=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-10-2018 18:00 − Mittwoch 31-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
Next End-of-Day report: 2018-11-02
=====================
= News =
=====================
∗∗∗ Square, PayPal POS Hardware Open to Multiple Attack Vectors ∗∗∗
---------------------------------------------
Popular card readers like Square and PayPal have various flaws that allow attacks ranging from fraud to card data theft.
---------------------------------------------
https://threatpost.com/square-paypal-pos-hardware-open-to-multiple-attack-v…
∗∗∗ Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims ∗∗∗
---------------------------------------------
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. Rising from the deep, Kraken Cryptor ransomware has had a notable development path in recent months. The first signs of Kraken came in mid-August on a popular underground forum. In mid-September it was reported that [...]
---------------------------------------------
https://securingtomorrow.mcafee.com/mcafee-labs/fallout-exploit-kit-release…
∗∗∗ Using PHP 5 Becomes Dangerous in 2 Months ∗∗∗
---------------------------------------------
WordPress, Joomla, Drupal and many other popular website CMSs were written in a programming language called PHP. PHP version 5 is about to reach end-of-life and will stop receiving security updates in two months. Many WordPress and other PHP websites remain on version 5.6 or older.
---------------------------------------------
https://www.wordfence.com/blog/2018/10/php5-dangerous/
∗∗∗ 5 Types of Malware Currently Affecting macOS ∗∗∗
---------------------------------------------
Mac malware, or macOS malware, exists contrary to the popular belief that Apple’s operating system is immune to online threats. Cybersecurity researchers have been closely observing the threat landscape only to conclude that malware infections targeting Mac devices have increased in 2018.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-awareness/5-types-of-ma…
∗∗∗ Wenn Sie in eine Abo-Falle getappt sind… ∗∗∗
---------------------------------------------
Auf der Suche nach kostenlosen Angeboten und gratis Dienstleistungen werden Sie im Internet schnell fündig. Doch Vorsicht: Hier ist nicht alles Gold, was glänzt! Oft handelt es sich nämlich um Abo-Fallen, bei denen Ihnen unbegründet Rechnungen zugeschickt werden und man Ihnen mit Inkassobüro oder Rechtsanwaltsschreiben droht. Die Lösung? Auf gar keinen Fall bezahlen!
---------------------------------------------
https://www.watchlist-internet.at/news/wenn-sie-in-eine-abo-falle-getappt-s…
∗∗∗ Warnung vor sierrasport-berlin.de ∗∗∗
---------------------------------------------
Der Online-Shop sierrasport-berlin.de vertreibt Markenfälschungen. Das können Konsument/innen daran erkennen, dass sämtliche Produkte stark rabattiert und lagernd sind. Kaufen sie bei sierrasport-berlin.de ein, müssen sie mit hohen Zusatzkosten, rechtlichen Konsequenzen und einem Identitätsdiebstahl rechnen. Von einem Einkauf bei sierrasport-berlin.de wird dringend abgeraten!
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-sierrasport-berlinde/
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability ∗∗∗
---------------------------------------------
Integrated Data Protection Appliance (iDPA) contains undocumented accounts with limited access which may potentially be used by a malicious user to compromise the affected system.
---------------------------------------------
https://seclists.org/fulldisclosure/2018/Oct/53
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (gitlab), Debian (gnutls28), Fedora (audiofile, coreutils, firefox, hesiod, kernel, kernel-headers, kernel-tools, libssh, lighttpd, mosquitto, opencc, patch, php-horde-nag, sos-collector, strongswan, and thunderbird), Gentoo (libxkbcommon, mutt-1.10, postgresql, systemd, xen, and xorg-server), Mageia (curl, libtiff, samba, spamassassin, and unzip), Oracle (java-1.7.0-openjdk and python-paramiko), Red Hat (git, glusterfs, java-1.7.0-openjdk, [...]
---------------------------------------------
https://lwn.net/Articles/770203/
∗∗∗ VMSA-2015-0008.2 ∗∗∗
---------------------------------------------
VMware product updates address information disclosure issue.
Updated advisory to add vCloud Director fixes for 9.0.0.x and 9.1.0.x versions that now address CVE-2015-3269.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2015-0008.html
∗∗∗ HPESBHF03894 rev.1 - HPE Integrated Lights-Out 5 (iLO 5) Firmware Updates, Local Bypass of Security Restrictions ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ ElegantThemes (divi, extra, divi-builder) - Authenticated Stored Cross-Site Scripting (XSS) ∗∗∗
---------------------------------------------
https://wpvulndb.com/vulnerabilities/9140
∗∗∗ Apple security updates ∗∗∗
---------------------------------------------
https://support.apple.com/en-us/HT201222
∗∗∗ Security Advisory - SegmentSmack Vulnerability in Linux Kernel ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181031-…
∗∗∗ Security Advisory - Improper Authorization Vulnerability in Huawei Watches ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181031-…
∗∗∗ IBM Security Bulletin: IBM Robotic Process Automation could disclose sensitive information in a web request (CVE-2018-1878) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735977
∗∗∗ IBM Security Bulletin: Passwords are unencrypted locally in IBM Robotic Process Automation with Automation Anywhere (CVE-2018-1877) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735973
∗∗∗ IBM Security Bulletin: Passwords printed to log files in IBM Robotic Process Automation with Automation Anywhere (CVE-2018-1876) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735967
∗∗∗ IBM Security Bulletin: ViewONE is vulnerable to XXE attack when opening PDF documents ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733815
∗∗∗ IBM Security Bulletin: IBM RackSwitch firmware products are affected by vulnerabilities in Python (CVE-2016-5636 CVE-2017-1000158) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737147
∗∗∗ IBM Security Bulletin: IBM Flex System switch firmware products are affected by vulnerabilities in Python (CVE-2016-5636 CVE-2017-1000158) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737125
∗∗∗ IBM Security Bulletin: IBM BladeCenter Switch Modules are affected by vulnerabilities in python (CVE-2016-5636 CVE-2017-1000158) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10736105
∗∗∗ IBM Security Bulletin: Remote Code Execution vulnerability in IBM Robotic Process Automation with Automation Anywhere (CVE-2018-1552) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22016247
∗∗∗ XSS vulnerability in undisclosed TMUI page CVE-2018-15314 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K04524282
∗∗∗ XSS vulnerability in undisclosed TMUI page CVE-2018-15313 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K21042153
∗∗∗ TMM vulnerability CVE-2018-15320 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K72442354
∗∗∗ BIG-IP tmsh vulnerability CVE-2018-15321 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K01067037
∗∗∗ MQTT vulnerability CVE-2018-15323 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K26583415
∗∗∗ BIG-IP Configuration utility vulnerability CVE-2018-15327 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20222812
∗∗∗ tmsh utility vulnerability CVE-2018-15322 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K28003839
∗∗∗ BIG-IP APM portal access vulnerability CVE-2018-15324 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K52206731
∗∗∗ TMM vulnerability CVE-2018-15319 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K64208870
∗∗∗ BIG-IP iControl & tmsh vulnerability CVE-2018-15325 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K77313277
∗∗∗ BIG-IP APM CRL vulnerability CVE-2018-15326 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K34652116
∗∗∗ TMM vulnerability CVE-2018-15318 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K16248201
∗∗∗ TMM vulnerability CVE-2018-15317 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K43625118
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-10-2018 18:00 − Dienstag 30-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ CommonRansom Ransomware Demands RDP Access to Decrypt Files ∗∗∗
---------------------------------------------
A new ransomware called CommonRansom was discovered that has a very bizarre request. In order to decrypt a computer after a payment is made, they require the victim to open up Remote Desktop Services on the affected computer and send them admin credentials in order to decrypt the victims files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/commonransom-ransomware-dema…
∗∗∗ Krankenkassen: Vivy-App gibt Daten preis ∗∗∗
---------------------------------------------
Sicherheitsforscher haben einige gravierende Lücken in der Krankenkassen-App Vivy gefunden. Unter anderem konnte auf Dokumente, die man mit dem Arzt teilte, unberechtigt zugegriffen werden. (Medizin, Verschlüsselung)
---------------------------------------------
https://www.golem.de/news/krankenkassen-vivy-app-gibt-daten-preis-1810-1373…
∗∗∗ Disrupting the Flow: Exposed and Vulnerable Water and Energy Infrastructures ∗∗∗
---------------------------------------------
by Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Cedric Pernet, and Roel Reyes Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected [...]
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/5LDw-xUlnAw/
∗∗∗ Sicherheitsupdates: Multifunktionsgeräte von Lexmark anfällig für "böse" Faxe ∗∗∗
---------------------------------------------
Sicherheitspatches für Drucker-Fax-Kopier-Kombinationen von Lexmark schließen zwei Lücken. Eine davon gilt als kritisch.
---------------------------------------------
http://heise.de/-4206719
∗∗∗ Systemd: DHCPv6-Pakete können Linux-Rechner kapern ∗∗∗
---------------------------------------------
Eine Systemd-Komponente in vielen modernen Linux-Systemen kann missbraucht werden, um den Rechner übers Netz zu kapern.
---------------------------------------------
http://heise.de/-4206800
∗∗∗ Erpresserische E-Mails drohen mit Masturbationsvideo ∗∗∗
---------------------------------------------
Kriminelle versenden betrügerische Nachrichten. Darin behaupten sie, dass sie das Passwort der Empfänger/innen kennen, angeblich Zugriff auf ihren Computer haben und deshalb über Masturbationsvideos verfügen. Die Adressat/innen sollen Bitcoins bezahlen, damit es zu keiner Veröffentlichung der Aufnahmen kommt. Konsument/innen können das Schreiben ignorieren, denn es ist erfunden. Eine Reaktion ist nicht erforderlich.
---------------------------------------------
https://www.watchlist-internet.at/news/erpresserische-e-mails-drohen-mit-ma…
=====================
= Vulnerabilities =
=====================
∗∗∗ Squid Proxy Cache Security Update Advisory SQUID-2018:4 ∗∗∗
---------------------------------------------
Due to incorrect input handling, Squid is vulnerable to a Cross-Site Scripting vulnerability when generating HTTPS response messages about TLS errors.
---------------------------------------------
http://www.squid-cache.org/Advisories/SQUID-2018_4.txt
∗∗∗ Squid Proxy Cache Security Update Advisory SQUID-2018:5 ∗∗∗
---------------------------------------------
Due to a memory leak in SNMP query rejection code, Squid is vulnerable to a denial of service attack.
---------------------------------------------
http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (xorg-x11-server), Debian (xen), Red Hat (389-ds-base, binutils, curl and nss-pem, fuse, glibc, glusterfs, GNOME, gnutls, jasper, java-1.7.0-openjdk, kernel, kernel-alt, kernel-rt, krb5, libcdio, libkdcraw, libmspack, libreoffice, libvirt, openssl, ovmf, python, python-paramiko, qemu-kvm, qemu-kvm-ma, samba, setup, sssd, wget, wpa_supplicant, X.org X11, xerces-c, zsh, and zziplib), and SUSE (ardana-monasca, ardana-spark, kafka, kafka-kit, [...]
---------------------------------------------
https://lwn.net/Articles/770031/
∗∗∗ Sandbox Bypass in Script Security and Pipeline Groovy Plugins ∗∗∗
---------------------------------------------
https://jenkins.io/security/advisory/2018-10-29/
∗∗∗ GitLab Security Release: 11.4.3, 11.3.8, and 11.2.7 ∗∗∗
---------------------------------------------
https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-…
∗∗∗ IBM Security Bulletin: Code execution vulnerability with OpenID connect in WebSphere Application Server Liberty (CVE-2018-1851) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735105
∗∗∗ IBM Security Bulletin: Vulnerability in the IBM FlashSystem model V840 ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732968
∗∗∗ IBM Security Bulletin: A vulnerability in Samba affects IBM Spectrum Scale SMB protocol access method (CVE-2018-10858) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732876
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for SAP Applications ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10737813
∗∗∗ IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM Spectrum Scale ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735169
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK affect IBM Integration Designer ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733845
∗∗∗ reposync vulnerability CVE-2018-10897 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K23200408
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-10-2018 18:00 − Montag 29-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Windows 10 Bug Allowed UWP Apps Full Access to File System ∗∗∗
---------------------------------------------
A bug in Windows 10 allowed UWP apps (Universal Windows Platform) to have access to the entire file system in Windows without permission from the user. This could have allowed a malicious app to access any data stored on the computer without the knowledge or consent of the user.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/windows-10-bug-allowed-uwp-a…
∗∗∗ Linux und BSD: Sicherheitslücke in X.org ermöglicht Root-Rechte ∗∗∗
---------------------------------------------
Eine Sicherheitslücke im Displayserver X.org erlaubt unter bestimmten Umständen das Überschreiben von Dateien und das Ausweiten der Benutzerrechte. Der passende Exploit passt in einen Tweet. (Sicherheitslücke, OpenBSD)
---------------------------------------------
https://www.golem.de/news/linux-und-bsd-sicherheitsluecke-in-x-org-ermoegli…
∗∗∗ Sicherheitslücke: Steuerung von Bau-Kran lässt sich übernehmen ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in der kabellosen Kransteuerung Telecrane F25 ermöglicht es, Signale mitzuschneiden und mit diesen anschließend den Kran fernzusteuern. Ein Sicherheitsupdate steht bereit. (Sicherheitslücke, Mobil)
---------------------------------------------
https://www.golem.de/news/sicherheitsluecke-steuerung-von-bau-kran-laesst-s…
∗∗∗ OWASP Top 10 Security Risks – Part II ∗∗∗
---------------------------------------------
It is National Cyber Security Awareness Month and in order to bring awareness to what threatens the integrity of websites, we have started a series of posts on the OWASP top 10 security risks.
---------------------------------------------
https://blog.sucuri.net/2018/10/owasp-top-10-security-risks-part-ii.html
∗∗∗ The D in Systemd stands for Dammmmit! A nasty DHCPv6 packet can pwn a vulnerable Linux box ∗∗∗
---------------------------------------------
Hole opens up remote-code execution to miscreants – or a crash, if youre lucky A security bug in Systemd can be exploited over the network to, at best, potentially crash a vulnerable Linux machine, or, at worst, execute malicious code on the box.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/10/26/systemd_dhc…
∗∗∗ Google schreibt Android-Herstellern zwei Jahre Sicherheitspatches vor ∗∗∗
---------------------------------------------
In einem Vertrag schreibt Google Herstellern von Android-Smartphones regelmäßige Sicherheitsupdates vor. Diese Verpflichtung gilt bereits seit dem Sommer.
---------------------------------------------
http://heise.de/-4203113
∗∗∗ Ransomware and the enterprise: A new white paper ∗∗∗
---------------------------------------------
Ransomware remains a serious threat and this new white paper explains what enterprises need to know, and do, to reduce risk The post Ransomware and the enterprise: A new white paper appeared first on WeLiveSecurity
---------------------------------------------
https://www.welivesecurity.com/2018/10/29/ransomware-enterprise-new-white-p…
=====================
= Vulnerabilities =
=====================
∗∗∗ GEOVAP Reliance 4 SCADA/HMI ∗∗∗
---------------------------------------------
This advisory includes mitigations for a cross-site scripting vulnerability in GEOVAPs Reliance 4 SCADA/HMI system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-298-01
∗∗∗ Advantech WebAccess ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow, and improper access control vulnerabilities in Advantechs WebAccess.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-298-02
∗∗∗ Cisco Advanced Malware Protection for Endpoints on Windows DLL Preloading Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the DLL loading component of Cisco Advanced Malware Protection (AMP) for Endpoints on Windows could allow an authenticated, local attacker to disable system scanning services or take other actions to prevent detection of unauthorized intrusions.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (firefox), CentOS (firefox), Debian (389-ds-base, openjdk-8, thunderbird, and xorg-server), Fedora (firefox), openSUSE (GraphicsMagick, jhead, mysql-community-server, ntp, postgresql96, python-cryptography, rust, tomcat, webkit2gtk3, and zziplib), Scientific Linux (firefox), and SUSE (clamav, firefox, ImageMagick, libgit2, net-snmp, smt, wpa_supplicant, and xorg-x11-server).
---------------------------------------------
https://lwn.net/Articles/769613/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (xorg-server), Debian (graphicsmagick, libmspack, paramiko, ruby2.1, teeworlds, and tiff), Fedora (lldpad), Mageia (bitcoin, blueman, busybox, dhcp, exempi, firefox, kernel, kernel-linus, kernel-tmb, lilypond, ruby, and x11-server), openSUSE (audiofile, clamav, hostapd, ImageMagick, lcms2, libgit2, mercurial, net-snmp, and wpa_supplicant), SUSE (audiofile, binutils, kdelibs3, lcms2, mysql, openssh, and xen), and Ubuntu (mysql-5.5 and xorg-server, [...]
---------------------------------------------
https://lwn.net/Articles/769891/
∗∗∗ WebKitGTK+ 2.22.3 released! ∗∗∗
---------------------------------------------
This is a bug fix release in the stable 2.22 series. What’s new in the WebKitGTK+ 2.22.3 release? [...] Fix a memory leak during media playback when using playbin3. Fix portions of Web views not being rendered after resizing. Fix Resource Timing reporting for elements. Fix the build with the remote Web Inspector [...]
---------------------------------------------
https://webkitgtk.org/2018/10/29/webkitgtk2.22.3-released.html
∗∗∗ OpenSSL: Eine Schwachstelle ermöglicht das Ausspähen des privaten Schlüssels ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-2188/
∗∗∗ IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Release 1801r ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737409
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability affects IBM® Rational® Team Concert ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737301
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability in CacheMonitor for WebSphere Application Server (CVE-2018-1767) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729547
∗∗∗ Microsoft Skype for Business Audio File Processing Flaw Lets Remote Users Execute Arbitrary Code ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041956
∗∗∗ Apache Tomcat vulnerability CVE-2018-11784 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K64921482
∗∗∗ Mozilla NSS vulnerability CVE-2018-12384 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41738501
∗∗∗ HPESBMU03895 rev.1 - HPE Real Time Management System (RTMS), Multiple Remote Security Issues ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03869 rev.1 - HPE Windows Firmware Installer for certain HPE Gen9,Gen8, G7, and G6 Servers, Local Disclosure of Privileged Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-10-2018 18:00 − Donnerstag 25-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ sLoad Banking Trojan Downloader Displays Sophisticated Recon and Targeting ∗∗∗
---------------------------------------------
The sLoad downloader is an example of the stealthy, smart malware trend.
---------------------------------------------
https://threatpost.com/sload-banking-trojan-downloader-displays-sophisticat…
∗∗∗ Magecart Cybergang Targets 0days in Third-Party Magento Extensions ∗∗∗
---------------------------------------------
Over two dozen third-party ecommerce plugins contain zero-day vulnerabilities being exploited in a recent Magecart campaign.
---------------------------------------------
https://threatpost.com/magecart-cybergang-targets-0days-in-third-party-mage…
∗∗∗ BSI-Mindeststandard zur Protokollierung und Detektion von Cyber-Angriffen ∗∗∗
---------------------------------------------
Cyber-Angriffe auf die IT-Systeme der Bundesverwaltung finden täglich statt. Neben ungezielten Massenangriffen sind die Netze des Bundes auch gezielten Angriffskampagnen ausgesetzt. Um die Detektion von Cyber-Angriffen zu verbessern, hat das Bundesamt für Sicherheit in der Informationstechnik (BSI) einen Mindeststandard zur Protokollierung und der darauf basierenden Erkennung von Cyber-Angriffen definiert.
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Mindeststan…
∗∗∗ EU-Kommission will Zertifizierung für sichere Internetgeräte schaffen ∗∗∗
---------------------------------------------
Die EU arbeitet an einer Verordnung zur Sicherheitszertifizierung, die insbesondere die Geräte im Internet of Things in den Blick nimmt.
---------------------------------------------
http://heise.de/-4202642
∗∗∗ Sicherheitsupdate: Gefährliche Lücke in Cisco Webex Meetings ∗∗∗
---------------------------------------------
Angreifer könnten den Update-Mechanismus von Webex missbrauchen, um eigenen Code auszuführen. Ein Sicherheitsupdate schließt die Schwachstelle.
---------------------------------------------
http://heise.de/-4202886
∗∗∗ Gandcrab: Aktualisiertes Entschlüsselungstool für Erpressungstrojaner ∗∗∗
---------------------------------------------
Opfer der Ransomware Gandcrab in den Versionen 1, 4 und 5 können ihre Daten nun kostenlos entschlüsseln.
---------------------------------------------
http://heise.de/-4203283
∗∗∗ Sextortion emails: They're probably not watching you ∗∗∗
---------------------------------------------
Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.
---------------------------------------------
https://blog.malwarebytes.com/101/2018/10/sextortion-emails-theyre-probably…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Webex Meetings Desktop App Update Service Command Injection Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Xen Security Advisory 278 v1 - x86: Nested VT-x usable even when disabled ∗∗∗
---------------------------------------------
When running HVM guests, virtual extensions are enabled in hardware because Xen is using them. As a result, a guest can blindly execute the virtualisation instructions, and will exit to Xen for processing.
---------------------------------------------
https://lists.xenproject.org/archives/html/xen-announce/2018-10/msg00000.ht…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (389-ds-base, clamav, firefox-esr, and mosquitto), openSUSE (Chromium and firefox), Oracle (firefox and kernel), Red Hat (chromium-browser, firefox, java-1.6.0-sun, java-1.7.0-oracle, and java-1.8.0-oracle), SUSE (dom4j, exempi, mercurial, ntp, python-cryptography, tiff, tomcat, and webkit2gtk3), and Ubuntu (audiofile and firefox).
---------------------------------------------
https://lwn.net/Articles/769529/
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSH affects AIX (CVE-2018-15473) Security Bulletin ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733751
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM OS Image for Red Hat Linux Systems on IBM PureApplication ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728607
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Platform Symphony and IBM Spectrum Symphony ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10732846
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in WebSphere Application Server Admin Console affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1770, CVE-2018-1777) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10737065
∗∗∗ IBM Security Bulletin: Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/support/docview.wss?uid=ibm10735863
∗∗∗ IBM Security Bulletin: A vulnerability in Samba affects IBM OS Image for Red Hat Linux Systems on IBM PureApplication (CVE-2018-1050) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728649
∗∗∗ IBM Security Bulletin : IBM Storwize V7000 Unified is affected by multiple GSKit vulnerabilities in GPFS ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734249
∗∗∗ IBM Security Bulletin: IBM Security Access Manager is affected by multiple vulnerabilities in GSKit ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22016890
∗∗∗ IBM Security Bulletin: IBM WebSphere Commerce could allow some server-side code injection (CVE-2018-1808) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735905
∗∗∗ Reflected XSS vulnerability in an undisclosed Configuration utility page CVE-2018-15315 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41704442
Next End-of-Day report: 2018-10-29
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-10-2018 18:00 − Mittwoch 24-10-2018 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ The Key New Security Features & Capabilities to Know in Windows 10 ∗∗∗
---------------------------------------------
Last year's WannaCry and Petya malware outbreaks couldn't breach Windows 10's latest security defenses, but companies still running outdated [...]
---------------------------------------------
https://www.beyondtrust.com/blog/key-new-security-features-in-windows-10/
∗∗∗ Hacker Discloses New Windows Zero-Day Exploit On Twitter ∗∗∗
---------------------------------------------
A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released another proof-of-concept exploit for a new Windows zero-day vulnerability.
---------------------------------------------
https://thehackernews.com/2018/10/windows-zero-day-exploit.html
∗∗∗ Sicherheitsupdates: Backup-Software von Arcserve kann Daten leaken ∗∗∗
---------------------------------------------
Angreifer könnten unberechtigt auf Daten von Host-Systemen, auf denen die Backup-Lösung Arcserve Unified Data Protection läuft, zugreifen.
---------------------------------------------
http://heise.de/-4202167
∗∗∗ Einkaufsbetrug mit gefälschten Smile Bank-Nachrichten ∗∗∗
---------------------------------------------
Privatverkäufer/innen erhalten Nachrichten von Kriminellen. Sie geben vor, im Ausland zu sein und wollen die angebotene Ware kaufen. Sie überweisen angeblich einen überhöhten Geldbetrag an ihre Vertragspartner/innen. Das sollen gefälschte Smile Bank-Nachrichten belegen. Schließlich sollen Verkäufer/innen den Differenzbetrag und die Ware ins Ausland senden. Dadurch verlieren sie ihre personenbezogenen Daten, ihr Geld und ihre Produkte an Betrüger/innen.
---------------------------------------------
https://www.watchlist-internet.at/news/einkaufsbetrug-mit-gefaelschten-smil…
∗∗∗ Nike-Markenfälscher auf coldenemy.com ∗∗∗
---------------------------------------------
Die neuesten Schuhe von Nike um 70 Prozent vergünstigt? Das gibt's auf coldenemy.com. Wer hier bestellt, erhält minderwertige Ware, die nichts mit dem gekauften Produkt zu tun hat. Außerdem gelangen Kredit- und Personendaten in die Hände von Kriminellen.
---------------------------------------------
https://www.watchlist-internet.at/news/nike-markenfaelscher-auf-coldenemyco…
=====================
= Vulnerabilities =
=====================
∗∗∗ Advantech WebAccess ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow, external control of file name or path, improper privilege management, and path traversal vulnerabilities in Advantechs WebAccess.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-01
∗∗∗ GAIN Electronic Co. Ltd SAGA1-L Series ∗∗∗
---------------------------------------------
This advisory includes mitigations for authentication bypass by capture-relay, improper access control, and improper authentication vulnerabilities in GAIN Electronics SAGA1-L series transmitters.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-02
∗∗∗ Telecrane F25 Series ∗∗∗
---------------------------------------------
This advisory includes mitigations for an authentication bypass by capture-replay vulnerability in the Telecrane F25 Series software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-03
∗∗∗ BitDefender Digital Signature Bypass Lets Remote Users Execute Arbitrary Code ∗∗∗
---------------------------------------------
A remote user can cause arbitrary code that is located elsewhere to be executed on the target users system due to a bypass of the digital signature GravityZone verification tools. Additional information is available at: https://labs.nettitude.com/blog/cve-2018-8955-bitdefender-gravityzone-arbit…
---------------------------------------------
https://www.securitytracker.com/id/1041940
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (hesiod, lighttpd, and opencc), openSUSE (apache-pdfbox, net-snmp, pam_pkcs11, rpm, tiff, udisks2, and wireshark), SUSE (dhcp, ghostscript-library, ImageMagick, libraw, net-snmp, ntp, postgresql96, rust, tiff, xen, and zziplib), and Ubuntu (mysql-5.5, mysql-5.7).
---------------------------------------------
https://lwn.net/Articles/769415/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ October 23, 2018 TNS-2018-13 [R1] LCE 5.1.1 Fixes Multiple Third-party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2018-13
∗∗∗ October 23, 2018 TNS-2018-14 [R1] Nessus 8.0.0 Fixes Multiple Third-party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2018-14
∗∗∗ Security vulnerabilities fixed in Firefox ESR 60.3 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-27/
∗∗∗ Security vulnerabilities fixed in Firefox 63 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-26/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 22-10-2018 18:00 − Dienstag 23-10-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malicious Powershell using a Decoy Picture ∗∗∗
---------------------------------------------
I found another interesting piece of malicious Powershell while hunting. The file size is 1.3MB and most of the file is a PE file Base64 encoded. You can immediately detect it by checking the first characters of the string: [...]
---------------------------------------------
https://isc.sans.edu/forums/diary/Malicious+Powershell+using+a+Decoy+Pictur…
∗∗∗ Jetzt patchen! Scanner und Exploits für kritische libssh-Lücke aufgetaucht ∗∗∗
---------------------------------------------
Da das Angriffsrisiko wächst, sollten Admins zügig die aktuelle libssh-Version auf Servern installieren.
---------------------------------------------
http://heise.de/-4198976
∗∗∗ Serverless botnets could soon become reality ∗∗∗
---------------------------------------------
We have been accustomed to think about botnets as a network of compromised machines – personal devices, IoT devices, servers – waiting for their masters' orders to begin their attack, but Protego researchers say that many compromised machines are definitely not a requirement: botnets can quite as easily be comprised of serverless functions.
---------------------------------------------
https://www.helpnetsecurity.com/2018/10/23/serverless-botnets/
∗∗∗ Who Is Agent Tesla? ∗∗∗
---------------------------------------------
A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity - attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malwares apparent creator seems to have done little to hide his real-life identity.
---------------------------------------------
https://krebsonsecurity.com/2018/10/who-is-agent-tesla/
∗∗∗ Betrug mit Euro-Lottosystem & Goggins-Transport ∗∗∗
---------------------------------------------
Konsument/innen erhalten eine betrügerische E-Mail, in der es heißt, dass sie bei einem Euro-Lottosystem 97.000 Euro gewonnen haben. Sie sollen Geld an Goggings-Transport bezahlen, damit sie den Preis ausbezahlt bekommen. Es folgen weitere Zahlungsaufforderungen. Mit jeder Bezahlung verliert das Opfer Geld, denn den Gewinn gibt es nicht.
---------------------------------------------
https://www.watchlist-internet.at/news/betrug-mit-euro-lottosystem-goggins-…
∗∗∗ Konsolen-kobold.de liefert keine Ware! ∗∗∗
---------------------------------------------
Kaufen Sie nicht auf konsolen-kobold.de ein. Die dort angebotenen Playstations, Xboxen, Nintendos und Spiele sind zwar verlockend günstig, werden aber auch nicht geliefert! Bezahlt wird per Vorkasse und Ihr Geld ist somit weg.
---------------------------------------------
https://www.watchlist-internet.at/news/konsolen-koboldde-liefert-keine-ware/
∗∗∗ CVE-2018–8414: A Case Study in Responsible Disclosure ∗∗∗
---------------------------------------------
The process of vulnerability disclosure can be riddled with frustrations, concerns about ethics, and communication failure. I have had tons of bugs go well. I have had tons of bugs go poorly.
---------------------------------------------
https://posts.specterops.io/cve-2018-8414-a-case-study-in-responsible-discl…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (java-1.8.0-openjdk), Fedora (mosquitto), openSUSE (binutils, clamav, exiv2, fuse, haproxy, singularity, and zziplib), Slackware (firefox), SUSE (apache-pdfbox, net-snmp, pam_pkcs11, postgresql94, rpm, tiff, and wireshark), and Ubuntu (kernel, libssh, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-azure, linux-lts-trusty, linux-lts-xenial, linux-aws, net-snmp, paramiko, requests, and texlive-bin).
---------------------------------------------
https://lwn.net/Articles/769300/
∗∗∗ IBM Security Bulletin: IBM BladeCenter Switch Modules are affected by information disclosure vulnerability (CVE-2014-8730) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10736107
∗∗∗ IBM Security Bulletin: IBM Integrated Management Module II (IMM2) is affected by vulnerability in OpenSLP (CVE-2017-17833) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10735359
∗∗∗ IBM Security Bulletin: Vulnerabilities in GNU OpenSSL affect IBM Netezza Analytics ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10734825
∗∗∗ IBM Security Bulletin: IBM WebSphere Commerce could allow a remote attacker to obtain sensitive information (CVE-2018-1811) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735589
∗∗∗ IBM Security Bulletin: An Information Disclosure Vulnerability affects WebSphere Commerce (CVE-2018-1809) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732972
∗∗∗ IBM Security Bulletin: A authenticated open redirect vulnerability affects IBM WebSphere Commerce Accelerator Tool (CVE-2018-1807) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735581
∗∗∗ IBM Security Bulletin: An Information Disclosure Vulnerability affects WebSphere Commerce (CVE-2018-1806) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10733149
∗∗∗ IBM Security Bulletin: A cross site scripting vulnerability affects IBM WebSphere Commerce Accelerator tool (CVE-2018-1541) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731225
∗∗∗ IPsec IKEv1 vulnerability CVE-2018-5389 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K42378447
∗∗∗ Linux kernel vulnerability CVE-2018-14634 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20934447
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 19-10-2018 18:00 − Montag 22-10-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Remote Code Execution Flaws Found in FreeRTOS - Popular OS for Embedded Systems ∗∗∗
---------------------------------------------
FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/remote-code-execution-flaws-…
∗∗∗ Sicherheitsupdate: Ein Klick zu viel und Microsoft Yammer führt Schadcode aus ∗∗∗
---------------------------------------------
Es gibt einen wichtigen Patch für die Desktop-Anwendung von Yammer.
---------------------------------------------
http://heise.de/-4198055
∗∗∗ Jetzt patchen! Kritische Lücke in den Mediaplayern VLC und MPlayer ∗∗∗
---------------------------------------------
Angreifer könnten Nutzer der Medienabspieler VLC und MPlayer mit vergleichsweise wenig Aufwand attackieren.
---------------------------------------------
http://heise.de/-4198129
∗∗∗ l+f: Snackautomaten-Flatrate ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher wird zum Snackosaurus.
---------------------------------------------
http://heise.de/-4198336
∗∗∗ TCP/IP, Sockets, and SIGPIPE ∗∗∗
---------------------------------------------
There is a spectre haunting the Internet - the spectre of SIGPIPE errors. Its a bug in the original design of Unix networking from 1981 that is perpetuated by college textbooks, which teach students to ignore it. As a consequence, sometimes software unexpectedly crashes. This is particularly acute on industrial and medical networks, where security professionals cant run port/security scans for fear of crashing critical devices.
---------------------------------------------
https://blog.erratasec.com/2018/10/tcpip-sockets-and-sigpipe.html
∗∗∗ Warnung vor verda-maehroboter.de ∗∗∗
---------------------------------------------
Der betrügerische Online-Shop verda-maehroboter.de verkauft günstige Mähroboter und Rasentraktoren. Wer bei ihm einkauft, verliert sein Geld und seine Identität an Verbrecher/innen. Zu einer Warenlieferung kommt es nicht. Der Fake-Shop verda-maehroboter.de ist mithilfe einer Internetrecherche, eines Preisvergleichs und einer Überprüfung der Zahlungsmethoden erkennbar.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-verda-maehroboterde/
∗∗∗ Let's talk about PAKE ∗∗∗
---------------------------------------------
The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password Authenticated Key Exchange — is actually one of the most useful technologies that (almost) never gets used. It should be deployed everywhere, and yet it isn't.
---------------------------------------------
https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/
=====================
= Vulnerabilities =
=====================
∗∗∗ libssh Authentication Bypass Vulnerability Affecting Cisco Products: October 2018 ∗∗∗
---------------------------------------------
A vulnerability in libssh could allow an unauthenticated, remote attacker to bypass authentication on a targeted system.The vulnerability is due to improper authentication operations by the server-side state machine of the affected software. An attacker could exploit this vulnerability by presenting a SSH2_MSG_USERAUTH_SUCCESS message to a targeted system. A successful exploit could allow the attacker to bypass authentication and gain unauthorized access to a targeted system.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ SECURITY BULLETIN: Trend Micro Antivirus for Mac (Consumer) Privilege Escalation Vulnerabilities ∗∗∗
---------------------------------------------
Trend Micro has released fixes for the Trend Micro Antivirus for Mac family of consumer products which resolve vulnerabilities that could allow an attacker to escalate privileges on a vulnerable system that they otherwise would not have had access to.
---------------------------------------------
https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (thunderbird), Debian (drupal7, exiv2, and ghostscript), Fedora (apache-commons-compress, git, libssh, and patch), Mageia (389-ds-base, calibre, clamav, docker, ghostscript, glib2.0, libtiff, mgetty, php-smarty, rust, tcpflow, and vlc), openSUSE (Chromium, icinga, and libssh), and SUSE (clamav, fuse, GraphicsMagick, haproxy, libssh, thunderbird, tomcat, udisks2, and Xerces-c).
---------------------------------------------
https://lwn.net/Articles/769163/
∗∗∗ IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU – Jul 2018 – Includes Oracle Jul 2018 CPU affects IBM Tivoli Composite Application Manager for Transactions ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10735807
∗∗∗ IBM Security Bulletin: Vulnerabilities in GNU binutils affect IBM Netezza Analytics ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733785
∗∗∗ BIG-IP-reflected XSS vulnerability in an undisclosed Configuration utility page CVE-2018-15315 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41704442
∗∗∗ PEPPERL+FUCHS ecom Mobile devices prone to Android privilege elevation vulnerability ∗∗∗
---------------------------------------------
https://cert.vde.com/de-de/advisories/vde-2018-016
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 18-10-2018 18:00 − Freitag 19-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ SSH Key Management Overview & 6 Best Practices ∗∗∗
---------------------------------------------
Secure Socket Shell (SSH), also called Secure Shell, is a special network protocol leveraging ..
---------------------------------------------
https://www.beyondtrust.com/blog/ssh-key-management-overview-6-best-practic…
∗∗∗ How we discovered a Ukranian cybercrime hotspot ∗∗∗
---------------------------------------------
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/10/31187-ukranian-cybercrime-hotspo…
∗∗∗ The Underground Job Market ∗∗∗
---------------------------------------------
"Leave your ego at the door every morning, and just do some truly great work. Few things will make you feel better than a job brilliantly done." Robin S. Sharma The last time we visited the ..
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/The-Underground-Job-Market/
∗∗∗ Hack.lu 2018 Wrap-Up Day #3 ∗∗∗
---------------------------------------------
Here we go with the last wrap-up of the 2018 edition! The first presentation was about worms: “Worms that turn: nematodes and neotodes” by Matt Wixey. The first slide contained the mention: “for educational purposes only”. What could we ..
---------------------------------------------
https://blog.rootshell.be/2018/10/18/hack-lu-2018-wrap-up-day-3/
∗∗∗ Jetzt patchen! Kritische Lücken in Drupal gefährden ganze Websites ∗∗∗
---------------------------------------------
Aufgrund von mehreren Schwachstellen sollten Web-Admins zügig ihre Drupal-Installation auf den aktuellen Stand bringen.
---------------------------------------------
http://heise.de/-4196243
∗∗∗ Sicherheitslücke in jQuery-File-Upload Plug-in macht unzählige Server verwundbar ∗∗∗
---------------------------------------------
Es ist ein wichtiges Sicherheitsupdate für das jQuery-File-Upload-Plug-in erschienen. Eine globale Installation ist jedoch utopisch.
---------------------------------------------
http://heise.de/-4196771
∗∗∗ Encrypted SNI Comes to Firefox Nightly ∗∗∗
---------------------------------------------
TL;DR: Firefox Nightly now supports encrypting the TLS Server Name Indication (SNI) extension, which helps prevent attackers on your network from learning your browsing history. You can enable encrypted SNI today and ..
---------------------------------------------
https://blog.mozilla.org/security/2018/10/18/encrypted-sni-comes-to-firefox…
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4323 drupal7 - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4323
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 17-10-2018 18:00 − Donnerstag 18-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hack.lu 2018 Wrap-Up Day #2 ∗∗∗
---------------------------------------------
The second day started early with an eye-opener talk: “IPC – the broken dream of inherent security” by Thanh Bui. IPC or “Inter-Process Communications” are everywhere. You can compare them as a network connection between a ..
---------------------------------------------
https://blog.rootshell.be/2018/10/17/hack-lu-2018-wrap-up-day-2/
∗∗∗ Sicherheitslücken-Cocktail bringt D-Link-Router zu Fall ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher kombiniert drei Sicherheitslücken und erlangt die volle Kontrolle über D-Link-Router. Patches gibt es noch nicht.
---------------------------------------------
http://heise.de/-4195134
∗∗∗ Distrust of the Symantec PKI: Immediate action needed by site operators ∗∗∗
---------------------------------------------
Chrome 70 has now been released to the Stable Channel, and users will start to see full screen interstitials on sites which still use certificates issues by the Legacy Symantec ..
---------------------------------------------
https://security.googleblog.com/2018/03/distrust-of-symantec-pki-immediate.…
∗∗∗ VestaCP compromised in a new supply-chain attack ∗∗∗
---------------------------------------------
Customers see their admin credentials stolen and their servers infected with ..
---------------------------------------------
https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-dist…
=====================
= Vulnerabilities =
=====================
∗∗∗ TYPO3-PSA-2018-001: By-passing Protection of PharStreamWrapper Interceptor ∗∗∗
---------------------------------------------
It has been discovered that the protection against insecure deserialization can be by-passed in PharStreamWrapper component.
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2018-001/
∗∗∗ Drupal Core - Multiple Vulnerabilities - SA-CORE-2018-006 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-core-2018-006
∗∗∗ Drupal Core - 3rd-party libraries -SA-CORE-2018-005 ∗∗∗
---------------------------------------------
https://www.drupal.org/SA-CORE-2018-005
∗∗∗ HTML Mail - Critical - Remote Code Execution - SA-CONTRIB-2018-069 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-069
∗∗∗ Mime Mail - Critical - Remote Code Execution - SA-CONTRIB-2018-068 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-068
∗∗∗ Cisco Wireless LAN Controller Software Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 16-10-2018 18:00 − Mittwoch 17-10-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Injecting Code into Windows Protected Processes using COM - Part 1 ∗∗∗
---------------------------------------------
Posted by James Forshaw, Google Project ZeroAt Recon Montreal 2018 I presented "Unknown Known DLLs and other Code Integrity Trust Violations" with Alex Ionescu. We described the implementation of Microsoft Windows' Code Integrity mechanisms and how Microsoft implemented Protected Processes (PP). As part of that I demonstrated various ways of bypassing Protected Process Light (PPL), some requiring administrator privileges, others not.
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/10/injecting-code-into-windows-…
∗∗∗ Multiple D-Link Routers Open to Complete Takeover with Simple Attack ∗∗∗
---------------------------------------------
The vendor only plans to patch two of the eight impacted devices, according to a researcher.
---------------------------------------------
https://threatpost.com/multiple-d-link-routers-open-to-complete-takeover-wi…
∗∗∗ Party like its 1987... SVGA code bug haunts VMwares house, lets guests flee to host OS ∗∗∗
---------------------------------------------
Malicious code in VMs can leap over ESXi, Workstation, Fusion hypervisor security Get busy, VMware admins and users: the virtualisation virtuoso has patched a programming blunder in ESXi, Workstation Pro and Player, and Fusion and Fusion Pro products that can be exploited by malicious code to jump from guest OS to host machine.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/10/17/vmware_svga…
∗∗∗ Warnung vor gefälschtem A1-Update ∗∗∗
---------------------------------------------
Konsument/innen erhalten eine angebliche Nachricht von A1, in der es heißt, dass der Mobilfunkanbieter ein Update für sie bereit stellt. Kund/innen sollen es installieren, damit sie weiterhin das Mobilfunknetz des Anbieters nutzen können. Kommen sie der Aufforderung nach, installieren sie Schadsoftware auf ihrem Smartphone.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-gefaelschtem-a1-update/
∗∗∗ IT-Sicherheit - 100.000 Geräte: "Netter" Hacker entfernt ungefragt Sicherheitslücken ∗∗∗
---------------------------------------------
Seit April sind verheerende Sicherheitslücken bei Routern der Marke Mikrotik bekannt - vom Hersteller gibt es kein Update
---------------------------------------------
https://derstandard.at/2000089517357/Netter-Hacker-entfernt-ungefragt-Siche…
∗∗∗ Persistent Credential Theft with Authorization Plugins ∗∗∗
---------------------------------------------
Credential theft is often one of the first tactics leveraged by attackers once they’ve escalated privileges on a victim’s machine. Credential theft on OSX has become more difficult with the introduction of System Integrity Protection (SIP). Attackers can no longer use methods such as extracting the master keys from the securityd process and decrypting the victim’s login keychain. An example of this can be seen here.
---------------------------------------------
https://posts.specterops.io/persistent-credential-theft-with-authorization-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Omron CX-Supervisor ∗∗∗
---------------------------------------------
This advisory includes mitigations for improper restriction of operations within the bounds of a memory buffer, out-of-bounds read, use-after-free, and incorrect type conversion or cast vulnerabilities in Omrons CX-Supervisor software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01
∗∗∗ Authentication bypass in server code in libssh ∗∗∗
---------------------------------------------
There is a vulnerability within the server code which can enable a client to bypass the authentication process and set the internal state machine maintained by the library to authenticated, enabling the (otherwise prohibited) creation of channels.
---------------------------------------------
https://www.libssh.org/security/advisories/CVE-2018-10933.txt
∗∗∗ VMSA-2018-0026 ∗∗∗
---------------------------------------------
VMware ESXi, Workstation, and Fusion updates address an out-of-bounds read vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0026.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (tomcat), Debian (asterisk, graphicsmagick, and libpdfbox-java), openSUSE (apache2 and git), Oracle (tomcat), Red Hat (kernel and Satellite 6.4), Slackware (libssh), SUSE (binutils, ImageMagick, and libssh), and Ubuntu (clamav, libssh, moin, and paramiko).
---------------------------------------------
https://lwn.net/Articles/768617/
∗∗∗ Synology-SA-18:55 DSM ∗∗∗
---------------------------------------------
A vulnerability allows remote authenticated users to obtain sensitive information via a susceptible version of Synology Diskstation Manager (DSM).
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_55
∗∗∗ Oracle Critical Patch Update Advisory - October 2018 ∗∗∗
---------------------------------------------
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
∗∗∗ Solaris Third Party Bulletin - October 2018 ∗∗∗
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/bulletinoct2018-5139632.h…
∗∗∗ Security Advisory - Information Leak Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20181017-…
∗∗∗ HPESBHF03891 rev.1 - HPE UIoT, Remote Unauthorized Access ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily