=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 09-10-2014 18:00 − Freitag 10-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cisco addresses numerous vulnerabilities in ASA software ***
---------------------------------------------
Many of the vulnerabilities can lead to a denial-of-service condition, but others could result in a full compromise of the affected system.
---------------------------------------------
http://www.scmagazine.com/vulnerabilities-in-cisco-asa-software/article/376…
*** CSAM: My servers started speaking IRC, and that is when I started to listen!, (Thu, Oct 9th) ***
---------------------------------------------
Hassan submitted this story: While reviewing our IDS logs, we noticed an alert for IRC botnet traffic coming from multiple servers in a specific VLAN. Ouch! One thing I keep saying in our IDS Class: If your servers all for sudden start joining IRC channels, then they are either very bored, or very compromised. But lets see how it went for Hassan. Hassan had what every analyst wants: pcaps! So he looked at the full packet capture of the traffic: The traffic wasnt 100% IRC. But it looked...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18799&rss
*** Critical Patch Update - October 2014 Pre-Release Announcement ***
---------------------------------------------
Critical Patch Update - October 2014 Pre-Release Announcement
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
*** MS14-OCT - Microsoft Security Bulletin Advance Notification for October 2014 - Version: 1.0 ***
---------------------------------------------
This is an advance notification of security bulletins that Microsoft is intending to release on October 14, 2014. This bulletin advance notification will be replaced with the October bulletin summary on October 14, 2014.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-OCT
*** Signed Malware = Expensive "Oops" for HP ***
---------------------------------------------
Computer and software industry maker HP is in the process of notifying customers about a seemingly harmless security incident in 2010 that nevertheless could prove expensive for the company to fix and present unique support problems for users of its older products.
---------------------------------------------
http://krebsonsecurity.com/2014/10/signed-malware-is-expensive-oops-for-hp/
*** Malware analysts tell crooks to shape up and write decent code ***
---------------------------------------------
Who writes their own crypto these days? Seriously! Blackhats beware: reverse engineers are laughing at your buggy advanced persistent threat (APT) malware.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/10/10/writing_bet…
*** Zwei-Faktor-Authentifizierung: Apple erhöht die Sicherheit für iCloud ***
---------------------------------------------
Apple weitet die Zwei-Faktor-Authentifizierung aus. Ab sofort sind anwendungsspezifische Passwörter für den Zugriff auf iCloud-Daten Pflicht.
---------------------------------------------
http://www.golem.de/news/zwei-faktor-authentifizierung-apple-erhoeht-die-si…
*** Crims zapped mobes, slabs we collared for evidence, wail cops ***
---------------------------------------------
Dont worry, sarge, we got all the ... oh, WTF! You know that nifty remote wipe function that takes all the photos off your phone when it gets lost? Turns out criminals know about it too, and theyre using it to wipe phones taken by police as evidence.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/10/10/police_say_…
*** WordPress Websites Continue to Get Hacked via MailPoet Plugin Vulnerability ***
---------------------------------------------
The popular Mailpoet(wysija-newsletters) WordPress plugin had a serious file upload vulnerability a few months back, allowing an attacker to upload files to the vulnerable site. This issue was disclosed months ago, the MailPoet team patched it promptly. It seems though that many are still not getting the word, or blatantly not updating, because we areRead More
---------------------------------------------
http://blog.sucuri.net/2014/10/wordpress-websites-continue-to-get-hacked-vi…
*** May-August 2014 ***
---------------------------------------------
The NCCIC/ICS-CERT Monitor for May-August 2014 is a summary of ICS-CERT activities for that period of time.
---------------------------------------------
https://ics-cert.us-cert.gov//monitors/ICS-MM201408
*** TWiki Sandbox.pm File Validation Flaw Lets Remote Authenticated Users Upload Arbitrary Windows Apache Configuration Files ***
---------------------------------------------
http://www.securitytracker.com/id/1030982
*** TWiki debugenableplugins Parameter Lets Remote Users View and Modify Files ***
---------------------------------------------
http://www.securitytracker.com/id/1030981
*** VMSA-2014-0006.11 ***
---------------------------------------------
VMware product updates address OpenSSL security vulnerabilities
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
*** PayPal Inc BB #85 MB iOS 4.6 - Auth Bypass Vulnerability ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered a security auth protection mechanism bypass vulnerability in the PayPal Inc iOS Mobile Application.
---------------------------------------------
http://www.vulnerability-lab.com/get_content.php?id=895
*** Cisco Security Notices for Autonomic Networking Infrastructure ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** HPSBHF03136 rev.1 - HP TippingPoint NGFW running OpenSSL, Remote Disclosure of Information ***
---------------------------------------------
A potential security vulnerability has been identified with HP TippingPoint NGFW running OpenSSL. This is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HPSBMU02895 SSRT101253 rev.4 - HP Data Protector, Remote Increase of Privilege, Denial of Service (DoS), Execution of Arbitrary Code ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP Data Protector. These vulnerabilities could be remotely exploited to allow an increase of privilege, create a Denial of Service (DoS), or execute arbitrary code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HPSBNS03130 rev.1 - HP NonStop Development Environment for Eclipse (NSDEE) running Bash Shell, Remote Code Execution ***
---------------------------------------------
A potential security vulnerability has been identified with HP NonStop Development Environment for Eclipse (NSDEE) running Bash Shell . This is the Bash Shell vulnerability known as "ShellShock" which could be exploited remotely to allow execution of code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HPSBST03122 rev.1 - HP StoreAll Operating System Software running Bash Shell, Remote Code Execution ***
---------------------------------------------
A potential security vulnerability has been identified with HP StoreAll Operating System Software running Bash Shell. This is the Bash Shell vulnerability known as "Shellshock" which could be exploited remotely to allow execution of code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** IBM Security Bulletin: Seven (7) Vulnerabilities in OpenSSL affect IBM FlashSystem 840 and V840 (CVEs) ***
---------------------------------------------
OpenSSL vulnerabilities affect the IBM FlashSystem 840 and V840 products. These vulnerabilities could allow a remote attacker to execute arbitrary code on the system, to obtain sensitive information, or cause of denial of service. CVE(s): CVE-2014-3509, CVE-2014-3506, CVE-2014-3507, CVE-2014-3511, CVE-2014-3505, CVE-2014-3510 and CVE-2014-3508 Affected product(s) and affected version(s): IBM FlashSystem 840: Machine Type 9840, model -AE1 (all supported releases before 1.1.2.7) Machine Type...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Six (6) Vulnerabilities in Network Security Services (NSS) & Netscape Portable Runtime (NSPR) affect IBM FlashSystem 840 and V840 (CVE-2013-1740, CVE-2014-1490, CVE-2014-1491, CVE-2014-1492, CVE-2014-1544, CVE-2014-1545) ***
---------------------------------------------
NSS & NSPR vulnerabilities affect the IBM FlashSystem 840 and V840 products. These vulnerabilities could allow a remote attacker to execute arbitrary code, on the system, to obtain sensitive information, or cause Denial of Service. CVE(s): CVE-2013-1740, CVE-2014-1490, CVE-2014-1491, CVE-2014-1492, CVE-2014-1544 and CVE-2014-1545 Affected product(s) and affected version(s): IBM FlashSystem 840: Machine Type 9840, model -AE1 (all supported releases before 1.1.2.7) Machine Type 9843,...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: IBM WebSphere MQ Telemetry Component - Potential authentication bypass vulnerability when using the JAASConfig property (CVE-2014-6116) ***
---------------------------------------------
IBM WebSphere MQ contains a vulnerability in which authentication is bypassed by MQTT clients with the "JAASConfig" configuration property set. CVE(s): CVE-2014-6116 Affected product(s) and affected version(s): IBM WebSphere MQ Telemetry Component WebSphere MQ 8.0.0.1 downloaded prior to 24th September 2014 (Level: p000-001-L140910). To check your fix pack level, issue the command dspmqver and check the output of the Level option.
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Proventia Network Security Controller is affected by multiple OpenSSL vulnerabilities ***
---------------------------------------------
Security vulnerabilities have been discovered in OpenSSL that were reported by the OpenSSL Project (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470, CVE-2014-0160, CVE-2014-0076, CVE-2014-3508, CVE-2014-5139, CVE-2014-3509, CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512) CVE(s): CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470, CVE-2014-0160, CVE-2014-0076, CVE-2014-3508,...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Remote Code Execution Vulnerability Security Bulletin: TRIRIGA Application Platform (CVE-2014-4840) ***
---------------------------------------------
IBM TRIRIGA Application Platform could allow an attacker to execute code on the vulnerable server. An attacker could send a specially crafted URL to the server that would execute commands as the privileges of the unprivileged user running the server. CVE(s): CVE-2014-4840 Affected product(s) and affected version(s): The following Application Platform versions are affected. IBM TRIRIGA Application Platform 3.4.0 IBM TRIRIGA Application Platform 3.3.2 and 3.3.2.1 fix pack...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletins for Products affected by Vulnerabilities in Bash ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 08-10-2014 18:00 − Donnerstag 09-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Pricing Policies in the Cyber Criminal Underground ***
---------------------------------------------
Underground markets are places on the Internet where criminal gangs offer a wide range of illegal products and services. Black markets are crowded places where single individuals or criminal organizations could acquire or rent products and services at very competitive prices. Like any other market, in black markets the relationship between supply and demand determines the price of the products. A growing number of highly specialized sellers are offering their wares, and the huge offer is...
---------------------------------------------
http://resources.infosecinstitute.com/pricing-policies-cyber-criminal-under…
*** Working Paper: Data Breaches in Europe: Reported Breaches of Compromised Personal Records in Europe, 2005-2014 ***
---------------------------------------------
Some 229 data breach incidents involved the personal records of people in Europe. Globally, all these incidents resulted in the loss of some 645 million records, though not all of these breaches exclusively involved people in Europe. Within Europe, we confirmed 200 cases involving people in Europe, and 227 million records lost in Europe...
---------------------------------------------
http://www.databreaches.net/working-paper-data-breaches-in-europe-reported-…
*** Bash Bug Saga Continues: Shellshock Exploit Via DHCP ***
---------------------------------------------
The Bash vulnerability known as Shellshock can be exploited via several attack surfaces including web applications, DHCP, SIP, and SMTP. With multiple proofs of concept (including Metasploit code) available in the public domain, this vulnerability is being heavily exploited. Most discussion of Shellshock attacks have focused on attacks on web apps. There has been relatively...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/1tDC5sTfbUQ/
*** Android: Rund die Hälfte aller Geräte von Sicherheitslücke betroffen ***
---------------------------------------------
45 Prozent aller Android-Smartphones sind noch immer von einer vor wenigen Wochen entdeckten Sicherheitslücke im Smartphone-Browser betroffen. In Deutschland liegt die Zahl sogar deutlich höher.
---------------------------------------------
http://www.golem.de/news/android-rund-die-haelfte-aller-geraete-von-sicherh…
*** Flying Blind ***
---------------------------------------------
With all the news about data breaches lately, it's not particularly surprising to wake up to headlines describing yet another one. What is perhaps a bit surprising, however, is the common theme that seems to exist in many of the...
---------------------------------------------
http://www.fireeye.com/blog/corporate/2014/10/flying-blind.html
*** Multiple Vulnerabilities in Cisco ASA Software ***
---------------------------------------------
cisco-sa-20141008-asa
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Juniper Junos Security Bulletins ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10655&actp=RSShttp://kb.juniper.net/index?page=content&id=JSA10654&actp=RSShttp://kb.juniper.net/index?page=content&id=JSA10653&actp=RSShttp://kb.juniper.net/index?page=content&id=JSA10652&actp=RSShttp://kb.juniper.net/index?page=content&id=JSA10651&actp=RSShttp://kb.juniper.net/index?page=content&id=JSA10650&actp=RSShttp://kb.juniper.net/index?page=content&id=JSA10649&actp=RSS
*** Schneider Electric SCADA Expert ClearSCADA Vulnerabilities (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-14-259-01 Schneider Electric SCADA Expert ClearSCADA Vulnerabilities that was published September 16, 2014, on the NCCIC/ICS-CERT web site. This updated advisory provides mitigation details for vulnerabilities in Schneider Electric's StruxureWare SCADA Expert ClearSCADA.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-259-01A
*** Siemens SIMATIC WinCC Vulnerabilities (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-14-205-02 Siemens SIMATIC WinCC Vulnerabilities that was published July 24, 2014, on the NCCIC/ICS-CERT web site. This updated advisory provides mitigation details for vulnerabilities in the Siemens SIMATIC WinCC application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-205-02A
*** Security_Advisory-9 OpenSSL Vulnerabilities on Huawei products ***
---------------------------------------------
Oct 08, 2014 20:28
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** VMSA-2014-0010.10 ***
---------------------------------------------
VMware product updates address critical Bash security vulnerabilities
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
*** SA-CONTRIB-2014-097 - nodeaccess - Access Bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-097Project: Nodeaccess (third-party module)Version: 6.x, 7.xDate: 2014-October-08Security risk: 13/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:UncommonVulnerability: Access bypassDescriptionNodeaccess is a Drupal access control module which provides view, edit and delete access to nodes.This module enables you to inadvertently allow an author of a node view/edit/delete the node in question (who may not have access). The module
---------------------------------------------
https://www.drupal.org/node/2352757
*** SA-CONTRIB-2014-096 - OAuth2 Client - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-096Project: OAuth2 Client (third-party module)Version: 7.xDate: 2014-October-08Security risk: 10/25 ( Moderately Critical) AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescriptionOAuth2 Client is an API support module, enabling other modules to connect to services using OAuth2 authentication.Within its API code the Client class exposes variables in an error message, which originate from a third party source without
---------------------------------------------
https://www.drupal.org/node/2352747
*** DSA-3048 apt ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3048
*** OpenSSH <=6.6 SFTP misconfiguration exploit for 64bit Linux ***
---------------------------------------------
OpenSSH lets you grant SFTP access to users without allowing full command execution using "ForceCommand internal-sftp". However, if you misconfigure the server and dont use ChrootDirectory, the user will be able to access all parts of the filesystem that he has access to - including procfs. On modern Linux kernels (>=2.6.39, I think), /proc/self/maps reveals the memory layout and /proc/self/mem lets you write to arbitrary memory positions. Combine those and you get easy RCE.
---------------------------------------------
http://seclists.org/fulldisclosure/2014/Oct/35
*** Onapsis Security Advisories for SAP Products ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100052http://cxsecurity.com/issue/WLB-2014100051http://cxsecurity.com/issue/WLB-2014100050http://cxsecurity.com/issue/WLB-2014100049http://cxsecurity.com/issue/WLB-2014100048http://cxsecurity.com/issue/WLB-2014100047http://cxsecurity.com/issue/WLB-2014100046
*** Security Advisory-Memory Overflow Vulnerabilities on Huawei E5332 Webserver ***
---------------------------------------------
Oct 09, 2014 11:51
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** HPSBMU03127 rev.1 - HP Operations Manager for UNIX, Remote Code Execution ***
---------------------------------------------
A potential security vulnerability has been identified with HP Operations Manager for UNIX. The vulnerability can be exploited remotely to execute arbitrary code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HPSBMU03110 rev.1 - HP Sprinter, Remote Execution of Code ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP Sprinter. The vulnerabilities could be exploited remotely to allow execution of code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Spider Facebook 1.0.8 - SQL Injection ***
---------------------------------------------
2014-10-08T19:00:47
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7639
*** Contact Form DB 2.8.13 - 2 x Cross-Site Scripting (XSS) ***
---------------------------------------------
2014-10-09T11:38:57
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7641
*** EWWW Image Optimizer 2.0.1 Cross-Site Scripting (XSS) ***
---------------------------------------------
2014-10-09T11:35:36
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7640
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 07-10-2014 18:00 − Mittwoch 08-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** ISACA announces entry-level cybersecurity certificate ***
---------------------------------------------
A new cybersecurity certificate has been launched by global IT association ISACA thats intended for those looking to break into the field.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/C8kTkbciKh0/
*** Belkin Router Apocalypse: heartbeat.belkin.com outage taking routers down ***
---------------------------------------------
According ot various reports, many users of Belkin routers had problems connecting to the internet as of last night. It appears that the router will occasionally ping">heartbeat.belkin.com to detect network connectivity. The heartbeat host is however not reachable for some hosts. Currently, the host responds to ICMP">As a workaround, you can add an entry to the routers host file pointing heartbeat.belkin.com to 127.0.0.1. This appears to remove the block. Also, the block only...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18779&rss
*** Caution: Gaming fraud! ***
---------------------------------------------
October 6, 2014 At the end of September, Doctor Web issued a report about the new Trojan program Trojan.SteamBurglar.1, which steals game items from Steam users, particularly Dota 2 fans. So far Doctor Webs security researchers have learnt about several dozen modifications of this malware. However, cybercriminals seeking to take advantage of massively multiplayer online role-playing game (MMORPG) players have other tools at their disposal to make illicit profit. In this post we will talk about...
---------------------------------------------
http://news.drweb.com/show/?i=5987&lng=en&c=9
*** Arbor: DDoS Attacks Getting Bigger as Reflection Increases ***
---------------------------------------------
New reflected distributed denial of service attack techniques are increasing the volume of each attack as well as the overall frequency of large-scale DDoS attacks.
---------------------------------------------
http://threatpost.com/arbor-ddos-attacks-getting-bigger-as-reflection-incre…
*** The facts about BadUSB ***
---------------------------------------------
Introduction Since the BadUSB talk[1] by Karsten Nohl and Jakob Lell at Black Hat USA in August there has been much discussion about the implications of this class of USB attack. The discussions gained additional momentum when Adam Caudill and Brandon Wilson investigated the attack further and publicly released working code[2] at the DerbyCon security conference. This blog post is intended to dispel some of the misunderstandings that have arisen around BadUSB and provide some practical advice...
---------------------------------------------
https://www.nccgroup.com/en/blog/2014/10/the-facts-about-badusb/
*** Paper: The Hulk ***
---------------------------------------------
Raul Alvarez studies cavity file infector.Most file infectors increase the length of the infected file, as the malicious code is added as a new section of the host file, or to the last section of that file. Cavity file infectors are different though: they infect files without increasing their size.Today, we publish a paper by Raul Alvarez, a researcher for Fortinet, in which he studies Win32/Huhk, a virus that implements cavity file infection.In the paper, Raul explains what happens when an...
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_08a.xml?rss
*** "Tickende Zeitbombe": Windows XP noch immer verbreitet ***
---------------------------------------------
Fast sieben Prozent aller deutschen Rechner mit Internetanschluss laufen noch unter Windows XP, ein halbes Jahr nach dem offiziellen Support-Ende. Dabei sind die Geräte nicht nur selbst gefährdet, sondern auch eine Gefahr für andere.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Tickende-Zeitbombe-Windows-XP-noch-i…
*** remote syslog PRI vulnerability CVE-2014-3683 ***
---------------------------------------------
While preparing a fix for CVE-2014-3634 for sysklogd, mancha discovered and privately reported that the initial rsyslog fix set was incomplete. It did not cover cases where PRI values > MAX_INT caused integer overflows resulting in negative values.
---------------------------------------------
http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/
*** [R1] Tenable Nessus Web UI Scanned Content Stored XSS ***
---------------------------------------------
The Nessus scanners web-based user interface (Web UI) was vulnerable to a stored cross-site scripting (XSS) attack. The issue was due to a security control being briefly removed due to a regression error. During this 48 hour window, one new build of the Web UI was released leading to the ability to inject arbitrary script code. This could be done by setting up a malicious web server that returned a crafted host header containing JavaScript. When Nessus scanned the web server, the input would be...
---------------------------------------------
http://www.tenable.com/security/tns-2014-08
*** Alert for CVE-2014-7169 Bash "Shellshock" ***
---------------------------------------------
Alert for CVE-2014-7169 Bash "Shellshock"
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-23032…
*** Cisco Intrusion Prevention System MainApp Denial of Service Vulnerability ***
---------------------------------------------
CVE-2014-3402
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** VMSA-2014-0010.9 ***
---------------------------------------------
VMware product updates address critical Bash security vulnerabilities
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
*** Cuckoo Sandbox 1.1.1 ***
---------------------------------------------
This is an immediate release of Cuckoo Sandbox 1.1.1, an hotfix for a security vulnerability discovered by Robert Michel from G-Data. The vulnerability is an arbitrary file upload from the guest virtual machines to the host system, which could potentially translate in command or code execution. It affects all versions of Cuckoo Sandbox from 0.6.
---------------------------------------------
http://cuckoosandbox.org/2014-10-07-cuckoo-sandbox-111.html
*** IBM Security Bulletins ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Wordfence <= 5.2.4 Multiple Vulnerabilities (XSS & Bypasses) ***
---------------------------------------------
2014-10-07T16:27:12
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7636
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 06-10-2014 18:00 − Dienstag 07-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Confusion over SSL and 1024 bit keys, (Tue, Oct 7th) ***
---------------------------------------------
Yesterday and today, a post on reddit.org caused quite a bit of uncertainty about the security of 1024 bit RSA keys if used with OpenSSL. The past referred to a presentation given at a cryptography conference, stating that 1024 Bit SSL keys can be factored with moderate resources ("20 minutes on a Laptop"). It was suggested that this is at least in part due to a bug in OpenSSL, which according to the post doesnt pick the random keys from the entire space available. It looks more and...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18775&rss
*** Yahoo says attackers looking for Shellshock found a different bug ***
---------------------------------------------
Yahoo said Monday it has fixed a bug that was mistaken for the Shellshock flaw, but no user data was affected.Three of the companys servers with APIs (application programming interfaces) that provide live streaming for its Sports service "had malicious code executed on them this weekend by attackers looking for vulnerable Shellshock servers," wrote Alex Stamos, Yahoos chief information security officer.Stamos wrote on the Hacker News website that the servers had been patched after the...
---------------------------------------------
http://www.csoonline.com/article/2692375/security/yahoo-says-attackers-look…
*** Tyupkin Malware Infects ATMs Worldwide ***
---------------------------------------------
The Tyupkin malware, spotted on ATMs in Eastern Europe, allows criminals to make withdrawals of 40 banknotes at a time, researchers at Kaspersky Lab said.
---------------------------------------------
http://threatpost.com/tyupkin-malware-infects-atms-in-eastern-europe/108734
*** Phishing with help from Compromised WordPress Sites ***
---------------------------------------------
We get thousands of spam and phishing emails daily. We use good spam filters (along with Gmail) and that greatly reduces the noise in our inbox. Today though, one slipped through the crack and showed up in my personal inbox: As I went to mark the email as Spam, I decided to hover over the...
---------------------------------------------
http://blog.sucuri.net/2014/10/phishing-with-help-from-compromised-wordpres…
*** Huge Security Hole in ZPanel 10.1 ***
---------------------------------------------
When it comes to managing a VPS, many of our customers would prefer to install some kind of control panel rather than do it all themselves from the command line. ZPanel is perhaps the most popular choice for this. We even offered ZPanel 10.1 as a pre-made image -- it was a very recent version (10.1.1 is the most recent at the time of writing), and there are no published security announcements relating to it. We thought it was safe.
---------------------------------------------
https://chunkhost.com/blog/16/huge_security_hole_in_zpanel_10_1
*** MMD-0029-2015 - Warning of Mayhem shellshock attack ***
---------------------------------------------
We afraid this wave will come during the "shellshock", and it did. The attack wave of "ELF .so malware library", and installer of a known botnet called as "Mayhem" just hit all of us. The attack came from various IP, their botnets into many NIX services, utilizing the shellshock web vulnerability scan method to download the remote installer written in Perl (replacing the previous PHP base infection). It obviously a different vector for Mayhem infection, we start
---------------------------------------------
http://blog.malwaremustdie.org/2014/10/mmd-0029-2015-warning-of-mayhem.html
*** Vulnerabilities in WordPress Themes an Plugins ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7632https://wpvulndb.com/vulnerabilities/7633https://wpvulndb.com/vulnerabilities/7635https://wpvulndb.com/vulnerabilities/7634
*** Distance Vector Multicast Routing Protocol Misuse ***
---------------------------------------------
cisco-sr-20141006-dvmrp
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-…
*** CA Technologies GNU Bash Shellshock ***
---------------------------------------------
Topic: CA Technologies GNU Bash Shellshock Risk: Low Text:CA20141001-01: Security Notice for Bash Shellshock Vulnerability Issued: October 01, 2014 Updated: October 03, 2014 ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100036
*** SSA-214365 (Last Update 2014-10-07): Vulnerabilities in SIMATIC WinCC ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** Bugzilla 4.0.14, 4.2.10, 4.4.5, and 4.5.5 Security Advisory ***
---------------------------------------------
The following security issues have been discovered in Bugzilla: * The realname parameter is not correctly filtered on user account creation, which could lead to user data override. * Several places were found in the Bugzilla code where cross-site scripting attacks could be used to access sensitive information. * Private comments can be shown to flagmail recipients who arent in the insider group * Specially formatted values in a CSV search results export could be used in spreadsheet software...
---------------------------------------------
http://www.bugzilla.org/security/4.0.14/
*** Bugtraq: OWTF 1.0 "Lionheart" released! ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533629
*** IBM Security Bulletin: Vulnerabilities in Bash affect SmartCloud Provisioning for IBM Provided Software Virtual Appliance (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187) ***
---------------------------------------------
Vulnerabilities in Bash affect SmartCloud Provisioning for IBM Provided Software Virtual Appliance (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187). Six Bash vulnerabilities were disclosed in September 2014. This bulletin addresses the vulnerabilities that have been referred to as "Bash Bug" or "Shellshock" and two memory corruption vulnerabilities. IBM recommends that you review your entire environment to identify...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple vulnerabilities had been identified in Oracle Database related to the RDBMS Core component. (CVE-2014-4236 and CVE-2014-4245) ***
---------------------------------------------
Multiple vulnerabilities had been identified in Oracle Database that is consumed by Tivoli Netcool Perfomance Manager for Wireless. (CVE-2014-4236 and CVE-2014-4245 ) CVE(s): CVE-2014-4236 and CVE-2014-4245 Affected product(s) and affected version(s): Tivoli Netcool Performance Manager (TNPM) for Wireless version 1.4 and 1.3.2 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin:...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Vuln: phpMyAdmin CVE-2014-7217 Multiple Cross Site Scripting Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/70252
*** VU#280844: Cryoserver Security Appliance vulnerable to privilege escalation ***
---------------------------------------------
Vulnerability Note VU#280844 Cryoserver Security Appliance vulnerable to privilege escalation Original Release date: 07 Oct 2014 | Last revised: 07 Oct 2014 Overview Cryoserver Security Appliance 7.3.x vulnerable to privilege escalation Description CWE-264: Permissions, Privileges, and Access Controls Cryoserver Security Appliance 7.3.x does not properly assign permission to the /etc/init.d/cryoserver shell script and allows the default support account to modify it using the /bin/cryo-mgmt
---------------------------------------------
http://www.kb.cert.org/vuls/id/280844
*** VU#121036: BMC Track-It! contains multiple vulnerabilities ***
---------------------------------------------
Vulnerability Note VU#121036 BMC Track-It! contains multiple vulnerabilities Original Release date: 07 Oct 2014 | Last revised: 07 Oct 2014 Overview BMC Track-It! version 11.3.0.355 contains multiple vulnerabilities Description CWE-306: Missing Authentication for Critical Function - CVE-2014-4872BMC Track-It! exposes several dangerous remote .NET services on port 9010 without authentication. .NET remoting allows a user to invoke methods remotely and retrieve their result. The exposed service
---------------------------------------------
http://www.kb.cert.org/vuls/id/121036
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 03-10-2014 18:00 − Montag 06-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** CSAM: The Power of Virustotal to Turn Harmless Binaries Malicious, (Fri, Oct 3rd) ***
---------------------------------------------
We all know that anti virus, the necessary evil of basic computer security, isnt a stranger to false positives. So no big surprise here when John is writing that he ran into such a false positive during an incident response: I was scanning a forensic drive image with clamav and scored a positive hit on a file. Great. ClamAV, a free anti-virus product. Of course, we dont trust it. So John did what most of use would have done, and submitted the suspect binary to Virustotal: Virustotal showed...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18759&rss
*** Detecting irregular programs and services installed in your network, (Sun, Oct 5th) ***
---------------------------------------------
When the corporate network becomes target, auditing for security policy compliance can be challenging if you dont have a software controlling irregular usage of administrator privilege granted and being used to install unauthorized software or to change configuration by installing services that could cause an interruption in network service. Examples of this possible issues are additional DHCP Servers (IPv4 and IPv6), Dropbox, Spotify or ARP scanning devices. We can use nmap to detect all...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18763&rss
*** Testing for opened ports with firewalk technique, (Sat, Oct 4th) ***
---------------------------------------------
There is an interesting way of knowing what kind of filters are placed in the gateway of a specific host. It is called firewalk and it is based on IP TTL expiration. The algorithm goes as follows: The entire route is determined using any of the traceroute techniques available A packet is sent with the TTL equal to the distance to the target If the packet times out, it is resent with the TTL equal to the distance to the target minus one. If an ICMP type 11 code 0 (Time-to-Live exceeded) is...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18761&rss
*** Shellshock-like Weakness May Affect Windows ***
---------------------------------------------
A weakness in Windows, similar to Shellshock, may put Windows Server deployments at risk to remote code execution.
---------------------------------------------
http://threatpost.com/shellshock-like-weakness-may-affect-windows/108696
*** Bugzilla Zero-Day Exposes Zero-Day Bugs ***
---------------------------------------------
A previously unknown security flaw in Bugzilla -- a popular online bug-tracking tool used by Mozilla and many of the open source Linux distributions -- allows anyone to view detailed reports about unfixed vulnerabilities in a broad swath of software. Bugzilla is expected today to issue a fix for this very serious weakness, which potentially exposes a veritable gold mine of vulnerabilities that would be highly prized by cyber criminals and nation-state actors.
---------------------------------------------
http://krebsonsecurity.com/2014/10/bugzilla-zero-day-exposes-zero-day-bugs/
*** Apple anti-malware update blocks new iWorm Mac botnet ***
---------------------------------------------
Apple has updated its malware blacklisting system, known as XProtect, to block a Mac attack thought to have infected over 18,500 Macs.
---------------------------------------------
http://www.zdnet.com/apple-anti-malware-update-blocks-new-iworm-mac-botnet-…
*** Using the Windows 10 Technical Preview? Microsoft might be watching your every move to help with feedback ***
---------------------------------------------
One of the main goals with the Windows 10 Technical Preview is for Microsoft to collect feedback to help shape the final version of the operating system, which is said to be coming sometime in summer 2015. The Technical Preview requires users to register with the Windows Insider Program, which allows users to submit their own feedback about the operating system... but is Microsoft collecting more than what you think youre submitting?
---------------------------------------------
http://www.winbeta.org/news/using-windows-10-technical-preview-microsoft-mi…
*** SEO poisoning attacks still impacting legitimate websites ***
---------------------------------------------
After recently helping a client rid their website of SEO spam, security company Sucuri detailed how SEO poisoning attacks are still impacting legitimate websites.
---------------------------------------------
http://www.scmagazine.com/attackers-use-seo-spam-to-improve-the-rankings-of…
*** Uni boffins: Accurate Android AV app outperforms most rivals ***
---------------------------------------------
...Dont sweat, VXers, its STILL no use against obfuscated kit German researchers have built an Android app capable of detecting 94 percent of malware quick enough to run on mobile devices they say bests current offerings in effectiveness and description.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/10/06/uni_bods_sa…
*** Bugtraq: BulletProof Security Wordpress v50.8 - POST Inject Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533611
*** Bugtraq: CVE-2014-7277 Stored Server XSS in ZyXEL SBG-3300 Security Gateway ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533609
*** Bugtraq: CVE-2014-7278 DoS in ZyXEL SBG-3300 Security Gateway ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533610
*** Cisco IOS XR Software Compression ACL Bypass Vulnerability ***
---------------------------------------------
CVE-2014-3396
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco WebEx Meetings Server Password Disclosure Vulnerability ***
---------------------------------------------
CVE-2014-3400
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco ASA Software Version Information Disclosure ***
---------------------------------------------
CVE-2014-3398
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco ASA Software SharePoint RAMFS Integrity and Lua Injection Vulnerability ***
---------------------------------------------
CVE-2014-3399
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** IBM Security Bulletins: Vulnerabilities in Bash affect various Products ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Identity Assurance Solution Client (IASC) 3.1 Hotfix 2 ***
---------------------------------------------
Abstract: This is an update to the shipping release of the Identity Assurance Solution Client (IASC) 3.1 also known as the Novell Enhanced Smart Card Method (NESCM). The IASC client 3.1 is a standalone method that provides smart card-based authentication for eDirectory. This Hotfix has been provided to address the following security vulnerabilities found in OpenSSL & CLDAP SDK: CVE-2014-0224 & CVE-2014-3508 (Bug 893314 / 892895) Files: NTLS.DLL, LDAPSSL.DLL Filename:...
---------------------------------------------
https://download.novell.com/Download?buildid=s6M5LsksoOA~
*** Linux Kernel Seed Initialization Flaw Reduces Randomness in Certain Values and May Make TCP Sequence Numbers More Predictable ***
---------------------------------------------
http://www.securitytracker.com/id/1030959
*** VMSA-2014-0010.7 ***
---------------------------------------------
VMware product updates address critical Bash security vulnerabilities
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
*** DSA-3046 mediawiki ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3046
*** Bugtraq: [SECURITY] [DSA 3044-1] qemu-kvm security update ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533619
*** Bugtraq: [SECURITY] [DSA 3045-1] qemu security update ***
---------------------------------------------
[SECURITY] [DSA 3045-1] qemu security update
---------------------------------------------
http://www.securityfocus.com/archive/1/533621
*** SSA-860967 (Last Update 2014-10-06): GNU Bash Vulnerabilities in Siemens Industrial Products ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** [remote] - OpenVPN 2.2.29 - ShellShock Exploit ***
---------------------------------------------
http://www.exploit-db.com/exploits/34879
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 02-10-2014 18:00 − Freitag 03-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Why is your Mac all for sudden using Bing as a search engine?, (Thu, Oct 2nd) ***
---------------------------------------------
Even as a Mac user, you may have heard about Bing, at least you may have seen it demonstrated in commercials [1]. But if your default search engine on your Mac is all for sudden switched to Bing, this may be due to another piece of legacy software that some Mac users may have a hard time living ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18753
*** ZDI-14-349: (0Day) Microsoft Internet Explorer ScriptEngine Use-After-Free Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-349/
*** ZDI-14-346: (0Day) Apple OS X IOHIDSecurePromptClient Denial Of Service Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-346/
*** Security incidents are up - and pricier! - but infosec budgets are dwindling ***
---------------------------------------------
The number of security incidents is popping, as are associated costs to mop them up, according to a report from PcW. Global corporate security budgets, meanwhile, seem to be hiding in the closet, just hoping it all goes away.
---------------------------------------------
http://nakedsecurity.sophos.com/2014/10/03/security-incidents-are-up-and-pr…
*** OPSec for security researchers ***
---------------------------------------------
Perfect OPSec is almost impossible. However implementing basic OPSec practices should become second nature for every researcher. You will be more careful and hopefully, avoid rookie mistakes like talking too much and bragging about your research.
---------------------------------------------
https://securelist.com/blog/research/66911/opsec-for-security-researchers/
*** BadUSB: Der USB-Stick als digitale Waffe ***
---------------------------------------------
Speicher gibt sich als anderes Gerät aus - Forscher veröffentlichen Anleitung und Werkzeuge im Internet
---------------------------------------------
http://derstandard.at/2000006383347
*** US-Bericht: Über 80 Millionen Konten bei JPMorgan von Hacker-Angriff betroffen ***
---------------------------------------------
Bei dem im August aufgedeckten Großangriff auf US-Amerikanische Banken, konten Hacker offenbar detaillierte Informationen von Kunden erbeuten.
---------------------------------------------
http://www.heise.de/security/meldung/US-Bericht-Ueber-80-Millionen-Konten-b…
*** Bugtraq: Elasticsearch vulnerability CVE-2014-6439 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533602
*** HPSBMU02895 SSRT101253 rev.3 - HP Data Protector, Remote Increase of Privilege, Denial of Service (DoS), Execution of Arbitrary Code ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP Data Protector. These vulnerabilities could be remotely exploited to allow an increase of privilege, create a Denial of Service (DoS), or execute arbitrary code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Command-injection vulnerability for COMMAND-Shell Scripts ***
---------------------------------------------
What if we told you that a normal user in your network could take over the control of your Windows file-servers by just creating a special (but no so complex) directory-name in one of the directories he has access to?
---------------------------------------------
http://www.thesecurityfactory.be/command-injection-windows.html
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 01-10-2014 18:00 − Donnerstag 02-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** The Shellshock Aftershock for NAS Administrators ***
---------------------------------------------
Summary FireEye has been monitoring Shellshock-related attacks closely since the vulnerability was first made public last week. Specifically, FireEye has observed attackers attempting to exploit the BASH remote code injection vulnerability against Network Attached Storage systems (NAS). These attacks ..
---------------------------------------------
http://www.fireeye.com/blog/technical/2014/10/the-shellshock-aftershock-for…
*** ZDI-14-335: Hewlett-Packard Network Node Manager ovopi.dll Stack Buffer Overflow Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-335/
*** Vulnerabilities in Citrix Access Gateway Plug-in for Windows could result in arbitrary code execution ***
---------------------------------------------
Vulnerabilities have been identified in an ActiveX based component of the Citrix Access Gateway Plug-in for Windows. The vulnerabilities, ..
---------------------------------------------
http://support.citrix.com/article/CTX129902
*** The Mac.BackDoor.iWorm threat in detail ***
---------------------------------------------
Doctor Webs security researchers have dissected the complex malicious program Mac.BackDoor.iWorm, a threat affecting computers running Mac OS X. As of September 29, 2014, 18,519 unique IP addresses were used by infected computers to connect the botnet created by hackers using this backdoor. The backdoor is unpacked into the directory /Library/Application Support/JavaW. Furthermore, using ..
---------------------------------------------
http://news.drweb.com/show/?i=5977&lng=en&c=9
*** New Mac OS X botnet discovered ***
---------------------------------------------
Doctor Webs security experts researched several new threats to Mac OS X. One of them turned out to be a complex multi-purpose backdoor that entered the virus database as Mac.BackDoor.iWorm. Criminals can issue commands that get this program to carry out a wide range of instructions on the infected machines. A statistical ..
---------------------------------------------
http://news.drweb.com/show/?i=5976&lng=en&c=9
*** Norton Security: Symantec bestätigt Ende von Norton Antivirus ***
---------------------------------------------
Norton Antivirus wird es als Einzelprodukt von Symantec nicht mehr geben. Nur bestehende Einzellizenzen lassen sich verlängern.
---------------------------------------------
http://www.golem.de/news/norton-security-symantec-bestaetigt-ende-von-norto…
*** Google zahlt 15.000 US-Dollar für Chrome-Exploits ***
---------------------------------------------
Das Unternehmen hat die Maximalsumme verdreifacht, die es an Entdecker von Chrome-Lücke auszahlt. Ausserdem winkt nun ein Eintrag in die Google Hall of Fame.
---------------------------------------------
http://www.heise.de/security/meldung/Google-zahlt-15-000-US-Dollar-fuer-Chr…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 30-09-2014 18:00 − Mittwoch 01-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks ***
---------------------------------------------
In the world of hacking, every malicious tool has its heyday---that period when it rules the underground forums and media headlines and is the challenger keeping computer security pros on their toes. Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to ..
---------------------------------------------
http://www.wired.com/2014/09/ram-scrapers-how-they-work/
*** Node.js eval() code execution ***
---------------------------------------------
Node.js could allow a remote attacker to execute arbitrary code on the system, caused by the improper validation of input prior to being used in an eval() call. An attacker could exploit this vulnerability to inject and execute arbitrary PHP code on the system.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/96728
*** Advertising firms struggle to kill malvertisements ***
---------------------------------------------
One provider finds a vulnerable advertising tool that allowed attackers access ..
---------------------------------------------
http://arstechnica.com/security/2014/09/advertising-firms-struggle-to-kill-…
*** Gedanken nach meinem shellshock ***
---------------------------------------------
Zum Thema Shellshock ist mir heute nach diesem Artikel wiederholt richtig klar geworden, dass das ganze dieses mal nicht so einfach ist wie Heartbleed - die Diversität mit der sich bash bugs (bzw. shell mis-interpretationen) verstecken ist interessant!Nach lesen des Artikels kann man sich ..
---------------------------------------------
http://www.cert.at/services/blog/20140930221128-1263.html
*** Several vulnerabilities in extension phpMyAdmin (phpmyadmin) ***
---------------------------------------------
It has been discovered that the extension "phpMyAdmin" (phpmyadmin) is susceptible to Cross-Site Scripting and Cross-Site Request Forgery.
---------------------------------------------
http://www.typo3.org/news/article/several-vulnerabilities-in-extension-phpm…
*** Splunk Enterprise 6.1.4 and 5.0.10 address four vulnerabilities ***
---------------------------------------------
Splunk Enterprise versions 6.1.4 and 5.0.10 address the following vulnerabilities: OpenSSL TLS protocol downgrade attack (SPL-88585, SPL-88587, SPL-88588, CVE-2014-3511) Persistent cross-site scripting (XSS) via ..
---------------------------------------------
http://www.splunk.com/view/SP-CAAANHS
*** Attackers exploiting Shellshock (CVE-2014-6721) in the wild ***
---------------------------------------------
Yesterday, a new vulnerability affecting Bash (CVE-2014-6271) was published. The new vulnerability allows attackers to execute arbitrary commands formatting an environmental variable using a specific format. It affects Bash (the Bourne Again SHell), the default command shell for Linux and ..
---------------------------------------------
https://www.alienvault.com/open-threat-exchange/blog/attackers-exploiting-s…
*** TimThumb is No Longer Supported or Maintained ***
---------------------------------------------
http://www.binarymoon.co.uk/2014/09/timthumb-end-life/
*** Multiple vulnerabilities in HP products ***
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Multiple product vulnerabilities: all TP-Link "2-series" switches, all TP-Link VxWorks-based product ***
---------------------------------------------
Telnet is available and cannot be disabled (confirmed by vendor) SSHv1 enabled by default if SSH is enabled (confirmed by vendor)
---------------------------------------------
http://seclists.org/fulldisclosure/2014/Oct/6
*** SchneiderWEB Server Directory Traversal Vulnerability ***
---------------------------------------------
This advisory provides firmware updates for a directory traversal vulnerability in Schneider Electric's SchneiderWEB, a web HMI.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-273-01
*** Rockwell Micrologix 1400 DNP3 DOS Vulnerability ***
---------------------------------------------
This advisory provides a Rockwell Automation firmware revision that mitigates ..
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-254-02
*** Firefox/Chrome: BERserk hätte verhindert werden können ***
---------------------------------------------
Die Sicherheitslücke BERserk ist nur deshalb ein Problem, weil einige Zertifizierungsstellen sich nicht an gängige Empfehlungen für RSA-Schlüssel halten. Mit BERserk akzeptieren Firefox und Chrome gefälschte Zertifikate.
---------------------------------------------
http://www.golem.de/news/firefox-chrome-berserk-haette-verhindert-werden-ko…
*** Studie: Malware ist Hauptgefährdung für Unternehmens-IT ***
---------------------------------------------
Laut der aktuellen /Microsoft-Sicherheitsstudie hat die Bedrohung der Unternehmens-IT durch Malware die bisherige Nummer ..
---------------------------------------------
http://www.heise.de/security/meldung/Studie-Malware-ist-Hauptgefaehrdung-fu…
*** Sicherheitslücke in Xen-Hypervisor betraf Cloud-Anbieter ***
---------------------------------------------
Ein Programmierfehler in der Virtualisierungssoftware zwang Amazon und Rackspace, zahlreiche virtuelle Maschinen neu zu starten. Inzwischen ist die Lücke in der freien Software geschlossen.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-in-Xen-Hypervisor-be…
*** Critical FreePBX RCE Vulnerability (ALL Versions) ***
---------------------------------------------
We have been made aware of a critical Zero-Day Remote Code Execution and Privilege Escalation exploit within the legacy 'FreePBX ARI Framework module/Asterisk Recording Interface (ARI)'. This affects any user who has installed FreePBX prior to version ..
---------------------------------------------
http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versi…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 29-09-2014 18:00 − Dienstag 30-09-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** JSA10648 - 2014-09 Out of Cycle Security Bulletin: Multiple Products: Shell Command Injection Vulnerability in Bash ***
---------------------------------------------
Last Updated: 29 Sep 2014
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10648
*** We Take Your Privacy and Security. Seriously. ***
---------------------------------------------
"Please note that [COMPANY NAME] takes the security of your personal data very seriously." If youve been on the Internet for any length of time, chances are very good that youve received at least one breach notification email or letter that includes some version of this obligatory line. But as far as lines go, this one is about as convincing as the classic break-up line, "Its not you, its me."
---------------------------------------------
http://krebsonsecurity.com/2014/09/we-take-your-privacy-and-security-seriou…
*** Splunk response to "shellshock" vulnerabilities ***
---------------------------------------------
Description Splunk response to "shellshock" vulnerabilities: Splunk Enterprise response to Bash "shellshock" parsing attack (CVE-2014-6271, CVE-2014-7169) Splunk Enterprise response to Bash "shellshock" parsing attack (CVE-2014-6271, CVE-2014-7169) Splunk Cloud response to Bash "shellshock" parsing attack (CVE-2014-6271, CVE-2014-7169) Splunk MINT response to Bash "shellshock" parsing attack (CVE-2014-6271, CVE-2014-7169) Splunk Storm response...
---------------------------------------------
http://www.splunk.com/view/SP-CAAANJN
*** WPScan Vulnerability Database a New WordPress Security Resource ***
---------------------------------------------
Researcher Ryan Dewhurst released the WPScan Vulnerability Database, a database housing security vulnerabilities in WordPress core code, plug-ins and themes. Its available for pen-testers, WordPress administrators and developers.
---------------------------------------------
http://threatpost.com/wpscan-vulnerability-database-a-new-wordpress-securit…
*** Cisco WebEx Meetings Server Arbitrary Download Vulnerability ***
---------------------------------------------
CVE-2014-3395
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun... ***
---------------------------------------------
Background: CVE-2014-6271 + CVE-2014-7169 During the mayhem of bash 0day remote execution vulnerability CVE-2014-6271 and CVE-2014-7169, not for bragging but as a FYI, I happened to be the first who reversed for the first ELF malware spotted used in the wild. The rough disassembly analysis and summary I wrote and posted in Virus Total & Kernel Mode here --> [-1-] [-2-] credit) (the credit is all for her for links to find this malware, for the swift sensoring & alert, and thanks for...
---------------------------------------------
http://blog.malwaremustdie.org/2014/09/linux-elf-bash-0day-fun-has-only-jus…
*** gnome-shell printscreen key security bypass ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/96713
*** Apple schließt Shellshock-Lücken in OS X - teilweise ***
---------------------------------------------
Update für die Unix-Shell Bash veröffentlicht - Scheint aber nur die ersten zwei aufgetauchten Lücken zu bereinigen
---------------------------------------------
http://derstandard.at/2000006210412
*** remote syslog PRI vulnerability ***
---------------------------------------------
Sysklogd is mildly affected. Having a quick look at the current git master branch, the wrong action may be applied to messages with invalid facility. ... Rsyslogd experiences the same problem as sysklogd. However, more severe effects can occur, BUT NOT WITH THE DEFAULT CONFIGURATION. The most likely and thus important attack is a remote DoS. Some of the additional tables are writable and can cause considerable misadressing. ...
---------------------------------------------
http://www.rsyslog.com/security-advisories/
*** [20140904] - Core - Denial of Service ***
---------------------------------------------
Project: Joomla! SubProject: CMS Severity: Low Versions: 2.5.4 through 2.5.25, 3.2.5 and earlier 3.x versions, 3.3.0 through 3.3.4 Exploit type: Denial of Service Reported Date: 2014-September-24 Fixed Date: 2014-September-30 CVE Number: CVE-2014-7229 Description Inadequate checking allowed the potential for a denial of service attack. Affected Installs Joomla! CMS versions 2.5.4 through 2.5.25, 3.2.5 and earlier 3.x versions, 3.3.0 through 3.3.4 Solution Upgrade to version 2.5.26, 3.2.6, or...
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/MWxjsJYnk9U/596-20140904-c…
*** [20140903] - Core - Remote File Inclusion ***
---------------------------------------------
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 2.5.4 through 2.5.25, 3.2.5 and earlier 3.x versions, 3.3.0 through 3.3.4 Exploit type: Remote File Inclusion Reported Date: 2014-September-24 Fixed Date: 2014-September-30 CVE Number: CVE-2014-7228 Description Inadequate checking allowed the potential for remote files to be executed. Affected Installs Joomla! CMS versions 2.5.4 through 2.5.25, 3.2.5 and earlier 3.x versions, 3.3.0 through 3.3.4 Solution Upgrade to version 2.5.26,...
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/NTyZcpJMN00/595-20140903-c…
*** IBM Sterling Connect:Direct for UNIX is affected by multiple OpenSSL vulnerabilities(CVE-2014-3508, CVE-2014-3511) ***
---------------------------------------------
Security vulnerabilities have been discovered in OpenSSL that were reported on 6 August 2014 by the OpenSSL Project. CVE(s): CVE-2014-3508 and CVE-2014-3511 Affected product(s) and affected version(s): IBM Sterling Connect:Direct for UNIX 4.0.00 - All versions prior to 4.0.00 Fix 131 IBM Sterling Connect:Direct for UNIX 4.1.0 - All versions prior to 4.1.0.4 iFix 33 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin:...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_sterling_connect_…
*** IBM Security Bulletin: Open Redirection in IBM Tivoli Federated Identity Manager (CVE-2014-3097) ***
---------------------------------------------
In certain cases, IBM Tivoli Federated Identity Manager does not handle end user provided data before using that data to construct an HTTP redirect request. CVE(s): CVE-2014-3097 Affected product(s) and affected version(s): IBM Tivoli Federated Identity Manager 6.2.0, 6.2.1, 6.2.2 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www.ibm.com/support/docview.wss?uid=swg21684852 X-Force Database:...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Vulnerabilities in Bash affect IBM InfoSphere Guardium Database Activity Monitoring (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278) ***
---------------------------------------------
Six Bash vulnerabilities were disclosed in September 2014. This bulletin addresses the vulnerabilities that have been referred to as "Bash Bug" or "Shellshock" and two memory corruption vulnerabilities. Bash is used by IBM InfoSphere Guardium Database Activity Monitoring. CVE(s): CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278 Affected product(s) and affected version(s):...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Shell command injection and cross-site scripting vulnerabilities in Access Manager for Mobile and Access Manager for Web (CVE-2014-4823, CVE-2014-6079) ***
---------------------------------------------
IBM Security Access Manager for Mobile and IBM Security Access Manager for Web could be affected by a command injection vulnerability and allow a cross site scripting attack. CVE(s): CVE-2014-4823 and CVE-2014-6079 Affected product(s) and affected version(s): IBM Security Access Manager for Mobile 8. - Firmware versions 8.0.0.0, 8.0.0.1, 8.0.0.3, and 8.0.0.4. IBM Security Access Manager for Web 7.0 and 8.0 - Firmware versions 7.0, 7.0.0.1, 7.0.0.2, 7.0.0.3, 7.0.0.4, 7.0.0.5, 7.0.0.6,...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Denial of Service when using e-community single sign on in IBM Security Access Manager for Web (CVE-2014-4809) ***
---------------------------------------------
When using e-community single sign on (ECSSO), the WebSEAL component of IBM Security Access Manager for Web could become unresponsive under certain circumstances, possibly resulting in denial of service. CVE(s): CVE-2014-4809 Affected product(s) and affected version(s): IBM Security Access Manager for Web version 7.0 appliance: All firmware versions. IBM Security Access Manager for Web version 8.0: Firmware versions 8.0.0.2, 8.0.0.3, and 8.0.0.4 Refer to the following reference URLs for...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Abgeschlossen: Wartungsarbeiten Dienstag 30. September 2014 ***
---------------------------------------------
Update: Die Wartungsarbeiten wurden gegen 10h abgeschlossen; insgesamt kam es zu Ausfallszeiten von etwa 15 Minuten.
---------------------------------------------
http://www.cert.at/services/blog/20140929105226-1254.html
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 26-09-2014 18:00 − Montag 29-09-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Wartungsarbeiten Dienstag 30. September 2014 ***
---------------------------------------------
Wir werden am Dienstag, 30. Sep. 2014, ab etwa 9h, Wartungsarbeiten an unserer Firewall vornehmen. Dadurch wird es zu Ausfällen aller öffentlich erreichbaren Internet-Services von CERT.at (zum Beispiel Webserver, Mail, Mailing-Listen, RSS-/Atom-Feeds etc.) kommen. Mails gehen selbstverständlich in dieser Zeit nicht verloren, es kann nur zu Verzögerungen bei Zustellung/Beantwortung kommen. Für die Webseite wird...
---------------------------------------------
http://www.cert.at/services/blog/20140929105226-1254.html
*** Vuln: Go TLS Server Implementation Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/70156
*** Oracle - Alert for CVE-2014-7169 "Bash" ***
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-23032…
*** Bash Command Injection Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a vulnerability in Bash, which is part of Unix-based operating systems.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-269-01
*** Shellshock: Immer mehr Lücken in Bash ***
---------------------------------------------
Die ersten Fehlerkorrekturen für die Shellshock-Lücke in Bash waren unvollständig. Inzwischen ist von fünf verschiedenen Sicherheitslücken die Rede.
---------------------------------------------
http://www.golem.de/news/shellshock-immer-mehr-luecken-in-bash-1409-109483-…
*** DSA-3038 libvirt ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3038
*** Shellshock in the Wild ***
---------------------------------------------
Michael Lin, James Bennett and David Bianco The exploitation of the BASH bug, now widely referred to as "Shellshock", is in full swing. Attackers have mobilized - multiple proof-of-concept scripts are available, including a Metasploit module, making this vulnerability very accessible. The...
---------------------------------------------
http://www.fireeye.com/blog/uncategorized/2014/09/shellshock-in-the-wild.ht…
*** iOS 8: Nutzung zufallsgenerierter MAC-Adressen ist eingeschränkt ***
---------------------------------------------
Apples iOS 8 bringt eine Sicherheitsfunktion mit, die dem Nutzer mehr Anonymität verschaffen soll. Die Geräte mit iOS 8 wechseln ständig die MAC-Adresse, so dass ein Tracken individueller Nutzer unmöglich wird. Doch nicht jedes iOS-8-fähige Gerät kann das.
---------------------------------------------
http://www.golem.de/news/ios-8-nutzung-zufallsgenerierter-mac-adressen-ist-…
*** Fraud shop OVERSTOCKED with stolen credit cards ***
---------------------------------------------
Supply, meet demand: prices crash Infamous carding store Rescator.cc is so chock-full of stolen credit cards from recent high-profile breaches that its gutting its prices due to overstocking.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/29/fraud_shop_…
*** AVM: Sicherheitslücke in Fritzbox wird wieder ausgenutzt ***
---------------------------------------------
Fritzbox-Nutzer, die die gepatchte Sicherheitslücke für unerlaubten Fernzugriff nicht geschlossen haben, werden wieder angegriffen. AVM rät, die Patches jetzt schnell aufzuspielen, doch eine Auto-Updatefunktion gibt es noch nicht lange.
---------------------------------------------
http://www.golem.de/news/avm-alte-sicherheitsluecke-in-fritzbox-wird-wieder…
*** HPSBNS03111 rev.1 - HP NonStop Servers running Bash Shell, Remote Code Execution ***
---------------------------------------------
A potential security vulnerability has been identified with HP NonStop Servers running Bash Shell . This is the Bash Shell vulnerability known as "ShellShock" which could be exploited remotely to allow execution of code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** DHCP Client Bash Environment Variable Code Injection ***
---------------------------------------------
Topic: DHCP Client Bash Environment Variable Code Injection Risk: High Text:## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-fr...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014090152
*** LSE entdeckt kritische Schwachstelle in Perl ***
---------------------------------------------
Mit der vom Identity-Management-Experten festgestellten Lücke in der Spracherweiterung Data::Dumper soll sich durch Anlegen großer Datenstrukturen ein Stack Overflow erzeugen lassen.
---------------------------------------------
http://www.heise.de/security/meldung/LSE-entdeckt-kritische-Schwachstelle-i…
*** HTTPS: Kostenlose TLS-Verschlüsselung bei Cloudflare ***
---------------------------------------------
Cloudflare aktiviert künftig bei allen Kunden kostenlos verschlüsselte HTTPS-Verbindungen. Damit verdoppelt sich die Zahl der Webseiten im Netz, die verschlüsselt erreichbar sind.
---------------------------------------------
http://www.golem.de/news/https-kostenlose-tls-verschluesselung-bei-cloudfla…
*** iOS 8 verrät Drittanbieter-Apps, mit wem man telefoniert ***
---------------------------------------------
Die beiden Forscher Andreas Kurtz und Markus Troßbach haben jede Menge Lücken in iOS entdeckt, durch die Drittanbieter-Apps etwa heimlich Fotos schießen oder das Telefonieverhalten ausspionieren können. Einige davon hat Apple geschlossen - andere nicht.
---------------------------------------------
http://www.heise.de/security/meldung/iOS-8-verraet-Drittanbieter-Apps-mit-w…
*** FBI to Open Up Malware Investigator Portal to External Researchers ***
---------------------------------------------
SEATTLE - The FBI has developed an internal malware-analysis tool, somewhat akin to the systems used by antimalware companies, and plans to open the system up to external security researchers, academics and others. The system is known as Malware Investigator and is designed to allow FBI agents and other authorized law enforcement users to upload suspicious files.
---------------------------------------------
http://threatpost.com/fbi-to-open-up-malware-investigator-portal-to-externa…
*** Shellshock: A Collection of Exploits seen in the wild, (Mon, Sep 29th) ***
---------------------------------------------
Ever since the shellshock vulnerablity has been announced, we have seen a large number of scans probing it. Here is a quick review of exploits that our honeypots and live servers have seen so far: 1 - Simple "vulnerability checks" that used custom User-Agents: () { 0v3r1d3;};echo \x22Content-type: text/plain\x22; echo; uname -a; () { :;}; echo Shellshock: Vulnerable () { :;};echo content-type:text/plain;echo;echo [random string];echo;exit () { :;}; /bin/bash -c "echo
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18725&rss
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 25-09-2014 18:00 − Freitag 26-09-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Patching Bash Vulnerability a Challenge for ICS, SCADA ***
---------------------------------------------
Experts are concerned that many Linux-based industrial control systems and embedded systems could be too steep a patching challenge and remain in the crosshairs of the Bash vulnerability.
---------------------------------------------
http://threatpost.com/patching-bash-vulnerability-a-challenge-for-ics-scada…
*** Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware ***
---------------------------------------------
Just several hours after the news on the bash vulnerability (covered under CVE-2014-7169) broke out; it was reportedly being exploited in the wild already. This vulnerability can allow execution of arbitrary code thus compromising the security of systems. Some of the possible scenarios that attackers can do range from changing the contents of web server and...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/-OM1T28JyB8/
*** Linux ELF bash 0day: The fun has only just begun... ***
---------------------------------------------
Background: CVE-2014-6271 + CVE-2014-7169 During the mayhem of bash 0day remote execution vulnerability CVE-2014-6271 and CVE-2014-7169, not for bragging but as a FYI, I happened to be the first who reversed for the first ELF malware spotted used in the wild. The assembly analysis and summary I wrote and posted in here --> [-1-] [-2-] The fun has only just begun...Yes. Today I was informed there is another payload distributed, thanks to my good friend, Father Robin Jackson (credit): Which...
---------------------------------------------
http://blog.malwaremustdie.org/2014/09/linux-elf-bash-0day-fun-has-only-jus…
*** Bad boy builds beastly Bash bug botnet - boxen battered ***
---------------------------------------------
DDoS zombie army found in the wild hours after flaw surfaces Mere hours after its discovery, the Shell Shock Bash vulnerability was exploited by an attacker to build a botnet.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/26/bad_guy_bui…
*** Vulnerabilities in LibVNCServer ***
---------------------------------------------
---------------------------------------------
LibVNCServer CVE-2014-6054 Denial of Service Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/70094
---------------------------------------------
libVNCserver CVE-2014-6051 Integer Overflow Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/70093
---------------------------------------------
LibVNCServer CVE-2014-6053 Remote Denial of Service Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/70092
---------------------------------------------
LibVNCServer CVE-2014-6052 Denial of Service Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/70091
*** JSA10648 - 2014-09 Out of Cycle Security Bulletin: Multiple Products: Shell command injection vulnerability in Bash (CVE-2014-6271, CVE-2014-7169) ***
---------------------------------------------
Products vulnerable to remote exploitation risks:
Junos Space is vulnerable in all versions.
JSA Series (STRM) devices are vulnerable in all versions.
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10648&actp=RSS
*** GNU Bash Environmental Variable Command Injection Vulnerability ***
---------------------------------------------
cisco-sa-20140926-bash
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** DSA-3035 bash ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3035
*** TYPO3-EXT-SA-2014-011: Several vulnerabilities in extension phpMyAdmin (phpmyadmin) ***
---------------------------------------------
It has been discovered that the extension "phpMyAdmin" (phpmyadmin) is susceptible to Cross-Site Scripting and Cross-Site Request Forgery.
---------------------------------------------
https://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-…
*** Bugtraq: [SECURITY] [DSA 3036-1] mediawiki security update ***
---------------------------------------------
[SECURITY] [DSA 3036-1] mediawiki security update
---------------------------------------------
http://www.securityfocus.com/archive/1/533552
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 24-09-2014 18:00 − Donnerstag 25-09-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Shellshock Bash Vulnerability ***
---------------------------------------------
Current event - 1.0 of post This is a current event and as such this blog post is subject to change over the course of the next few days as we perform further supplementary research and analysis by NCC Group's Cyber Defence Operations and Security Consulting divisions. v1.0 - initial version Background Yesterday (24 September) CVE-2014-6271 was released with a corresponding patch for Bash (a common Linux shell). The risk arises from this vulnerability because of certain use cases. The use...
---------------------------------------------
https://www.nccgroup.com/en/blog/2014/09/shellshock-bash-vulnerability/
*** Update on CVE-2014-6271: Vulnerability in bash (shellshock), (Thu, Sep 25th) ***
---------------------------------------------
(this diary will be updated with links to relevant resources shortly) Yesterday, a vulnerability in bash was announced, that was originally found by,Stephane Schazelas. The vulnerability allows for arbitrary code execution in,bash by setting specific environment variables. Later, Travis Ormandy released,a second exploit that will work on patched systems, demonstration that the,patch released yesterday is incomplete. What is the impact of the vulnerability? At first, the vulnerability doesnt...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18707&rss
*** Bash-Lücke: ShellShock ist noch nicht ausgestanden ***
---------------------------------------------
Die Sicherheitslücke in der Linux-Shell Bash, die nun unter dem Namen "ShellShock" firmiert, wird bereits als der schlimmere Bruder von Heartbleed bezeichnet. Sicher ist, dass der am Mittwoch ausgelieferte Patch weitere Lücken enthält.
---------------------------------------------
http://www.heise.de/security/meldung/Bash-Luecke-ShellShock-ist-noch-nicht-…
*** "Bash" (CVE-2014-6271) vulnerability - Q&A ***
---------------------------------------------
The "bash" vulnerability is an extremely powerful vulnerability due to its high impact and the ease with which it can be exploited.
---------------------------------------------
https://securelist.com/blog/research/66673/bash-cve-2014-6271-vulnerability…
*** Bug in Bash shell creates big security hole on anything with *nix in it [Updated] ***
---------------------------------------------
Could allow attackers to execute code on Linux, Unix, and Mac OS X.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/94xcSgjPriY/
*** Bash Exploit Reported, First Round of Patches Incomplete ***
---------------------------------------------
Reports of the first in-the-wild exploits targeting the Bash vulnerability have surfaced, as have complaints the first patches for the bug are incomplete.
---------------------------------------------
http://threatpost.com/bash-exploit-reported-first-round-of-patches-incomple…
*** RSA-Signaturen: Acht Jahre alte Sicherheitslücke kehrt zurück ***
---------------------------------------------
In der NSS-Bibliothek ist eine Sicherheitslücke entdeckt worden, mit der sich RSA-Signaturen fälschen lassen. Betroffen sind die Browser Chrome und Firefox, für die bereits Updates erschienen sind. Es handelt sich um eine Variante der Bleichenbacher-Attacke von 2006.
---------------------------------------------
http://www.golem.de/news/rsa-signaturen-acht-jahre-alte-sicherheitsluecke-k…
*** iOS-Sicherheitslücke ermöglicht Keylogging in Apps mit integriertem Browser ***
---------------------------------------------
Einem Entwickler ist aufgefallen, dass Apple offenbar beim Trennen von Prozessen geschlampt hat. Bietet eine App eine Browser-Ansicht, kann diese von der App selbst beobachtet werden.
---------------------------------------------
http://www.heise.de/security/meldung/iOS-Sicherheitsluecke-ermoeglicht-Keyl…
*** An Analysis of the CAs trusted by iOS 8.0 ***
---------------------------------------------
iOS 8.0 ships with a number of trusted certificates (also known as "root certificates" or "certificate authorities"), which iOS implicitly trusts. The root certificates are used to trust intermediate certificates, and the intermediate certificates are used to trust web site certificates. When you go to a web site using HTTPS, or an app makes a secure connection to something on the Internet (like your mail server), the web site (or mail server, or whatever) gives iOS its...
---------------------------------------------
http://karl.kornel.us/2014/09/an-analysis-of-the-cas-trusted-by-ios-8-0/
*** GNU bash Environment Variable Processing Flaw Lets Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1030890
*** DSA-3032 bash ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3032
*** Security Advisories for Cisco IOS Software ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco Unified Communications Domain Manager glibc Arbitrary Code Execution Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** IBM Security Bulletin: Vulnerability in IBM Java SDKs and IBM Java Runtime Technology Edition affecting Rational Functional Tester (CVE-2014-3086) ***
---------------------------------------------
Multiple vulnerabilities exist in IBM SDKs Java Technology Edition and IBM Runtime Environment Java Technology Edition that are used by Rational Functional Tester (RFT). These issues were disclosed as part of the IBM Java SDK updates in July 2014. CVE(s): CVE-2014-3086 Affected product(s) and affected version(s): Rational Functional Tester version 8.2.2 and later Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin:...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Tivoli Netcool OMNIbus (CVE-2014-4263, CVE-2014-4244) ***
---------------------------------------------
There are multiple vulnerabilities in IBM Runtime Environment Java Technology Edition, Versions 5, 6, and 7 that are used by Tivoli Netcool OMNIbus. These issues were disclosed as part of the IBM Java SDK updates in July 2014. CVE(s): CVE-2014-4263 and CVE-2014-4244 Affected product(s) and affected version(s): Tivoli Netcool/OMNIbus 7.3.0 Tivoli Netcool/OMNIbus 7.3.1 Tivoli Netcool/OMNIbus 7.4.0 Tivoli Netcool/OMNIbus 8.1.0 Refer to the following reference URLs for...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Security Advisories for Drupal Third-Party Modules ***
---------------------------------------------
https://www.drupal.org/node/2344383https://www.drupal.org/node/2344369https://www.drupal.org/node/2344363https://www.drupal.org/node/2344389
*** Mozilla Network Security Services certificates security bypass ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/96194
*** HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Unauthorized Access, Disclosure of Information ***
---------------------------------------------
A potential security vulnerability has been identified with HP Storage Enterprise Virtual Array (EVA) Command View Suite. The vulnerability could be exploited to allow remote unauthorized access and disclosure of information.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Bugtraq: Two SQL Injections in All In One WP Security WordPress plugin ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533519
*** TYPO3-EXT-SA-2014-012: Several vulnerabilities in extension JobControl (dmmjobcontrol) ***
---------------------------------------------
It has been discovered that the extension "JobControl" (dmmjobcontrol) is susceptible to Cross-Site Scripting and SQL Injection.
---------------------------------------------
https://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-…
*** Bugtraq: LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533543
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 23-09-2014 18:00 − Mittwoch 24-09-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** MS14-055 - Important: Vulnerabilities in Microsoft Lync Server Could Allow Denial of Service (2990928) - Version: 3.0 ***
---------------------------------------------
Revisions:
V1.0 (September 9, 2014): Bulletin published.
V2.0 (September 15, 2014): Bulletin revised to remove Download Center links for Microsoft security update 2982385 for Microsoft Lync Server 2010. See the Update FAQ for details.
V3.0 (September 23, 2014): Bulletin rereleased to announce the reoffering of the 2982385 security update file (server.msp) for Microsoft Lync Server 2010. See the Update FAQ for details.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-055
*** Website Malware - Curious .htaccess Conditional Redirect Case ***
---------------------------------------------
I really enjoy when I see a different kind of conditional redirect, check this one out: The special thing about this one is the usage of a not so common .htaccess feature in malware: variables. In the first part it set the conditions for user-agents, nothing new, but the afterward rules are interesting: RewriteRule .*Read More
---------------------------------------------
http://blog.sucuri.net/2014/09/website-malware-curious-htaccess-conditional…
*** Apt: Buffer Overflow in Debians Paketmanagement ***
---------------------------------------------
Im von Debian und Ubuntu verwendeten Paketmanagement Apt wurde ein sicherheitskritischer Fehler entdeckt. Es ist bereits das zweite Mal in kurzer Zeit dass Apt Sicherheitsprobleme hat.
---------------------------------------------
http://www.golem.de/news/apt-buffer-overflow-in-debians-paketmanagement-140…
*** Microsoft Starts Online Services Bug Bounty ***
---------------------------------------------
Microsoft today launched the Microsoft Online Services Bug Bounty Program which will pay out a minimum of $500 for vulnerabilities found in its cloud services such as Office 365.
---------------------------------------------
http://threatpost.com/microsoft-starts-online-services-bug-bounty/108486
*** jQuery.com Compromise: The Dangers of Third Party Hosted Content, (Tue, Sep 23rd) ***
---------------------------------------------
jQuery is a popular Javascript framework, used by many websites (including isc.sans.edu) . jQuery provides many features, like easy access to webservices as well as advanced user interface features. When using jQuery, sites have the option to download and host the complete code, or let jQuery.com and its CDN (Content Delivery Network) host the code. There are two advantages in allowing jQuery.com to host the code: Performance: Code is typically delivered faster, and a user may already have the...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18699&rss
*** Auch Mozilla verabschiedet sich langsam von SHA-1 ***
---------------------------------------------
Die Entwickler der freien Web-Browsers Firefox wollen den angreifbaren Hash-Algorithmus in Zukunft nicht mehr für verschlüsselte Verbindungen akzeptieren. Server-Betreibern bleibt jedoch noch Zeit für die Umstellung.
---------------------------------------------
http://www.heise.de/security/meldung/Auch-Mozilla-verabschiedet-sich-langsa…
*** Remote exploit vulnerability in bash CVE-2014-6271 ***
---------------------------------------------
A remotely exploitable vulnerability has been discovered in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271. This affects Debian as well as other Linux distributions. If you have have Microsoft Services for UNIX you will need to patch ASAP. Bash supports exporting she variables as well as shell functions to other bash instances. This is accomplished through the process environment to a child process. From Debian:Current bash versions use an
---------------------------------------------
http://www.csoonline.com/article/2687265/application-security/remote-exploi…
*** Bugtraq: CVE-2014-6603 suricata 2.0.3 Out-of-bounds access in SSH parser ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533515
*** Huawei Security Advisory - CSRF Vulnerabilities in Multiple Products ***
---------------------------------------------
Cross-site request forgery (CSRF) vulnerabilities are discovered in multiple products, including FusionManager (Vulnerability ID: HWPSIRT-2014-0408) and USG firewall series (Vulnerability ID: HWPSIRT-2014-0406).
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Huawei Security Advisory - Information Leakage Vulnerability via MPLS Ping in VRP Platform ***
---------------------------------------------
Information leakage vulnerability exists in several devices using VRP platform, because the MPLS LSP Ping service is bound to unnecessary interfaces, which can cause the leak of IP addresses of devices (Vulnerability ID: HWPSIRT-2014-0418).
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Security Advisory - Hikashop Extension for Joomla! ***
---------------------------------------------
Advisory for: Hikashop for Joomla! Security Risk: High (DREAD score : 7/10) Vulnerability: Object Injection / Remote Code Execution Updated Version: 2.3.2 In a routine audit of our Website Firewall we discovered a serious vulnerability within the Hikashop ecommerce product for Joomla! allowing remote code execution on the vulnerable website[s]. What are the risks? ThisRead More
---------------------------------------------
http://blog.sucuri.net/2014/09/security-advisory-hikashop-extension-for-joo…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 22-09-2014 18:00 − Dienstag 23-09-2014 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Cyber Campaigns ***
---------------------------------------------
This website simply lists multiple cyber-espionage and cyber-attack campaigns. These campaigns have successfully compromised hundreds of government entities and global corporations in over 50 countries. Click on any of the links below to access more detailed information regarding these cyber campaigns. If you see one missing, just let me know.
---------------------------------------------
http://cybercampaigns.net/
*** Whonix Anonymous Operating System Version 9 Released ***
---------------------------------------------
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
---------------------------------------------
https://www.whonix.org/blog/whonix-anonymous-9-released
*** UK banks hook themselves up to real-time cop data feed ***
---------------------------------------------
Not like the movies: Law enforcement is on it... UK banks will receive real-time warnings about threats to their customers accounts as well as the overall integrity of their banking systems from a new financial crime alert system.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/23/uk_bank_fra…
*** HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access ***
---------------------------------------------
A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL. The vulnerability could be exploited remotely to allow remote unauthorized access.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** BIND 9.8.8, 9.9.6 and 9.10.1 Release Notes ***
---------------------------------------------
https://kb.isc.org/article/AA-01211/81/BIND-9.8.8-Release-Notes.htmlhttps://kb.isc.org/article/AA-01210/81/BIND-9.9.6-Release-Notes.htmlhttps://kb.isc.org/article/AA-01209/81/BIND-9.10.1-Release-Notes.html
*** Bugtraq: Glype proxy cookie jar path traversal allows code execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533504
*** Security Advisory-Screen Capture Vulnerability on Huawei Ascend P6 Mobile Phones ***
---------------------------------------------
Sep 23, 2014 17:47
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** TYPO3 CMS 4.5.36, 6.1.11 and 6.2.5 released ***
---------------------------------------------
All versions are maintenance releases and contain bug fixes.
---------------------------------------------
https://typo3.org/news/article/typo3-cms-4536-6111-and-625-released/
*** [20140901] - Core - XSS Vulnerability ***
---------------------------------------------
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 3.2.0 through 3.2.4, 3.3.0 through 3.3.3 Exploit type: XSS Vulnerability Reported Date: 2014-August-27 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6631 Description Inadequate escaping leads to XSS vulnerability in com_media. Affected Installs Joomla! CMS versions 3.2.0 through 3.2.4 and 3.3.0 through 3.3.3 Solution Upgrade to version 3.2.5 or 3.3.4 Contact The JSST at the Joomla! Security Center. Reported By: Dingjie (Daniel)
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/EiyFsQIjpu4/593-20140901-c…
*** [20140902] - Core - Unauthorised Logins ***
---------------------------------------------
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Exploit type: Unauthorised Logins Reported Date: 2014-September-09 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6632 Description Inadequate checking allowed unauthorised logins via LDAP authentication. Affected Installs Joomla! CMS versions 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Solution
---------------------------------------------
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/uFCKpt1YcxU/594-20140902-c…
*** XEN Security Advisories ***
-------------------------------
*** Race condition in HVMOP_track_dirty_vram ***
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-104.html
*** Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation ***
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-105.html
*** Missing privilege level checks in x86 emulation of software interrupts ***
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-106.html
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 19-09-2014 18:00 − Montag 22-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Tiny Tinba Trojan Could Pose Big Threat ***
---------------------------------------------
In July 2014, the original source code of Tinba was made public in an underground forum. This leaked version comes with complete documentation and full source code. This follows other source code leaks from much more infamous and prevalent threats, which researchers worry that attackers could use as the basis for new versions. Similar to...
---------------------------------------------
http://www.seculert.com/blog/2014/09/tiny-tinba-trojan-could-pose-big-threa…
*** Apple Pay: A Security Analysis ***
---------------------------------------------
Has Apple taken a bite out of hackers' arsenals? The company is betting on it. Its recent announcement about a new secure payment option has the retail and tech worlds buzzing. If Apple can implement its near-field communication (NFC) payment...
---------------------------------------------
http://www.fireeye.com/blog/corporate/2014/09/apple-pay-a-security-analysis…
*** How to secure your new iPhone in three simple steps ***
---------------------------------------------
Summary: Symantec recommends best practices to keep your Apple ID account and iPhone safe.
---------------------------------------------
http://www.symantec.com/connect/blogs/how-secure-your-new-iphone-three-simp…
*** Conditional Malicious iFrame Targeting WordPress Web Sites ***
---------------------------------------------
We have an email, labs(a)sucuri.net where we receive multiple questions a day about various forms of malware. One of the most common questions happen when our Free Security Scanner, SiteCheck, detects a spam injection or a hidden iframe and the user is unable to locate the infection in the source code. It's not until we...
---------------------------------------------
http://blog.sucuri.net/2014/09/conditional-malicious-iframe-targeting-wordp…
*** PHP Fixes Several Bugs in Version 5.4 and 5.5, (Fri, Sep 19th) ***
---------------------------------------------
PHP announced the released of version 5.5.17 and 5.4.33. Ten bugs were fixed in version 5.4.33 and 15 bugs were fixed in version 5.5.17. All PHP users are encouraged to upgrade.The latest version are available for download here. [1] http://php.net/ChangeLog-5.php#5.4.33 [2] http://php.net/ChangeLog-5.php#5.5.17 [3] http://windows.php.net/download ----------- Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18683&rss
*** CipherShed Fork from TrueCrypt Project, Support Windows, Mac OS and Linux - https://ciphershed.org, (Fri, Sep 19th) ***
---------------------------------------------
----------- Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18677&rss
*** New OWASP Testing guide version 4! Check https://www.owasp.org/images/1/19/OTGv4.pdf, (Sat, Sep 20th) ***
---------------------------------------------
Manuel Humberto Santander Peláez SANS Internet Storm Center - Handler Twitter: (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18687&rss
*** CloudFlare ditches private SSL keys for better security ***
---------------------------------------------
Sorry, spooks, we cant decrypt this for you CloudFlare has announced the outcome of what it says is two years work - switching on Keyless SSL - which lets customers encrypt their web traffic via the companys services without having to hand over their private SSL keys.
---------------------------------------------
http://www.theregister.co.uk/2014/09/22/cloudflare_ditches_keys_for_better_…
*** Holzleim: Fingerabdrucksensor des iPhone 6 ausgetrickst ***
---------------------------------------------
Mit einer simpel angefertigten Kopie hat Ben Schlabs von den SRLabs den Fingerabdrucksensor des iPhone 6 getäuscht. Da Apple unter iOS 8 auch Drittanbieter diese Authentifizierungsmethode nutzen lässt, ist dies brisanter als beim iPhone 5S.
---------------------------------------------
http://www.golem.de/news/holzleim-fingerabdrucksensor-des-iphone-6-ausgetri…
*** VB2014 preview: Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam ***
---------------------------------------------
Jérôme Segura looks at recent developments in malicious cold calls. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, in the final entry in this series, we look at the paper Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam, by Jérôme Segura (Malwarebytes).Two years ago, at VB2012 in Dallas, I...
---------------------------------------------
https://www.virusbtn.com/blog/2014/09_22.xml
*** Doubleclick und Zedo lieferten virenverseuchte Werbung aus ***
---------------------------------------------
Das große Werbenetzwerk Zedo und die Google-Tochter Doubleclick sollen nach Angaben eines Antivirenherstellers fast einen Monat lang Schadcode über ihre Werbung verteilt haben. Auch größere Webseiten wie Last.fm waren betroffen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Doubleclick-und-Zedo-lieferten-viren…
*** iOS 7.1.x Exploit Released (CVE-2014-4377), (Mon, Sep 22nd) ***
---------------------------------------------
Havent upgraded to iOS 8 yet? Aside from a lot of new features, Apple also fixed a number of security vulnerabilities in iOS 8. For example CVE-2014-4377, a memory corrupion issue in iOSs core graphics library. An exploit is now available for this vulnerability. NOTE: I have not verified yet that the exploit is working / genuine. We will not link at this point to the exploit code, but basic Google Fu should allow you to find it. The author claims that the exploit is "compleatly reliable
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18693&rss
*** Datenleck: WhatsApp petzt Online-Status ***
---------------------------------------------
Ob und wie oft man WhatsApp öffnet, will man unter Umständen lieber für sich behalten. Der Betreiber macht diese Information allerdings für jedermann zugänglich, der die Nummer kennt. Selbst, wenn man dies in den Datenschutz-Einstellungen deaktiviert hat.
---------------------------------------------
http://www.heise.de/security/meldung/Datenleck-WhatsApp-petzt-Online-Status…
*** VU#730964: FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities ***
---------------------------------------------
Vulnerability Note VU#730964 FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities Original Release date: 19 Sep 2014 | Last revised: 19 Sep 2014 Overview Fortinet FortiGate and FortiWiFi appliances are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122). Description Fortinet FortiGate and FortiWiFi 4.00.6 and possibly earlier versions are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow...
---------------------------------------------
http://www.kb.cert.org/vuls/id/730964
*** Cisco Nexus 1000V Cross-Site Scripting Vulnerability ***
---------------------------------------------
CVE-2014-3367
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** IBM Security Bulletins ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_pure_application_…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletins for ClearQuest ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Asterisk PJSIP channel denial of service ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/96073
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 18-09-2014 18:00 − Freitag 19-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** WordFence WordPress Security Plugin Pushes a Security Update ***
---------------------------------------------
If you are one of the many users of the WordPress Security Plugin, WordFence, we highly encourage you to update. They recently pushed out an important security update that ..
---------------------------------------------
http://blog.sucuri.net/2014/09/security-disclosure-the-wordfence-wordpress-…
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** CosmicDuke and the latest political news ***
---------------------------------------------
After we had published the CosmicDuke report in July 2014, we continued to actively follow the malware. Today, we discovered two new samples that both leverage timely, political topics to deceive the recipient into opening ..
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002745.html
*** Nuclear exploit kit - complete infection cycle ***
---------------------------------------------
Zscaler ThreatLabZ has been seeing a steady increase in the Nuclear Exploit Kit (EK) traffic over the past few weeks. The detection of malicious activity performed by this EK remains low, due to usage of dynamic content and heavy ..
---------------------------------------------
http://research.zscaler.com/2014/09/nuclear-exploit-kit-complete-infection.…
*** Web Scan looking for /info/whitelist.pac, (Fri, Sep 19th) ***
---------------------------------------------
Nathan reported today that he has been seeing a new trend of web scanning against his webservers looking for /info/whitelist.pac. The scanning he has observed is over SSL. He has been ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18675
*** Asterisk res_fax_spandsp Module Processing Flaw Lets Remote Authenticated Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1030876
*** Asterisk SIP SUBSCRIBE Type Handling Flaw Lets Remote Authenticated Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1030875
*** Android ist in Zukunft standardmässig verschlüsselt ***
---------------------------------------------
Wie Google offiziell bekannt gegeben hat, wird die Verschlüsselungsfunktion in Android L erstmals ab Werk eingeschaltet sein.
---------------------------------------------
http://futurezone.at/produkte/android-ist-in-zukunft-standardmaessig-versch…
*** Advantech WebAccess Vulnerabilities ***
---------------------------------------------
Researcher Ricardo Narvaja of Core Security Technologies has identified several buffer overflow vulnerabilities in Advantech's WebAccess application. Advantech has produced a patch that mitigates these vulnerabilities. The researcher has ..
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-261-01
*** Bugtraq: CVE ID Syntax Change - Deadline Approaching ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533478
*** How to Detect SQL Injection Attacks ***
---------------------------------------------
SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is that they still work on quite a few web application targets. In fact, according to Veracode's 2014 State of Security Software Report , SQL injection vulnerabilities still ..
---------------------------------------------
http://thehackernews.com/2014/09/how-to-detect-sql-injection-attacks.html
*** Hackerangriff auf Home Depot: 56 Millionen Kreditkarten betroffen ***
---------------------------------------------
Hacker sind weiter auf Beutezug durch den US-Einzelhandel: Erst verschafften sie sich Zugriff auf rund 40 Millionen Bankkarten bei Target-Supermärkten, jetzt könnten bei der Baumarktkette Home Depot 56 Millionen Karten betroffen sein.
---------------------------------------------
http://www.heise.de/security/meldung/Hackerangriff-auf-Home-Depot-56-Millio…
*** Cloudflare: TLS-Verbindungen ohne Schlüssel sollen Banken schützen ***
---------------------------------------------
Cloudflare bietet Kunden künftig ein neues Feature namens Keyless SSL, mit dem der Teil des TLS-Handshakes, der den privaten Schlüssel benötigt, ausgelagert werden kann. Damit können Unternehmen die Kontrolle über den Schlüssel behalten.
---------------------------------------------
http://www.golem.de/news/cloudflare-tls-verbindungen-ohne-schluessel-sollen…
*** XSS: Cross-Site-Scripting über DNS-Records ***
---------------------------------------------
Eine besonders kreative Variante einer Cross-Site-Scripting-Lücke macht auf der Webseite Hacker News die Runde: Mittels eines TXT-DNS-Records lässt sich auf zahlreichen Webseiten Javascript einfügen.
---------------------------------------------
http://www.golem.de/news/xss-cross-site-scripting-ueber-dns-records-1409-10…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 17-09-2014 18:00 − Donnerstag 18-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** How Cops Can Still Pull Data Off Your Locked iPhone, In Spite Of Apple ***
---------------------------------------------
A reminder to iPhone owners cheering Apple's latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn't mean it can prevent the cops from vivisecting the device on their own. On Wednesday evening Apple made news ..
---------------------------------------------
http://www.wired.com/2014/09/apple-iphone-security/
*** SA-CONTRIB-2014-091 - Survey Builder - Cross Site Scripting (XSS) ***
---------------------------------------------
When viewing surveys at "/surveys", the survey titles printed out are not sanitized. Any potentially dangerous code in the survey titles is also rendered. This vulnerability is mitigated by the fact that a user must have the "Create Survey" permission ..
---------------------------------------------
https://www.drupal.org/node/2340069
*** SA-CONTRIB-2014-088 - Mollom - Cross-site scripting (XSS) ***
---------------------------------------------
Mollom offers a feature to report submitted content as inappropriate which allows end users to indicate that a piece of site content is objectionable or out of place. When reporting content, the content title is not sufficiently sanitized to prevent cross-site scripting (XSS) attacks. This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create content and the content type must ..
---------------------------------------------
https://www.drupal.org/node/2340029
*** Bugtraq: APPLE-SA-2014-09-17-2 Apple TV 7 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533468
*** D-BUS Buffer Overflow and Multiple Processing Flaws Let Local Users Obtain Elevated Privileges and Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1030864
*** Apple OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges and Obtain Potentially Sensitive Information ***
---------------------------------------------
http://www.securitytracker.com/id/1030868
*** Open Web App Security Project releases new app dev opus ***
---------------------------------------------
The global security community has completed an 18-month effort to produce a guide it is hoped will boost the standard of web application testing and address new and dangerous technologies. Version 4 of the Open Web App Security Projects (OWASPs) Testing Guide was produced by more than 60 security bods from around the world with a core lead team of four.
---------------------------------------------
http://www.theregister.co.uk/2014/09/18/guide_to_obliterating_web_apps_publ…
*** Yokogawa CENTUM and Exaopc Vulnerability ***
---------------------------------------------
Tod Beardsley of Rapid7 Inc., and Jim Denaro of CipherLaw, have identified an authentication vulnerability and released proof-of-concept (exploit) code for the Yokogawa CENTUM CS 3000 series and Exaopc products. JPCERT and Yokogawa have mitigated this vulnerability.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-260-01
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 16-09-2014 18:00 − Mittwoch 17-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** https://yourfakebank.support -- TLD confusion starts!, (Tue, Sep 16th) ***
---------------------------------------------
Pretty much ever since the new top level domain (TLD) ".biz" went online a couple years ago, and the only ones buying domains in this space were the scammers, we kinda knew what would happen when ICANNs latest folly and money-grab went live. It looks like a number of the "new" top level domains, like ".support", ".club", etc have now come online. And again, it seems like only the crooks are buying. We are currently investigating a wave of phishing emails
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18651&rss
*** Hintergrund: Nach Snowden: Wenig Schlaf für Kryptoforscher ***
---------------------------------------------
Bei der Internet Engineering Task Force in Toronto stellte Lange vor kurzem einen Überblick über elliptische Kurven Verschlüsselung vor und riet dringend, sich für neuere Varianten zu entscheiden. Sie sprach am Rande der Veranstaltung mit heise Security.
---------------------------------------------
http://www.heise.de/security/artikel/Nach-Snowden-Wenig-Schlaf-fuer-Kryptof…
*** Virus activity overview: Adware and other security events of August 2014 ***
---------------------------------------------
September 1, 2014 The last summer month of 2014 witnessed not only a large number of encryption Trojans in action but also a myriad of malicious programs displaying annoying (and sometimes fraudulent) ads in an effort to generate revenue for the criminals behind them. Also at summers end, Chinese attackers intensified their efforts to port certain Linux malware programs to Windows. In addition, security researchers discovered new threats to Android. Viruses Statistics collected by Dr.Web
---------------------------------------------
http://news.drweb.com/show/?i=5935&lng=en&c=9
*** Netzwerkanalyse-Tool Message Analyzer in Version 1.1 veröffentlicht ***
---------------------------------------------
Microsoft hat sein Sniffing- und Analysetool Message Analyzer in der Version 1.1 herausgebracht. Die neue Fassung schneidet unter anderem Netzwerkdaten aus der Ferne mit oder entschlüsselt SSL-gesicherte Datenströme.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Netzwerkanalyse-Tool-Message-Analyze…
*** Understanding the WordPress Security Plugin Ecosystem ***
---------------------------------------------
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn't it always funny to see what the final message received would be? Oh and how it would have morphed as it was processed and conveyed by each individual in the group. This is what I see when I look at the WordPress Security Ecosystem.
---------------------------------------------
http://blog.sucuri.net/2014/09/understanding-the-wordpress-security-plugin-…
*** FreeBSD Denial of Service advisory (CVE-2004-0230), (Tue, Sep 16th) ***
---------------------------------------------
A vulnerability has been discovered by Johnathan Looney at the Juniper SIRT in FreeBSD (base for Junos and many other products) in the way that FreeBSD processes certain TCP packets (https://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc) If you send TCP SYN packets for an existing connection (i.e. the correct source IP, source port, destination IP, destination port combination) the operating system will tear down the connection. The attack is similar to the "slipping in the
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18657&rss
*** EMC Documentum Content Server Flaws Let Remote Authenticated Users Gain Elevated Privileges ***
---------------------------------------------
http://www.securitytracker.com/id/1030855
*** Bugtraq: Android Bluetooth Pairing Packet Processing Vulnerability (by wangzq from NCNIPC) ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533462
*** DSA-3025-1 apt -- security update ***
---------------------------------------------
It was discovered that APT, the high level package manager, does not properly invalidate unauthenticated data (CVE-2014-0488), performs incorrect verification of 304 replies (CVE-2014-0487), does not perform the checksum check when the Acquire::GzipIndexes option is used (CVE-2014-0489) and does not properly perform validation for binary packages downloaded by the apt-get download command (CVE-2014-0490). For the stable distribution (wheezy), these problems have been fixed in version...
---------------------------------------------
https://www.debian.org/security/2014/dsa-3025
*** Schneider Electric SCADA Expert ClearSCADA Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for three vulnerabilities in Schneider Electric's StruxureWare SCADA Expert ClearSCADA.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-259-01
*** IBM Security Bulletins ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 15-09-2014 18:00 − Dienstag 16-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Security updates available for Adobe Reader and Acrobat (APSB14-20) ***
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1130
*** THREE QUARTERS of droid phones open to web page spy bug ***
---------------------------------------------
Metasploit module gobbles KitKat SOP slop A Metasploit module has been developed to easily exploit a dangerous flaw in 75 percent of Android devices that allows attackers to hijack a users open websites.
---------------------------------------------
http://www.theregister.co.uk/2014/09/16/three_quarters_of_droid_phones_open…
*** Attackers tapping on SNMP door to see if its open ***
---------------------------------------------
SANS spots new, dumb attack Googles DNS IP address is being spoofed by an attacker, apparently in an attempt to DDoS hosts vulnerable to a flaw in the SNMP protocol.
---------------------------------------------
http://www.theregister.co.uk/2014/09/16/attackers_tapping_on_snmp_door_to_s…
*** Kindle durch versteckte Codes in E-Books gefährdet ***
---------------------------------------------
Durch eine Sicherheitslücke im E-Reader Kindle können Angreifer an die Daten von Amazon-Kunden gelangen. Die Lücke tritt zum zweiten Mal auf.
---------------------------------------------
http://futurezone.at/digital-life/kindle-durch-versteckte-codes-in-e-books-…
*** Encrypt-then-MAC für TLS standardisiert ***
---------------------------------------------
Eine neue TLS-Erweiterung ermöglicht es, die Reihenfolge zwischen Authentifizierung und Verschlüsselung zu ändern. Die bisherige Methode führte zu Sicherheitsproblemen wie der Lucky-Thirteen-Attacke. ... Gegen die Lucky-Thirteen-Attacke wurden Workarounds in die gängigen Browser und TLS-Bibliotheken eingebaut, aber trotzdem gab es den Wunsch, das Problem generell zu beheben.
---------------------------------------------
http://www.golem.de/news/verschluesselung-encrypt-then-mac-fuer-tls-standar…
*** Ungestopftes Datenleck in Androids Open-Source-Browser ***
---------------------------------------------
Eine Lücke im AOSP-Browser von Android erlaubt es Webseiten die Daten anderer Seiten auszulesen. Die App wird in fast allen Android-Versionen vor Kit Kat mitgeliefert und dient vielen Custom-ROMs ebenfalls als Standard-Browser.
---------------------------------------------
http://www.heise.de/security/meldung/Ungestopftes-Datenleck-in-Androids-Ope…
*** AppLock Vulnerability Leaves Configuration Files Open for Exploit ***
---------------------------------------------
We have previously discussed about certain file locker apps that fail to do hide files properly. We recently came across yet another file locker app, AppLock, which has the same issue. However, the vulnerability concerning this app goes beyond improperly hiding files - the vulnerability can ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/applock-vulnerab…
*** Twitter Vulnerability Allows Hacker to Delete Credit Cards from Any Twitter Account ***
---------------------------------------------
At the beginning of this month, just like other social networks, Twitter also started paying individuals for any flaws they uncover on its service with a fee of $140 or more offered per flaw under its new Bug Bounty program, and here comes the ..
---------------------------------------------
http://thehackernews.com/2014/09/twitter-vulnerability-allows-hacker-to_16.…
*** Metasploit gems from scratch ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/09/16/metasploi…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 12-09-2014 18:00 − Montag 15-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Squid Off-by-One in snmpHandleUdp() Lets Remote Users Execute Arbitrary Code ***
---------------------------------------------
A remote user can send a specially crafted UDP SNMP packet to trigger an off-by-one memory error in snmpHandleUdp() and potentially execute arbitrary code on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1030838
*** Rooted SSH/SFTP Daemon Default Login Credentials ***
---------------------------------------------
The software comes pre-configured with a default login of User: root Password: abc123. This weak password
would easily be guessed leading to root compromise of the android system.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014090066
*** WordPress Photo Album Plus 5.4.4 Cross Site Scripting ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014090061
*** Malware 'Eskimo' hat es auf Steam-Konten abgesehen ***
---------------------------------------------
Die Schadsoftware wird hauptsächlich im Twitch-Chat verbreitet - Guthaben sowie Items werden nach Hack übertragen
---------------------------------------------
http://derstandard.at/2000005543386
*** IRC: Chatnetzwerk Freenode gehackt ***
---------------------------------------------
Die Betreiber des IRC-Netzwerks Freenode haben eine Kompromittierung ihrer Server festgestellt. Alle Nutzer sollten vorsorglich ihr Passwort ändern.
---------------------------------------------
http://www.golem.de/news/irc-chatnetzwerk-freenode-wurde-gehackt-1409-10923…
*** Multiple vulnerabilities in IBM products ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_pureapplication_s…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Trustwave.com: 2014 Business Password Analysis ***
---------------------------------------------
We set out to determine how easily we could crack a sample of 626,718 hashed passwords we collected during thousands of network penetration tests performed in 2013 and some performed in 2014. ... We recovered more than half of the passwords within just the first ..
---------------------------------------------
https://gsr.trustwave.com/topics/business-password-analysis/2014-business-p…
*** Moodle Bugs Let Remote Users Obtain Potentially Sensitive Information and Bypass Security Controls ***
---------------------------------------------
Moodle Bugs Let Remote Users Obtain Potentially Sensitive Information and Bypass Security Controls
---------------------------------------------
http://www.securitytracker.com/id/1030839
*** Hacking Canon Pixma Printers - Doomed Encryption ***
---------------------------------------------
This blog post is another in the series demonstrating current insecurities in devices categorised as the 'Internet of Things'. This instalment will reveal how the firmware on Canon Pixma printers (used in the home and by SMEs) can be modified from the Internet to run custom code. ... For demonstration purposes I decided to get Doom running on the printer (Doom as in the classic 90s computer game).
---------------------------------------------
http://www.contextis.co.uk/resources/blog/hacking-canon-pixma-printers-doom…
*** Bugtraq: Open-Xchange Security Advisory 2014-09-15 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533443
*** [Honeypot Alert] New Bot Malware (BoSSaBoTv2) Attacking Web Servers Discovered ***
---------------------------------------------
Our web honeypots picked up some interesting attack traffic. The initial web application attack vector (PHP-CGI vulnerability) is not new, the malware payload is. We wanted to get this information out to the community quickly due to the following combined threat elements - Active exploit attempts to upload/install the malware The overall low detection rates among AV vendors The malware is actively being sold in underground ..
---------------------------------------------
http://blog.spiderlabs.com/2014/09/honeypot-alert-bossabotv2-irc-botnetbitc…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 11-09-2014 18:00 − Freitag 12-09-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Hacker publishes tech support phone scammer slammer ***
---------------------------------------------
Security pro Matthew Weeks has released a Metasploit module that can take over computers running the Ammyy Admin remote control software popular among "Hi this is Microsoft, theres a problem with your computer" tech support scammers. Weeks day job is director at Root9b, but hes taken time to detail a zero-day flaw in Ammyy Admin he hopes will be used to fight back against tech support scammers.
---------------------------------------------
http://www.theregister.co.uk/2014/09/12/phone_scammer_slammer/
*** Cisco Unified Communications Manager glibc Arbitrary Code Execution Vulnerability ***
---------------------------------------------
A vulnerability in the GNU C library of Cisco Unified Communications Manager (Cisco Unified CM) could allow an unauthenticated, local attacker to input crafted data to cause a heap-based buffer overflow.
The vulnerability is due to incorrect sanitization of data. An attacker could exploit this vulnerability by setting an environment variable to a malicious value.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Schneider Electric VAMPSET Buffer Overflow ***
---------------------------------------------
This advisory provides mitigation details for a buffer overflow vulnerability in Schneider Electric's VAMPSET software product.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-254-01
*** Ecava Integraxor SCADA Server Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities in the Ecava Integraxor SCADA Server.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-224-01
*** Linux Kernel logi_dj_recv_destroy_djhid_device buffer overflow ***
---------------------------------------------
Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking by the logi_dj_recv_destroy_djhid_device function. By sending an overly long string, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/95928
*** DNS cache poisoning used to steal emails ***
---------------------------------------------
Does this happen in practice? CERT/CC researchers Jonathan Spring and Leigh Metcalf have evidence to suggest that it does. Using passive DNS data, they found a number of incorrect responses for A records belonging to mail servers of the big three webmail providers (Gmail, Yahoo! and Hotmail). Even though an increasing number of emails are sent over encrypted connections (using STARTTLS), there isnt really a way for the receiving mail server to enforce this, as HSTS does for secure HTTP
---------------------------------------------
https://www.virusbtn.com/blog/2014/09_12.xml?rss
*** Multiple security bulletins for IBM products ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 10-09-2014 18:00 − Donnerstag 11-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** iOS 8 stopft Hintertüren weitestgehend ***
---------------------------------------------
Apple hat die für Diagnosezwecke gedachten Systemdienste in iOS 8 grösstenteils abgeschottet, berichtet ein Sicherheitsforscher. Bislang lassen sich darüber zahlreiche Nutzerdaten auslesen.
---------------------------------------------
http://www.heise.de/security/meldung/iOS-8-stopft-Hintertueren-weitestgehen…
*** Multiple vulnerabilities in Juniper products ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10646http://kb.juniper.net/index?page=content&id=JSA10645http://kb.juniper.net/index?page=content&id=JSA10647
*** IBM Security Bulletin: Fixes available for Security Vulnerabilities in IBM WebSphere Portal (CVE-2014-4762; CVE-2014-4792) ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Apache Warns of Tomcat Remote Code Execution Vulnerability ***
---------------------------------------------
Some older versions of Apache Tomcat, the company's open source web server and servlet container, are vulnerable to remote code execution.
---------------------------------------------
http://threatpost.com/apache-warns-of-tomcat-remote-code-execution-vulnerab…
*** IBM Security Bulletin: Administrator password can be reset without authentication on SAN Volume Controller and Storwize Family (CVE-2014-4811) ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** AIX OpenSSL Denial of Service due to double free ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/aix_openssl_denial_of…
*** Cisco Unified Communications Manager GLIBC Arbitrary Code Execution Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco TelePresence System MXP Series Software Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** SA-CONTRIB-2014-087 - Drupal Commerce - Information disclosure ***
---------------------------------------------
Drupal Commerce is used to build eCommerce websites and applications of all sizes. The commerce_order module can be used to create new user accounts where email addresses are used as user names. Since user names are not considered ..
---------------------------------------------
https://www.drupal.org/node/2336357
*** Oracle MySQL Server MyISAM code execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/95881
*** Swiss economy makes online security its priority ***
---------------------------------------------
Switzerland is one of the safest countries in the world. To make also the Internet a secure place in Switzerland, the Swiss online economy has started the Swiss Internet ..
---------------------------------------------
http://securityblog.switch.ch/2014/09/11/swiss-economy-makes-online-securit…
*** SHA1 deprecation: what you need to know ***
---------------------------------------------
The news is that SHA1, a very popular hashing function, is on the way out. Strictly speaking, this development is not new. The first signs of weaknesses in SHA1 appeared (almost) ten years ago. In 2012, some calculations showed how breaking SHA1 is becoming feasible for those who can afford it. In November 2013, Microsoft announced that they wouldnt be accepting SHA1 certificates after 2016.
---------------------------------------------
http://blog.ivanristic.com/2014/09/sha1-deprecation-what-you-need-to-know.h…
*** Tabnabbing: A New Type of Phishing Attack ***
---------------------------------------------
Most phishing attacks depend on an original deception. If you detect that you are at the wrong URL, or that something is amiss on a page, the chase is up. You've escaped the attackers. In fact, the time that wary people are most wary is exactly when they first navigate to a site. What we don't expect is that a page we've been looking at will change behind our backs, when we aren't looking. That'll catch us by surprise.
---------------------------------------------
http://www.azarask.in/blog/post/a-new-type-of-phishing-attack/
*** Sicherheitslücke in vielen WordPress-Themes ***
---------------------------------------------
Ein Fehler im beliebten Plug-in Slider Revolution erlaubt es, beliebige Dateien vom Webserver herunterzuladen. Damit kann ein Angreifer im schlimmsten Fall den ganzen Server kompromittieren. Das Plug-in ist in einer grossen Zahl von Themes fest verbaut.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-in-vielen-WordPress-…
*** A system that facilitates malware identification in smartphones ***
---------------------------------------------
The tool, developed by these UC3M researchers, baptized DENDROID and detailed in a study published in the review Expert Systems with Applications, allows security analysts to scrutinize a large quantity of apps to determine the origins of a malware sample and the family to which it belongs.
---------------------------------------------
http://www.alphagalileo.org/ViewItem.aspx?ItemId=145206
*** Home Articles PCI Updates Skimming Prevention Guide - Best Practices for Protecting Merchants from POS Attacks ***
---------------------------------------------
At a time when retailers are seeing a surge in point-of-sale breaches, The PCI Security Standards Council has released an update to its guidance for merchants on protecting against card skimming attacks in POS environments.
---------------------------------------------
http://www.bankinfosecurity.co.uk/pci-updates-skimming-prevention-guide-a-7…
*** Key Flaw Enables Recovery of Files Encrypted by TorrentLocker ***
---------------------------------------------
Crypto ransomware, a relatively unknown phenomenon a couple of years ago, has exploded into one of the nastier malware problems for Internet users. Variants such as CryptoLocker and CryptoWall have been siphoning money from victims for some time, and now researchers have dissected a newer ..
---------------------------------------------
http://threatpost.com/key-flaw-enables-recovery-of-files-encrypted-by-torre…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 09-09-2014 18:00 − Mittwoch 10-09-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Security updates available for Adobe Flash Player (APSB14-21) ***
---------------------------------------------
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions
...
CVE-2014-0547, CVE-2014-0548, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, CVE-2014-0553, CVE-2014-0554, CVE-2014-0555, CVE-2014-0556, CVE-2014-0557, CVE-2014-0559
---------------------------------------------
http://helpx.adobe.com/security/products/flash-player/apsb14-21.html
*** Assessing risk for the September 2014 security updates ***
---------------------------------------------
Today we released four security bulletins addressing 42 unique CVE's. One bulletin has a maximum severity rating of Critical and the other three have maximum severity Important. This table is designed to help you prioritize the deployment of updates appropriately for your environment.
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-se…
*** MSRT September 2014 - Zemot ***
---------------------------------------------
​This month we added the Win32/Zemot family to the Malicious Software Removal Tool. The Zemot family of trojan downloaders are frequently used by malware with a number of different payloads. We started seeing activity from TrojanDownloader:Win32/Upatre.B in late 2013 and identified this threat as the main distributor of the click fraud malware PWS:Win32/Zbot.gen!AP and PWS:Win32/Zbot.CF. We renamed the downloader to Zemot in May 2014. Recently, other malware such as Win32/Rovnix,
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/09/09/msrt-september-2014-zemo…
*** Microsoft IIS Web Server - CMD Process Contributing to Website Reinfections ***
---------------------------------------------
We often spend a lot of time talking about application level malware, but from time to time we do like to dabble in the ever so interesting web server infections as well. It is one of those things that comes with the job. Today, we're going to chat about an interesting reinfection case in which the client was running their website on a Microsoft's Internet Information Services (IIS) web server. Yes, contrary to popular belief many organizations, especially large enterprise
---------------------------------------------
http://blog.sucuri.net/2014/09/microsof-iis-web-server-cmd-process-contribu…
*** VMware vSphere product updates to third party libraries ***
---------------------------------------------
The Apache Struts library is updated to address a security issue. This issue may lead to remote code execution after authentication. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-0114 to this issue.
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
*** The September 2014 issue of our SWITCH Security Report is available! ***
---------------------------------------------
A new issue of our monthly SWITCH Security Report has just been released.
Topics:
- Inside information on government Trojans used internationally published on Twitter
- Page not found: Network blocking in in Switzerland and neighbouring countries
- Breaking bad - malvertising ransomware: ZeroLocker / CryptoLocker / CryptoWall / SynoLocker
- Canvas or cookies - choosing between Scylla and Charybdis
- The Clipboard: Interesting presentations, articles and videos
---------------------------------------------
http://securityblog.switch.ch/2014/09/10/the-september-2014-issue-of-our-sw…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 08-09-2014 18:00 − Dienstag 09-09-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Cisco Unified Computing System E-Series Blade Servers Cisco Integrated Management Controller SSH Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers could allow an unauthenticated, remote attacker to cause a denial of service condition.
The vulnerability is due to a failure to properly handle a crafted SSH packet. An attacker could exploit this vulnerability by sending a crafted packet to the SSH server running on the Cisco IMC of an affected device, which could result in the Cisco IMC becoming unresponsive. The operating system running on the blade will be unaffected.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS XR Software DHCPv6 Denial Of Service Vulnerability ***
---------------------------------------------
A vulnerability in the DHCP version 6 (DHCPv6) code of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause the DHCPv6 server process on an affected device to crash.
The vulnerability is due to incorrect handling of malformed DHCPv6 packets. An attacker could exploit this vulnerability by sending a malformed DHCPv6 packet to an affected device configured with DHCPv6 server functionality. An exploit could allow the attacker to cause the DHCPv6 process on the device to crash.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Netgear ProSafe Plus Configuration Utility information disclosure ***
---------------------------------------------
Netgear ProSafe Plus Configuration Utility could allow a remote attacker to obtain sensitive information, caused by the storing of passwords in plaintext within the backup file. An attacker could exploit this vulnerability using the configuration backup file to obtain sensitive information.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/95780
*** Researchers reveal security issues in Android apps ***
---------------------------------------------
On Monday, the University of New Haven revealed its first video in a series of security findings.
---------------------------------------------
http://www.scmagazine.com/researchers-reveal-security-issues-in-android-app…
*** Why Google Is Pushing For a Web Free of SHA-1 ***
---------------------------------------------
An anonymous reader writes: Google recently announced Chrome will be gradually phasing out support for certificates using SHA-1 encryption. They said, "We need to ensure that by the time an attack against SHA-1 is demonstrated publicly, the web has already moved away from it." Developer Eric Mill has written up a post explaining why SHA-1 is dangerously weak, and why moving browsers away from acceptance of SHA-1 is a lengthy, but important process.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/ME5Z29v_gGw/story01.htm
*** Salesforce: Oh no! Dyre RATs are thirsty for our customers logins ***
---------------------------------------------
But attacks werent the cause of server outage, were told Salesforce has warned that miscreants are trying to infect its customers with a remote access trojan (RAT) dubbed Dyre that siphons off Salesforce.com login data.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/08/salesforcec…
*** H1 2014 Threat Report ***
---------------------------------------------
Our latest Threat Report is now available.
The report includes our statistics, incidents calendar and threatscape summaries for H1(Q1+Q2) 2014.
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002741.html
*** QEMU VGA Emulator Bug Lets Local Guest Users Obtain Potentially Sensitive Information from the Host System ***
---------------------------------------------
Description: A vulnerability was reported in QEMU. A local user on a guest system can obtain potentially sensitive information from the host system.
A guest system Graphics Output Protocol driver can set a high resolution to trigger a flaw in the VGA emulator and obtain host memory contents.
Impact: A local user on a guest system can obtain potentially sensitive information from the host system memory.
---------------------------------------------
http://www.securitytracker.com/id/1030817
*** Enigmail PGP plugin forgets to encrypt mail sent as blind copies ***
---------------------------------------------
User now waiting for the bad guys come and get me with their water-boards Enigmail has patched a hole in the worlds most popular PGP email platform that caused mail to be sent unencrypted when all security check boxes were ticked.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/09/enigmail_en…
*** Kaspersky Internet Security Android App Certificate Validation Flaw Lets Remote Users Spoof Servers ***
---------------------------------------------
A vulnerability was reported in Kaspersky Internet Security app for Android. A remote user can spoof servers.
The application (com.kms.free) does not verify X.509 certificates from SSL servers. A remote user with the ability conduct a man-in-the-middle attack can supply a specially crafted certificate to spoof an SSL server obtain or modify sensitive information
---------------------------------------------
http://www.securitytracker.com/id/1030815
*** OpenSSL Security Policy ***
---------------------------------------------
Recent flaws have captured the attention of the media and highlighted how much of the internet infrastructure is based on OpenSSL. Weve never published our policy on how we internally handle security issues; that process being based on experience and has evolved over the years.
---------------------------------------------
https://www.openssl.org/about/secpolicy.html
*** 'Google Dorking' - Waking Up Web Admins Everywhere ***
---------------------------------------------
Last July, the US Department of Homeland Security warned of a new kind of criminal attack: 'Google dorking'. This refers to asking Google for things they have found via special search operators. Let's look closely and see what this is. Google finds things online using a program that accesses web sites: the Google web crawler, called ...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/DdLfN3jTMhw/
*** How a DNS Sinkhole Can Protect Against Malware ***
---------------------------------------------
The Domain Name Service (DNS) is an integral part of Internet access. It translates human-recognized domain names into computer-readable IP addresses in order to facilitate online communication and connection between devices. ... And one of the best ways to gain control is via DNS itself, in order to disrupt malware transmission at the very point of connection. A DNS sinkhole, or sinkhole server, gives organizations this control in order to prevent internal access to malicious websites.
---------------------------------------------
http://resources.infosecinstitute.com/dns-sinkhole-can-protect-malware/
*** Threat Spotlight: 'Kyle and Stan' Malvertising Network Threatens Windows and Mac Users With Mutating Malware ***
---------------------------------------------
Once the victim gets redirected to the final URL, the website automatically starts the download of a unique piece of malware for every user. The file is a bundle of legitimate software, like a media-player, and compiles malware and a unique-to-every-user configuration into the downloaded file. The attackers are purely relying on social engineering techniques, in order to get the user to install the software package. No drive-by exploits are being used thus far.
---------------------------------------------
https://blogs.cisco.com/security/kyle-and-stan/
*** Modern anti-spam and E2E crypto ***
---------------------------------------------
... asked me to write up some thoughts on how spam filtering and fully end to end crypto would interact, so its all available in one message instead of scattered over other threads. Specifically he asked for brain dumps on: - how does antispam currently work at large email providers - how would widespread E2E crypto affect this - what are the options for moving things to the client (and pros, cons) - is this feasible for email?
---------------------------------------------
https://moderncrypto.org/mail-archive/messaging/2014/000780.html
*** Research Finds No Large Scale Heartbleed Exploit Attempts Before Vulnerability Disclosure ***
---------------------------------------------
In the days and weeks following the public disclosure of the OpenSSL Heartbleed vulnerability in April, security researchers and others wondered aloud whether there were some organizations - perhaps the NSA - that had known about the bug for some time and had been using it for targeted attacks. A definitive answer to that question may never come, but ...
---------------------------------------------
http://threatpost.com/research-finds-no-large-scale-heartbleed-exploit-atte…
*** UPDATE: Upcoming Security Updates for Adobe Reader and Acrobat (APSB14-20) ***
---------------------------------------------
UPDATE: The security update for Adobe Reader and Acrobat has been re-scheduled from September 9, 2014 to the week of September 15, 2014. This delay was necessary to address issues identified during routine regression testing.
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1121
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 05-09-2014 18:00 − Montag 08-09-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Apple IDs targeted by Kelihos botnet phishing campaign ***
---------------------------------------------
Botnet targets Apple customers, launching phishing email campaign to lure victims into disclosing their Apple IDs and passwords. Days after numerous celebrities were found to have their iCloud accounts compromised, a major botnet has turned its attention to Apple customers, launching a phishing email campaign ..
---------------------------------------------
http://www.symantec.com/connect/blogs/apple-ids-targeted-kelihos-botnet-phi…
*** USB firmware: An upcoming threat for home and enterprise users ***
---------------------------------------------
Every year, thousands of hackers and security researchers from around the world descend on Las Vegas to attend the annual Black Hat security conference. The conference boasts top notch security presentations from industry leaders - often centered on breaking computer security. Although many of the presentations are on breaking things, most of the ..
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/09/02/usb-firmware-an-upcoming…
*** Stupid Spammer Tricks - Reversing Characters ***
---------------------------------------------
Spammers engaged in phishing attacks constantly try to get their emails past spam filters. They try many different tactics, and these can include taking advantage of HTML coding characteristics. These HTML tricks can make the email look normal when rendered in a mail client, but the actual ..
---------------------------------------------
http://blog.spiderlabs.com/2014/09/stupid-spammer-tricks-reversing-characte…
*** Mozilla 1024-Bit Cert Deprecation Leaves 107,000 Sites Untrusted ***
---------------------------------------------
Mozilla has deprecated 1024-bit RSA certificate authority certificates in Firefox 32 and Thunderbird. While there are pluses to the move such as a requirement for longer, stronger keys, at least 107,000 websites will no longer be trusted by Mozilla. Data from HD Moores Project Sonar, which ..
---------------------------------------------
http://it.slashdot.org/story/14/09/05/2120246/mozilla-1024-bit-cert-depreca…
*** Cisco Integrated Management Controller SSH Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers could allow an unauthenticated, remote attacker to cause a denial of service condition.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Nuclear Exploit Kit and Flash CVE-2014-0515 ***
---------------------------------------------
For this blog, wed like to walk you through a recent attack involving Nuclear Exploit Kit (EK) that we analyzed. It was found leveraging CVE-2014-0515, a buffer overflow in Adobe Flash Player discovered in April 2014. Nuclear Exploit kit ..
---------------------------------------------
http://research.zscaler.com/2014/09/nuclear-exploit-kit-and-flash-cve-2014.…
*** WPS-Sicherheitslücke: Wahrscheinlich wenige Router betroffen ***
---------------------------------------------
Auf Anfrage von heise Netze haben sich einige Hersteller von in Deutschland verbreiteten Routern zur Sicherheitslücke in WPS-PIN geäussert, bei der sich die Zugangsnummer offline errechnen lässt.
---------------------------------------------
http://www.heise.de/security/meldung/WPS-Sicherheitsluecke-Wahrscheinlich-w…
*** Popular Photo Sharing Website Likes.com Vulnerable To Multiple Critical Flaws ***
---------------------------------------------
Likes.com, one of the emerging social networking site and popular image browsing platform, is found vulnerable to several critical vulnerabilities that could allow an attacker to completely delete users' account in just one click. Likes.com is a social networking website that helps you to connect ..
---------------------------------------------
http://thehackernews.com/2014/09/popular-photo-sharing-website.html
*** Demasking Google Users With a Timing Attack ***
---------------------------------------------
A 3rd party site can determine if a website viewer has access to a particular Google Drive document. ... How it works: The attack is straightforward. A malicious page repeatedly instantiates an image whose source points at the URL of a Google Drive document. If that document is viewable by the ..
---------------------------------------------
http://blog.andrewcantino.com/blog/2014/09/04/demasking-google-users-with-a…
*** Bugtraq: [security bulletin] HPSBUX03102 SSRT101681 rev.1 - HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Execution of Arbitrary Code and Denial of Service (DoS) and Other Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533370
*** iCloud: Apple verschickt neue Warnhinweise ***
---------------------------------------------
Nach den aus iCloud-Accounts entwendeten Promi-Nacktfotos hat Apple damit begonnen, neue Benachrichtigungen zu versenden, wenn auf den Cloud-Dienst zugegriffen wird. Weitere Schutzfunktionen sind angekündigt.
---------------------------------------------
http://www.heise.de/security/meldung/iCloud-Apple-verschickt-neue-Warnhinwe…