=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 09-07-2013 18:00 − Mittwoch 10-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Google patches critical Android threat as working exploit is unleashed ***
---------------------------------------------
Bug allows hackers to surreptitiously turn some legit apps into malicious ones.
---------------------------------------------
http://arstechnica.com/security/2013/07/google-patches-critical-android-thr…
*** Summary for July 2013 - Version: 1.1 ***
---------------------------------------------
This bulletin summary lists security bulletins released for July 2013.
With the release of the security bulletins for July 2013, this bulletin summary replaces the bulletin advance notification originally issued July 4, 2013. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-jul
*** Adobe Security Bulletins Posted ***
---------------------------------------------
APSB13-17 Security updates available for Adobe Flash Player
APSB13-18 Security update available for Adobe Shockwave
APSB13-19 Security update: Security Hotfixes available for ColdFusion
---------------------------------------------
http://blogs.adobe.com/psirt/2013/07/adobe-security-bulletins-posted-8.html
*** Who's Behind The Styx-Crypt Exploit Pack? ***
---------------------------------------------
Earlier this week I wrote about the Styx Pack, an extremely sophisticated and increasingly popular crimeware kit that is being sold to help miscreants booby-trap compromised Web sites with malware. Today, Ill be following a trail of breadcrumbs that leads back to central Ukraine and to a trio of friends who appear to be responsible for marketing (if not also making) this crimeware-as-a-service.
---------------------------------------------
https://krebsonsecurity.com/2013/07/whos-behind-the-styx-crypt-exploit-pack
*** Joomla Attachments Shell Upload ***
---------------------------------------------
Topic: Joomla Attachments Shell Upload Risk: High Text: # Exploit Title: Joomla Com_Attachments Component Arbitrary File Upload Vulnerability # Google Dork: inurl:...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070068
*** Cybercriminals spamvertise tens of thousands of fake 'Your Booking Reservation at Westminster Hotel' themed emails, serve malware ***
---------------------------------------------
By Dancho Danchev Cybercriminals are currently mass mailing tens of thousands of fake emails impersonating the Westminster Hotel, in an attempt to trick users into thinking that they've received a legitimate booking confirmation. In reality through, once the socially engineered users execute the malicious attachments, their PCs automatically join the botnet operated by the cybercriminals behind the ..
---------------------------------------------
http://blog.webroot.com/2013/07/10/cybercriminals-spamvertise-tens-of-thous…
*** Priyanka yanks your WhatsApp contact chain on Android mobes ***
---------------------------------------------
If that really is your name, nobody wants to know you right now A worm spreading through the popular WhatsApp messenging platform across Android devices is likely to cause plenty of confusion, even though it doesnt cause much harm.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/07/10/priyanka_wh…
*** Study: Bug bounty programs provide strong value for vendors ***
---------------------------------------------
A study of Googles and Mozillas browser bug programs shows it is money well spent
---------------------------------------------
http://www.csoonline.com/article/736127/study-bug-bounty-programs-provide-s…
*** Datenklau am Automaten: Millionenschaden trotz Milliardeninvestition ***
---------------------------------------------
Im Kampf gegen Datendiebe investieren Banken in bessere Technik. Ganz abhalten lassen sich Kriminelle dadurch nicht: Noch immer k�nnen sie in vielen Staaten mit Daten deutscher Bankkunden an Geld kommen.
---------------------------------------------
http://www.heise.de/security/meldung/Datenklau-am-Automaten-Millionenschade…
*** Scanner warnt vor Android-Lücke ***
---------------------------------------------
Eine kostenlose App soll zeigen, ob ein Android-Gerät von der kürzlich entdeckten Lücke in der Code-Signierungstechnik des Betriebssystems betroffen ist. Die Software stammt von der Firma, die auch den Fehler entdeckt hat.
---------------------------------------------
http://www.heise.de/security/meldung/Scanner-warnt-vor-Android-Luecke-19146…
*** Blog: Security policies: misuse of resources ***
---------------------------------------------
According to surveys conducted in Europe and the United States, company employees spend up to 30% of their working hours on private affairs. By multiplying the hours spent on non-business-related things by the average cost of the working hour, the analysts estimate the costs to companies amounting to millions of dollars a year.
---------------------------------------------
http://www.securelist.com/en/blog/8109/Security_policies_misuse_of_resources
*** Vuln: VLC Media Player CVE-2013-3245 Remote Integer Overflow Vulnerability ***
---------------------------------------------
VLC Media Player CVE-2013-3245 Remote Integer Overflow Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/61032
*** Advanced User Tagging vBulletin Stored XSS Vulnerability ***
---------------------------------------------
Topic: Advanced User Tagging vBulletin Stored XSS Vulnerability Risk: Low Text: # # Exploit Title: Advanced User Tagging vBulletin - Stored XSS Vulnerability # Google Dork: ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070077
*** Preparing For Possible Future Crypto Attacks ***
---------------------------------------------
Security experts warn that current advances in solving a complex problem could make a broad class of public-key crypto systems less secure Security researchers and hackers have always been good at borrowing ideas, refining them, and applying them to create practical attacks out of theoretical results.
---------------------------------------------
http://www.darkreading.com/vulnerability/preparing-for-possible-crypto-atta…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 08-07-2013 18:00 − Dienstag 09-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Root SSH Key Shipping with Emergency Alert System Devices Exposed ***
---------------------------------------------
Firmware images for devices at the core of the Emergency Alert System are shipping with a compromised root SSH key, researchers at IOActive said.
---------------------------------------------
http://threatpost.com/root-ssh-key-shipping-with-emergency-alert-system-dev…
*** Novel ransomware tactic locks users PCs, demands that they participate in a survey to get the unlock code ***
---------------------------------------------
>From managed ransomware as a service 'solutions' to DIY ransomware generating tools, this malicious market segment is as hot as ever with cybercriminals continuing to push new variants, and sometimes, literally introducing novel approaches to monetize locked PCs.
-------------------
http://blog.webroot.com/2013/07/08/novel-ransomware-tactic-locks-users-pcs-…
*** RSA Authentication Manager Lets Local Users View the Administrative Account Password ***
---------------------------------------------
When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace log file.
---------------------------------------------
http://www.securitytracker.com/id/1028742
*** WordPress Search N Save XSS & Path Disclosure ***
---------------------------------------------
These are Cross-Site Scripting and Full path disclosure vulnerabilities. These XSS holes are in ZeroClipboard.swf, which is used in the plugin.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070060
*** Oracle Java Applet Preloader Click-2-Play Warning Bypass ***
---------------------------------------------
The vulnerability is caused by a design error in the Java click-2-play
security warning when the preloader is used, which can be exploited by
remote attackers to load a malicious applet (e.g. taking advantage of
a Java memory corruption vulnerability) without any user interaction
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070067
*** Doctor Web: June virus activity review ***
---------------------------------------------
Despite summer being a holiday season, threats to IT security persisted in June. At the very beginning of the month, Doctor Webs virus analysts discovered a new version of a dangerous Trojan targeting Linux servers, while in the middle of June, another wave of Trojan encoders swept across desktops. Also found was a host of new threats to mobile devices.
---------------------------------------------
http://news.drweb.com/show/?i=3708&lng=en&c=9
*** Spamvertised 'Export License/Invoice Copy' themed emails lead to malware ***
---------------------------------------------
We've just intercepted a currently circulating malicious spam campaign consisting of tens of thousands of fake 'Export License/Invoice Copy' themed emails, enticing users into executing the malicious attachment. Once the socially engineered users do so, their PCs automatically become part of the botnet operated by the cybercriminals behind the campaign.
---------------------------------------------
http://blog.webroot.com/2013/07/09/spamvertised-export-licenseinvoice-copy-…
*** Exploit Code Released For Android Security Hole ***
---------------------------------------------
Pau Oliva Fora, a security researcher for the firm Via Forensics, published a small, proof of concept module that exploits the flaw in the way Android verifies the authenticity of signed mobile applications. The flaw was first disclosed last week by Jeff Forristal, the Chief Technology Officer at Bluebox Security, ahead of a presentation at the Black Hat Briefings in August.
---------------------------------------------
https://securityledger.com/2013/07/exploit-code-released-for-android-securi…
*** [2013-07-09] Denial of service vulnerability in Apache CXF ***
---------------------------------------------
It is possible to execute Denial of Service attacks on Apache CXF, exploiting the fact that the streaming XML parser does not put limits on things like the number of elements, number of attributes, the nested structure of the document received, etc. The effects of these attacks can vary from causing high CPU usage, to causing the JVM to run out of memory.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** HP storage: more possible backdoors ***
---------------------------------------------
LeftHand, StoreVirtual remote reset suggests factory account Technion, the blogger who recently turned up an undocumented back door in HPs StoreOnce, has turned up similar issues in other HP products - publicised on support forums by the company, but unnoticed at the time.
---------------------------------------------
http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/
*** Hard drive-wiping malware that hit South Korea tied to military espionage ***
---------------------------------------------
The hackers responsible for a malware attack in March that simultaneously wiped data from tens of thousands of South Korean computers belong to the same espionage group that has targeted South Korean and US military secrets for four years, researchers said.
---------------------------------------------
http://arstechnica.com/security/2013/07/hard-drive-wiping-malware-that-hit-…
*** Vuln: MongoDB Remote Privilege Escalation Vulnerability ***
---------------------------------------------
MongoDB is prone to a remote privilege-escalation vulnerability.
An attacker can exploit this issue to gain elevated privileges within the application and obtain unauthorized access to the sensitive information.
MongoDB 2.4.0 through 2.4.4 and 2.5.0 are vulnerable; other versions may also be affected.
---------------------------------------------
http://www.securityfocus.com/bid/61007
*** US-Behörde zerstört eigene Hardware aus Angst vor Viren ***
---------------------------------------------
PCs, Bildschirme, Kameras, Mäuse und Tastaturen - eine US-Behörde wollte ihre gesamte IT-Ausstattung verschrotten, weil sie einen massiven Virenbefall befürchtete. Dabei waren wohl nur sechs Rechner betroffen.
---------------------------------------------
http://www.heise.de/security/meldung/US-Behoerde-zerstoert-eigene-Hardware-…
*** Mail-Adressen bei T-Online lassen sich kapern ***
---------------------------------------------
Gelingt es einem Angreifer, sein Opfer in spe auf eine speziell präparierte Internetseite zu locken, kann er dessen Mailadresse bei T-Online dauerhaft übernehmen.
---------------------------------------------
http://www.heise.de/security/meldung/Mail-Adressen-bei-T-Online-lassen-sich…
*** OTRS / OTRS ITSM Unspecified Script Insertion and SQL Injection Vulnerabilities ***
---------------------------------------------
Some vulnerabilities have been reported in OTRS and OTRS ITSM, which can be exploited by malicious users to conduct script insertion and SQL injection attacks.
---------------------------------------------
https://secunia.com/advisories/52623
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 05-07-2013 18:00 − Montag 08-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host ***
---------------------------------------------
A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server.
Systems running only HVM guests are not affected.
---------------------------------------------
http://www.securitytracker.com/id/1028740
*** WordPress post.php cross-site scripting ***
---------------------------------------------
WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the post.php script. A remote attacker could exploit this vulnerability using the excerpt and content fields to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85439
*** Debian Security Advisory DSA-2720 icedove ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2720
*** Multiple D-Link Devices - OS-Command Injection via UPnP Interface ***
---------------------------------------------
The vulnerability is caused by missing input validation in different XML parameters. This vulnerability could be exploited to inject and execute arbitrary shell commands.
WARNING: You do not need to be authenticated to the device to insert and execute malicious commands.
---------------------------------------------
http://www.exploit-db.com/exploits/26664
*** OpenNetAdmin Remote Code Execution ***
---------------------------------------------
This exploit works because adding modules can be done without any sort
of authentication.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070055
*** Styx Exploit Pack: Domo Arigato, PC Roboto ***
---------------------------------------------
Not long ago, miscreants who wanted to buy an exploit kit -- automated software that helps booby-trap hacked sites to deploy malicious code -- had to be fairly well-connected, or at least have access to semi-private underground forums. These days, some exploit kit makers are brazenly advertising and offering their services out in the open, marketing their wares as browser vulnerability "stress-test platforms."
---------------------------------------------
https://krebsonsecurity.com/2013/07/styx-exploit-pack-domo-arigato-pc-robot…
*** Debian Security Advisory DSA-2721 nginx ***
---------------------------------------------
buffer overflow
---------------------------------------------
http://www.debian.org/security/2013/dsa-2721
*** What Does Facebook Know About You - An Analysis ***
---------------------------------------------
If you've read a news website, turned on the TV or not been under a rock over the past few weeks, then there is a good chance you've heard of a guy named Edward Snowden. He's the US analyst who is currently stuck in a Russian airport looking for asylum because he exposed that - surprise, surprise - the US government/NSA had been spying on pretty much everyone.
---------------------------------------------
http://daylandoes.com/facebook-and-your-data/
*** 15 MILLION dodgy login attempts spaffed all over Nintendo loyalists ***
---------------------------------------------
Thousands of players plundered for their hard-earned booty Hackers broke into 24,000 Club Nintendo accounts after pummelling the loyalty-reward website in a month-long assault.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/07/08/nintendo_br…
*** Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability ***
---------------------------------------------
Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/50218
*** DropBox account hacking bypassing two-factor authentication ***
---------------------------------------------
Zouheir Abdallah revealed that a hacker already knows the victim's credentials for Dropbox account that has 2FA authentication enabled, is able to hack it.
---------------------------------------------
http://securityaffairs.co/wordpress/15944/hacking/dropbox-account-hacking.h…
*** Spam blizzards sometimes seed malware, AppRiver study warns ***
---------------------------------------------
Digital desperadoes have begun hiding their larcenous activities behind blizzards of spam aimed at their victims inboxes, according to a report released last week by a cloud security provider. The technique, called Distributed Spam Distraction (DSD), began appearing early this year, AppRiver revealed in its Global Threat & Spamscape Report for the first half of 2013.
---------------------------------------------
http://www.techhive.com/article/2043764/spam-blizzards-sometimes-seed-malwa…
*** cPanel cpanellogd Two Privilege Escalation Vulnerabilities ***
---------------------------------------------
cPanel cpanellogd Two Privilege Escalation Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53921
*** FFmpeg Multiple Vulnerabilities ***
---------------------------------------------
FFmpeg Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/54044
*** Several vulnerabilities in third party extensions ***
---------------------------------------------
Several vulnerabilities have been found in the following third-party TYPO3 extensions: accessible_is_browse_results, maag_formcaptcha, meta_feedit, rzautocomplete, sb_folderdownload, sg_zfelib, sg_zlib, tq_seo
---------------------------------------------
http://typo3.org/news/article/several-vulnerabilities-in-third-party-extens…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 04-07-2013 18:00 − Freitag 05-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Bugtraq: Paypal Bug Bounty #102 QR Dev Labs - Auth Bypass Vulnerability ***
---------------------------------------------
An independent vulnerability laboratory researcher discovered an auth bypass web session vulnerability in the PayPal QR Labs Service Web Application.
---------------------------------------------
http://www.securityfocus.com/archive/1/527069
*** phpMyAdmin 4.0.2 Cross Site Scripting ***
---------------------------------------------
Topic: phpMyAdmin 4.0.2 Cross Site Scripting Risk: Low Text:PMASA-2013-6 Announcement-ID: PMASA-2013-6 Date: 2013-06-05 Summary XSS due to unescaped HTML output in Create View p...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070047
*** phpMyAdmin 4.0.4 change the configuration vulnerability ***
---------------------------------------------
Topic: phpMyAdmin 4.0.4 change the configuration vulnerability Risk: Medium Text:PMASA-2013-7 Announcement-ID: PMASA-2013-7 Date: 2013-06-30 Updated: 2013-07-01 Summary Global variable scope inje...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070048
*** EU-Parlament beschließt härtere Strafen für Cyber-Angriffe ***
---------------------------------------------
Mit großer Mehrheit hat das Parlament den Richtlinienentwurf der EU-Kommission über Angriffe auf Informationssysteme verabschiedet.
---------------------------------------------
http://www.heise.de/security/meldung/EU-Parlament-beschliesst-haertere-Stra…
*** Advance Notification Service for July 2013 Security Bulletin Release ***
---------------------------------------------
Today we're providing advance notification for the release of seven bulletins, six Critical and one Important, for July 2013. The Critical bulletins address vulnerabilities in Microsoft Windows, .NET Framework, Silverlight, Internet Explorer and GDI+. Also scheduled for inclusion among these Critical bulletins is an update to address CVE-2013-3660, which is a publicly known issue in the Kernel-Mode Drivers component of Windows. The Important-rated bulletin will address an issue in...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/07/04/advance-notification-ser…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 03-07-2013 18:00 − Donnerstag 04-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Alstom Grid S1 Agile Improper Authorization ***
---------------------------------------------
This advisory provides mitigation details for a vulnerability affecting the Alstom Grid MiCOM S1 Agile and S1 Studio Software.Note: Alstom Grid MiCOM S1 Studio Software is its own software suite. A user could have MiCOM S1 Studio Software from a different vendor. This advisory only addresses the Alstom software product.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-184-01
*** Security Bulletin: IBM Business Process Manager (BPM) Vulnerable URLs (CVE-2013-0581) ***
---------------------------------------------
When a dashboard is opened or a service is executed, a malicious attacker can intercept network requests from the client. Then, the attacker can modify the URL parameters of the request so that malicious code can be executed within the client browser. CVE(s): CVE-2013-0581 Affected product(s) and affected version(s): IBM Business Process Manager Standard Versions 7.5.1.x, 8.0.0.x, 8.0.1.x IBM Business Process Manager Express Versions 7.5.1.x,8.0.0.x, 8.0.1.x IBM Business Process Manager
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Deceptive ads targeting German users lead to the W32/SomotoBetterInstaller Potentially Unwanted Application (PUA) ***
---------------------------------------------
By Dancho Danchev We've just intercepted yet another campaign serving deceptive ads, this time targeting German-speaking users into downloading and installing the privacy-invading "FLV Player" Potentially Unwanted Application (PUA), part of Somoto's pay-per-install network. More details: ...
---------------------------------------------
http://blog.webroot.com/2013/07/03/deceptive-ads-targeting-german-users-lea…
*** IBM AIX TFTP RBAC Bug Lets Remote Authenticated Users Read and Overwrite Root-Owned Files ***
---------------------------------------------
A vulnerability was reported in IBM AIX. A remote authenticated user can read and overwrite files on the target system with root privileges.
---------------------------------------------
http://www.securitytracker.com/id/1028728
*** Androids Code-Signatur lässt sich umgehen ***
---------------------------------------------
Ein junges US-Sicherheitsunternehmen will einen Android-Fehler entdeckt haben, der das Einschleusen beliebigen Codes in signierte App-Pakete erlaubt, ohne die Signatur zu brechen.
---------------------------------------------
http://www.heise.de/security/meldung/Androids-Code-Signatur-laesst-sich-umg…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 02-07-2013 18:00 − Mittwoch 03-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cybercriminals experiment with Tor-based C&C, ring-3-rootkit empowered, SPDY form grabbing malware bot ***
---------------------------------------------
By Dancho Danchev Keeping in pace with the latest and most widely integrated technologies, with the idea to abuse them in a fraudulent/malicious way, is an everyday reality in today’s cybercrime ecosystem that continues to be over-supplied with modified and commoditized malicious software. This is achieved primarily through either leaked source code or a slightly different set of 'common'...
---------------------------------------------
blog.webroot.com/2013/07/02/cybercriminals-experiment-with-tor-based-cc-rin…
*** DSA-2718 wordpress ***
---------------------------------------------
Several vulnerabilities were identified in WordPress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the wordpress package to the latest upstream version instead of backporting the patches.
This means extra care should be taken when upgrading, especially when using third-party plugins or themes, since compatibility may have been impacted along the way. We recommend that users check their install before doing the upgrade.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2718
*** Apple Mac OS X Multiple Vulnerabilities ***
---------------------------------------------
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.
The vulnerabilities are caused due to a bundled version of QuickTime.
---------------------------------------------
https://secunia.com/advisories/54049
*** Vulnerabilities in multiple WordPress Plugins ***
---------------------------------------------
https://secunia.com/advisories/52958https://secunia.com/advisories/54018https://secunia.com/advisories/54035https://secunia.com/advisories/54048
*** Vuln: Multiple Vendors Multiple EAS Devices Private SSH Key Information Disclosure Vulnerability ***
---------------------------------------------
Multiple Vendors Multiple EAS Devices are prone to an information-disclosure vulnerability.
Remote attackers can exploit this issue to gain access to the root SSH private key.
---------------------------------------------
http://www.securityfocus.com/bid/60810
*** Vuln: ansible paramiko_ssh.py Security Bypass Vulnerability ***
---------------------------------------------
ansible is prone to a security-bypass vulnerability.
An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions.
---------------------------------------------
http://www.securityfocus.com/bid/60869
*** Rampant Apache website attack hits visitors with highly malicious software ***
---------------------------------------------
Darkleech is back. Or maybe it never left. Either way, its a growing problem.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/e7uQIRcAY78/
*** Bugtraq: Multiple Vulnerabilities in OpenX ***
---------------------------------------------
High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in OpenX, which can be exploited to execute arbitrary PHP code, perform Cross-Site Scripting (XSS) attacks and compromise vulnerable system.
---------------------------------------------
http://www.securityfocus.com/archive/1/527051
*** Sony Multiple Network Cameras Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in multiple Sony Network Cameras, which can be exploited by malicious people to conduct cross-site forgery attacks.
The device allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. create a user with administrative privileges when a logged-in administrative user visits a specially crafted web page.
---------------------------------------------
https://secunia.com/advisories/53758
*** MachForm Form Maker 2 view.php file upload ***
---------------------------------------------
MachForm Form Maker2 could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions by the view.php script. By sending a specially-crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious PHP script, which could allow the attacker to execute arbitrary PHP code on the vulnerable system.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85386
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 01-07-2013 18:00 − Dienstag 02-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Bugtraq: [SECURITY] CVE-2013-1777: Apache Geronimo 3 RMI classloader exposure ***
---------------------------------------------
A misconfigured RMI classloader in Apache Geronimo 3.0 may enable an attacker to send a serialized object via JMX that could compromise the system.
---------------------------------------------
http://www.securityfocus.com/archive/1/527022
*** Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities ***
---------------------------------------------
Topic: Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities Risk: Low Text:Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities Vendor: Barracuda Networks, Inc. Product web ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070014
*** Hackers Aggressively Scanning ICS, SCADA Default Credentials, Vulnerabilities ***
---------------------------------------------
Attacks against industrial control systems and SCADA equipment are progressing beyond automated scans for vulnerabilities or default credentials hitting honeypots, and are leading to service disruptions.
---------------------------------------------
http://threatpost.com/hackers-aggressively-scanning-ics-scada-default-crede…
*** Bugtraq: Linksys EA - 2700, 3500, 4200, 4500 w/ Lighttpd 1.4.28 Unauthenticated Remote Administration Access ***
---------------------------------------------
- Unauthenticated remote access to all pages of the router
administration GUI, bypassing any credential prompts under certain
common configurations (see below)
- Direct access to several other critical files, unauthenticated as well
---------------------------------------------
http://www.securityfocus.com/archive/1/527027
*** Symantec Security Information Manager Console Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Symantec Security Information Manager, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to disclose sensitive information and conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53990
*** IBM Rational Automation Framework Java JSSE Denial of Service Vulnerability ***
---------------------------------------------
IBM has acknowledged a vulnerability in IBM Rational Automation Framework, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54034
*** IBM Sterling B2B Integrator / IBM Sterling File Gateway Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in IBM Sterling B2B Integrator and IBM Sterling File, where one has an unknown impact and others can be exploited by malicious users to conduct SQL injection attacks, disclose certain sensitive information, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53850
*** HPSBHF02888 rev.1 - HP ProCurve, H3C, 3COM Routers and Switches, Remote Information Disclosure and Code Execution ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP, 3COM, and H3C routers and switches. The vulnerabilities could be remotely exploited resulting in disclosure of information and execution of code.
---------------------------------------------
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Cisco TC Software SIP Implementation Error May Affect Communications Integrity ***
---------------------------------------------
A vulnerability in the Session Initiation Protocol (SIP) implementation used in TC Software could allow an unauthenticated, remoteattacker to cause an endpoint to process unintended SIP NOTIFY messages.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** TRENDnet Multiple Products Security Bypass Security Issue ***
---------------------------------------------
A security issue has been reported in multiple TRENDnet products, which can be exploited by malicious users to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/53926
*** HTTPS Side-Channel Attack A Tool For Encrypted Secret Theft ***
---------------------------------------------
Researchers to release details on how SSL vulnerability gives attackers ability to steal everything from OAuth tokens to PII through an enterprise app in just 30 seconds.
---------------------------------------------
http://www.darkreading.com/vulnerability/https-side-channel-attack-a-tool-f…
*** IBM Storwize V7000 Unified Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Storwize V7000 Unified, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54036
*** HP-UX update for Java ***
---------------------------------------------
HP has issued an update for Java in HP-UX. This fixes multiple vulnerabilities which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53999https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Fortinet FortiOS (FortiGate) Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Fortinet FortiOS (FortiGate), which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53996
*** Hacker Holes in Server Management System Allows ‘Almost-Physical’ Access ***
---------------------------------------------
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out. The vulnerabilities exist in more than 100,000 servers connected ...
---------------------------------------------
http://www.wired.com/threatlevel/2013/07/ipmi/
*** HP-UX update for Apache with Tomcat Servlet Engine ***
---------------------------------------------
HP has issued an update for Apache with Tomcat Servlet Engine. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53989
*** Alcatel-Lucent OmniTouch Multiple Products Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been reported in multiple Alcatel-Lucent OmniTouch products, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/54000
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-06-2013 18:00 − Montag 01-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** How cybercriminals create and operate Android-based botnets ***
---------------------------------------------
By Dancho Danchev On their way to acquire the latest and coolest Android game or application, end users with outdated situational awareness on the latest threats facing them often not only undermine the confidentiality and integrity of their devices, but also, can unknowingly expose critical business data to the cybercriminals who managed to infect their...
---------------------------------------------
http://blog.webroot.com/2013/06/28/how-cybercriminals-create-and-operate-an…
*** Fortigate Firewall Cross Site Request Forgery ***
---------------------------------------------
Topic: Fortigate Firewall Cross Site Request Forgery Risk: Low Text:Vulnerability ID: CVE-2013-1414 Vulnerability Type: CSRF (Cross-Site Request Forgery) Product: All Fortigate Firewalls Vendo...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060241
*** Several Flaws Discovered in ZRTPCPP Library Used in Secure Phone Apps ***
---------------------------------------------
A security researcher has uncovered a number of serious vulnerabilities in one of the core security components of several secure telephony applications, including the Silent Circle system developed by PGP creator Phil Zimmermann.
---------------------------------------------
http://threatpost.com/several-flaws-discovered-in-zrtpcpp-library-used-in-s…
*** NIST Cybersecurity Framework, (Sun, Jun 30th) ***
---------------------------------------------
The NIST has published a voluntary framework to reduce cyber risk to critical infrastructure as a result of a directive inside the Presidents execute order for improving critical infrastructure cybersecurity. The core of this framework is composed of a function matrix and a framework implementation level matrix. The function matrix contains the five top-level cybersecurity functions, which are: Know: Gaining the institutional understanding to identify what systems need to be protected,...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16093
*** Backdoor Discovered In Atlassian Crowd ***
---------------------------------------------
An anonymous reader writes "Recently published on the Command Five website is a technically detailed threat advisory (PDF) in relation to a recurring vulnerability in Atlassian Crowd. Tucked away inconspicuously at the end of this document in a section entitled Unpatched Vulnerabilities is the real security bombshell: Atlassians turnkey solution for enterprise single sign-on and secure user authentication contains an unpatched backdoor. The backdoor allows anyone to remotely take full...
---------------------------------------------
http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlass…
*** Xorbin Multiple Products "widgetUrl" Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in multiple Xorbin products, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53979
*** IBM Tivoli Composite Application Manager for Transactions OpenSSL Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Tivoli Composite Application Manager for Transactions, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/54029
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-06-2013 18:00 − Freitag 28-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Apache XML Security, which can be exploited by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53959
*** April-June 2013 ***
---------------------------------------------
The “ICS-CERT Monitor” newsletter offers a means of promoting preparedness, information sharing, and collaboration with the 16 critical infrastructure sectors. ICS‑CERT accomplishes this on a day-to-day basis through sector briefings, meetings, conferences, and information product releases.
---------------------------------------------
http://ics-cert.us-cert.gov/monitors/ICS-MM201306
*** Citadel Trojan Variant Delivers Localized Content, Targets Amazon Customers ***
---------------------------------------------
A new variant of the Citadel banking malware was discovered, this one delivering localized content for European targets that include not only banks but major ecommerce sites such as Amazon.
---------------------------------------------
http://threatpost.com/citadel-trojan-variant-delivers-localized-content-tar…
*** One-click/key attack forces IE and Chrome to execute malicious code ***
---------------------------------------------
Minimal user interaction increases chances that social engineering will succeed.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/siZrFBsO_0E/
*** Ruby Certificate Hostname Validation Flaw Lets Remote Users Spoof SSL Servers ***
---------------------------------------------
A vulnerability was reported in Ruby. A remote user can spoof SSL servers.
---------------------------------------------
http://www.securitytracker.com/id/1028714
*** Bugtraq: Mobile USB Drive HD 1.2 - Arbitrary File Upload Vulnerability ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the Mobile USB Drive HD v1.2 apple iOS application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526997
*** Bugtraq: eFile Wifi Transfer Manager 1.0 iOS - Multiple Vulnerabilities ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the eFile Wifi Manager v1.0 iOS mobile application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526995
*** Bugtraq: Re: Re: EMC Avamar: World writable cache files ***
---------------------------------------------
Due to a vulnerability, described in detail below, the Avamar client leaves certain directories and files as world writable. The presence of world writable directories and files may inadvertently result in elevation of privileges by a user who has access to the local file system.
---------------------------------------------
http://www.securityfocus.com/archive/1/526996
*** Bugtraq: Barracuda CudaTel 2.6.02.04 - Multiple Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526999http://www.securityfocus.com/archive/1/527000
*** Xerox WorkCube / Xerox ColorQube Unspecified Vulnerabilities ***
---------------------------------------------
Some vulnerabilities with an unknown impact have been reported in Xerox WorkCube and Xerox ColorQube.
---------------------------------------------
https://secunia.com/advisories/54005
*** Criminals sell access to rooted servers via online shop ***
---------------------------------------------
Researchers have discovered an online store where criminals sell access to hacked servers, another cautionary example of miscreants commercialization of stolen data.
---------------------------------------------
http://www.scmagazine.com//criminals-sell-access-to-rooted-servers-via-onli…
*** Cisco ASA Next-Generation Firewall Services Fragmented Traffic Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Cisco ASA Next-Generation Firewall Services, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53971
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 26-06-2013 18:00 − Donnerstag 27-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Windows 8.1: Defender mit Verhaltenserkennung ***
---------------------------------------------
Mit dem kommenden Windows-Upgrade rüstet Microsoft zahlreiche Security-Features nach. Einige sind längst überfällig, andere innovativ. Auf der TechEd Europe ging das Unternehmen ins Detail.
---------------------------------------------
http://www.heise.de/security/meldung/Windows-8-1-Defender-mit-Verhaltenserk…
*** Styx Exploit Kit Takes Advantage of Vulnerabilities ***
---------------------------------------------
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits target vulnerabilities in popular applications and provide an effective way for cybercriminals to distribute malware. We have already discussed Red Kit, a common exploit kit. Recently McAfee Labs has observed an increase in the prevalence Read more...
---------------------------------------------
http://blogs.mcafee.com/mcafee-labs/styx-exploit-kit-takes-advantage-of-vul…
*** Attackers sign malware using crypto certificate stolen from Opera Software ***
---------------------------------------------
A "few thousand" users may have automatically installed malware signed by expired cert.
---------------------------------------------
http://arstechnica.com/security/2013/06/attackers-sign-malware-using-crypto…
*** Gezielter Phishing-Angriff auf Eset-Kunden ***
---------------------------------------------
Kunden des Antiviren-Software-Herstellers Eset erhalten momentan sehr gut gemachte Phishing-Mails, mit denen Kreditkartendaten geklaut werden sollen.
---------------------------------------------
http://www.heise.de/security/meldung/Gezielter-Phishing-Angriff-auf-Eset-Ku…
*** Analysis: Redirects in Spam ***
---------------------------------------------
We will look at the most popular spammer tricks that use redirects and the most widely used types of redirect.
---------------------------------------------
http://www.securelist.com/en/analysis/204792295/Redirects_in_Spam
*** Top 5 Fake Security Rogues of 2013 ***
---------------------------------------------
By Tyler Moffitt We see users on the internet getting infected with Rogue Security Malware all the time. In fact, it's one of the most common and obvious type of infections we see. The Rogues lock-down your computer and prevent you from opening any applications so you're forced to read their scam.
---------------------------------------------
http://blog.webroot.com/2013/06/27/top-5-fake-security-rogues-of-2013/
*** Magnolia CMS multiple security bypass ***
---------------------------------------------
Magnolia CMS could allow a remote attacker to bypass security restrictions, caused by improper verification of access permissions. An attacker could exploit this vulnerability by accessing and executing multiple administrative functionalities to bypass security and gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85252
*** Drupal 7.x Fast Permissions Administration Access bypass ***
---------------------------------------------
The Fast Permissions Administration module enables you to use inline filters on the permissions page, as well as loading the permissions form through a modal dialog. The module doesn't sufficiently check user access for the modal content callback, allowing unauthorized access to the permissions edit form.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060226
*** Bugtraq: HP-UX Running HP Secure Shell, Remote Denial of Service (DoS) ***
---------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
---------------------------------------------
http://www.securityfocus.com/archive/1/526986
*** Multiple Vulnerabilities in Cisco Web Security Appliance ***
---------------------------------------------
Cisco IronPort AsyncOS Software for Cisco Web Security Appliance is affected by the following vulnerabilities:
- Two authenticated command injection vulnerabilities
- Management GUI Denial of Service Vulnerability
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 25-06-2013 18:00 − Mittwoch 26-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cisco Linksys X3000 Router apply.cgi cross-site scripting ***
---------------------------------------------
Cisco Linksys X3000 Router is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the apply.cgi script. A remote attacker could exploit this vulnerability using the...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85186
*** Vast majority of malware attacks spawned from legit sites ***
---------------------------------------------
Drive-by attacks not just from porn and warez sites, new Google data shows.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/_ndPPR-K7Z4/
*** Google adds malware, phishing to transparency report to make the Web safer ***
---------------------------------------------
The data come from the companys Safe Browsing technology, which flags up to 10,000 sites daily
---------------------------------------------
http://www.csoonline.com/article/735463/google-adds-malware-phishing-to-tra…
*** Forticlient VPN client credential interception vulnerability ***
---------------------------------------------
Topic: Forticlient VPN client credential interception vulnerability Risk: Medium Text:FORTICLIENT VPN CLIENT CREDENTIAL INTERCEPTION VULNERABILITY == Description -- The Fortinet FortiClient ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060220
*** aSc TimeTables Add Subject buffer overflow ***
---------------------------------------------
aSc TimeTables is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Add Subject functionality. A remote authenticated attacker could exploit this vulnerability using a...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85199
*** IBM OpenPages GRC Platform Multiple Java Vulnerabilities ***
---------------------------------------------
Where: From remote
Impact: Spoofing, Manipulation of data, Exposure of sensitive information, DoS, System access
Solution Status: Unpatched
---------------------------------------------
https://secunia.com/advisories/53962
*** Bugtraq: [SECURITY] [DSA 2716-1] iceweasel security update ***
---------------------------------------------
Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser: Multiple memory safety errors,...
The iceweasel version in the oldstable distribution (squeeze) is no
longer supported with security updates.
---------------------------------------------
http://www.securityfocus.com/archive/1/526973
*** Apache Qpid Python Client SSL Certificate Verification Security Issue ***
---------------------------------------------
A security issue has been reported in Apache Qpid, which can be exploited by malicious people to conduct spoofing attacks.
---------------------------------------------
https://secunia.com/advisories/53968
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 24-06-2013 18:00 − Dienstag 25-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Latest Pushdo Variants Challenge Antimalware Solution ***
---------------------------------------------
Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other tricks. However, hiding the network traffic specifically from monitoring outside an infected computer is not an easy task, but is something that the botnet creators have improved through the years.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/latest-pushdo-va…
*** Backdoor in Backup-Servern von HP ***
---------------------------------------------
Einem Hacker zufolge besitzt die Software auf den Backup-Systemen der Serie "StoreOnce" von HP eine Hintertür. Zur Ausnutzung der Lücke soll ein SSH-Zugang ausreichen.
---------------------------------------------
http://www.heise.de/security/meldung/Backdoor-in-Backup-Servern-von-HP-1895…
*** Raspberry Pi bot tracks hacker posts to vacuum up passwords and more ***
---------------------------------------------
Dumpmon scours Twitter for sensitive data hiding in plain site.
---------------------------------------------
http://arstechnica.com/security/2013/06/raspberry-pi-bot-tracks-hacker-post…
*** Trend Micro turns RAT catcher as Taiwan cops cuff hacker ***
---------------------------------------------
Ghost RAT attacks hit thousands on the island... Security vendor Trend Micro has embiggened its industry collaboration credentials this week after helping Taiwanese police arrest one man in connection with a widespread targeted attack, and teaming up with Interpol on a new cyber crime prevention centre.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/25/trend_micro…
*** SIP-based API-supporting fake caller ID/SMS number supporting DIY Russian service spotted in the wild ***
---------------------------------------------
By Dancho Danchev One of the most common myths regarding the emerging TDoS (Telephony Denial of Service) market segment, portrays a RBN (Russian Business Network) type of bulletproof infrastructure used to launch these attacks. The infrastructure's speculated resilience is supposed to be acting as a foundation for the increase of TDoS services and products.
---------------------------------------------
http://blog.webroot.com/2013/06/25/sip-based-api-supporting-fake-caller-ids…
*** Scam Sites Now Selling Instagram Followers ***
---------------------------------------------
Another scam site is offering to increase a user's Instagram followers. Unlike previous attacks, however, these sites require payment with the amount depending on the number of followers you prefer. Figure 1. Pricelist for Instagram followers Despite the sitess liberal use of the Instagram logo, it has nothing to do with the service.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/scam-sites-now-s…
*** Download me - Saying "yes" to the Web's most dangerous search terms ***
---------------------------------------------
Seeking "free games" and getting burned by illicit downloads is so 2008, right?
---------------------------------------------
http://arstechnica.com/information-technology/2013/06/download-me-saying-ye…
*** LG-Smartphones: Root-Zugriff durch Backup-Programm ***
---------------------------------------------
Android-Smartphones der Firma LG können durch Sicherheitslücken in ihrer vorinstallierten Backup-Software manipuliert werden.
---------------------------------------------
http://www.heise.de/security/meldung/LG-Smartphones-Root-Zugriff-durch-Back…
*** Carberp Source Code Leaked ***
---------------------------------------------
The source code for the Carberp Trojan, which typically sells for $40,000 on the underground, has been leaked and is now available to anyone who wants it. The leak has echoes of the release of the Zeus crimeware source code a couple of years ago and has security researchers concerned that it may lead to [...]
---------------------------------------------
http://threatpost.com/carberp-source-code-leaked/
*** Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ***
---------------------------------------------
A security issue and a vulnerability have been reported in the Login Security module for Drupal, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53717
*** cURL/libcURL curl_easy_unescape() function buffer overflow ***
---------------------------------------------
cURL/libcURL is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the curl_easy_unescape() function in lib/escape.c. While decoding URL encoded strings to raw binary data, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85180
*** MoinMoin twikidraw Action Traversal File Upload ***
---------------------------------------------
This module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files.
---------------------------------------------
http://www.exploit-db.com/exploits/26422
*** [2013-06-25] Multiple vulnerabilities in IceWarp Mail Server ***
---------------------------------------------
IceWarp Mail Server is vulnerable to reflected Cross-Site Scripting and XXE Injection attacks. By exploiting the XXE vulnerability, an unauthenticated attacker can get read access to the filesystem of the IceWarp Mail Server host and thus obtain sensitive information such as the configuration files.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** Stream Video Player plugin for WordPress cross site request forgery ***
---------------------------------------------
Stream Video Player plugin for WordPress is vulnerable to an unspecified cross-site request forgery. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify plugin settings and perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85155
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 21-06-2013 18:00 − Montag 24-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Tausende Domains ***
---------------------------------------------
Die Adressen verschiedener Dienste wie LinkedIn, Yelp oder Fidelity wurden durch einen menschlichen Fehler für mehrere Stunden auf andere Webseiten umgeleitet. Cisco geht von 5000 betroffenen Domains aus.
---------------------------------------------
http://www.heise.de/security/meldung/Tausende-Domains-1894195.html
*** Dirt Jumper DDoS Variant Drive 'Much More Powerful' Than Predecessors ***
---------------------------------------------
A variant of the Dirt Jumper DDoS engine called Drive has been detected. Drive includes new capabilities and has already targeted a number popular destinations on the Internet.
---------------------------------------------
http://threatpost.com/dirt-jumper-ddos-variant-drive-much-more-powerful-tha…
*** Security Bulletin: WebSphere Commerce Java API Documentation Frame Injection Vulnerability (CVE-2013-1571) ***
---------------------------------------------
Java API Documentation contains a frame injection vulnerability.
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_web…
*** WordPress Maintenance Mode Plugin Cross-site request forgery vulnerability ***
---------------------------------------------
WordPress Maintenance Mode Plugin Cross-site request forgery vulnerability
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85146
*** Adobe Flash spoof leads to infectious audio ads ***
---------------------------------------------
We've seen quite a few audio ads infecting users recently. We think it's a good idea to go over an in-depth look at how they infect your computer and how to remediation them. As you can see in this first picture, this is another Adobe Flash spoof that launches its signature update window.
---------------------------------------------
http://blog.webroot.com/2013/06/21/adobe-flash-spoof-leads-to-infectious-au…
*** Device-disabling Fake AV migrates to Android phones, demands ransom ***
---------------------------------------------
Long the bane of computer users, Fake antivirus may extort Android owners, too.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/esDZHzGloyI/
*** Google Translate Cross Site Request Forgery ***
---------------------------------------------
1)Vulnerability Description
I discovered a new CSRF vulnerability on translate.google.com web site which could allow an attacker to insert items (Words/Phrases/Urls and related translations) into the user's Phrasebook. Furthermore an attacker could also inserta potentially malicious Urls - into the
above mentioned Phrasebook - towards which the victim could be redirected simply clicking on the "Go to <website>" right-click option on translate.google.com.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060181
*** McAfee ePolicy Orchestrator 4.6.5 SQL injection & directory traversal ***
---------------------------------------------
Main Features:
Remote command execution on the ePo server.
Remote command execution on the Managed stations (one ring to rule them all).
File upload on the ePo server.
Active Directory credentials stealing.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060183
*** Datenpanne bei Facebook ***
---------------------------------------------
Nicht-öffentliche Telefonnummern und E-Mai-Adressen von ungefähr sechs Millionen Facebook-Usern wurden fälschlich an andere Facebook-Nutzer weitergegeben.
---------------------------------------------
http://www.heise.de/security/meldung/Datenpanne-bei-Facebook-1894855.html
*** Vuln: HAProxy CVE-2013-2175 Multiple Denial of Service Vulnerabilities ***
---------------------------------------------
HAProxy is prone to multiple denial-of-service vulnerabilities.
Exploiting these issues allow remote attackers to trigger denial-of-service conditions.
---------------------------------------------
http://www.securityfocus.com/bid/60588
*** Is SSH no more secure than telnet?, (Sun, Jun 23rd) ***
---------------------------------------------
In SSHs default (and most common) deployment: Yes. It is no more secure than telnet, but it can be better. Apologies to Ian Betteridge If you ask any sysadmin, they say that SSH is more secure than telnet, and theyll likely comment that opening telnet up to the Internet is reckless. One can simulate asking general opinion with a little googling: "ssh is more secure than telnet": 11,500 "telnet is more secure than ssh": 81 So, the Conventional Wisdom is that
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16049&rss
*** ZPanel 10.0.0.2 htpasswd Module Username Command Execution ***
---------------------------------------------
This module exploits a vulnerability found in ZPanel's htpasswd module. When creating .htaccess using the htpasswd module, the username field can be used to inject system commands, which is passed on to a system() function for executing the system's htpasswd's command.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060193
*** Bugtraq: Linksys X3000 - Multiple Vulnerabilities ***
---------------------------------------------
The vulnerability is caused by missing input validation in the ping_ip parameter and can be exploited to inject and execute arbitrary shell commands.
You need to be authenticated to the device or you have to find other methods for inserting the malicious commands.
---------------------------------------------
http://www.securityfocus.com/archive/1/526945
*** Wordpress: Update schließt zwölf Sicherheitslücken ***
---------------------------------------------
Mit dem Update auf Version 5.3.2 schließt Wordpress Schwachstellen, die mit Cross-Site-Scripting, Server-Side-Request-Forgery- und Denial-of-Service-Attacken ausgenutzt werden können.
---------------------------------------------
http://www.heise.de/security/meldung/Wordpress-Update-schliesst-zwoelf-Sich…
*** Beware Of HTML5 Development Risks ***
---------------------------------------------
Local storage is a big change from HTML of the past, where browsers could only use cookies to store small bits of information, such as session tokens, for managing identity. HTML5 changes this with sessionStorage, localStorage, and client-side databases to allow developers to store vast amounts of data in the browser that is all accessible from JavaScript.
---------------------------------------------
http://www.darkreading.com/applications/beware-of-html5-development-risks/2…
*** Apple Phishing Scams on the Rise ***
---------------------------------------------
Apple has one of the more gilded consumer brands and the company spends a lot of time and money to keep it that way. Consumers love Apple. Scammers and attackers do too, though, and security researchers in recent months have seen a major spike in the volume of phishing emails abusing Apple's brand, most of which are focused on stealing users' Apple IDs and payment information.
---------------------------------------------
https://threatpost.com/apple-phishing-scams-on-the-rise/
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 20-06-2013 18:00 − Freitag 21-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Common Web Vulnerabilities Plague Top WordPress Plug-Ins ***
---------------------------------------------
Top WordPress plug-ins and themes remain vulnerable to common Web-based attacks such as cross-site scripting and SQL injection.
---------------------------------------------
http://threatpost.com/common-web-vulnerabilities-plague-top-wordpress-plug-…
*** New E-Shop sells access to thousands of malware-infected hosts, accepts Bitcoin ***
---------------------------------------------
By Dancho Danchev Thanks to the buzz generated over the widespread adoption of the decentralized P2P based E-currency, Bitcoin, we continue to observe an overall increase in international underground market propositions that accept it as means for fellow cybercriminals to pay for the goods/services that they want to acquire.
---------------------------------------------
http://blog.webroot.com/2013/06/20/new-e-shop-sells-access-to-thousands-of-…
*** Trojan.APT.Seinup Hitting ASEAN ***
---------------------------------------------
The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.
---------------------------------------------
http://www.fireeye.com/blog/technical/malware-research/2013/06/trojan-apt-s…
*** PoisonIvy Uses Legitimate Application as Loader ***
---------------------------------------------
I recently obtained a PoisonIvy sample which uses a legitimate application in an effort to stay under the radar. In this case, the PoisonIvy variant detected as BKDR_POISON.BTA (named as newdev.dll) took advantage of a technique known as a DLL preloading attack (aka binary planting) instead of exploiting previously known techniques. The malware was located [...]
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/C9_ZJyLJ1YA/
*** WordPress Slash WP theme XSS and Content Spoofing vulnerabilities ***
---------------------------------------------
Topic: WordPress Slash WP theme XSS and Content Spoofing vulnerabilities Risk: Low Text:I want to warn you about multiple vulnerabilities in Slash WP theme for WordPress. This is commercial theme for WP. These ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060173
*** BSI nimmt WordPress, Typo3 & Co. unter die Security-Lupe ***
---------------------------------------------
Das Bundesamt für Sicherheit in der Informationstechnologie hat im Rahmen einer Studie das Sicherheitsniveau der gängigen Content Management Systeme analysiert. Die Gefahr geht demnach zu bis zu 95 Prozent von Add-Ons aus.
---------------------------------------------
http://www.heise.de/security/meldung/BSI-nimmt-WordPress-Typo3-Co-unter-die…
*** Login Security module for Drupal soft blocking security bypass ***
---------------------------------------------
Login Security module for Drupal could allow a remote attacker to bypass security restrictions, caused by incorrect use of string filtering. When the soft blocking option is disabled, an attacker could exploit this vulnerability to gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85135
*** OpenStack python-keystoneclient memcache signing/encryption security bypass ***
---------------------------------------------
OpenStack python-keystoneclient could allow a remote attacker to bypass security restrictions, caused by an error in the memcache signing/encryption feature. An attacker could exploit this vulnerability by inserting malicious data to the memcache backend to bypass security and gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85139
*** Is Hotel WiFi Secure? ***
---------------------------------------------
When you check in to a hotel, you assume that the company will keep you and your valuables safe by not sharing your room keys and providing a safe for your belongings. But a much greater threat could be lurking in your rented room - the free WiFi connection that most lodging providers offer.
---------------------------------------------
http://blog.hotspotshield.com/2013/06/17/hotel-wifi-security/
*** Avaya Aura Session Manager ISC BIND Record Handling Lockup Vulnerability ***
---------------------------------------------
Avaya has acknowledged a vulnerability in Avaya Aura Session Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53906
*** Hitachi Cosminexus Products Oracle Java Multiple Vulnerabilities ***
---------------------------------------------
Hitachi has acknowledged multiple vulnerabilities in multiple Cosminexus products, which can be exploited by malicious, local users to disclose certain sensitive information, manipulate certain data, and gain escalated privileges and by malicious people to conduct spoofing attacks, disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53759
*** How to backdoor an encryption app ***
---------------------------------------------
Over the past week or so theres been a huge burst of interest in encryption software. Applications like Silent Circle and RedPhone have seen a major uptick in new installs. CryptoCat alone has seen a zillion new installs, prompting several infosec researchers to nearly die of irritation.
---------------------------------------------
http://blog.cryptographyengineering.com/2013/06/how-to-backdoor-encryption-…
*** Hackers and viruses now stalking smart phones ***
---------------------------------------------
Computer viruses have plagued consumers for many years now, causing companies to spend heavily on installing every kind of firewall known to mankind to keep their security software updated.
---------------------------------------------
http://www.nation.co.ke/oped/Opinion/Hackers-and-viruses-now-stalking-smart…
*** Buffalo WZR-HP-G300NH2 Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Buffalo WZR-HP-G300NH2, which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53750
*** Oracle Solaris Multiple Vulnerabilities ***
---------------------------------------------
Oracle has acknowledged multiple vulnerabilities in multiple packages included in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53843
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 19-06-2013 18:00 − Donnerstag 20-06-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Multiple Vulnerabilities in Cisco TelePresence TC and TE Software ***
---------------------------------------------
Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition.
Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Vuln: OTRS CVE-2013-4088 Remote Security Bypass Vulnerability ***
---------------------------------------------
OTRS is prone to a remote security-bypass vulnerability.
Attackers can exploit this issue to bypass security restrictions and obtain sensitive information; other attacks may also be possible.
---------------------------------------------
http://www.securityfocus.com/bid/60688
*** Anonymous' #OpPetrol: What is it, What to Expect, Why Care? ***
---------------------------------------------
Last month, the hacker collective Anonymous announced their intention to launch cyber attacks against the petroleum industry (under the code name #OpPetrol) that is expected to last up to June 20. Their claimed reason for this attack is primarily due to petroleum being sold with the US dollar instead of currency of the country where...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/wIkmxr0Tz_A/
*** LinkedIn auf indische Webseite umgeleitet ***
---------------------------------------------
Das Karriereportal LinkedIn war in den letzten Stunden nur hin und wieder zu erreichen. Das Karriereportal wurde auf fremde Seiten umgeleitet. Die Einen sprechen von "menschlichen Fehlern", die anderen von einem Angriff.
---------------------------------------------
http://www.heise.de/security/meldung/LinkedIn-auf-indische-Webseite-umgelei…
*** VLC Media Player Unspecified Vulnerabilities ***
---------------------------------------------
Some vulnerabilities with an unknown impact have been reported in VLC Media Player.
The vulnerabilities are caused due to unspecified errors. No further information is currently available.
---------------------------------------------
https://secunia.com/advisories/53656
*** Blog: Apple of discord ***
---------------------------------------------
As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. The cybercriminals are aiming to steal Apple ID data which provides access to users' personal information stored in iCloud (e.g., photographs, contacts, documents, email, etc.) as well as to the purchases made in the company's iTunes Store. Many malicious users go further and try to the steal bank card details used to pay for those purchases.
---------------------------------------------
http://www.securelist.com/en/blog/8108/Apple_of_discord
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 18-06-2013 18:00 − Mittwoch 19-06-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Sybase EAServer Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Sybase EAServer, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53733
*** Java SE Critical Patch Update - June 2013 ***
---------------------------------------------
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 40 new security fixes across Java SE products of which 4 are applicable to server deployments of Java.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…
*** Java 7 update 25 released (Tue, Jun 18th) ***
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16025
*** Critical Update Plugs 40 Security Holes in Java ***
---------------------------------------------
Oracle today released a critical patch update for its Java software that fixes at least 40 security vulnerabilities in this widely deployed program and browser plugin. Updates are available for Java 7 on both Mac and Windows.
---------------------------------------------
https://krebsonsecurity.com/2013/06/critical-update-plugs-40-security-holes…
*** Siemens WinCC 7.2 Multiple Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities that impact the Siemens WinCC Web Navigator 7.2.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-169-02
*** Remote code execution vuln appears in Puppet ***
---------------------------------------------
Big trouble in automated clouds - Puppet Labs has blasted out a security advisory about a vulnerability in the popular infrastructure management tool Puppet.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/18/puppet_secu…
*** Solaris 10 patch cluster File clobbering vulnerability ***
---------------------------------------------
Topic: Solaris 10 patch cluster File clobbering vulnerability Risk: Medium Text:File clobbering vulnerability in Solaris 10 patch cluster 3/27/2013 Larry W. Cashdollar @_larry0 Hello, The 147147-2...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060154
*** Joomla 1.5.26, 2.5.11, 3.1.1 crypto vulnerability ***
---------------------------------------------
Topic: Joomla 1.5.26, 2.5.11, 3.1.1 crypto vulnerability Risk: Medium Text:# Vulnerable Application All current and past versions of Joomla (http://www.joomla.org) up to 1.5.26, 2.5.11, 3.1.1. Also th...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060146
*** Symantec Endpoint Protection Manager Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Symantec Endpoint Protection Manager, which can be exploited by malicious people to compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53864
*** Angestellte wollen Hilfe bei IT-Sicherheit ***
---------------------------------------------
Der Umgang mit Informationstechnik gehört auch für Angestellte in kleinen und mittelständischen Unternehmen zum täglichen Alltag. Einer Studie zufolge fühlten sie sich bei dieser Aufgabe jedoch vielfach alleingelassen.
---------------------------------------------
http://futurezone.at/b2b/16584-angestellte-wollen-hilfe-bei-it-sicherheit.p…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 17-06-2013 18:00 − Dienstag 18-06-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Siemens SIMATIC WinCC Web Navigator Bugs Let Remote Users Inject SQL Commands and Login to the System ***
---------------------------------------------
Siemens SIMATIC WinCC Web Navigator Bugs Let Remote Users Inject SQL Commands and Login to the System
---------------------------------------------
http://www.securitytracker.com/id/1028672
*** New Regulation for EU cybersecurity agency ENISA, with new duties ***
---------------------------------------------
European Union (EU) cybersecurity agency, ENISA has today (18th June) received a new Regulation, granting it a seven year mandate with an expanded set of duties.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/new-regulation-for-eu-cyber…
*** Tools - ProcDOT 1.0 released ***
---------------------------------------------
I am happy to announce that the first release (1.0) of my visual malware analysis tool ProcDOT (I already mentioned the beta in a recent blog post) is now available. This tool processes Sysinternals Process Monitor (Procmon) logfiles and PCAP-logs (Windump, Tcpdump) to generate a graph via the GraphViz suite. This graph visualizes any relevant activities (customizable) and can be interactively analyzed.
---------------------------------------------
https://www.cert.at/services/blog/20130618112047-852_en.html
*** Wall Street sets example for testing security defenses ***
---------------------------------------------
Quantum Dawn 2 will test institutions playbooks while also finding more efficient ways to share real-time information
---------------------------------------------
http://www.csoonline.com/article/735068/wall-street-sets-example-for-testin…
*** iOS: Sicherheitsmängel im "Persönlichen Hotspot" ***
---------------------------------------------
iOS wählt die Passwörter für mobiles Tethering nicht wirklich zufällig. Mobile Hotspots können in wenigen Sekunden geknackt werden.
---------------------------------------------
http://www.heise.de/security/meldung/iOS-Sicherheitsmaengel-im-Persoenliche…
*** Windows-Härter überführt SSL-Spione ***
---------------------------------------------
Microsofts Gratis-Schutzprogramm EMET soll in Version 4.0 nicht nur besser vor Cyber-Angriffen schützen, es ist auch deutlich benutzerfreundlicher geworden. Die empfohlenen Schutzeinstellungen aktiviert man mit wenigen Klicks.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Windows-Haerter-ueberfuehrt-SSL-Spio…
*** Apache XML Security Multiple Vulnerabilities ***
---------------------------------------------
Apache XML Security Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53590
*** Graphical Tools Help Security Experts Track Cyber-Attacks in Real Time ***
---------------------------------------------
"... it looks like a fantastic image from something in the world of science fiction. Streams of data flow from the globe representing the Internet. Attack vectors are highlighted in red. You can watch the changes as the attacks progress."
---------------------------------------------
http://www.eweek.com/security/graphical-tools-help-security-experts-track-c…
*** Security Vulnerability in Siemens COMOS 9.2/10.0 ***
---------------------------------------------
Siemens has discovered a vulnerability in the client library of the database system COMOS which might allow attackers to escalate their privileges for database access. The attacker would need local access as authenticated user to exploit the vulnerability.
---------------------------------------------
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemen…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 14-06-2013 18:00 − Montag 17-06-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** [webapps] - LibrettoCMS 2.2.2 - Arbitrary File Upload ***
---------------------------------------------
LibrettoCMS is provided a file upload function to unauthenticated users. Allows for write/read/edit/delete download arbitrary file uploaded , which results attacker might arbitrary write/read/edit/delete files and folders.
---------------------------------------------
http://www.exploit-db.com/exploits/26213
*** Adobe Flash exploit grabs video and audio, long after “fix” ***
---------------------------------------------
Demonstration code shows a new trick defeats Flash privacy fix.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/72PWd3AAReE/
*** Microsoft Sharepoint (Cloud) Persistent Script Insertion ***
---------------------------------------------
Topic: Microsoft Sharepoint (Cloud) Persistent Script Insertion Risk: Low Text:Title: Microsoft SharePoint (Cloud) - Persistent Exception-Handling Web Vulnerability Date: == 2013-06-14 Re...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060124
*** Avira AntiVir Engine Denial Of Service / Filter Evasion ***
---------------------------------------------
Topic: Avira AntiVir Engine Denial Of Service / Filter Evasion Risk: Medium Text: LSE Leading Security Experts GmbH - Security Advisory 2013-06-13 Avira AntiVir Engine -- Denial of Service / Filtering E...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060123
*** Siemens OpenScape Branch / Session Border Controller XSS / Disclosure / Injection ***
---------------------------------------------
Topic: Siemens OpenScape Branch / Session Border Controller XSS / Disclosure / Injection Risk: Medium Text:SEC Consult Vulnerability Lab Security Advisory == title: Multiple vulner...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060121
*** Firefox und Twitter schützen vor eingeschleusten Skripten ***
---------------------------------------------
"Du kommst hier nicht rein" heißt es für Schadcode, wenn man als Webseiten-Betreiber den HTTP-Header "Content Security Policy" benutzt. Google, Mozilla und Twitter gehen mit gutem Beispiel voran.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Firefox-und-Twitter-schuetzen-vor-ei…
*** Security Bulletin: WebSphere Commerce vulnerability could allow disclosure of user personal data (CVE-2013-0523) ***
---------------------------------------------
Some WebSphere Commerce data may be encrypted using an encryption algorithm that is susceptible to a padding oracle attack which may allow for the disclosure of user personal data. CVE(s): ...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_web…
*** Joomla com_extplorer Components shell upload Vulnerability ***
---------------------------------------------
Topic: Joomla com_extplorer Components shell upload Vulnerability Risk: Medium Text: # ISlamic Republic Of Iran Security Team # Www.IrIsT.Ir ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060127
*** Microsoft Outlook Vulnerability S/MIME Loss of Integrity ***
---------------------------------------------
Topic: Microsoft Outlook Vulnerability S/MIME Loss of Integrity Risk: Medium Text:** Attention script bunnies: This is not an RCE, XSS, etc. Please move along :) ** Microsoft Outlook (all versions) suffers ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060129
*** Mozilla Firefox and Microsoft Internet Explorer DoS vulnerability ***
---------------------------------------------
Topic: Mozilla Firefox and Microsoft Internet Explorer DoS vulnerability Risk: Medium Text:I want to warn you about Denial of Service vulnerability in Mozilla Firefox and Microsoft Internet Explorer. Earlier Jean ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060128
*** Vulnerability Disclosure – Open or Private? ***
---------------------------------------------
At the end of May, two Google security engineers announced Mountain View’s new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, [...]Post from: Trendlabs Security Intelligence Blog - by Trend MicroVulnerability Disclosure – Open or Private?
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/1qT_zYH1FxU/
*** Oracle Java pre-announcement: Upcoming JRE patch will plug 37 remotely exploitable holes.
---------------------------------------------
See http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…, (Mon, Jun 17th)
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16013&rss
*** Fortinet FortiOS (FortiGate) Guest User Permission Security Bypass Security Issue ***
---------------------------------------------
Fortinet FortiOS (FortiGate) Guest User Permission Security Bypass Security Issue
---------------------------------------------
https://secunia.com/advisories/53875
*** Debian Security Advisory for fail2ban ***
---------------------------------------------
When using Fail2ban to monitor Apache logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, thus causing a denial of service.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2708
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 13-06-2013 18:00 − Freitag 14-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Java SE Critical Patch Update - June 2013 - Pre-Release Announcement ***
---------------------------------------------
This Critical Patch Update Pre-Release Announcement provides advance information about the Oracle Java SE Critical Patch Update for June 2013, which will be released on Tuesday, June 18, 2013. While this Pre-Release Announcement is as accurate as possible at the time of publication, the information it contains may change before publication of the Critical Patch Update Advisory.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…
*** MtGox Phishing Campaign Hits Bing, Yahoo! ***
---------------------------------------------
An active phishing campaign targeting account holders at popular Bitcoin exchange MtGox.com has hijacked the top search results at Bing and Yahoo.com, redirecting unwary clickers to mtpox.com, a look-alike domain and Web site that was registered on June 12, 2013, less than 24 hours ago.
---------------------------------------------
https://krebsonsecurity.com/2013/06/mtgox-phishing-campaign-hits-bing-yahoo
*** How cybercriminals apply Quality Assurance (QA) to their malware campaigns before launching them ***
---------------------------------------------
By Dancho Danchev In 2013, the use of basic Quality Assurance (QA) practices has become standard practice for cybercrininals when launching a new campaign. In an attempt to increase the probability of a successful outcome for their campaigns � think malware infection, increased visitor-to-malware infected conversion, improved conversion of blackhat SEO acquired traffic leading to the purchase of counterfeit pharmaceutical items etc.
---------------------------------------------
http://blog.webroot.com/2013/06/14/how-cybercriminals-apply-quality-assuran…
*** Critical vulnerabilities in Siemens OpenScape Branch & SBC ***
---------------------------------------------
Siemens OpenScape Branch & SBC are vulnerable to critical vulnerabilities such as unauthenticated execution of OS commands or file disclosure. Attackers are able to take over the operating system and potentially intercept VoIP traffic or phone calls.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** AirLive IP cameras plain text information disclosure ***
---------------------------------------------
AirLive IP cameras could allow a remote attacker to obtain sensitive information, caused by retrieving users details and passwords stored as plain text in a backup file. An attacker could exploit this vulnerability to obtain sensitive information.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84933
*** OWASP Top 10 2013 released ***
---------------------------------------------
The Open Web Application Security Project's top 10 most critical web application security risks, has been updated and a new list has been published. Last updated back in 2010, the organization has published the new list wherein the importance of cross-site scripting (XSS) and cross-site request forgery (CRSF) has been diluted a little while risks related to broken session management and authentication has moved up a notch.
---------------------------------------------
https://www.owasp.org/index.php/Top10
*** Linux-Kernel-Exploit wurde auf Android portiert ***
---------------------------------------------
Eine gefährliche Sicherheitslücke, die unter Linux längst gepatcht wurde, wird nun unter Android ausgenutzt. Laut Symantec ist es Entwicklern von Schadsoftware gelungen, den Exploit zu portieren. Abhilfe durch eine neue Android-Version gibt es zunächst nicht.
---------------------------------------------
http://www.golem.de/news/privilege-escalation-linux-kernel-exploit-wurde-au…
*** Big browser builders scramble to fix cross-platform zero-day flaw ***
---------------------------------------------
Browser manufacturers will release an update in the next few weeks to block a new type of malware that exploits a cross-platform flaw that allows attackers access to Mac, PC, mobile, and even games console internet users.
---------------------------------------------
http://www.theregister.co.uk/2013/06/13/cross_platform_browser_flaw_in_wild/
*** Hintergrund: XSS-Bremse Content Security Policy ***
---------------------------------------------
Cross-Site-Scripting (XSS) ist eine der größten Plagen, mit denen Webmaster zu kämpfen haben. Selbst Banken und Bezahldienstleistern wie PayPal gelingt es nicht, das gefährliche Einschleusen von Fremdcode zu verhindern. Der neue Standard "Content Security Policy" soll endlich Abhilfe schaffen.
---------------------------------------------
http://www.heise.de/security/artikel/XSS-Bremse-Content-Security-Policy-188…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 12-06-2013 18:00 − Donnerstag 13-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** BlackBerry Issues Z10, PlayBook Security Advisories ***
---------------------------------------------
BlackBerry has issued security advisories warning of vulnerabilities in the Z10 smartphone and PlayBook tablet.
---------------------------------------------
http://threatpost.com/blackberry-issues-z10-playbook-security-advisories/
*** NanoBB 0.7 - Multiple Vulnerabilities ***
---------------------------------------------
An attacker might execute arbitrary SQL commands on the database server with this vulnerability. User tainted data is used when creating the database query that will be executed on the database management system (DBMS).
---------------------------------------------
http://www.exploit-db.com/exploits/26126
*** Vuln: WordPress crypt_private() Method Remote Denial of Service Vulnerability ***
---------------------------------------------
WordPress is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to consume CPU and memory resources, denying service to legitimate users.
WordPress 3.5.1 is vulnerable; other versions may also be affected.
---------------------------------------------
http://www.securityfocus.com/bid/60477
*** Rogue ads lead to SafeMonitorApp Potentially Unwanted Application (PUA) ***
---------------------------------------------
By Dancho Danchev Our sensors just picked up yet another rogue ad enticing users into installing the SafeMonitorApp, a potentially unwanted application (PUA) that socially engineers users into giving away their privacy through deceptive advertising of the rogue application's 'features'.
---------------------------------------------
http://blog.webroot.com/2013/06/13/rogue-ads-lead-to-safemonitorapp-potenti…
*** Swedens data protection Authority bans Google cloud services over privacy concerns ***
---------------------------------------------
In a landmark ruling, Swedens data protection authority (the Swedish Data Inspection Board) this week issued a decision that prohibits the nations public sector bodies from using the cloud service Google Apps......
---------------------------------------------
http://www.privacysurgeon.org/blog/incision/swedens-data-protection-authori…
*** Enterprises spend too much time on attack prevention, not enough on mitigating a breach ***
---------------------------------------------
The biggest security mistake enterprises make is focusing too much time and too many resources on preventing cyberattacks and not enough time and money on mitigation once a breach occurs, said Dave Monnier, security evangelist and fellow at non-profit Internet security research firm Team Cymru."
---------------------------------------------
http://www.fierceenterprisecommunications.com/story/enterprises-spend-too-m…
*** Blog: AutoRun. Reloaded ***
---------------------------------------------
Recent months have produced little of interest among worms written in Java and script languages such as JavaScript and VBScript. The main reason behind this was the limited proficiency of the virus writers, whose creations were anything but remarkable. However, a couple of malware samples grabbed our attention; their complexity is testimony to the fact that professionals sometimes get involved as well.
---------------------------------------------
http://www.securelist.com/en/blog/8107/AutoRun_Reloaded
*** Microsoft botnet smackdown caused collateral damage, failed to kill target ***
---------------------------------------------
Zombies just wont stay underground Microsoft is attracting fresh criticism for its handling of the Citadel botnet takedown, with some security researchers pointing to signs that the zombie network is already rising from the grave again.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/13/ms_citadel_…
*** Medical Devices Hard-Coded Passwords ***
---------------------------------------------
ALERTSUMMARYResearchers Billy Rios and Terry McCorkle of Cylance have reported a hard-coded password vulnerability affecting a wide variety of medical devices. According to the report, the vulnerability could be exploited to potentially change critical settings and/or modify device firmware. ICS-CERT has been working closely with the Food and Drug Administration (FDA) on these issues. ICS-CERT and the FDA have notified the affected vendors of the report and have asked the vendors to confirm the
---------------------------------------------
http://ics-cert.us-cert.gov/alerts/ICS-ALERT-13-164-01
*** Researchers Claim Wi-Fi Threat Is A Serious Danger To iPhone Users ***
---------------------------------------------
The way certain iOS devices, like iPhones or iPads, automatically connect to Wi-Fi networks could place users at serious risk. Security firm SkyCure said it had discovered a feature in iPhone devices running on certain networks, including Vodafone, that would connect automatically to a Wi-Fi network with a specified SSID, such as 'BTWiFi'.
---------------------------------------------
http://www.techweekeurope.co.uk/news/researchers-claim-wi-fi-threat-is-a-se…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 11-06-2013 18:00 − Mittwoch 12-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** Microsoft Security Bulletin Summary for June 2013
---------------------------------------------
- Cumulative Security Update for Internet Explorer
- Vulnerability in Windows Kernel Could Allow Information Disclosure
- Vulnerability in Kernel-Mode Driver Could Allow Denial of Service
- Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege
- Vulnerability in Microsoft Office Could Allow Remote Code Execution
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-jun
*** Microsoft schließt sie nicht alle ***
---------------------------------------------
Am Juni-Patchday hat Microsoft zahlreihe Lücken in Windows, Internet Explorer und Office geschlossen. Eine Rechteausweitungslücke, für die bereits ein Exploit im Netz kursiert, hat die Redmonder Softwareschmiede dabei jedoch offenbar ausgelassen.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-schliesst-sie-nicht-alle-188…
*** Juni-Updates für Flash-Player und Co. ***
---------------------------------------------
Eine Lücke, viele Updates: Adobe hat ein kritisches Sicherheitsloch gestopft und neue Flash- und Air-Versionen für sämtliche Plattformen veröffentlicht.
---------------------------------------------
http://www.heise.de/security/meldung/Juni-Updates-fuer-Flash-Player-und-Co-…
*** HP integrated Lights Out (iLO) Unspecified Bug Lets Remote Users Gain Access ***
---------------------------------------------
HP integrated Lights Out (iLO) Unspecified Bug Lets Remote Users Gain Access
---------------------------------------------
http://www.securitytracker.com/id/1028661
*** glibc 2.17+ XDM crypto() NULL pointer deref ***
---------------------------------------------
Topic: glibc 2.17+ XDM crypto() NULL pointer deref Risk: Medium Text:Its been suggested we get a CVE id assigned for this recent fix to the xdm display/login manager from X.Org: http://cgit.f...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060101
*** Weitere XSS-Lücke bei ClickandBuy geschlossen ***
---------------------------------------------
Nachdem heise Security über eine XSS-Lücke beim Zahlungsabwickler berichtete, erreichte uns vor kurzem schon der nächste Hinweis auf eine weitere Lücke.
---------------------------------------------
http://www.heise.de/security/meldung/Weitere-XSS-Luecke-bei-ClickandBuy-ges…
*** Vuln: HP Data Protector CVE-2013-2333 Remote Code Execution Vulnerability ***
---------------------------------------------
HP Data Protector CVE-2013-2333 Remote Code Execution Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/60309
*** WordPress Mail Subscribe List Plugin Script Insertion Vulnerability ***
---------------------------------------------
WordPress Mail Subscribe List Plugin Script Insertion Vulnerability
---------------------------------------------
https://secunia.com/advisories/53732
*** Hewlett Packards Weboberfläche "System Management Homepage" angreifbar ***
---------------------------------------------
Die Weboberfläche zur Verwaltung von ProLiant- und Integrity-Servern enthält eine kritische Sicherheitslücke.
---------------------------------------------
http://www.heise.de/security/meldung/Hewlett-Packards-Weboberflaeche-System…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 10-06-2013 18:00 − Dienstag 11-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** CERT Warns of Vulnerabilities in HP Insight Diagnostics ***
---------------------------------------------
CERT warns of an unpatched vulnerability in HPs Insight Diagnostics server management software that could lead to remote code execution attacks.
---------------------------------------------
http://threatpost.com/cert-warns-of-vulnerabilities-in-hp-insight-diagnosti…
*** Apple iOS and Mac OS X security bypass ***
---------------------------------------------
Apple iOS and Mac OS X security bypass
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84809
*** The Value of a Hacked Email Account ***
---------------------------------------------
One of the most-viewed stories on this site is a blog post+graphic that I put together last year to illustrate the ways that bad guys can monetize hacked computers. But just as folks who dont bank online or store sensitive data on their PCs often have trouble understanding why someone would want to hack into their systems, many people do not fully realize how much they have invested in their email accounts until those accounts are in the hands of cyber thieves.
---------------------------------------------
https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account
*** NSA Whistleblower Article Redirects to Malware ***
---------------------------------------------
The Washington Free Beacons website has been attacked and malware is redirecting visitors to a site hosting the ZeroAccess rootkit and scareware.
---------------------------------------------
http://threatpost.com/nsa-whistleblower-article-redirects-to-malware/
*** Debian Security Advisory DSA-2706 chromium-browser ***
---------------------------------------------
Several vulnerabilities have been discovered in the Chromium web browser.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2706
*** Cisco ASA Ethernet Information Leak ***
---------------------------------------------
Exploit for hosts which use a network device driver that pads ethernet frames with data which vary from one packet to another, likely taken from kernel memory, system memory allocated to the device driver, or a hardware buffer on its network interface card.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060088
*** MobileIron Virtual Smartphone Platform Privilege Escalation Exploit 0day ***
---------------------------------------------
The MobileIron VSP appliance provides a restricted "clish" java application that can be used for performing a minimal amount of configuration and requires an "enable" password for elevated privileges.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060085
*** Going Solo: Self-Propagating ZBOT Malware Spotted ***
---------------------------------------------
Who says you can't teach old malware new tricks? Recently, we reported on how ZBOT had made a comeback of sorts in 2013; this was followed by media reports that it was now spreading via Facebook. Now, we have spotted a new ZBOT variant that can spread on its own.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/9Agp1TYzr9c/
*** Microsoft FixIt Tool Blocks Java Attacks in IE ***
---------------------------------------------
Java is a security headache, not just for users and Oracle, its provider, but also for other software companies that have to deal with it, as well. Microsoft has taken steps to address this problem by releasing a FixIt tool that is designed to block all of the Web-based Java attack vectors in Internet Explorer, ...
---------------------------------------------
http://threatpost.com/microsoft-fixit-tool-blocks-java-attacks-in-ie/
*** Store passwords the right way in your application ***
---------------------------------------------
I suspect most of our readers know this, but it cant hurt to repeat this every so often as there is a lot of confusion on the issue. One thing that gets to me is seeing reports of website compromises that claim "the passwords were hashed with SHA-256". Well at face value that means 90% of the passwords were decoded before the news hit.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15974
*** [remote] - Java Web Start Double Quote Injection Remote Code Execution ***
---------------------------------------------
Java Web Start Double Quote Injection Remote Code Execution
---------------------------------------------
http://www.exploit-db.com/exploits/26123
*** WordPress 3.5.1 Denial of Service ***
---------------------------------------------
Version 3.5.1 (latest) of popular blogging engine WordPress suffers from remote denial of service vulnerability. The bug exists in encryption module (class-phpass.php).
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060091
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 07-06-2013 18:00 − Montag 10-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Zpanel 10.0.0.2 Remote Execution Exploit ***
---------------------------------------------
Topic: Zpanel 10.0.0.2 Remote Execution Exploit Risk: High Text:One of our expert team members (shachibista () gmail com) who is assigned to do the security audit of ZPanel code has found th...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060057
*** Asus RT56U 3.0.0.4.360 Remote Command Injection ***
---------------------------------------------
Topic: Asus RT56U 3.0.0.4.360 Remote Command Injection Risk: High Text:Insufficient (or rather, a complete lack thereof) input sanitization leads to the injection of shell commands. Its possible t...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060058
*** Sneaky new Android Trojan is WORST yet discovered ***
---------------------------------------------
Sophisticated code stays hidden but can wreak havoc Security researchers at Kaspersky Lab report that a recently discovered Android Trojan is the most sophisticated such mobile malware yet to be identified.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/07/android_oba…
*** Abhilfe für Zero-Day-Lücke in Plesk ***
---------------------------------------------
Parallels bezieht Stellung zu einem angeblichen Exploit in seiner Server-Verwaltungssoftware und stellt einen Workaround für nicht mehr offiziell unterstützte Versionen bereit.
---------------------------------------------
http://www.heise.de/security/meldung/Abhilfe-fuer-Zero-Day-Luecke-in-Plesk-…
*** May 2013 virus activity review from Doctor Web ***
---------------------------------------------
June 3, 2013 In early May, a dangerous Trojan was discovered that can replace pages loaded in the browser. Another malicious program, also added to the virus database in May, attacked users on Facebook, Google Plus and Twitter. At the end of the month, Doctor Web analysts hijacked another command-and-control (C&C) server of the botnet Rmnet and discovered that two mew malicious components of the file infector were being distributed in the zombie network. Also found were new malicious...
---------------------------------------------
http://news.drweb.com/show/?i=3576&lng=en&c=9
*** Qnap patcht häppchenweise ***
---------------------------------------------
Mittlerweile stehen Updates des Herstellers für die verwundbaren NAS- und Videoüberwachungssysteme bereit.
---------------------------------------------
http://www.heise.de/security/meldung/Qnap-patcht-haeppchenweise-1885664.html
*** Twitter Spammers abuses Google search ***
---------------------------------------------
We reported few days ago about a new spam campaign that abuses open-redirect vulnerability in popular websites including CNN, Yahoo and Ask.com. Today, Security researcher Janne Ahlberg discovered another spam campaign that abuses the google search to spread the scam websites.
---------------------------------------------
http://www.ehackingnews.com/2013/06/twitter-spammers-abuses-google-search.h…
*** Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac ***
---------------------------------------------
Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of whats coming.
---------------------------------------------
http://nakedsecurity.sophos.com/2013/06/09/microsoft-announces-five-bulleti…
*** ZeuS-P2P internals - understanding the mechanics: a technical report ***
---------------------------------------------
At the beginning of 2012, we wrote about the emergence of a new version of ZeuS called ZeuS-P2P or Gameover. It utilizes a P2P (Peer-to-Peer) network topology to communicate with a hidden C&C center. This malware is still active and it has been monitored and investigated by CERT Polska for more than a year.
---------------------------------------------
https://www.cert.pl/news/7386/langswitch_lang/en
*** Comparing Antivirus Threat Detection to Online Sandboxes ***
---------------------------------------------
Metascan uses multiple virus and malware detection engines and aggregates their findings to identify potential threats. There are other ways to detect potential threats, and one approach is to create a virtual environment, or 'sandbox', for the file where it can be observed to see if it exhibits any threatening behavior.
---------------------------------------------
http://www.opswat.com/blog/comparing-antivirus-threat-detection-online-sand…
*** Microsoft borks botnet takedown in Citadel snafu ***
---------------------------------------------
Stupid Redmond kicked over our honeypots, wail white hats Security researchers are complaining about collateral damage from the latest botnet take-down efforts by Microsoft and its partners.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/citadel_bot…
*** Apple Store Vulnerable to XSS ***
---------------------------------------------
There is a cross-site scripting vulnerability in the Apple Store Web site that is exposing visitors to potential attack. The vulnerability was discovered by a German security researcher who says he informed Apple about the problem in mid-May, but the vulnerability still exists.
---------------------------------------------
http://threatpost.com/apple-store-vulnerable-to-xss/
*** RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files ***
---------------------------------------------
RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files
---------------------------------------------
http://www.securitytracker.com/id/1028638
*** Cisco IOS XR SNMP Memory Leak Lets Remote Users Deny Service ***
---------------------------------------------
Cisco IOS XR SNMP Memory Leak Lets Remote Users Deny Service
---------------------------------------------
http://www.securitytracker.com/id/1028636
*** DSA-2703 subversion ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2703
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 06-06-2013 18:00 − Freitag 07-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Advanced Notification Service for the June 2013 Security Bulletin Release ***
---------------------------------------------
Today we're providing Advance Notification of five bulletins for release on Tuesday, June 11, 2013. This release brings one Critical- and four Important-class bulletins. The Critical-rated bulletin addresses issues in Internet Explorer, and the Important-rated bulletins address issues in Microsoft Windows and Office. We will publish the bulletins on the second Tuesday of the month, at approximately 10 a.m. PT. Please revisit this blog at that time for our official risk and impact...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/06/06/advanced-notification-se…
*** Plesk 0-day: Real or not?, (Fri, Jun 7th) ***
---------------------------------------------
Yesterday, a poster to the full disclosure mailing list described a possible new 0-day vulnerability against Plesk. Contributing to the vulnerability is a very odd configuration choice to expose "/usr/bin" via a ScriptAlias, making executables inside the directory reachable via URLs. The big question that hasnt been answered so far is how common this configuration choice is. Appaerently, some versions of Plesk on CentOS 5 are configured this way, but not necessarily exploitable. The...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15950&rss
*** 100% Compliant (for 65% of the systems), (Fri, Jun 7th) ***
---------------------------------------------
At a community college where Im helping out whenever they panic on security issues, I recently was confronted with the odd reality of a lingering malware infection on their network, even though they had deployed a custom anti-virus (AV) pattern ("extra.dat") to eradicate the problem. Of course, these days, reliance on anti-virus is somewhat moot to begin with, our recent tally of fresh samples submitted to VirusTotal had AV lagging behind about 8 days or so. If you caught a keylogger...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15959&rss
*** PHP "php_quot_print_encode()" Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53736
*** Vuln: Drupal Services Module Cross Site Request Forgery Vulnerability ***
---------------------------------------------
The Services module for Drupal is prone to a cross-site request-forgery vulnerability.
---------------------------------------------
http://www.securityfocus.com/bid/60356
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 05-06-2013 18:00 − Donnerstag 06-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Security Bulletin: Vulnerability in IBM InfoSphere Information Server due to issues in IBM Java SDK (CVE-2013-0440, CVE-2013-0443, CVE-2013-0169, CVE-2012-1717, CVE-2012-1718, CVE-2012-5081) ***
---------------------------------------------
Multiple IBM Java SDK security vulnerabilities exist in the IBM InfoSphere Information Server. Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21639487
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_vul…
*** Frei zugängliche Schwachstellen-Datenbank ***
---------------------------------------------
Das Potsdamer Hasso-Plattner-Institut hat für jedermann den Zugang für eine Schwachstellendatenbank freigegeben. Darin kann der Nutzer unter anderem nach Produkten, CVE-Kennungen und Gefährdungsstufen suchen.
---------------------------------------------
http://www.heise.de/security/meldung/Frei-zugaengliche-Schwachstellen-Daten…
*** Cisco WebEx Meetings Server Information Disclosure Vulnerability ***
---------------------------------------------
Cisco WebEx Meetings Server Information Disclosure Vulnerability
---------------------------------------------
https://secunia.com/advisories/53731
*** QNAP VioStor NVR Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
QNAP VioStor NVR Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/53583
*** QNAP VioStor NVR and QNAP NAS Products Security Bypass Security Issue and Arbitrary Command Injection Vulnerability ***
---------------------------------------------
QNAP VioStor NVR and QNAP NAS Products Security Bypass Security Issue and Arbitrary Command Injection Vulnerability
---------------------------------------------
https://secunia.com/advisories/53721
*** Operation b54: Microsoft, FBI und Finanzunternehmen schalten 1462 Botnetze ab ***
---------------------------------------------
Microsoft ist in seinen siebten Feldzug gegen Botnetze gezogen. Fünf Millionen infizierte Rechner und ein Schaden von einer halben Milliarde US-Dollar sollen die Citadel-Botnetze verursacht haben. FBI und Finanzsektor standen dem Unternehmen zur Seite.
---------------------------------------------
http://www.heise.de/security/meldung/Operation-b54-Microsoft-FBI-und-Finanz…
*** Parallels Plesk Panel Arbitrary PHP Code Execution Vulnerability ***
---------------------------------------------
Parallels Plesk Panel Arbitrary PHP Code Execution Vulnerability
---------------------------------------------
https://secunia.com/advisories/53596