=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 03-07-2018 18:00 − Mittwoch 04-07-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malware Authors Seem Intent on Weaponizing Windows SettingContent-ms Files ∗∗∗
---------------------------------------------
Malware authors are frantically trying to weaponize a new infection vector that was revealed at the start of June. The trick relies on using Windows Settings (.SettingContent-ms) shortcut files in order to achieve ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malware-authors-seem-intent-…
∗∗∗ Lücken in Provider-Routern entdeckt ∗∗∗
---------------------------------------------
Durch Lücken in Routern des Herstellers ADB kann sich ein Angreifer Root-Rechte verschaffen. Das kann auch für die Provider zum Problem werden.
---------------------------------------------
http://heise.de/-4099449
∗∗∗ Phishing tales: Microsoft Access Macro (.MAM) shortcuts ∗∗∗
---------------------------------------------
Previously, I blogged about the ability to create malicious .ACCDE Microsoft Access Database files and using them as a phishing vector. This post expands on using the ACCDE format and will be introducing Microsoft Access Macro “MAM” ..
---------------------------------------------
https://posts.specterops.io/phishing-tales-microsoft-access-macro-mam-short…
=====================
= Vulnerabilities =
=====================
∗∗∗ Rockwell Automation Allen-Bradley Stratix 5950 ∗∗∗
---------------------------------------------
This advisory includes mitigations for improper input validation, improper certificate validation, and resource management error vulnerabilities in the Allen-Bradley Stratix 5950 security appliance.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01
∗∗∗ Privilege escalation via linux group manipulation in all ADB Broadband Gateways / Routers ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/privilege-escalation-via-lin…
∗∗∗ Authorization Bypass in all ADB Broadband Gateways / Routers ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-…
∗∗∗ Local root jailbreak via network file sharing flaw in all ADB Broadband Gateways / Routers ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/local-root-jailbreak-via-net…
∗∗∗ Security vulnerabilities fixed in Thunderbird 52.9 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-18/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 02-07-2018 18:00 − Dienstag 03-07-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malware lockt mit Fortnite-Cheats ∗∗∗
---------------------------------------------
Die Beliebtheit von Fortnite ruft vermehrt auch Kriminelle auf den Plan.
---------------------------------------------
https://futurezone.at/games/malware-lockt-mit-fortnite-cheats/400060664
∗∗∗ Akute Gefahr für Überwachungs-Software Nagios XI ∗∗∗
---------------------------------------------
Ein MetaSploit-Modul nutzt mehrere Schwachstellen in Nagios XI so geschickt aus, dass ein Angreifer den Monitoring-Server übernehmen kann.
---------------------------------------------
http://heise.de/-4096379
∗∗∗ Patchday: Google schließt teils kritische Android-Lücken ∗∗∗
---------------------------------------------
Die monatlich von Google veröffentlichten Sicherheits-Patches für Android betreffen im Juli ausnahmslos Lücken mit hohem bis kritischem Schweregrad.
---------------------------------------------
http://heise.de/-4096435
∗∗∗ Mac malware targets cryptomining users ∗∗∗
---------------------------------------------
A new Mac malware called OSX.Dummy is being distributed on cryptomining chat groups that, even after being removed, leaves behind remnants for future malware to find.
---------------------------------------------
https://blog.malwarebytes.com/malwarebytes-news/2018/07/mac-malware-targets…
∗∗∗ Smoking Guns - Smoke Loader learned new tricks ∗∗∗
---------------------------------------------
This post is authored by Ben Baker and Holger Unterbrink OverviewCisco Talos has been tracking a new version of Smoke Loader — a malicious application that can be used to ..
---------------------------------------------
https://blog.talosintelligence.com/2018/07/smoking-guns-smoke-loader-learne…
∗∗∗ Kontrolle erlangt - Hacker integrierten bei Gentoo Linux gefährlichen Löschbefehl ∗∗∗
---------------------------------------------
Github-Repo übernommen und Befehl untergejubelt – mittlerweile haben die Entwickler aber wieder Kontrolle
---------------------------------------------
https://derstandard.at/2000082722326/Hacker-integrierten-bei-Gentoo-Linux-g…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (drupal7-backup_migrate, firefox, and podman), Red Hat (python), Scientific Linux (glibc, kernel, libvirt, pcs, samba, samba4, sssd and ding-libs, and zsh), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-hwe, linux-azure, linux-lts-trusty, linux-lts-xenial, linux-aws, linux-oem, and zziplib).
---------------------------------------------
https://lwn.net/Articles/758940/
∗∗∗ Multiple vulnerabilities from IBM Security Bulletin ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ DSA-2018-122: RSA Certificate Manager Path Traversal Vulnerability ∗∗∗
---------------------------------------------
https://www.securitytracker.com/id/1041211
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 29-06-2018 18:00 − Montag 02-07-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses ∗∗∗
---------------------------------------------
While we have covered cryptocurrency clipboard hijackers in the past, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses. This week BleepingComputer noticed a sample of this type of malware that monitors for a over 2.3 million cryptocurrency addresses!
---------------------------------------------
https://www.bleepingcomputer.com/news/security/clipboard-hijacker-malware-m…
∗∗∗ DNS Poisoning or BGP Hijacking Suspected Behind Trezor Wallet Phishing Incident ∗∗∗
---------------------------------------------
The team behind the Trezor multi-cryptocurrency wallet service has discovered a phishing attack against some of its users that took place over the weekend.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/dns-poisoning-or-bgp-hijacki…
∗∗∗ Newer Diameter Telephony Protocol Just As Vulnerable As SS7 ∗∗∗
---------------------------------------------
Security researchers say the Diameter protocol used with todays 4G (LTE) telephony and data transfer standard is vulnerable to the same types of vulnerabilities as the older SS7 standard used with older telephony standards such as 3G, 2G, and earlier.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/newer-diameter-telephony-pro…
∗∗∗ Taking apart a double zero-day sample discovered in joint hunt with ESET ∗∗∗
---------------------------------------------
In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel with ESET researchers, I was surprised to discover two new zero-day exploits in the same Read more
---------------------------------------------
https://cloudblogs.microsoft.com/microsoftsecure/2018/07/02/taking-apart-a-…
∗∗∗ Boffins want to stop Network Time Protocols time-travelling exploits ∗∗∗
---------------------------------------------
Ancient protocols key vulnerability is fixable Among the many problems that exist in the venerable Network Time Protocol is its vulnerability to timing attacks: turning servers into time-travellers can play all kinds of havoc with important systems.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/07/02/ntp_revisio…
∗∗∗ The principle of least privilege: A strategy of limiting access to what is essential ∗∗∗
---------------------------------------------
The principle of least privilege is a security strategy applicable to different areas, which is based on the idea of only granting those permissions that are necessary for the performance of a certain activity
---------------------------------------------
https://www.welivesecurity.com/2018/07/02/principle-least-privilege-strateg…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium-browser, mosquitto, python-pysaml2, simplesamlphp, tiff, and tomcat7), Fedora (kernel, libgxps, nodejs, and phpMyAdmin), Mageia (ansible, firefox, java-1.8.0-openjdk, libcrypt, libgcrypt, ncurses, phpmyadmin, taglib, and webkit2), openSUSE (GraphicsMagick, ImageMagick, mailman, Opera, and rubygem-sprockets), and SUSE (ImageMagick, kernel, mariadb, and python-paramiko).
---------------------------------------------
https://lwn.net/Articles/758845/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 28-06-2018 18:00 − Freitag 29-06-2018 18:00
Handler: Olaf Schwarz
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ File-Wiping Malware Placed Inside Gentoo Linux Code After GitHub Account Hack ∗∗∗
---------------------------------------------
An unknown hacker has temporarily taken control over the GitHub account of the Gentoo Linux organization and embedded malicious code inside the operating systems distributions that would delete user files.
---------------------------------------------
https://www.bleepingcomputer.com/news/linux/file-wiping-malware-placed-insi…
∗∗∗ Samsung-Smartphones schicken unbemerkt Fotos an Kontakte ∗∗∗
---------------------------------------------
Ein Fehler in Samsung-Handys schickt zufällig verschiedene Fotos an im Telefonbuch gespeicherte Kontakte.
---------------------------------------------
https://futurezone.at/produkte/samsung-smartphones-schicken-unbemerkt-fotos…
∗∗∗ Überwachungskameras schickten Videos an falsche Nutzer ∗∗∗
---------------------------------------------
Bereits zum zweiten Mal wird ein Fall bekannt, in denen Kameras des Herstellers Swann Security Videobilder an die falschen Nutzer senden.
---------------------------------------------
https://futurezone.at/digital-life/ueberwachungskameras-schickten-videos-an…
∗∗∗ RIG Exploit Kit Delivering Monero Miner Via PROPagate Injection Technique ∗∗∗
---------------------------------------------
Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique to inject code that downloads and executes a Monero miner (similar activity has been reported by Trend Micro). Apart from leveraging a relatively lesser known injection technique, the attack chain has some other interesting properties that we will touch on in this blog post.
---------------------------------------------
http://www.fireeye.com/blog/threat-research/2018/06/rig-ek-delivering-moner…
∗∗∗ Rampage: Neuer Rowhammer-Angriff betrifft alle Android-Handys seit 2011 ∗∗∗
---------------------------------------------
Mit einer neuen Technik lässt sich der Speicher von Android-Geräten manipulieren. Der Angreifer wird so auf die harte Art zum Admin.
---------------------------------------------
http://heise.de/-4094782
=====================
= Vulnerabilities =
=====================
∗∗∗ Medtronic MyCareLink Patient Monitor ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for hard-coded password and exposed dangerous method or function vulnerabilities reported in Medtronics MyCareLink Patient Monitors.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-18-179-01
∗∗∗ VMSA-2018-0016 ∗∗∗
---------------------------------------------
VMware ESXi, and Workstation updates address multiple out-of-bounds read vulnerabilities
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0016.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (firefox), Debian (firefox-esr, lava-server, libgcrypt20, mariadb-10.0, and zendframework), Fedora (firefox, podman, webkitgtk4, and xen), openSUSE (procps and unixODBC), Oracle (pki-core), Red Hat (firefox), SUSE (kernel, procps, and tomcat6), and Ubuntu (file and nasm).
---------------------------------------------
https://lwn.net/Articles/758656/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 27-06-2018 18:00 − Donnerstag 28-06-2018 18:00
Handler: Olaf Schwarz
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Windows Defender Detecting Legitimate Files as Trojan:Win32/Bluteal.B!rfn ∗∗∗
---------------------------------------------
Recently there have been a lot of reports of Windows Defender suddenly detecting files as Trojan:Win32/Bluteal.B!rfn. The detected files range from CPU miners, which would make sense, to legitimate Windows files, which do not.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/windows-defender-detecting-l…
∗∗∗ Schneller Mobilfunk: Sicherheitslücken in LTE ∗∗∗
---------------------------------------------
Um die Lücken auszunutzen, braucht man viel Know-how und ausgeklügelte Hardware. Aber mit hinreichend Aufwand könnten darüber Geheimnisträger attackiert werden.
---------------------------------------------
http://heise.de/-4093507
∗∗∗ Jetzt patchen! Exploit für Cisco ASA im Umlauf ∗∗∗
---------------------------------------------
In Ciscos System für unter anderem Firewalls Adaptive Security Aplliance klafft eine Sicherheitslücke, die Angreifer bald ausnutzen könnten.
---------------------------------------------
http://heise.de/-4093948
∗∗∗ Spectre-Sicherheitslücken: Browser trotz Patches nicht sicher ∗∗∗
---------------------------------------------
Die Patches, die Chrome, Edge und Safari gegen Spectre V1 bekamen, verhindern Angriffe auf die Lücke nicht vollständig. Lediglich Firefox ist im Moment sicher.
---------------------------------------------
http://heise.de/-4094014
∗∗∗ UPnP als Tarnung: Verwundbare Router helfen DDoS-Angreifern ∗∗∗
---------------------------------------------
Der neueste Trick von DDoS-Angreifern ist das Tarnen von Traffic mithilfe unachtsamer Heim-Router und deren UPnP-Möglichkeiten.
---------------------------------------------
http://heise.de/-4094140
∗∗∗ Datendiebstahl mit angeblichen Deutsche Bahn-Gewinnspiel ∗∗∗
---------------------------------------------
Konsument/innen erhalten eine angebliche Benachrichtigung der Deutschen Bahn. Darin heißt es, dass sie ein Einjahresticket 1. Klasse für 2 Personen gewinnen können. Die Teilnahme am Gewinnspiel setzt die Bekanntgabe von persönlichen Daten voraus. Sie soll auf einer gefälschten Deutsche Bahn-Website erfolgen. Gewinnspiel-Teilnehmer/innen übermitteln ihre Angaben an Kriminelle. Das Gewinnspiel gibt es nicht.
---------------------------------------------
https://www.watchlist-internet.at/news/datendiebstahl-mit-angeblichen-deuts…
∗∗∗ Efail: HTML Mails have no Security Concept and are to blame ∗∗∗
---------------------------------------------
I recently wrote down my thoughts about why I think deprecated cryptographic standards are to blame for the Efail vulnerability in OpenPGP and S/MIME. However I promised that Ill also cover the other huge part that made a bug like Efail possible: HTML mails.
---------------------------------------------
https://blog.hboeck.de:443/archives/894-Efail-HTML-Mails-have-no-Security-C…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (exiv2, firefox-esr, graphicsmagick, php-horde-crypt, ruby-passenger, tomcat7, and xen), Fedora (dcraw, file, kernel-tools, and mupdf), openSUSE (firefox and tiff), Oracle (kernel, libvirt, pki-core, and qemu-kvm), Red Hat (patch), SUSE (jpeg, python-Django, tiff, and unixODBC), and Ubuntu (jasper).
---------------------------------------------
https://lwn.net/Articles/758550/
∗∗∗ Linux kernel vulnerability CVE-2012-6701 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K13213573
∗∗∗ Linux kernel vulnerability CVE-2017-7889 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K80440915
∗∗∗ TMM vulnerability CVE-2018-5528 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K27044729
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 26-06-2018 18:00 − Mittwoch 27-06-2018 18:00
Handler: Olaf Schwarz
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ NSA Exploit "DoublePulsar" Patched to Work on Windows IoT Systems ∗∗∗
---------------------------------------------
An infosec researcher who uses the online pseudonym of Capt. Meelo has modified an NSA hacking tool known as DoublePulsar to work on the Windows IoT operating system (formerly known as Windows Embedded).
---------------------------------------------
https://www.bleepingcomputer.com/news/security/nsa-exploit-doublepulsar-pat…
∗∗∗ Codeausführung: Wordpress schließt Sicherheitslücke nicht ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in Wordpress erlaubt angemeldeten Nutzern, die Installation zu übernehmen und Code auszuführen. Wordpress wusste von dem Problem seit November 2017, hat es aber bisher nicht gefixt. (Wordpress, PHP)
---------------------------------------------
https://www.golem.de/news/codeausfuehrung-wordpress-schliesst-sicherheitslu…
∗∗∗ Datenleck bei FastBooking: Hacker klauen Daten von über 124.000 Hotelgästen ∗∗∗
---------------------------------------------
Hacker haben Daten vom Server eines Booking-Providers kopiert. Die Firma schweigt zum Ausmaß – eine Hotelkette warnte derweil fast 125.000 betroffene Gäste.
---------------------------------------------
http://heise.de/-4093080
∗∗∗ Top Tools for Security Analysts in 2018 ∗∗∗
---------------------------------------------
Last spring, after discussing the tools and tech used by our team, we published a list of 51 Tools for Security Analysts. The article was well-received, and the comments offered some great suggestions to top it all off. In the spirit of that list we’d like to offer our updated 2018 edition, featuring the Defiant [...]
---------------------------------------------
https://www.wordfence.com/blog/2018/06/top-tools-for-security-analysts-in-2…
∗∗∗ Achtung vor Apple-ID Phishing-Versuch ∗∗∗
---------------------------------------------
InternetnutzerInnen erhalten vermehrt Nachrichten per E-Mail, in denen sie darüber informiert werden, dass angeblich ihre Apple-ID in China für einen Zugriff auf die iCloud verwendet wurde. Die EmpfängerInnen werden in weiterer Folge dazu aufgefordert einem Link zu folgen, sofern sie nicht selbst in China auf ihr Konto zugegriffen haben. Betroffene sollten der Aufforderung auf keinen Fall nachkommen, denn die Versender sind hinter ihren Daten her.
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-vor-apple-id-phishing-versuc…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (cantata and qutebrowser), Debian (imagemagick, php5, and redis), Fedora (cri-o and libgxps), Oracle (glibc, kernel, libvirt, samba, samba4, sssd and ding-libs, and zsh), Red Hat (ansible, dpdk, kernel, kernel-alt, kernel-rt, libvirt, pki-core, podman, qemu-kvm, and qemu-kvm-rhev), Scientific Linux (kernel, libvirt, pki-core, and qemu-kvm), SUSE (firefox, gcc43, and kernel), and Ubuntu (openssl).
---------------------------------------------
https://lwn.net/Articles/758442/
∗∗∗ TMM vulnerability CVE-2018-5528 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K27044729
∗∗∗ SSL Forward Proxy vulnerability CVE-2018-5527 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20134942
∗∗∗ HPESBHF03844 rev.1 - HPE Integrated Lights-Out 4, 5 (iLO 4, 5), Remote Unauthorized Modification of Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 25-06-2018 18:00 − Dienstag 26-06-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ WPA3: Neuer WLAN-Verschlüsselungsstandard verabschiedet ∗∗∗
---------------------------------------------
Die Wi-Fi Alliance hat mit WPA3 einen neuen Verschlüsselungsstandard für drahtlose Netze vorgestellt. Darin werden einige Macken von früheren Standards ausgebessert, wie etwa Offline-Passwort-Angriffe unterbunden und Forward Secrecy eingeführt.
---------------------------------------------
https://www.golem.de/news/wpa3-neuer-wlan-verschluesselungsstandard-verabsc…
∗∗∗ Sicherheit von Industrieanlagen: BSI veröffentlicht Snort-Regeln für SIS-Netzwerke ∗∗∗
---------------------------------------------
Zum besseren Schutz vor Cyber-Angriffen mit Schadsoftware wie "Triton/Trisis/HatMan" hat das Bundesamt für Sicherheit in der Informationstechnik (BSI) sogenannte Snort-Regeln für das TriStation-Kommunikationsprotokoll der Firma Schneider Electric veröffentlicht.
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/RAPSN_SETS_…
∗∗∗ Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor ∗∗∗
---------------------------------------------
This blog post was authored by Edmund Brumaghin, Earl Carter and Andrew Williams.Executive summaryCisco Talos has analyzed Thanatos, a ransomware variant that is being distributed via multiple malware campaigns that have been conducted over the past few months. As a result of our research, we have released a new, free decryption tool to help victims recover from this malware.
---------------------------------------------
http://feedproxy.google.com/~r/feedburner/Talos/~3/_YSxzYWrMgs/ThanatosDecr…
=====================
= Vulnerabilities =
=====================
∗∗∗ [20180602] - Core - XSS vulnerability in language switcher module ∗∗∗
---------------------------------------------
Severity: Low
Versions: 1.6.0 through 3.8.8
Exploit type: XSS
Number: CVE-2018-12711
In some cases the link of the current language might contain unescaped HTML special characters. This may lead to reflective XSS via injection of arbitrary parameters and/or values on the current page url. Affected Installs Joomla! CMS versions 1.6.0 through 3.8.8
Solution: Upgrade to version 3.8.9
---------------------------------------------
https://developer.joomla.org/security-centre/740-20180602-core-xss-vulnerab…
∗∗∗ [20180601] - Core - Local File Inclusion with PHP 5.3 ∗∗∗
---------------------------------------------
Severity: Low
Versions: 2.5.0 through 3.8.8
Exploit type: LFI
CVE Number: CVE-2018-12712
Our autoload code checks classnames to be valid, using the "class_exists" function in PHP. In PHP 5.3 this function validates invalid names as valid, which can result in a Local File Inclusion.
Affected Installs: Joomla! CMS versions 2.5.0 through 3.8.8
Solution: Upgrade to version 3.8.9
---------------------------------------------
https://developer.joomla.org/security-centre/741-20180601-core-local-file-i…
∗∗∗ Bugtraq: KL-001-2018-008 : HPE VAN SDN Unauthenticated Remote Root Vulnerability ∗∗∗
---------------------------------------------
A hardcoded service token can be used to bypass authentication. Built-in functionality can be exploited to deploy and execute a malicious deb file containing a backdoor. A weak sudoers configuration can then be abused to escalate privileges to root.
---------------------------------------------
http://www.securityfocus.com/archive/1/542101
∗∗∗ SSA-159860 (Last Update: 2018-06-26): Access Control Vulnerability in IEC 61850 system configurator, DIGSI 5, DIGSI 4, SICAM PAS/PQS, SICAM PQ Analyzer, and SICAM SCC ∗∗∗
---------------------------------------------
IEC 61850 system configurator, DIGSI 5, DIGSI 4, SICAM PAS/PQS, SICAM PQ Analyzer, and SICAM SCC products are affected by a security vulnerability which could allow an attacker to either exfiltrate limited data from the system or to execute code with operating system user permissions.Siemens has released updates for several affected products, and recommends that customers update to the new version.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-159860.txt
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Slackware (firefox), SUSE (gpg2 and zlib), and Ubuntu (openssl, openssl1.0).
---------------------------------------------
https://lwn.net/Articles/758310/
∗∗∗ Security Advisory - Side-Channel Vulnerability Variants 3a and 4 ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180615-…
∗∗∗ HPESBHF03843 rev.1 - HPE Moonshot Provisioning Manager, Remote Bypass of Security Restrictions, Local Arbitrary File Modification ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 22-06-2018 18:00 − Montag 25-06-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Changes in WebAssembly Could Render Meltdown and Spectre Browser Patches Useless ∗∗∗
---------------------------------------------
"Once Wasm gets support for threads with shared memory (which is already on the Wasm roadmap), very accurate [JavaScript] timers can be created," Bergbom says, "that may render browser mitigations of certain CPU side channel attacks non-working."
---------------------------------------------
https://www.bleepingcomputer.com/news/security/changes-in-webassembly-could…
∗∗∗ ST18-001: Securing Network Infrastructure Devices ∗∗∗
---------------------------------------------
Network infrastructure devices are ideal targets for malicious cyber actors. Most or all organizational and customer traffic must traverse these critical devices.An attacker with presence on an organization’s gateway router can monitor, modify, and deny traffic to and from the organization.An attacker with presence on an organization’s internal routing and switching infrastructure can monitor, modify, and deny traffic to and from key
---------------------------------------------
https://www.us-cert.gov/ncas/tips/ST18-001
∗∗∗ iOS: Verwirrung um Brute-Force-Hack der Gerätesperre ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher behauptet, einen Trick gefunden zu haben, mit dem sich iPhone und iPad knacken lassen. Apple widerspricht dem.
---------------------------------------------
http://heise.de/-4090901
∗∗∗ Offene Firebase-Datenbanken: Tausende Apps leaken Passwörter, Nutzerdaten etc. ∗∗∗
---------------------------------------------
Dritte könnten mit vergleichsweise wenig Aufwand private Daten von Millionen App-Nutzern einsehen, warnen Sicherheitsforscher.
---------------------------------------------
http://heise.de/-4090963
∗∗∗ Leck in Intel-Prozessoren: TLBleed-Lücke verrät geheime Schlüssel ∗∗∗
---------------------------------------------
Forscher nutzen Hyper-Threading und den Transaction Lookaside Buffer (TLB) von Intel-Prozessoren, um geschützte Informationen per Seitenkanal abzuschöpfen.
---------------------------------------------
http://heise.de/-4091114
∗∗∗ Aufgepasst: Phishing-Mails schüren WannaCry-Panik ∗∗∗
---------------------------------------------
Aktuell gehen E-Mails um, die behaupten, der Rechner des Empfängers sei mit einem Verschlüsselungstrojaner infiziert.
---------------------------------------------
http://heise.de/-4091746
∗∗∗ Gefälschte Pichler Werkzeug GmbH-Rechnung verbreitet Schadsoftware ∗∗∗
---------------------------------------------
Unternehmen erhalten per E-Mail eine gefälschte Bestellbestätigung der Pichler Werkzeug GmbH aus Innsbruck. Darin heißt es, dass sie ein unterzeichnetes Formular zurück an die Absenderin retournieren sollen. Das Formular befindet sich angeblich in einer GZ-Datei. In Wahrheit verbirgt sie Schadsoftware. Empfänger/innen dürfen den Dateianhang nicht öffnen.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-pichler-werkzeug-gmbh-re…
=====================
= Vulnerabilities =
=====================
∗∗∗ [20180507] - Core - Session deletion race condition ∗∗∗
---------------------------------------------
CVE Number: CVE-2018-11324
A long running background process, such as remote checks for core or extension updates, could create a race condition where a session which was expected to be destroyed would be recreated.
Affected Installs: Joomla! CMS versions 3.0.0 through 3.8.7
Solution: Upgrade to version 3.8.8
---------------------------------------------
https://developer.joomla.org/security-centre/735-20180507-core-session-dele…
∗∗∗ Bluetooth-Lücke: Patch für "smartes" Vorhängeschloss Tapplock ∗∗∗
---------------------------------------------
Sicherheitsforscher knacken das Schloss Tapplock über Bluetooth in wenigen Sekunden. Auch rohe Gewalt kann das Schloss unter Umständen öffnen.
---------------------------------------------
http://heise.de/-4091406
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (git), Debian (bouncycastle and lava-server), Fedora (ansible, epiphany, kernel, kernel-tools, matrix-synapse, mingw-podofo, pass, podofo, python-prometheus_client, redis, rubygem-sinatra, and thunderbird-enigmail), Gentoo (file and pnp4nagios), Mageia (file, glibc, kernel, librsvg, and libvorbis), openSUSE (go1.9, mariadb, phpMyAdmin, and redis), and SUSE (firefox, kernel modules packages, and python).
---------------------------------------------
https://lwn.net/Articles/758211/
∗∗∗ Synology-SA-18:33 DSM ∗∗∗
---------------------------------------------
Multiple vulnerabilities allow remote authenticated users to execute arbitrary OS commands or obtain sensitive information via a susceptible version of Synology Diskstation Manager (DSM).
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_33
∗∗∗ FortiOS SSL VPN webportal user credentials present in plain text in client side javascript file ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/%20FG-IR-18-027
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 21-06-2018 18:00 − Freitag 22-06-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New GZipDe Malware Drops Metasploit Backdoor ∗∗∗
---------------------------------------------
Security researchers from AlienVault have discovered a new malware strain named GZipDe that appears to be part of a targeted attack —most likely a cyber-espionage campaign.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-gzipde-malware-drops-met…
∗∗∗ FIRST Releases Training to Help Companies Respond to Product Vulnerabilities ∗∗∗
---------------------------------------------
The Forum of Incident Security Response Teams, Inc. (FIRST) is pleased to release the final Product Security Incident Response Teams (PSIRT) Services Framework (PDF) and accompanying training video course. This framework and training video course were developed by a global team of PSIRT practitioners from FIRST members and relevant subject matter experts.
---------------------------------------------
https://www.first.org/newsroom/releases/20180621
∗∗∗ Detecting Kernel Memory Disclosure – Whitepaper ∗∗∗
---------------------------------------------
Since early 2017, we have been working on Bochspwn Reloaded – a piece of dynamic binary instrumentation built on top of the Bochs IA-32 software emulator, designed to identify memory disclosure vulnerabilities in operating system kernels. Over the course of the project, we successfully used it to discover and report over 70 previously unknown security issues in Windows, and more than 10 bugs in Linux.
---------------------------------------------
https://googleprojectzero.blogspot.com/2018/06/detecting-kernel-memory-disc…
∗∗∗ Financial Services Sector Rife with Hidden Tunnels ∗∗∗
---------------------------------------------
Attackers use the approach to look like legitimate traffic and hide data exfiltration in plain sight.
---------------------------------------------
https://threatpost.com/financial-services-sector-rife-with-hidden-tunnels/1…
∗∗∗ Wie Sie eine Baby-Cam erfolgreich hacken (Gwelltimes P2P Cloud) ∗∗∗
---------------------------------------------
Vor einiger Zeit wurde in den USA ein Fall bekannt, bei dem ein W-LAN-fähiges Babyphone gehackt worden sei. Jemand hätte die Mutter und ihr Baby überwacht. SEC Consult hat sich den Fall nun aus der technischen Perspektive angesehen.
---------------------------------------------
https://www.sec-consult.com/blog/2018/06/wie-sie-eine-babycam-erfolgreich-h…
∗∗∗ Documenting and Attacking a Windows Defender Application Control Feature the Hard Way - A Case Study in Security Research Methodology ∗∗∗
---------------------------------------------
As is typically the case for me, whenever a new Windows build is released, I diff the Windows Defender Application Control (WDAC, formerly Device Guard) code integrity policy schema (located in %windir%\schemas\CodeIntegrity\cipolicy.xsd) to see if there are any new, interesting features. I resort to doing this because new WDAC features are seldom documented [...]
---------------------------------------------
https://posts.specterops.io/documenting-and-attacking-a-windows-defender-ap…
∗∗∗ Why You Should Care about Website Security on Your Small Site ∗∗∗
---------------------------------------------
Most people assume that if their website has been compromised, there must have been an attacker evaluating their site and looking for a specific vulnerability to hack. Under most circumstances however, bad actors don’t manually hand-pick websites to attack since it’s a tedious and time consuming process. Instead, they rely on automation to identify vulnerable websites and execute their attacks.
---------------------------------------------
https://blog.sucuri.net/2018/06/why-you-should-care-about-website-security-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Delta Electronics Delta Industrial Automation COMMGR ∗∗∗
---------------------------------------------
This advisory includes mitigations for a stack-based buffer overflow vulnerability in the Delta Electronics Delta Industrial Automation COMMGR software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-172-01
∗∗∗ Rockwell Automation Allen-Bradley CompactLogix and Compact GuardLogix ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for an improper input validation vulnerability reported in Rockwell Automation Allen-Bradley CompactLogix and Compact GuardLogix controllers.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-172-02
∗∗∗ PMASA-2018-4 ∗∗∗
---------------------------------------------
File inclusion and remote code execution attackAffected VersionsphpMyAdmin 4.8.0 and 4.8.1 are affected.CVE ID(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12613, uCVE-2018-12613)
---------------------------------------------
https://www.phpmyadmin.net/security/PMASA-2018-4/
∗∗∗ PMASA-2018-3 ∗∗∗
---------------------------------------------
XSS in Designer featureAffected VersionsphpMyAdmin versions prior to 4.8.2.CVE ID(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12581, uCVE-2018-12581)
---------------------------------------------
https://www.phpmyadmin.net/security/PMASA-2018-3/
∗∗∗ Security Advisory - FRP Bypass Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
There is Factory Reset Protection (FRP) bypass vulnerability in some Huawei smart phones. An attacker gets some users smart phone and performs some special operations in the guide function. The attacker may exploit the vulnerability to bypass FRP function and use the phone normally. (Vulnerability ID: HWPSIRT-2018-04051)
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180622-01-by…
∗∗∗ Security Advisory - Bluetooth Unlock Bypassing Vulnerability in Some Huawei Mobile Phones ∗∗∗
---------------------------------------------
Some Huawei mobile phones have a Bluetooth unlock bypassing vulnerability due to the lack of validation on Bluetooth devices. If a user has enabled the smart unlock function, an attacker can impersonate the users Bluetooth device to unlock the users mobile phone screen. (Vulnerability ID: HWPSIRT-2017-01088)
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170323-01-sm…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (php-horde-image), openSUSE (kernel), Scientific Linux (git), SUSE (bluez, kernel, mariadb, and mariadb, mariadb-connector-c, xtrabackup), and Ubuntu (openjdk-7).
---------------------------------------------
https://lwn.net/Articles/758024/
∗∗∗ Lazy FP state restore vulnerability CVE-2018-3665 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K21344224
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 20-06-2018 18:00 − Donnerstag 21-06-2018 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Downloading 3rd Party OpenVPN Configs May Be Dangerous. Here’s Why. ∗∗∗
---------------------------------------------
If an actor wanted to cause the OpenVPN configuration file to execute a command they would add the "script-security 2" line, which allows user defined scripts to be executed, and a "up" entry, which contains the command that is executed after after a connection has been made.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/downloading-3rd-party-openvp…
∗∗∗ Beginner’s Guide to Pentesting IoT Architecture/Network and Setting Up IoT Pentesting Lab – Part 1 ∗∗∗
---------------------------------------------
In this post, I will explain how to pentest an IoT Network/Architecture. Also, I will explain how to set up an IoT Pentesting lab for getting started with IoT Pentesting. Since the post is too long, to make it digestible, it will be split into two parts.
---------------------------------------------
https://resources.infosecinstitute.com/beginners-guide-to-pentesting-iot-ar…
∗∗∗ Google Developer Discovers a Critical Bug in Modern Web Browsers ∗∗∗
---------------------------------------------
Chrome and Safari already have a policy in place to reject such cross-origin requests as soon as they see any redirection after the underlying content appears to have changed between requests, their users are already protected.
...
FireFox and Edge browsers that were found vulnerable to this issue have also patched the vulnerability in their latest versions after Archibald responsibly reported it to their security teams.
Therefore, FireFox and Edge browser users are highly recommended to make sure that they are running the latest version of these browsers.
---------------------------------------------
https://thehackernews.com/2018/06/browser-cross-origin-vulnerability.html
∗∗∗ Drupal Vulnerability (CVE-2018-7602) Exploited to Deliver Monero-Mining Malware ∗∗∗
---------------------------------------------
We were able to observe a series of network attacks exploiting CVE-2018-7602, a security flaw in the Drupal content management framework. For now, these attacks aim to turn affected systems into Monero-mining bots. Of note are its ways of hiding behind the Tor network to elude detection and how it checks the affected system first before infecting it with a cryptocurrency-mining malware.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/0C5nXsg4wxQ/
∗∗∗ Warnung vor gefälschter Finanzonline.at-Nachricht ∗∗∗
---------------------------------------------
Internet-Nutzer/innen erhalten eine gefälschte E-Mail des Finanzministeriums. Sie hat das Betreff „Ihre Steuerrückzahlung“. Darin heißt es, dass eine kürzlich erfolgte Steuerrückzahlung an Empfänger/innen fehlgeschlagen sei. Aus diesem Grund sollen sie auf einer unbekannten Website persönliche Bankdarten bekannt geben. Nutzer/innen übermitteln diese an Kriminelle und werden Opfer eines Datendiebstahls.
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-gefaelschter-finanzonlin…
=====================
= Vulnerabilities =
=====================
∗∗∗ NVIDIA TX1 Boot ROM Vulnerability ∗∗∗
---------------------------------------------
On April 24, 2018, researchers disclosed a vulnerability that takes advantage of a buffer overflow vulnerability in NVIDIA TX1 BootROM when Recovery Mode (RCM) is active. This vulnerability could allow an unprivileged, local attacker to bypass secure boot and execute unverified code on an affected system. The vulnerability has been identified by CVE-2018-6242.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Nextcloud Server: Mehrere Schwachstellen ermöglichen u.a. das Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
er Hersteller stellt die Nextcloud Server Versionen 12.0.8 und 13.0.3 zur Behebung der Schwachstellen CVE-2018-3761 und CVE-2018-3762 zur Verfügung. Zur Behebung der Schwachstellen CVE-2018-3763 und CVE-2018-3764 stehen Sicherheitsupdates für die Apps 'Contacts' auf Version 2.1.2 und 'Calendar' auf Version 1.6.1 bzw. 1.5.8 zur Verfügung.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1204/
∗∗∗ Security Advisory für Microsoft Exchange Server ∗∗∗
---------------------------------------------
Microsoft hat anlässlich des Quartals-Updates für Microsoft Exchange Server ein Security Advisory sowie Sicherheitsupdates für Elemente der "Outside In" Libraries von Oracle veröffentlicht, die in Microsoft Exchange Server enthalten sind. Durch diese Patches werden drei Schwachstellen geschlossen.
---------------------------------------------
https://www.cert.at/warnings/all/20180620.html
∗∗∗ Sicherheitslücken (teils kritisch) in Cisco FXOS und NX-OS Software - Patches verfügbar ∗∗∗
---------------------------------------------
Cisco hat mehrere Security Advisories zu teils kritischen Sicherheitslücken in Cisco FXOS und Cisco NX-OS Software veröffentlicht. Fünf der Schwachstellen werden mit einem CVSS Base Score von 9.8 als kritisch eingestuft: [...]
---------------------------------------------
https://www.cert.at/warnings/all/20180621.html
∗∗∗ Symantec Endpoint Protection Multiple Issues ∗∗∗
---------------------------------------------
Symantec has released a set of updates to address issues that were discovered in the Symantec Endpoint Protection product.
---------------------------------------------
https://support.symantec.com/en_US/article.SYMSA1454.html
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by openSUSE (cobbler and matrix-synapse), Oracle (git), Red Hat (git), SUSE (java-1_7_1-ibm, nagios-nrpe, and ntp), and Ubuntu (AMD microcode).
---------------------------------------------
https://lwn.net/Articles/757971/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily