday, and there are a few changes in the patching routine that send a shiver down my spine...."
---------------------------------------------
http://www.infoworld.com/t/microsoft-windows/microsofts-new-security-patchi…
*** Sourcefire VRT Community ruleset is live, (Wed, Mar 27th) ***
---------------------------------------------
Joel let us know about a new Community rulset for Snort, from Sourcefires VRT group (Vulnerability Research Team). For more details, and how it might affect your Snort build, find his article here: http://blog.snort.org/2013/03/the-sourcefire-vrt-community-ruleset-is.html =============== Rob VandenBrink Metafore (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15490&rss
*** Drupal Common Groups 7.x Access Bypass & Privilege Escalation ***
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/Y_MNMfXrUTY/WLB-20…
*** Drupal Zero Point 7.x Cross Site Scripting ***
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/Nkxz5Ba6yYA/WLB-20…
*** Drupal Rules 7.x Cross Site Scripting ***
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/yWPWLIvXGvg/WLB-20…
*** New DIY RDP-based botnet generating tool leaks in the wild ***
---------------------------------------------
By Dancho Danchev In times when we're witnessing the most prolific and systematic abuse of the Internet for fraudulent and purely malicious activities, there are still people who cannot fully grasp the essence of the cybercrime ecosystem in the context of the big picture - economic terrosm - and in fact often deny its existence, [...]
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/5yiqMhAsw_c/
*** McAfee Virtual Technician ActiveX Control Save() Insecure Method Vulnerability ***
---------------------------------------------
MVT 6.5 and earlier contain a vulnerability where the Save() function could be used to cause an escalation of privileges. This issue mainly affects Consumer users, but can also affects Enterprise users who use MVT or have deployed ePO-MVT to systems in their environments for diagnostic purposes.
---------------------------------------------
https://kc.mcafee.com/corporate/index?page=content&id=SB10040
*** The Modern Malware Review ***
---------------------------------------------
"The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire (Palo Alto Networks feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products. A FOCUS ON ACTIONABLE RESEARCHThe goal of focusing on unknown or undetected malware is not to point out deficiency in traditional antivirus solutionsbut rather...
---------------------------------------------
http://media.paloaltonetworks.com/documents/The-Modern-Malware-Review-March…
*** One in six Amazon S3 storage buckets are ripe for data-plundering ***
---------------------------------------------
The root of the problem isnt a security hole in Amazons storage cloud, according to Vandevanter. Rather, he credited Amazon S3 account holders who have failed to set their buckets to private -- or to put it more bluntly, organizations that have embraced the cloud without fully understanding it. The fact that all S3 buckets have predictable, publically accessible URLs doesnt help, though.
---------------------------------------------
https://www.infoworld.com/t/cloud-security/one-in-six-amazon-s3-storage-buc…
*** Asterisk Products Denial of Service Vulnerability and User Enumeration Weakness ***
---------------------------------------------
Asterisk Products Denial of Service Vulnerability and User Enumeration Weakness
---------------------------------------------
https://secunia.com/advisories/52815
*** HP XP P9000 Command View Advanced Edition Suite Products, Remote Disclosure of Information ***
---------------------------------------------
A potential security vulnerability has been identified with HP XP P9000 Command View Advanced Edition Suite products including HP P9000 Command View Advanced Edition Software (DevMgr), HP XP Provisioning Manager Software (ProvMgr), HP P9000 Replication Manager Software (RepMgr), and HP P9000 Tiered Storage Manager Software (TSMgr). The vulnerability could be remotely exploited resulting in a disclosure of information.
---------------------------------------------
https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Amazon bringt neues Security-Tool für seine Cloud-Dienste ***
---------------------------------------------
Mit dem Hardware-Modul AWS CloudHSM will Amazon die Sicherheit seiner Cloud-Dienste erhöhen.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/2a167246/l/0L0Sheise0Bde0Csec…
*** Drupal Rules Module Script Insertion Vulnerability ***
---------------------------------------------
Drupal Rules Module Script Insertion Vulnerability
---------------------------------------------
https://secunia.com/advisories/52768
*** HP-UX update for XNTP ***
---------------------------------------------
HP-UX update for XNTP
---------------------------------------------
https://secunia.com/advisories/52790
*** Argentinisches Analysewerkzeug untersucht SAP- und Oracle-Produkte ***
---------------------------------------------
Ein System-Ingenieur von der Universidad Tecnológica Nacional hat sich auf das Auffinden von Lücken in Warenwirtschafts- und Datenbanksystemen spezialisiert.
---------------------------------------------
http://heise.de.feedsportal.com/c/35207/f/653902/s/2a176b17/l/0L0Sheise0Bde…
*** Vuln: Moodle Multiple Remote Security Vulnerabilities ***
---------------------------------------------
Moodle Multiple Remote Security Vulnerabilities
---------------------------------------------
http://www.securityfocus.com/bid/58660
*** Studie alarmiert: Java-Plugins sind meist stark veraltet ***
---------------------------------------------
Laut einer Feldstudie von WebSense sind fast 94% der Browser mit aktivierten Java-Plugin gegen aktuelle Sicherheitslücken nicht gepatched.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/2a1a921b/l/0L0Sheise0Bde0Csec…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 26-03-2013 18:00 − Mittwoch 27-03-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Microsoft Security Advisory (2819682): Security Updates for Microsoft Windows Store Applications - Version: 1.0 ***
---------------------------------------------
Microsoft is announcing the availability of security updates for Windows Store applications running on Windows 8, Windows RT, and Windows Server 2012 (Windows Server 2012 Server Core installations are not affected).
---------------------------------------------
http://technet.microsoft.com/en-us/security/advisory/2819682
*** IBM Lotus Domino Cross-Site Scripting ***
---------------------------------------------
Topic: IBM Lotus Domino Cross-Site Scripting Risk: Low Text:I want to warn you about multiple Cross-Site Scripting vulnerabilities in IBM Lotus Domino. Last year Ive announced multip...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/4yG8wBlWdJY/WLB-20…
*** Wordpress trafficanalyzer Plugin XSS ***
---------------------------------------------
Topic: Wordpress trafficanalyzer Plugin XSS Risk: Low Text:# Exploit Title: Wordpress trafficanalyzer Plugin Xss ((|)) # Vulnerability ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/EPjJkeXhZCc/WLB-20…
*** 6 Emerging Security Threats, and How to Fight Them ***
---------------------------------------------
"The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So its important to be aware of the threats to enterprise security that are coming over the horizon and heading this way. Its a question the Georgia Institute of Technology addresses in its Emerging Cyber Threat Report 2013, in which researchers identify at least six threats that all security professionals should know
---------------------------------------------
http://www.esecurityplanet.com/network-security/6-emerging-security-threats…
*** EAST Releases First 2013 European Fraud Update ***
---------------------------------------------
"The first European Fraud Update of 2013 was recently released at the 29th European ATM Security Team (EAST) meeting, held in Brussels on February 6th of this year. This update represents the Single Euro Payments Area (SEPA) consisting of 21 countries, and two non-SEPA countries, EAST stated in a press release. Thieves have gone to new technical limits, using ATM skimming to make fraudulent transactions...."
---------------------------------------------
http://www.pymnts.com/briefing-room/PYMNTS-International/2013/03/EAST-Relea…
*** HPSBUX02857 SSRT101103 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities ***
---------------------------------------------
Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other exploits.
---------------------------------------------
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** SCADA and ICS Security Patching: The Good, the Bad and the Ugly ***
---------------------------------------------
"In my last blog, I discussed the reasons why critical industrial infrastructure control systems are so vulnerable to attacks from security researchers and hackers, and explained why patching for such systems is not a workable solution. But lets now examine the good, the bad and the ugly details of patching as a means to secure SCADA and ICS systems. And to begin, lets suppose patches could be installed without shutting down the process (for example, through the staged patching of
---------------------------------------------
http://www.infosecisland.com/blogview/23039-SCADA-and-ICS-Security-Patching…
*** WordPress plugin user-photo file upload arbitrary PHP code execution ***
---------------------------------------------
Topic: WordPress plugin user-photo file upload arbitrary PHP code execution Risk: High Text:Can I get CVE identifier for WordPress plugin user-photo file upload arbitrary PHP code execution security vulnerability. Diff...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/boTyNVQ8PAs/WLB-20…
*** EMC Smarts Network Configuration Manager Improper Authentication Vulnerability ***
---------------------------------------------
Topic: EMC Smarts Network Configuration Manager Improper Authentication Vulnerability Risk: Medium Text:ESA-2013-016: EMC Smarts Network Configuration Manager Improper Authentication Vulnerability EMC Identifier: ESA-2013-016 ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/bpGpOtUKF0M/WLB-20…
*** 2nd Annual Cyber Security for the Chemical & Petrochem Industries Europe ***
---------------------------------------------
"Another very good security event this year, the Cyber Security for the Chemical & Petrochem Industries Europe. There has been a huge increase in the amount of press lately around new cyber-attacks in the chemical and oil and gas industries. The words DuQu, Gauss, Flame and Shamoon have filled board rooms with fear and angst over the last year as the trend for such cyber threats appears to be gaining momentum...."
---------------------------------------------
http://www.felipemartins.info/2013/03/2nd-annual-cyber-security-for-the-che…
*** Juniper NetScreen ScreenOS OpenSSL DER Format Data Processing Vulnerability ***
---------------------------------------------
Juniper NetScreen ScreenOS OpenSSL DER Format Data Processing Vulnerability
---------------------------------------------
https://secunia.com/advisories/52724
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
Cisco IOS Software IP Service Level Agreement Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
Cisco IOS Software Protocol Translation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
Cisco IOS Software Smart Install Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
Cisco IOS Software Internet Key Exchange Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
Cisco IOS Software Network Address Translation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 25-03-2013 18:00 − Dienstag 26-03-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** libxslt XSL Parsing Flaws Let Remote Users Deny Service ***
---------------------------------------------
A remote user can send an XSL template with an empty 'match' attribute to trigger a crash in the xsltDocumentFunction() function in 'libxslt/functions.c'.
---------------------------------------------
http://www.securitytracker.com/id/1028338
*** Novell ZENworks Configuration Management File Upload Authentication Flaw Lets Remote Users Execute Arbitrary Code ***
---------------------------------------------
A remote user can exploit a flaw in the ZENworks Configuration Management (ZCM) webserver to upload files to the filesystem of the underlying operating system. The files can then be executed.
---------------------------------------------
http://www.securitytracker.com/id/1028337
*** Malware abuses Chromium Embedded Framework, developers fight back ***
---------------------------------------------
"A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering engine inside their own applications, according to security researchers from antivirus vendor Symantec. In an effort to temporarily block the abuse, CEF project administrators suspended the frameworks primary download location on Google Code. The TDL malware generates profit for its authors by...
---------------------------------------------
http://www.computerworld.com.au/article/457251/malware_abuses_chromium_embe…
*** Windows Trojan Found Targeting Mac OS X Users ***
---------------------------------------------
"Researchers at ESET have discovered a Trojan that initially focused on Windows users, but appears to be changing direction. The Trojan now has its sights on Mac OS X users, and its actions have prompted Apple to update XProtect with signatures to detect it. The Yontoo Trojan spreads on Windows by pretending to be a video codec...."
---------------------------------------------
http://www.securityweek.com/windows-trojan-found-targeting-mac-os-x-users?u…
*** How much difference can an ISP make over an outbreak? ***
---------------------------------------------
"F-Secure works extensively with ISPs and operators. We were assisting several large operators last year during the remediation of the DNSChanger malware. There was an interesting study recently done by researchers at Georgia Tech...."
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002532.html
*** LinkedIn Cross Site Request Forgery ***
---------------------------------------------
Topic: LinkedIn Cross Site Request Forgery Risk: Low Text: INTERNET SECURITY AUDITORS ALERT 2013-001 - Original release date: January 30th, 2013 - Last revised: March ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/IO--fDEMzSQ/WLB-20…
*** HP ProCurve Switch Bug Permits Cross-Site Request Forgery Attacks ***
---------------------------------------------
A remote user can take actions on the target device acting as the target user.
The HP ProCurve 1700-8 Switch (Model J9079A) and HP ProCurve 1700-24 Switch (Model J9080A) is affected.
---------------------------------------------
http://www.securitytracker.com/id/1028339
*** Grum Spam Botnet Is Slowly Recovering After Takedown, Experts Warn ***
---------------------------------------------
"In July 2012, we learned that Spamhaus, FireEye and CERT-GIB managed to shut down the command and control (C&C) servers utilized by Grum, a spam botnet that was the worlds third largest at the time. A couple of months later, FireEye experts reported that the botnets masters started reinstating its C&C servers. At the time, since there were only a couple of new servers, no major spam-related activities were identified...."
---------------------------------------------
http://news.softpedia.com/news/Grum-Spam-Botnet-is-Slowly-Recovering-After-…
*** WordPress WP Banners Lite Plugin "cid" Cross-Site Scripting Vulnerability ***
---------------------------------------------
WordPress WP Banners Lite Plugin "cid" Cross-Site Scripting Vulnerability
---------------------------------------------
https://secunia.com/advisories/52625
*** Blog: Android Trojan Found in Targeted Attack ***
---------------------------------------------
In the past, weve seen targeted attacks against Tibetan and Uyghur activists on Windows and Mac OS X platforms. Weve documented several interesting attacks which used ZIP files as well as DOC, XLS and PDF documents rigged with exploits. Several days ago, the e-mail account of a high-profile Tibetan activist was hacked and used to send targeted attacks to other activists and human rights advocates. Perhaps the most interesting part is that the attack e-mails had an APK attachment - a malicious...
---------------------------------------------
http://www.securelist.com/en/blog/208194186/Android_Trojan_Found_in_Targete…
*** Splunk Unspecified Cross-Site Scripting Vulnerability ***
---------------------------------------------
Splunk Unspecified Cross-Site Scripting Vulnerability
---------------------------------------------
https://secunia.com/advisories/52076
*** Honeyproxy ***
---------------------------------------------
HoneyProxy is a lightweight tool that allows live HTTP(S) traffic inspection and analysis. It focuses on features that are useful for malware analysis and network forensics.
---------------------------------------------
http://honeyproxy.org/
*** Fehlende Schnittstelle macht Smartphone-Passwortmanager unsicher ***
---------------------------------------------
Studierende der Universität Hannover haben Passwortmanager für Android-Smartphones unter die Lupe genommen. Die Manager sind zwar benutzerfreundlich, aber sichern die Passwörter nicht ausreichend ab.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/2a03600b/l/0L0Sheise0Bde0Csec…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 22-03-2013 18:00 − Montag 25-03-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** SANS Pen Test Berlin 2013 ***
---------------------------------------------
"SANS Pen Test Berlin 2013 takes place from June 3rd to June 8th in the Radisson Blu Hotel on the bank of Berlins River Spree. SANS once again presents a world class line up of pen test training courses led by SANS globally renowned, expert instructors. As well as the unique SANS training experience, we will also be offering a series of @Night talks and social functions, plus the opportunity to take place in NetWars...."
---------------------------------------------
http://www.sans.org/event/pentest-berlin-2013
*** Apple: Sicherheitslücke in Account-Recovery-Tool ***
---------------------------------------------
Laut US-Berichten genügte es bis zum Freitag, die Mail-Adresse und das Geburtsdatum von Apple-ID-Inhabern zu kennen, um deren Passwort zu ersetzen.
---------------------------------------------
http://heise.de.feedsportal.com/c/35207/f/653902/s/29e6e636/l/0L0Sheise0Bde…
*** Bundeskriminalamt warnt vor neuem Lösegeld-Trojaner ***
---------------------------------------------
Erenut ist Schadsoftware im Umlauf, die Betroffenen unterstellt, jugendpornografisches Material zu verbreiten und zu einer Geldzahlung auffordert.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/29e7d088/l/0L0Sheise0Bde0Csec…
*** Schwache Schlüssel bei NetBSD ***
---------------------------------------------
Eine falsch gesetzte Klammer im Programmcode von NetBSD führt dazu, dass das System schwache kryptografische Schlüssel erzeugt. Besonders betroffen sind Schlüssel für OpenSSH-Server.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/29eea8f1/l/0L0Sheise0Bde0Csec…
*** Wordpress wp-video-commando Plugin XSS ***
---------------------------------------------
Topic: Wordpress wp-video-commando Plugin XSS Risk: Low Text:# Exploit Title: Wordpress wp-video-commando Plugin Xss ((|)) # Vulnerability ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/lkXYceohQoo/WLB-20…
*** MongoDB: Exploit im Netz, Metasploit-Modul in der Mache ***
---------------------------------------------
Administratoren von MongoDB mit der Version 2.2.3 sollten so schnell wie möglich auf die aktuelle Version 2.4.1 wechseln. Es ist ein Exploit aufgetaucht, der einen serverseitigen Buffer-Overflow und Crash verursachen kann.
---------------------------------------------
http://rss.feedsportal.com/c/32407/f/463925/s/29f72124/l/0L0Sheise0Bde0Csec…
*** [papers] - Hacking Trust Relationships Between SIP Gateways ***
---------------------------------------------
Hacking Trust Relationships Between SIP Gateways
---------------------------------------------
http://www.exploit-db.com/download_pdf/24878
*** Moodle Multiple Vulnerabilities ***
---------------------------------------------
Two weaknesses and multiple vulnerabilities have been reported in Moodle, which can be exploited by malicious users to disclose potentially sensitive information, manipulate certain data, and conduct script insertion attacks and by malicious people to disclose potentially sensitive and system information.
---------------------------------------------
https://secunia.com/advisories/52691
*** Novell ZENworks Configuration Management Control Center Arbitrary File Upload Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise the vulnerable system.
---------------------------------------------
https://secunia.com/advisories/52784
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 21-03-2013 18:00 − Freitag 22-03-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** Symantec Enterprise Vault privilege escalation ***
---------------------------------------------
Symantec Enterprise Vault privilege escalation
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/82989
*** Symantec NetBackup Appliance Management Console Lets Remote Authenticated Users Download Files ***
---------------------------------------------
A vulnerability was reported in Symantec NetBackup Appliance. A remote authenticated user can view files on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1028329
*** Symantec finds Linux wiper malware used in S. Korean attacks ***
---------------------------------------------
"Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers. Tucked inside a piece of Windows malware used in the attacks is a component that erases Linux machines, an analysis from Symantec has found. The malware, which it called Jokra, is unusual, Symantec said.
---------------------------------------------
http://www.csoonline.com/article/730574/symantec-finds-linux-wiper-malware-…
*** LibreOffice 4.0.1.2 Update Spoofing ***
---------------------------------------------
Topic: LibreOffice 4.0.1.2 Update Spoofing Risk: Medium Text:[waraxe-2013-SA#099] - Update Spoofing Vulnerability in LibreOffice 4.0.1.2 = Author: Janek Vind "waraxe" Date...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/5kWhqQ69Ci0/WLB-20…
*** Joomla Component com_wordpress XSS Vulnerability ***
---------------------------------------------
Topic: Joomla Component com_wordpress XSS Vulnerability Risk: Low Text:# Title : joomla Component com_wordpress XSS Vulnerability # Date: 2013-03-15
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/xJniCtV-cHo/WLB-20…
*** Spotted: cybercriminals working on new Western Union based 'money mule management' script ***
---------------------------------------------
By Dancho Danchev Risk-forwarding is an inseparable part of the cybercrime ecosystem. Whether it's the use of malware-infected hosts as stepping-stones, the issuing of License Agreements for your latest rootkit release stating that it's meant to be tested against the customer's own systems you wish or the selling of cheap access to verified PayPal accounts....
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/lnqwrG1Fm4A/
*** EuroForensics 2013: 4th International Forensic Sciences Conference & Exhibition ***
---------------------------------------------
"4th International Forensic Sciences, Cyber Security and Surveillance Technologies Conference & Exhibition takes place in Harbiye Military Museum Istanbul, Turkey 27-29 March 2013. The 4th Euroforensics has been designed as the primary international conference and exhibition for sourcing digital forensics products, equipment and services, and to provide a complete source of education, best practice, training and networking for the entire forensics and security sector and supply chain.
---------------------------------------------
http://www.forensicfocus.com/News/article/sid=2018/
*** IBM Lotus Notes Multiple Vulnerabilities ***
---------------------------------------------
IBM Lotus Notes Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/52599
*** RealPlayer Heap Overflow in Processing MP4 Lets Remote Users Execute Arbitrary Code ***
---------------------------------------------
A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system.
---------------------------------------------
http://www.securitytracker.com/id/1028332
*** CoreFTP "DELE" Buffer Overflow Vulnerability ***
---------------------------------------------
CoreFTP "DELE" Buffer Overflow Vulnerability
---------------------------------------------
https://secunia.com/advisories/52736
*** Links im Tarnkleid ***
---------------------------------------------
Der Link soll zu Heise führen, aber dann landet der Nutzer woanders. Der "Mouse-Over"-Test enttarnt die Umleitung nicht. auch ein Blick in den Quellcode hilft nicht gleich weiter. Links lassen sich so manipulieren, dass es im Zweifel zu spät auffällt.
---------------------------------------------
http://www.heise.de/security/meldung/Links-im-Tarnkleid-1828362.html
*** Privacy 101: Skype Leaks Your Location ***
---------------------------------------------
The events of the past week reminded me of a privacy topic Ive been meaning to revisit: That voice-over-IP telephony service Skype constantly exposes your Internet address to the entire world, and that there are now numerous free and commercial tools that can be used to link Skype user account names to numeric Internet addresses.Related Posts:Rogue Antivirus Via Skype Phone Call?Google Adds 1-Time Passwords to Gmail, AppsThe Scrap Value of a Hacked PC, RevisitedEarn a Diploma from Scam UThe
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/pOQV1cF-XH8/
*** Apple Adds Two-Factor Authentication to iTunes Accounts ***
---------------------------------------------
Apple has introduced a new two-factor authentication system designed to help protect users iTunes and App Store accounts and prevent attackers or unauthorized users from taking over users accounts. The system is similar to the one that Google has implemented for Gmail, utilizing verification codes sent via SMS. The move by Apple comes years after Google made the change with Gmail two-factor authentication in response to a series of targeted attacks against Gmail users....
---------------------------------------------
http://threatpost.com/en_us/blogs/apple-adds-two-factor-authentication-itun…
*** vbulletin 4.1.5 attachment SQLI ***
---------------------------------------------
Topic: vbulletin 4.1.5 attachment SQLI Risk: Medium Text:vbulletin 4.1.5 attachment SQLI examine variables came across sq-injection, as later found to be inherent to all vbulletin ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/8PX5zvE7-bM/WLB-20…
*** vBulletin x.x.x Customer Area 0day ***
---------------------------------------------
Topic: vBulletin x.x.x Customer Area 0day Risk: Medium Text:vBulletin x.x.x Customer Area 0day - vBulletin x.x.x Customer Area 0day Perl script got leaked so decided ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/nLzgCibjUrQ/WLB-20…
*** vBulletin 5.0.0 all Beta releases SQL Injection Exploit 0day ***
---------------------------------------------
Topic: vBulletin 5.0.0 all Beta releases SQL Injection Exploit 0day Risk: Medium Text:vBulletin 5.0.0 all Beta releases SQL Injection Exploit 0day ************************************************** ************...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/ovrdpW5le4o/WLB-20…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 20-03-2013 18:00 − Donnerstag 21-03-2013 18:00
Handler: Robert Waldner
Co-Handler: Christian Wojner
*** AMD Catalyst Control Center Update Spoofing Vulnerability ***
---------------------------------------------
AMD Catalyst Control Center Update Spoofing Vulnerability
---------------------------------------------
https://secunia.com/advisories/52696
*** tokend (Apple, Gemalto) privacy leak & arbitrary file creation ***
---------------------------------------------
Topic: tokend (Apple, Gemalto) privacy leak & arbitrary file creation Risk: High Text:Tokend is a module for OS X CDSA/Keychain subsystem for accessing smart cards. It acts as a bridge between the apple KeyChain ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/EQ1oxqfYnQA/WLB-20…
*** OpenSC.tokend privacy leak & arbitrary file creation ***
---------------------------------------------
Topic: OpenSC.tokend privacy leak & arbitrary file creation Risk: High Text:OpenSC.tokend (1,2) is a Tokend module for OS X CDSA/Keychain subsystem for accessing smart cards. As is common in such bridge...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/QSRbtZTKohQ/WLB-20…
*** Linux Kernel kvm Multiple Vulns ***
---------------------------------------------
Topic: Linux Kernel kvm Multiple Vulns Risk: High Text:* CVE-2013-1796 Description of the problem: If the guest sets the GPA of the time_page so that the request to update the tim...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/ajIh5W6bo-g/WLB-20…
*** Resilient Cyber Systems Symposium (Resilience Week 2013) ***
---------------------------------------------
"Announcement and call for papers for the 1st International Symposium on Resilient Cyber Systems, which will be held as part of the Resilience Week in San Francisco, in August 2013. Topics of Interest include:- Resilient Cyber Frameworks and Architectures: multi-agent systems for monitoring and control, supervisory control and data acquisition, distributed sense making and coordination- Moving Target Defense: Moving target defense technologies, evaluation metrics, visualization and command
---------------------------------------------
http://cybersystems2013.inl.gov/
*** Another iPhone passcode bypass spell revealed ***
---------------------------------------------
Turn off Siri, remove SIM, add unicorn blood, phone and contacts are yours Apples recent release of iOS 6.1.3, complete with fix for the weird keypress sequence that allowed access to and export of iPhone address books, seems to have been just a little bit futile after a new bug with the same effects emerged.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/03/21/another_mag…
*** libvirt Group Privileges Error Lets Local Users Modify Certain Files on the Target System ***
---------------------------------------------
A vulnerability was reported in libvirt. A local user can modify certain files on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1028323
*** Linux Kernel i915 driver in the Direct Rendering Manager Integer Overflow ***
---------------------------------------------
Topic: Linux Kernel i915 driver in the Direct Rendering Manager Integer Overflow Risk: Medium Text:It is possible to wrap the counter used to allocate the buffer for relocation copies. This could lead to heap writing overflow...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/uuWQ-E59VLw/WLB-20…
*** Drupal Views Module View Configuration Fields Script Insertion Vulnerabilities ***
---------------------------------------------
Drupal Views Module View Configuration Fields Script Insertion Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/51540
*** IBM Rational ClearQuest reflected cross-site scripting ***
---------------------------------------------
IBM Rational ClearQuest reflected cross-site scripting
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/80061
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 19-03-2013 18:00 − Mittwoch 20-03-2013 18:00
Handler: Robert Waldner
Co-Handler: Matthias Fraidl
*** Security firm publishes details about Java issue, asks for second opinion ***
---------------------------------------------
"Making good on their promise, Security Exploration has published technical details about a Java issue that they consider to be a security vulnerability, but Oracle has categorized as demonstrating "allowed behavior"."As of Mar 18, 2013 no information was received from Oracle that would indicate that Issue 54 is treated by the company as a security vulnerability," they wrote on Monday. ..."
---------------------------------------------
http://www.net-security.org/secworld.php?id=14617
*** Google fully implements security feature on DNS lookups ***
---------------------------------------------
"Google has fully implemented a security feature that ensures a person looking up a website isnt inadvertently directed to a fake one. The Internet company has run its own free public Domain Name System (DNS) lookup service, called Public DNS, since 2009. DNS lookups are required to translate a domain name, such as www...."
---------------------------------------------
http://www.computerworld.com.au/article/456804/google_fully_implements_secu…
*** Samsung Android Remote Owning Devices *youtube ***
---------------------------------------------
Topic: Samsung Android Remote Owning Devices *youtube Risk: High Text:I was planning to open a blog since some months, but I decided to do it only now, to summarize some of the findings of a quick ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/zRL6QVbdylE/WLB-20…
*** Strategie zu Cyberkriminalität beschlossen ***
---------------------------------------------
Regierung will sich künftig besser koordinieren
---------------------------------------------
http://futurezone.at/netzpolitik/14759-strategie-zu-cyberkriminalitaet-besc…
*** CVSS Security-Bug Rating System Gets A Makeover ***
---------------------------------------------
"In 2005, three companies--Cisco, Qualys and Symantec--announced the Common Vulnerability Scoring System (CVSS) as a way to rank the security impact of software flaws and the potential risks they posed to companies. In theory, the flaw scoring system aims to give security professionals, researchers and software vendors a repeatable way to rank the severity of a vulnerability by measuring the issues base exploitability, how that evolves over time, and the impact the security bug has on the
---------------------------------------------
http://www.darkreading.com/vulnerability-management/167901026/security/secu…
*** MySQL yaSSL Two Buffer Overflow Vulnerabilities ***
---------------------------------------------
MySQL yaSSL Two Buffer Overflow Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/52445
*** Linux Kernel ext3 Message Logging Format String Vulnerabilities ***
---------------------------------------------
Linux Kernel ext3 Message Logging Format String Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/52661
*** IBM WebSphere Commerce password information disclosure ***
---------------------------------------------
IBM WebSphere Commerce password information disclosure
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/80206
*** Google Picasa BMP and TIFF Images Processing Vulnerabilities ***
---------------------------------------------
Google Picasa BMP and TIFF Images Processing Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/51652
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 15-03-2013 18:00 − Montag 18-03-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Expert: Social Networks Targeted for Drive-By Exploits ***
---------------------------------------------
"Malware was spread in unique ways in 2012, particularly through drive-by exploits. In 2013, organizations can expect more exploits targeting social networks, says Adam Kujawa of anti-malware vendor Malwarebytes."The method in which the links to drive-bys have been spread was pretty unique [in 2012]," says Kujawa, a malware intelligence analyst. "We can see that moving over into 2013."Kujawa says cybercriminals are increasingly targeting social networking sites and
---------------------------------------------
http://www.govinfosecurity.com/malware-emerging-trends-a-5598
*** The World Has No Room For Cowards ***
---------------------------------------------
Its not often that one has the opportunity to be the target of a kinetic and cyber attack at the same time. But that is exactly whats happened to me and my Web site over the past 24 hours. On Thursday afternoon, my site was the target of a fairly massive denial of service attack. That attack was punctuated by a visit from a heavily armed local police unit that was tricked into responding to a 911 call spoofed to look like it came from my home.
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/uD9Evlztjaw/
*** Debian Security Advisory DSA-2649 lighttpd ***
---------------------------------------------
fixed socket name in world-writable directory
---------------------------------------------
http://www.debian.org/security/2013/dsa-2649
*** Sicherheitsunternehmen analysiert Angriffe auf Industriesteuerungen ***
---------------------------------------------
Auf der Security-Konferenz Black Hat Europe stellte Trend Micro einen Forschungsbericht über einen einen Praxisversuch vor und zeigt, von wo aus und auf welche Art industrielle Systeme mit Malware angegriffen werden.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsunternehmen-analysiert-Angr…
*** Analysis of the Booter.TW ***
---------------------------------------------
"Earlier this week, famous InfoSec blogger Brian Krebs website suffered from a denial of service attack that knocked it offline. Following the attack Brian posted an article, "The World has No Room for Cowards", which detailed how he had been SWATed following the attacks against his site. In his article he talked about some of the indicators of who may be behind the attack...."
---------------------------------------------
http://www.reversecurity.com/2013/03/analysis-of-bootertw.html
*** Android malware analysis tool ***
---------------------------------------------
"Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides software architecture information presented through a web-based user interface...."
---------------------------------------------
http://www.net-security.org/secworld.php?id=14605
*** You Only Click Twice: FinFisher's Global Proliferation ***
---------------------------------------------
This post describes the results of a comprehensive global Internet scan for the command and control servers of FinFisher's surveillance
software. It also details the discovery of a campaign using FinFisher in Ethiopia used to target individuals linked to an opposition group.
---------------------------------------------
https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proli…
*** Online Security Tools (Malware, Sandboxes, Hash Checking, Cracking, DNSBL, SSL, BGP) ***
---------------------------------------------
Some readers and friends convinced me recently to start posting some
articles in english as well - to reach a wider audience. Lets start with a quick post containing a list of very useful online security tools. The services are very useful for incident responders, forensicators and security information practitioners.
---------------------------------------------
http://sseguranca.blogspot.fr/2012/03/online-security-tools-malware-sandbox…
*** Bugtraq: [SECURITY] [DSA 2646-1] typo3-src security update ***
---------------------------------------------
[SECURITY] [DSA 2646-1] typo3-src security update
---------------------------------------------
http://www.securityfocus.com/archive/1/526030
*** From Russia With Bots: Finding The Source Of Cyber Attacks ***
---------------------------------------------
While media and government source continue to allude to China as the
biggest source of cyber attacks hitting innocent servers on the
Internet, recent evidence instead suggests it's the Russian Federation
that's king of the cyber attack mountain.
---------------------------------------------
http://readwrite.com/2013/03/18/from-russia-with-bots-finding-the-source-of…