=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-03-2017 18:00 − Mittwoch 29-03-2017 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** World Backup Day is as good as any to back up your data ***
---------------------------------------------
In today’s security landscape, there are more threats to data than ever before. Beyond corruption caused by hardware or human failure, malware and cyberattacks can put data in serious danger. That’s why it’s .. ---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/03/28/world-backup-day-is-as-…
*** Siemens RUGGEDCOM ROX I ***
---------------------------------------------
This advisory contains mitigation details for improper authorization, cross-site scripting, and cross-site request forgery vulnerabilities in the Siemens RUGGEDCOM ROX I.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-087-01
*** 3S-Smart Software Solutions GmbH CODESYS Web Server ***
---------------------------------------------
This advisory contains mitigation details for arbitrary file upload and stack buffer overflow vulnerabilities in the 3S-Smart Software Solutions GmbH CODESYS Web Server.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-087-02
*** FBI warns of attacks on anonymous FTP servers ***
---------------------------------------------
The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental ..
---------------------------------------------
http://www.cio.com/article/3185882/security/fbi-warns-of-attacks-on-anonymo…
*** About the security content of iCloud for Windows 6.2 ***
---------------------------------------------
https://support.apple.com/en-us/HT207607
*** Ransomware: Scammer erpressen Besucher von Pornoseiten ***
---------------------------------------------
Über einen Fehler in Apples Safari für iPhone blockieren Unbekannte den Browser mit einem immer ..
---------------------------------------------
https://www.golem.de/news/ransomware-scammer-erpressen-besucher-von-porno-s…
*** Benutzt hier jemand JSON Encryption?If you are using ... ***
---------------------------------------------
Benutzt hier jemand JSON Encryption?If you are using go-jose, node-jose, jose2go, Nimbus JOSE+JWT or jose4 with ECDH-ES please update to the latest version. RFC 7516 aka JSON Web ..
---------------------------------------------
http://blog.fefe.de/?ts=a6254421
*** Vuln: ImageMagick Incomplete Fix CVE-2017-7275 Memory Corruption Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/97166
*** "Cyber-Angriff" im Bundestag: Anscheinend eine gewöhnliche Malvertising-Kampagne ***
---------------------------------------------
Deutsche Medien berichten von einem erneuten Hackerangriff auf den Bundestag. Dabei scheint es sich um Abgeordnete zu handeln, die Opfer von verseuchter Werbung auf der Webseite einer israelischen Zeitung geworden sind. Infektionen gab es keine.
---------------------------------------------
https://heise.de/-3668761
*** Escaping a Python sandbox with a memory corruption bug ***
---------------------------------------------
https://medium.com/@gabecpike/python-sandbox-escape-via-a-memory-corruption…
*** DFN-CERT-2017-0543: AppArmor: Eine Schwachstelle ermöglicht das Umgehen von Sicherheitsvorkehrungen ***
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann eine speziell präparierte Anwendung uneingeschränkt auf einem betroffenen System einsetzen, da über AppArmor ..
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0543/
*** Ausbruch aus der VM: VMware schließt kritische Pwn2Own-Lücken ***
---------------------------------------------
VMware hat Sicherheitslücken in VMware Workstation, Fusion und ESXi geschlossen, mit deren Hilfe Sicherheitsforscher beim Pwn2Own-Wettbewerb aus virtuellen Maschinen ausgebrochen und das Host-System gekapert hatten.
---------------------------------------------
https://heise.de/-3669902
*** PMASA-2017-8 ***
---------------------------------------------
https://www.phpmyadmin.net/security/PMASA-2017-8/
*** Ebury-Rootkit: Russischer Hacker bekennt sich schuldig ***
---------------------------------------------
Ein russsischer Staatsbürger hat in den USA seine Beteiligung am Auf- und Ausbau des Ebury-Botnetzes eingestanden. Ebury befällt vor allem Linux-Server und greift SSH-Logins ab.
---------------------------------------------
https://heise.de/-3669617
*** Browser-Plug-in Crusader injiziert falsche Support-Telefonnummern in Webseiten ***
---------------------------------------------
Eine neue Schadcode-Variante integriert sich in den Browser und tauscht Suchergebnisse aus. Dadurch kann der Anwender auf Affiliate-Seiten umgelenkt werden. Außerdem ist es möglich, ihm falsche Support-Telefonnummern unterzuschieben.
---------------------------------------------
https://heise.de/-3670102
*** GitHub Users Targeted with Dimnie Trojan ***
---------------------------------------------
https://www.bleepingcomputer.com/news/security/github-users-targeted-with-d…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-03-2017 18:00 − Dienstag 28-03-2017 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Bugtraq: APPLE-SA-2017-03-27-1 Pages 6.1, Numbers 4.1, and Keynote 7.1 for Mac; Pages 3.1, Numbers 3.1, and Keynote 3.1 for iOS ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540325
*** APT29 Used Domain Fronting, Tor to Execute Backdoor ***
---------------------------------------------
APT29, a/k/a Cozy Bear, has used Tor and a technique called domain fronting in order to secure backdoor access to targets for nearly two years running.
---------------------------------------------
http://threatpost.com/apt29-used-domain-fronting-tor-to-execute-backdoor/12…
*** New Clues Surface on Shamoon 2’s Destructive Behavior ***
---------------------------------------------
Researchers report new connections between Magic Hound and Shamoon 2, along with descriptions of how the Disttrack malware component of campaigns moves laterally within infected networks.
---------------------------------------------
http://threatpost.com/new-clues-surface-on-shamoon-2s-destructive-behavior/…
*** Vuln: GnuTLS GNUTLS-SA-2017-3 Multiple Security Vulnerabilities ***
---------------------------------------------
GnuTLS GNUTLS-SA-2017-3 Multiple Security Vulnerabilities
---------------------------------------------
http://www.securityfocus.com/bid/97040
*** Neue Sicherheitslücke im Passwort-Manager LastPass ***
---------------------------------------------
Bereits zum zweiten Mal innerhalb kurzer Zeit ist der populäre Passwort-Manager mit einer Schwachstelle konfrontiert.
---------------------------------------------
https://futurezone.at/produkte/neue-sicherheitsluecke-im-passwort-manager-l…
*** Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates ***
---------------------------------------------
A security researcher has disclosed critical issues in the processes and third-party API used by Symantec certificate resellers to deliver and manage Symantec SSL ..
---------------------------------------------
https://thehackernews.com/2017/03/symantec-ssl-certificates.html
*** Threat Landscape for Industrial Automation Systems, H2 2016 ***
---------------------------------------------
On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure.
---------------------------------------------
http://securelist.com/analysis/publications/77842/threat-landscape-for-indu…
*** From DDoS to Server Ransomware: APACHE STRUTS 2 - CVE-2017-5638 Campaign ***
---------------------------------------------
As soon as a zero-day remote code execution vulnerability is disclosed, it is common to see many scans in the wild. Some of these scans are researchers, but many of ..
---------------------------------------------
https://f5.com/labs/articles/threat-intelligence/malware/from-ddos-to-serve…
*** This book reads you - using JavaScript ***
---------------------------------------------
Apple just released a fix for one issue I reported last year in iBooks that allowed access to files on a users system when a book was opened. iBooks on El Capitan would ..
---------------------------------------------
https://s1gnalcha0s.github.io/ibooks/epub/2017/03/27/This-book-reads-you-us…
*** Gefahr durch Exploit für Zombie-IIS ***
---------------------------------------------
Microsofts Internet Information Services 6.0 sind eigentlich Alteisen, für das es nicht einmal Sicherheits-Updates gibt. Trotzdem gibt es noch über 30.000 allein in Deutschland. Und die sind durch einen öffentlich bekannten Exploit akut bedroht.
---------------------------------------------
https://heise.de/-3666599
*** Verschlüsselung: Schwachstellen in zahlreichen VoIP-Anwendungen entdeckt ***
---------------------------------------------
Das ZRT-Protokoll soll für sichere Verbindungen und verschlüsselte VoIP-Telefonate sorgen. Forscher haben Schwachstellen in zahlreichen ZRTP-Anwendungen ..
---------------------------------------------
https://www.golem.de/news/verschluesselung-schwachstellen-in-zahlreichen-vo…
*** IronWASP – Part 1 ***
---------------------------------------------
Considering not all vulnerability scanners are open source, a great deal of them are available such as: IronWASP OpenVAS Retina CS Community W3af Grabber, etc. In this article, we shall be discussing more about IronWASP.
---------------------------------------------
http://resources.infosecinstitute.com/ironwasp-part-1-2/
*** Docs.com-Nutzer teilen Kennwörter und vieles mehr mit der Welt ***
---------------------------------------------
Über Microsofts Dienst Docs.com lassen sich Dokumente teilen. Allerdings sind diese oft öffentlich einsehbar. Viele Anwender scheinen sich dem nicht bewusst zu sein – zu einfach finden sich Informationen wie Kennwörter.
---------------------------------------------
https://heise.de/-3665975
*** Apache / ModSecurity Tutorials ***
---------------------------------------------
This is a series of Apache web server tutorials that will span from the basics to advanced topics like ModSecurity and logfile visualization.
---------------------------------------------
https://www.netnea.com/cms/apache-tutorials/
*** Xen Security Advisory XSA-206 - xenstore denial of service via repeated update ***
---------------------------------------------
Unprivileged guests may be able to stall progress of the control domain or driver domain, possibly leading to ..
---------------------------------------------
http://xenbits.xen.org/xsa/advisory-206.txt
*** With iOS 10.3, iDevices get new Apple File System with native encryption support ***
---------------------------------------------
On Monday, Apple released updates for its various products. As usual, they fix flaws and add capabilities, but the iOS update (v10.3) is more noteworthy than usual, ..
---------------------------------------------
https://www.helpnetsecurity.com/2017/03/28/apple-file-system-encryption/
*** Ransomware: Scammer erpressen Besucher von Porno-Seiten ***
---------------------------------------------
Über einen Fehler in Apples Safari für iPhone blockieren Unbekannte den Browser mit einem immer wiederkehrenden Javascript-Popup. Darin werden Nutzer aufgefordert, Lösegeld zu zahlen. Mit einem einfachen Trick lässt sich der Falle aber entgehen.
---------------------------------------------
https://www.golem.de/news/ransomware-scammer-erpressen-besucher-von-porno-s…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-03-2017 18:00 − Montag 27-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** SAP NetWeaver J2EE Platform Security ***
---------------------------------------------
In the previous article, we discussed SAP NetWeaver ABAP Platform and its vulnerabilities. Today's topic is the J2EE platform, its architecture, vulnerabilities, and the latest trends in its cyber security.
---------------------------------------------
http://resources.infosecinstitute.com/sap-netweaver-j2ee-platform-security/
*** [Update] Ungepatchte SAP-Systeme angreifbar für Remote Code Execution ***
---------------------------------------------
Wenn die im Rahmen des SAP Security Patch Day im März 2017 veröffentlichten Patches nicht umgehend eingespielt werden, droht die Kompromittierung zentraler Datenbestände, warnen SAP-Kenner.
---------------------------------------------
https://heise.de/-3664479
*** Amazon-Phishingmail: Rechnung über Ihre Verkäufergebühren ***
---------------------------------------------
In einer angeblichen Nachricht von "Europe Amazon" erhalten Kund/innen die Information, dass ihr "Duplikat der elektronisch erzeugten Steuerrechnung" verfügbar sei. Sie können es in einem beigefügten Dokument, das den Login-Bereich von Amazon imitiert, herunterladen. Es handelt sich um einen Phishingversuch.
---------------------------------------------
https://www.watchlist-internet.at/phishing/amazon-phishingmail-rechnung-ueb…
*** Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005 ***
---------------------------------------------
On March 14, 2017, Microsoft released security bulletin MS17-013 to address CVE-2017-0005, a vulnerability in the Windows Win32k component that could potentially allow elevation of privileges. A report from a trusted partner identified a zero-day exploit for this vulnerability. The exploit targeted older versions of Windows and allowed attackers to elevate process privileges on these platforms.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/03/27/detecting-and-mitigatin…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect WebSphere Dashboard Framework ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000663
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Web Experience Factory ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000643
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Process Designer used in IBM Business Process Manager and WebSphere Lombardi Edition ***
http://www.ibm.com/support/docview.wss?uid=swg22000871
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in zlib affect IBM Sterling Connect:Direct for Microsoft Windows (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843) ***
http://www.ibm.com/support/docview.wss?uid=swg22000608
---------------------------------------------
*** IBM Security Bulletin: Privilege Escalation vulnerability affects Cognos Business Intelligence (CVE-2016-8960) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993718
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects LCM8 & LCM16 KVM Switch Firmware and GCM16 & GCM32 KVM Switch Firmware (CVE-2016-8610) ***
https://support.podc.sl.edst.ibm.com/support/home/docdisplay?lndocid=migr-5…
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in SSH affect IBM DataPower Gateways (CVE-2016-10009, CVE-2016-10012) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000413&myns=swgws&mynp=O…
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSH and OpenSSL affect GPFS for Windows V3.5 ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024968
---------------------------------------------
*** IBM Security Bulletin: IBM Sterling Selling and Fulfillment Foundation is affected by Cross Site Scripting (XSS) Vulnerability (CVE-2016-8917) ***
http://www.ibm.com/support/docview.wss?uid=swg22000943
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Jazz Team Server affect IBM Rational products based on IBM Jazz technology ***
https://www.ibm.com/support/docview.wss?uid=swg22000784
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in GSKit affects IBM Sterling Connect:Direct for UNIX (CVE-2016-2183) ***
https://www-01.ibm.com/support/docview.wss?uid=swg22000927
---------------------------------------------
*** IBM Security Bulletin: Fix Available for IBM iNotes Cross-site Scripting Vulnerability (CVE-2016-9990) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998824
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-03-2017 18:00 − Freitag 24-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** TROOPERS 2017 Day #4 Wrap-Up ***
---------------------------------------------
I'm just back from Heidelberg so here is the last wrap-up for the TROOPERS 2017 edition.
---------------------------------------------
https://blog.rootshell.be/2017/03/23/troopers-2017-day-4-wrap/
*** Google slaps Symantec for sloppy certs, slow show of SNAFUs ***
---------------------------------------------
Certs will keep working, but Chrome will be suspicious, soon Googles Chrome development team has posted a stinging criticism of Symantecs certificate-issuance practices, saying it has lost confidence in the companys practices and therefore in the safety of sessions hopefully-secured by Symantec-issued certificates.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2017/03/24/google_slap…
*** Referrer spoofing with iframe injection ***
---------------------------------------------
Last year we've been playing with a very simple method to spoof the referrer on Edge, which allowed us of course to spoof the referrer and -as a bonus- other neat things like bypass the XSS filter. Today I found out that it was patched, so I decided to give it a try and find a way around the patch. Honestly I don't feel it's a bypass but clearly a variation. From a practical point of view, it works again and bypasses the patch...
---------------------------------------------
https://www.brokenbrowser.com/referer-spoofing-patch-bypass/
*** VMSA-2017-0004.6 ***
---------------------------------------------
VMware product updates resolve remote code execution vulnerability via Apache Struts 2
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2017-0004.html
*** Betrugsnetzwerk: Kinox.to-Nutzern Abofallen andrehen ***
---------------------------------------------
Eine Betrugskampagne nutzt Sicherheitslücken im Stock-Browser von Android aus, um Nutzern Abofallen und Premiumdienste zuzuschieben. Die Betrüger bauen gefälschte Webshops auf, um legitim zu erscheinen. (Abofallen, Server)
---------------------------------------------
https://www.golem.de/news/betrugsnetzwerk-mit-fake-webshops-kinox-to-nutzer…
*** DFN-CERT-2017-0524/">F5 Networks BIG-IP Protocol Security Module (PSM): Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ***
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann eine Schwachstelle im Traffic Management Microkernel (TMM) auf BIG-IP-Systemen durch die Versendung präparierten Netzwerkverkehrs für einen Denial-of-Service (DoS)-Angriff ausnutzen.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0524/
*** Erpressung durch iCloud-Fernlöschung: Wie Sie Ihr iPhone schützen ***
---------------------------------------------
Unbekannte drohen damit, wahllos iPhones zu löschen - wenn Apple nicht zahlt. Die Angreifer sind offenbar in Besitz von iCloud-Zugangsdaten. Mac & i erklärt, wie man sich gegen einen derartigen Angriff wappnen kann.
---------------------------------------------
https://heise.de/-3663802
*** LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA ***
---------------------------------------------
This advisory contains mitigation details for a path traversal vulnerability in the LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-082-01
*** BD Kiestra PerformA and KLA Journal Service Applications Hard-Coded Passwords Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a hard-coded password vulnerability in the Becton, Dickinson and Company (BD) Kiestra PerformA and KLA Journal Service applications that access the BD Kiestra Database.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSMA-17-082-01
*** Vuln: libpcre Multiple Security Vulnerabilities ***
---------------------------------------------
libpcre is prone to the following multiple security vulnerabilities:
1. A denial-of-service vulnerability
2. Multiple stack-based buffer-overflow vulnerabilities
Attackers can exploit these issues to run arbitrary code within the context of the affected application. Failed exploit attempts may result in denial-of-service conditions.
libpcre1 in PCRE 8.40 is vulnerable; other versions may also be affected.
---------------------------------------------
http://www.securityfocus.com/bid/97067
*** DFN-CERT-2017-0526/">F5 Networks BIG-IP Protocol Security Module (PSM): Eine Schwachstelle ermöglicht das Ausspähen von Informationen ***
---------------------------------------------
Ein lokaler, einfach authentisierter Angreifer mit erweiterten Privilegien kann sensitive Daten ausspähen, die seit dem letzten Neustart betroffener Geräte angefallen sind. Dazu gehören beispielsweise die Passwörter zu kürzlich erstellten Benutzerkonten.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0526/
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in NTP affect Power Hardware Management Console ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021868
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities CVE-2016-5636 and CVE-2016-5699 in Python affect IBM i ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021926
---------------------------------------------
*** IBM Security Bulletin: Cross-Site Scripting Vulnerability in IBM WebSphere Portal (CVE-2017-1120) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000152
---------------------------------------------
*** IBM Security Bulletin: A cross-site scripting vulnerablity has been addressed in IBM Kenexa LMS on Cloud 5.1 ***
http://www.ibm.com/support/docview.wss?uid=swg21999483
---------------------------------------------
*** IBM Security Bulletin: Multiple Security Vulnerabilties have been addressed in LCMS Premier on Cloud 11.0 ***
http://www.ibm.com/support/docview.wss?uid=swg21998874
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect LCM8 & LCM16 KVM Switch Firmware and GCM16 & GCM32 KVM Switch Firmware ***
https://support.podc.sl.edst.ibm.com/support/home/docdisplay?lndocid=migr-5…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-03-2017 18:00 − Donnerstag 23-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Google: Die Hälfte aller Android-Geräte erhält unsere Sicherheitspakete nicht ***
---------------------------------------------
Google macht Fortschritte im Kampf gegen Malware im Play Store, muss aber eingestehen, dass mehr als eine halbe Milliarde Android-Geräte die regelmäßigen Sicherheitsupdates der Firma nicht erhält. Viele dieser Geräte haben eklatante Sicherheitslücken.
---------------------------------------------
https://heise.de/-3662665
*** AIX for Penetration Testers ***
---------------------------------------------
This was my first encounter with privilege escalation on AIX and I was pretty surprised by how little information I found online on enumerating AIX systems. ... It took me a little time going through various AIX system administration guides and command cheatsheets (links at the bottom of the post) and putting together a list of various post-exploitation techniques to use on the box. I decided to put this blog-post up with the hope that it will one day help another clueless pentester/red teamer.
---------------------------------------------
https://thevivi.net/2017/03/19/aix-for-penetration-testers/
*** Avatar Rootkit: Decryption of the Key and Data ***
---------------------------------------------
In this second article on the dropper, we will resume our analysis right where we left off: the decryption of the key and data. After the decryption, two structures are initialized. The equivalent pseudo-code is presented below.
---------------------------------------------
http://resources.infosecinstitute.com/avatar-rootkit-dropper-analysis-part-…
*** [R1] LCE 5.0.1 Fixes Two Third-party Library Vulnerabilities ***
---------------------------------------------
Log Correlation Engine (LCE) 5.0.0 is impacted by multiple vulnerabilities reported in a third-party library and an encryption algorithm. LCE was errantly using 3DES on TCP port 1243.
---------------------------------------------
http://www.tenable.com/security/tns-2017-09
*** Vuln: libavcodec CVE-2017-7206 Denial of Service Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/97006
*** VMware AirWatch Input Validation Flaw in Shared Filenames Lets Remote Authenticated Users Conduct Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1038116
*** Security Advisory - Bluetooth Unlock Bypassing Vulnerability in Some Huawei Mobile Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170323-…
*** DFN-CERT-2017-0508/">Apple iTunes: Mehrere Schwachstellen ermöglichen u.a. das Ausführen beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0508/
*** Vuln: NfSen CVE-2017-6972 Unspecified Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/97016
*** DFN-CERT-2017-0506/">NTP: Mehrere Schwachstellen ermöglichen u.a. die Auführung beliebigen Programmcodes mit den Rechten des Dienstes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0506/
*** DFN-CERT-2017-0518/">Samba: Eine Schwachstelle ermöglicht das Ausspähen von Informationen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0518/
*** DFN-CERT-2017-0515/">Git: Eine Schwachstelle ermöglicht die Ausführung beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0515/
*** DFN-CERT-2017-0520/">BIG-IP Protocol Security Module (PSM): Eine Schwachstelle ermöglicht einen Denial-of-Service Angriff ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0520/
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM TRIRIGA Application Privilege Escalation (CVE-2017-1153) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999563
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in IBM Java SDK affects multiple IBM Rational products based on IBM Jazz technology ***
http://www.ibm.com/support/docview.wss?uid=swg21999820
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM MQ and IBM MQ Appliance ***
http://www.ibm.com/support/docview.wss?uid=swg22000304
---------------------------------------------
*** IBM Security Bulletin: IBM TRIRIGA Application Platform Cross-Site Scripting (XSS) (CVE-2016-9737) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21996200
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Mozilla Network Security Services (NSS) affect IBM MQ Appliance (CVE-2016-2834, CVE-2016-5285, CVE-2016-8635) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21996836
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect Tivoli Storage FlashCopy Manager Unix (CVE-2016-6303, CVE-2016-2182, CVE-2016-2177, CVE-2016-2183, CVE-2016-6309, CVE-2016-7052, CVE-2016-2178, CVE-2016-6306) ***
http://www.ibm.com/support/docview.wss?uid=swg22000209
---------------------------------------------
*** IBM Security Bulletin: IBM Jazz for Service Management (Jazz SM) is affected by a code execution vulnerability in IBM Tivoli Common Reporting (TCR) (CVE-2016-5983) ***
http://www.ibm.com/support/docview.wss?uid=swg22000719
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 21-03-2017 18:00 − Mittwoch 22-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Cybellum verkauft Autostart-Funktion als Zero-Day ***
---------------------------------------------
Mit kräftigen Worten, einem eigenen Namen und Logo und dem Prädikat "Zero-Day" stellt Cybellum eine Technik vor, mit der sich Malware in einem Windows-System verankern lässt -- nachdem es bereits die Kontrolle übernommen hat.
---------------------------------------------
https://heise.de/-3662090
*** QNAP Storage Devices Multiple Flaws Let Remote Users Inject SQL Commands, Steal Cookies, Conduct Cross-Site Scripting and Clickjacking Attacks, Obtain Potentially Sensitive Informaiton, and Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1038091
*** Vuln: Malware Information Sharing Platform CVE-2017-7215 Multiple Cross Site Scripting Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/96997
*** Vuln: Rockwell Automation FactoryTalk Activation CVE-2017-6015 Local Privilege Escalation Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96996
*** Security Advisory - Information Leak Vulnerability in Huawei Hilink APP ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170322-…
*** Security Advisory - Phone Finder Bypass Vulnerability in Some Huawei Smart Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170322-…
*** Phishingversuch bei der FH Oberösterreich ***
---------------------------------------------
In einer gefälschten FH OOE IT-SERVICE DESK-Nachricht heißt es, dass Empfänger/innen ihr Webmail-Konto bestätigen müssen. Dazu sollen sie eine Website aufrufen und ihre Zugangsdaten bekannt geben. Es handelt sich um einen Phishingversuch. Wer der Aufforderung nachkommt, übermittelt Kriminellen die Zugangsdaten des FH OÖ-Webmailkontos.
---------------------------------------------
https://www.watchlist-internet.at/phishing/phishingversuch-bei-der-fh-obero…
*** Avatar Rootkit: Dropper Analysis Part 2 ***
---------------------------------------------
In this second article on the dropper, we will resume our analysis right where we left off: the decryption of the key and data. After the decryption, two structures are initialized. The equivalent pseudo-code is presented below.
---------------------------------------------
http://resources.infosecinstitute.com/avatar-rootkit-dropper-analysis-part-…
*** Security Advisory - Sixteen OpenSSL Vulnerabilities on Some Huawei products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170322-…
*** Intermediate Mitigation Measures May be Required for Apache Struts Vulnerabilities ***
---------------------------------------------
The general consensus among InfoSec professionals is to patch critical vulnerabilities such as Apache Struts as soon as a patch is made available by the vendor. So why mightn't your company simply patch Apache Struts and go on your merry way? Not all events can be remediated immediately. Very often, intermediate mitigation measures must be taken to lower the risk of exploit and protect assets very quickly.
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/intermediate-mitigatio…
*** Passwortklau-Lücke in Lastpass geschlossen (oder auch nicht) ***
---------------------------------------------
Eine Sicherheitslücke im Passwort-Manager Lastpass erlaubt das Auslesen von Passwörtern. Unter Umständen kann der Angreifer auch Code ausführen. Es gibt Berichte, dass der Fix von Lasspass die Lücke bisher nicht erfolgreich geschlossen hat.
---------------------------------------------
https://heise.de/-3661616
*** Code Execution Vulnerability Found in Libpurple IM Library ***
---------------------------------------------
A severe vulnerability has been disclosed in libpurple, the library used in the development of a number of popular instant messaging clients, including Pidgin and Adium for the macOS platform. Adium 1.5.10.2 is vulnerable and can be exploited to run arbitrary code remotely. ... Pidgin has been patched in version 2.12.0.
---------------------------------------------
https://threatpost.com/code-execution-vulnerability-found-in-libpurple-im-l…
*** Vuln: D-Link DIR-600M CVE-2017-5874 Cross Site Request Forgery Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96999
*** Apple-Erpressung: Hacker drohen angeblich mit Fernlöschung von iPhones ***
---------------------------------------------
Das Ändern der PIN aus der Ferne ist bei iPhone und iPad allerdings nur möglich, wenn der Nutzer keine Code-Sperre für sein Gerät eingerichtet hat - die Aktivierung der Code-Sperre ist auch deshalb dringend zu empfehlen. Um den Zugriff auf die eigenen iCloud-Daten besser zu schützen, sollte Apples Zwei-Faktor-Authentifizierung aktiviert werden. Die Sicherheitsfunktion hilft allerdings nicht gegen das Fernsperren und Fernlöschen...
---------------------------------------------
https://www.heise.de/mac-and-i/meldung/Apple-Erpressung-Hacker-drohen-angeb…
*** SAP Vulnerability Puts Business Data at Risk for Thousands of Companies ***
---------------------------------------------
Researchers at ERPScan today disclosed details and a proof-of-concept exploit for a SAP GUI remote code execution vulnerability patched last week.
---------------------------------------------
http://threatpost.com/sap-vulnerability-puts-business-data-at-risk-for-thou…
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco IOS and IOS XE Software DHCP Client Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOS XE Software for Cisco ASR 920 Series Routers Zero Touch Provisioning Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOS XE Software HTTP Command Injection Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOS XE Software Web User Interface Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco IOS and IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOx Data in Motion Stack Overflow Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Application-Hosting Framework Directory Traversal Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Application-Hosting Framework Arbitrary File Creation Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Fabric Manager ***
https://support.podc.sl.edst.ibm.com/support/home/docdisplay?lndocid=migr-5…
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Tomcat affect SAN Volume Controller, Storwize family and FlashSystem V9000 products (CVE-2017-6056) ***
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1010022
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Sterling Connect:Direct for HP NonStop (CVE-2016-7055, CVE-2017-3732) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000456
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Rational DOORS Web Access ***
http://www.ibm.com/support/docview.wss?uid=swg21999797
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities CVE-2016-0736, CVE-2016-2161 and CVE-2016-8743 in IBM i HTTP Server ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021918
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Open Source Samba, NTP and ISC BIND affect IBM Netezza Host Management ***
http://www-01.ibm.com/support/docview.wss?uid=swg21997024
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 20-03-2017 18:00 − Dienstag 21-03-2017 18:00
Handler: Petr Sikuta
Co-Handler: Robert Waldner
*** Kritische Sicherheitslücken in E-Learning-Plattform Moodle geschlossen ***
---------------------------------------------
Moodle-Admins aufgepasst: Die Open-Source E-Learning-Plattform enthält Sicherheitslücken, welche es Angreifern ermöglichen, einen Moodle-Server zu kapern.
---------------------------------------------
https://heise.de/-3660119
*** Personalized spam campaign targets Germany ***
---------------------------------------------
The key detail of each message was the fact that the recipient's full name, mailing address, and telephone number were embedded in the middle of the message.
---------------------------------------------
https://www.symantec.com/connect/blogs/personalized-spam-campaign-targets-g…
*** Workaround? Abdrehen! ***
---------------------------------------------
Langsam gibt es erste Details zu den 0-days, die im Vault-7-Leak enthalten sind.Betroffen sind u.A. Switche von Cisco. Patches sind noch nicht für alle Modelle verfügbar, laut Heise gibt es aber folgenden Workaround:Bis dahin empfiehlt der Hersteller Telnet auf betroffenen Geräte zu deaktivieren und bis zum Erscheinen des Patches auf SSH zu setzen. Das ist meiner Meinung nach viel zu kurz gegriffen.
---------------------------------------------
http://www.cert.at/services/blog/20170321100440-1957.html
*** OpenSSH Bugs Let Remote Users Decrypt Messages in Certain Cases and Let Remote Authenticated Users Create or Modify Files on the Target System ***
---------------------------------------------
Impact: A remote authenticated server can create or modify files on the connected target user's system. A remote user may be able to decrypt messages in certain cases.
Solution: The vendor has issued a fix (7.5).
---------------------------------------------
http://www.securitytracker.com/id/1038071
*** Google: Zahl der gehackten Webseiten steigt rapide ***
---------------------------------------------
Im Jahr 2016 wurden 32 Prozent mehr Webseiten gehackt, als im Jahr zuvor. Das geht aus den von Google erhobenen Daten zu infizierten Servern hervor. Die Firma gibt Webmastern deswegen Hilfestellung beim Verhindern von Hackerangriffen.
---------------------------------------------
https://heise.de/-3660903
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Apache Tomcat affect IBM UrbanCode Release ***
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000285
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Apache Tomcat affect IBM UrbanCode Release ***
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000283
---------------------------------------------
*** IBM Security Bulletin: IBM Call Center for Commerce is affected by Cross Site Scripting (XSS) Vulnerability (CVE-2016-6056) ***
http://www.ibm.com/support/docview.wss?uid=swg22000442
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 17-03-2017 18:00 − Montag 20-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Malicious Subdirectories Strike Again ***
---------------------------------------------
In a previous post, we illustrated how attackers were fetching information from compromised sites under their control to display spam content on other hacked websites. By adding malicious files into a directory and using the victim's database structure, attackers were able to inject ads and promote their products. This time, attackers used a similar technique with a little bit more sophistication to achieve their goals. Essay Spam Campaign This technique is now being used to distribute
---------------------------------------------
https://blog.sucuri.net/2017/03/malicious-subdirectories-strike-again.html
*** Mimikatz: Walkthrough ***
---------------------------------------------
Security researchers have been obsessed with Windows security since the beginning of time. Various tools have been released over the years which try to weaken the security/bypass it in some way or the other. Mimikatz is a tool written in `C` as an attempt to play with Windows security.
---------------------------------------------
http://resources.infosecinstitute.com/mimikatz-walkthrough/
*** Doctor Web: It is possible to decrypt files encrypted with Trojan.Encoder.10465 ***
---------------------------------------------
March 17, 2017 Doctor Web has developed an algorithm that successfully decrypts files encrypted by Trojan.Encoder.10465. Trojan.Encoder.10465 poses a threat to Windows computers. The Trojan is written in Delphi. The encoder appends the extension .crptxxx to the infected files and also saves to the disk a text file named HOW_TO_DECRYPT.txt, which contains the following content: Warning!!! All your files are encrypted with AESalgorithm!
---------------------------------------------
http://news.drweb.com/show/?i=11211&lng=en&c=9
*** Sicherheitsupdate in Sicht: Gravierende Telnet-Lücke bedroht zahlreiche Cisco-Switches ***
---------------------------------------------
Offensichtlich hat Cisco den Vault-7-Leak analysiert und ist auf eine kritische Lücke in über 300 Modellen seiner Switch-Reihe mit IOS-Betriebsystem gestoßen. Bislang gibt es nur einen Workaround - ein Patch soll folgen.
---------------------------------------------
https://heise.de/-3658915
*** RIPS - Finding vulnerabilities in PHP application ***
---------------------------------------------
The biggest fear of any developer has always been that their site may get hacked and occasionally it does end up being hacked. For a very long time, the most popular stack being used for the development of website has been the LAMP Stack (Linux, MySQL, PHP/Perl/Python).
---------------------------------------------
http://resources.infosecinstitute.com/rips-finding-vulnerabilities-php-appl…
*** Browser: Update der Ask.com-Toolbar verteilt Malware ***
---------------------------------------------
Die meisten Nutzer dürften sich ohnehin nur fragen, wie sie die Ask.com-Toolbar im Browser am schnellsten wieder loswerden. Doch es gibt ein weiteres Problem: Der Update-Prozess des Programms ist notorisch für Sicherheitslücken anfällig. (Malware, Virus)
---------------------------------------------
https://www.golem.de/news/browser-update-der-ask-com-toolbar-verteilt-malwa…
*** Gefälschte Virenwarnung auf dem Smartphone ***
---------------------------------------------
Während der mobilen Nutzung des Smartphones erscheinen angebliche Virenwarnungen. Sie geben vor, dass das Endgerät mit Schadsoftware infiziert sei. Abhilfe schafft ein Schutzprogramm aus einer unbekannten Quelle. Es kann Schadsoftware installieren oder zu einem Abovertrag führen.
---------------------------------------------
https://www.watchlist-internet.at/handy-abzocke/gefaelschte-virenwarnung-au…
*** Low Orbit Ion Cannon: Star-Trek-Ransomware tarnt sich als DDoS-Tool ***
---------------------------------------------
Wer einen DDoS-Angriff starten will, sollte seine Werkzeuge gut auswählen. Bestimmte Versionen der Low Orbit Ion Cannon starten derzeit keinen Überlastungsangriff, sondern die Verschlüsselung der eigenen Festplatte. Teuer wird es auch, wenn Spock die Festplatte entschlüsseln soll. (Star Trek, Applikationen)
---------------------------------------------
https://www.golem.de/news/low-orbit-ion-cannon-star-trek-ransomware-tarnt-s…
*** Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Registrar Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics:
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** Cisco IOS and IOS XE Software IPv6 Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to a device that is running a Cisco IOS Software or Cisco IOS XE Software release that
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by bash vulnerabilities ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024962
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in IBM Java SDK affects IBM Application Delivery Intelligence v1.0.1, v1.0.1.1, and v1.0.2. (CVE-2016-2183, CVE-2016-5546, CVE-2016-5547,CVE-2016-5548, CVE-2016-5549) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000014
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by php5 vulnerabilities (CVE-2016-9933, CVE-2016-9935) ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024961
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by an International Components for Unicode (ICU) vulnerability (CVE-2014-9911) ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024958
---------------------------------------------
*** IBM Security Bulletin: IBM Security Key Lifecycle Manager is affected by Query Parameter in SSL Request (CVE-2016-6102) ***
http://www.ibm.com/support/docview.wss?uid=swg22000359
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect WebSphere Message Broker and IBM Integration Bus ***
http://www.ibm.com/support/docview.wss?uid=swg22000536
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 16-03-2017 18:00 − Freitag 17-03-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Bugtraq: CVE-2017-6805 MobaXterm Personal Edition v9.4 Path Traversal Remote File Disclosure ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540291
*** SSA-603476 (Last Update 2017-03-16): Web Vulnerabilities in SIMATIC CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-603476…
*** Pass-the-Hash Is Dead: Long Live LocalAccountTokenFilterPolicy ***
---------------------------------------------
Nearly three years ago, I wrote a post named “Pass-the-Hash is Dead: Long Live Pass-the-Hash” that detailed some operational implications of Microsoft’s KB2871997 patch. A specific sentence in the security advisory, “Changes to this feature ..
---------------------------------------------
http://www.harmj0y.net/blog/redteaming/pass-the-hash-is-dead-long-live-loca…
*** Chamois: Google deckt betrügerisches Werbenetzwerk auf ***
---------------------------------------------
Adfraud ist ein weit verbreitetes Problem auf Android-Geräten. Google hat Details zu einem neu entdeckten Netzwerk bekanntgegeben, es soll das größte bislang bekannte sein.
---------------------------------------------
https://www.golem.de/news/chamois-google-deckt-betruegerisches-werbenetzwer…
*** Winzige Kameras auf Bankomaten spähen PINs aus ***
---------------------------------------------
Die Londoner Polizei hat innerhalb kurzer Zeit mehrere Mini-Kameras entdeckt, die an Geldautomaten angebracht waren.
---------------------------------------------
https://futurezone.at/digital-life/winzige-kameras-auf-bankomaten-spaehen-p…
*** GitHub Code Execution Bug Fetches $18,000 Bounty ***
---------------------------------------------
GitHub awarded $18,000 to a researcher after he came across a remote code execution bug in the company’s enterprise management console.
---------------------------------------------
http://threatpost.com/github-code-execution-bug-fetches-18000-bounty/124378/
*** BSI: Schützt euer Owncloud vor Feuer und Wasser! ***
---------------------------------------------
Das BSI beklagt, dass Nutzer von Owncloud und Nextcloud ihre Installationen nicht aktualisieren. Das liegt aber auch daran, dass die Updatefunktion oft fehlschlägt. Und die ..
---------------------------------------------
https://www.golem.de/news/bsi-schuetzt-euer-owncloud-vor-feuer-und-wasser-1…
*** Sieben Jahre alte Lücke im Linux-Kernel erlaubt Rechteausweitung ***
---------------------------------------------
Über die Lücke können Angreifer außerdem den Kernel lahmlegen. Da die Lücke schon so lange im Code des Kernels schlummert, betrifft sie sehr viele Systeme.
---------------------------------------------
https://heise.de/-3657912
*** Wettbewerb: Windows, MacOS, Linux und Browser gehackt ***
---------------------------------------------
Bei der Veranstaltung Pwn2Own hacken IT-Security-Teams um die Wette. Insgesamt winken eine Million US-Dollar Preisgeld.
---------------------------------------------
https://futurezone.at/digital-life/wettbewerb-windows-macos-linux-und-brows…
*** Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability ***
---------------------------------------------
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely ..
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** Low Orbit Ion Cannon: Star-Trek-Ransomware tarnt sich als DDos-Tool ***
---------------------------------------------
Wer einen DDoS-Angriff starten will, sollte seine Werkzeuge gut auswählen. Bestimmte Versionen der Low Orbit Ion Cannon starten derzeit keinen Überlastungsangriff, sondern die Verschlüsselung der eigenen Festplatte. Teuer wird es ..
---------------------------------------------
https://www.golem.de/news/low-orbit-ion-cannon-star-trek-ransomware-tarnt-s…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 15-03-2017 18:00 − Donnerstag 16-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Attackers target dozens of global banks with new malware ***
---------------------------------------------
Organizations in 31 countries have been targeted in a new wave of attacks which has been underway since at least October 2016. The attackers used compromised websites or 'watering holes' to infect pre-selected targets with previously unknown malware.
---------------------------------------------
https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks…
*** SEO Spam Campaign Exploiting WordPress REST API Vulnerability ***
---------------------------------------------
Just over a week ago, WordPress released version 4.7.3 to patch multiple security issues. Despite the automatic update feature provided by many hosting companies, there are still many WordPress websites that have not been updated. In fact, we are seeing quite a few sites that are still using versions 4.7 and 4.7.1, which are vulnerable to the WordPress REST API vulnerability patched in early February (version 4.7.2). This more serious vulnerability allows attackers to create, delete, and modify ..
---------------------------------------------
https://blog.sucuri.net/2017/03/seo-spam-via-wp-rest-api-vulnerability.html
*** Drupal Core - Multiple Vulnerabilities - SA-CORE-2017-001 ***
---------------------------------------------
Drupal 8.2.7, a maintenance release which contains fixes for security vulnerabilities, is now available for download.Download Drupal 8.2.7Upgrading your existing Drupal 8 sites is strongly recommended. There are no new features nor non-security-related bug fixes in this release.
---------------------------------------------
https://www.drupal.org/SA-2017-001
*** Ransomware operators are hiding malware deeper in installer packages ***
---------------------------------------------
We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code. These changes are observed in installers that drop ransomware like Cerber, Locky, and others.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/03/15/ransomware-operators-ar…
*** DFN-CERT-2017-0429/">Roundcube Webmail: Eine Schwachstelle ermöglicht einen Cross-Site-Scripting-Angriff ***
---------------------------------------------
Ein entfernter, nicht authentifizierter Angreifer kann mit Hilfe einer Email, die ein speziell präpariertes SVG-Element enthält, einen Cross-Site-Scripting (XSS)-Angriff gegen Benutzer von Roundcube Webmail durchführen.
Der Hersteller stellt Roundcube Webmail 1.1.8 und 1.2.4 zur Behebung der Schwachstelle bereit.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0429/
*** Using Intels SGX to Attack Itself ***
---------------------------------------------
Researchers have demonstrated using Intels Software Guard Extensions to hide malware and steal cryptographic keys from inside SGXs protected enclave:Malware Guard Extension: Using SGX to Conceal Cache AttacksAbstract:In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine.
---------------------------------------------
https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html
*** [2017-03-16] Authenticated Command Injection in multiple Ubiquiti Networks products ***
---------------------------------------------
The firmware of various Ubiquiti Networks devices contains a command injection vulnerability which can be exploited by luring an authenticated user to click on a malicious link or surf to a malicious website. Low privileged users can elevate their rights and use the vulnerability for further attacks.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2017…
*** Moodle 2.7.19 release notes ***
---------------------------------------------
A number of security related issues were resolved. Details of these issues will be released after a period of approximately one week to allow system administrators to safely update to the latest version.
---------------------------------------------
https://docs.moodle.org/dev/Moodle_2.7.19_release_notes
*** NexusLogger: A New Cloud-based Keylogger Enters the Market ***
---------------------------------------------
NexusLogger is a cloud-based keylogger that uses the Microsoft .NET Framework and has a low level of sophistication. NexusLogger collects keystrokes, system information, stored passwords and will take screenshots. It also specifically seeks to harvest game credentials for UPlay, Minecraft, Steam, and Origin. ... All NexusLogger samples require communications with the nexuslogger[.]com domain via HTTPS, which makes it trivial for defenders to block.
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2017/03/unit42-nexuslogger-new-c…
*** Penetration Testing Node.Js Applications - Part-2 ***
---------------------------------------------
This article covers the left-over vulnerabilities from Part-1. In this article, we will have an in-depth look at some uncommon flaws and how to find them while doing performing code review of node.js applications.
---------------------------------------------
http://resources.infosecinstitute.com/penetration-testing-node-js-applicati…
*** Vuln: Palo Alto Networks Terminal Services CVE-2017-6356 Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96925
*** Alert (TA17-075A) HTTPS Interception Weakens TLS Security ***
---------------------------------------------
Organizations that have performed a risk assessment and determined that HTTPS inspection is a requirement should ensure their HTTPS inspection products are performing correct transport layer security (TLS) certificate validation. Products that do not properly ensure secure TLS communications and do not convey error messages to the user may further weaken the end-to-end protections that HTTPS aims to provide.
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA17-075A
*** Code Review of Node.Js Applications: Uncommon Flaws ***
---------------------------------------------
This article covers the left-over vulnerabilities from Part-1. In this article, we will have an in-depth look at some uncommon flaws and how to find them while doing performing code review of node.js applications.
---------------------------------------------
http://resources.infosecinstitute.com/penetration-testing-node-js-applicati…
*** (Twitter) Keep Calm and Revoke Access ***
---------------------------------------------
For the last 24 hours, the Twitter landscape has seen several official accounts hacked. ... How to protect against this kind of attack? First, do not link your Twitter account to untrusted or suspicious applications. ... Finally, the best advice is to visit the following link at regular interval: https://twitter.com/settings/applications. During your first visit, you could be surprised to find so many applications linked to your account!
---------------------------------------------
https://blog.rootshell.be/2017/03/15/keep-calm-revoke-access/
*** BSI warnt vor gefährdeten Cloud-Servern: über 20.000 deutsche ownCloud- und Nextcloud-Installationen veraltet ***
---------------------------------------------
Das BSI ist auf viele veraltete Installationen von ownCloud und Nextcloud gestoßen. Obwohl die Betroffenen Bescheid wissen, haben bislang die wenigsten reagiert.
---------------------------------------------
https://heise.de/-3656458
*** Microsoft To End Support For Windows Vista In Less Than a Month ***
---------------------------------------------
In less than a months time, Microsoft will put Windows Vista to rest once and for all. If youre one of the few people still using it, you have just a few weeks to find another option before time runs out. (I mean, nobody will uninstall it from your computer, but.) From a report on PCWorld: After April 11, 2017, Microsoft will no longer support Windows Vista: no new security updates, non-security hotfixes, free or paid assisted support options, or online technical content updates...
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/9XgfNI5PoWc/microsoft-to-en…
*** Warnung vor kaufhaus-guenther.de ***
---------------------------------------------
Kaufhaus Günther ist ein 'Online Kaufhaus'. Es wirbt mit Produkten für Haushalt, Technik und Möbel. Die verlangten Preise sind sehr günstig. Eine Bezahlung der Ware ist nur im Voraus möglich. Wer sie bezahlt, verliert Geld, denn kaufhaus-guenther.de ist ein Fake-Shop. Er liefert trotz Bezahlung keine Ware. Darüber hinaus droht ein Identitätsdiebstahl.
---------------------------------------------
https://www.watchlist-internet.at/fake-shops/warnung-vor-kaufhaus-guentherd…
*** DFN-CERT-2017-0479/">McAfee Advanced Threat Defence (ATD): Eine Schwachstelle ermöglicht das Ausspähen von Informationen ***
---------------------------------------------
Ein einfach authentisierter Angreifer im benachbarten Netzwerk mit erweiterten Privilegien kann die SQL-Abfragelogik der Advanced Threat Defense über speziell präparierte HTTP-Anfragen so manipulieren, dass unautorisierte Aktionen im Kontext der unterliegenden Datenbank möglich sind (SQL-Injection). Intel Security erwähnt die Möglichkeit, auf diese Weise Produktinformationen auszuspähen. Die Ausführung beliebigen SQL-Programmcodes ist ebenfalls denkbar, aber nicht bestätigt.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0479/
*** Hackers Take Down Reader, Safari, Edge, Ubuntu Linux at Pwn2Own 2017 ***
---------------------------------------------
On the first day of Pwn2Own 2017 hackers poked holes in Adobe Reader, Apple Safari, Microsoft Edge, and Ubuntu Linux.
---------------------------------------------
http://threatpost.com/hackers-take-down-reader-safari-edge-ubuntu-linux-at-…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Rational ClearQuest ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994995
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Netezza Host Management (CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21997019
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Expat component shipped with IBM Rational ClearCase (CVE-2016-0718, CVE-2015-1283, CVE-2016-4472, CVE-2015-2716) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998042
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Expat component shipped with IBM Rational ClearQuest (CVE-2016-0718, CVE-2015-1283, CVE-2016-4472, CVE-2015-2716) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998866
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Perl component shipped with IBM Rational ClearQuest (CVE-2015-8608, CVE-2015-8853, CVE-2016-2381) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998868
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Perl component shipped with IBM Rational ClearCase (CVE-2015-8608, CVE-2015-8853, CVE-2016-2381) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998046
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects Liberty for Java for IBM Bluemix January 2017 CPU ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000092
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in cURL component shipped with IBM Rational ClearCase (CVE-2016-8624, CVE-2016-8625) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21996857
---------------------------------------------
*** IBM Security Bulletin: Security vulnerabilities in Apache Tomcat affect Rational Insight ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000124
---------------------------------------------
*** IBM Security Bulletin: Security vulnerabilities in Apache Tomcat affect Rational Reporting for Development Intelligence ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000123
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 14-03-2017 18:00 − Mittwoch 15-03-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Sicherheitsupdates: Microsoft veranstaltet zwei Patchdays an einem Tag ***
---------------------------------------------
Im März holt Microsoft den aus unbekannten Gründen verschobenen Patchday aus dem Februar nach, stellt zudem die Patches für den aktuellen Monat bereit und schließt insgesamt 140 Sicherheitslücken.
---------------------------------------------
https://heise.de/-3653806
*** March 2017 security update release ***
---------------------------------------------
Today we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month's security updates can be found on the Security Update Guide. Security bulletins were also published this month to give customers extra time to ensure they are...
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2017/03/14/march-2017-security-upd…
*** Propaganda auf Twitter ***
---------------------------------------------
Der echte Groundhog Day ist noch nicht lange her, und manchmal kommt es einem so vor, als wäre im Internet jeden Tag "Groundhog Day": manche Sachen wiederholen sich einfach viel zu oft.Aktuell geht es um missbrauchte Twitter-Accounts. Das hatte wir schon im November: twittercounter.com hatte ein Problem, und schon werden Tweets unter falschem Namen verteilt. Das gleiche ist gerade wieder passiert...
---------------------------------------------
http://www.cert.at/services/blog/20170315114231-1952.html
*** Patchday: Adobe umsorgt Flash und Shockwave Player ***
---------------------------------------------
Wie gewohnt flickt Adobe den Flash Player - darüber hinaus bekommt diesen Monat auch der Shockwave Player ein Sicherheitsupdate serviert.
---------------------------------------------
https://heise.de/-3653924
*** Citrix XenServer Multiple Security Updates ***
---------------------------------------------
Two security issues have been identified within Citrix XenServer. These issues could, if exploited, allow the administrator ...
---------------------------------------------
https://support.citrix.com/article/CTX220771
*** VMware Workstation and Fusion Memory Access Error in Drag and Drop Function Lets Local Users on a Guest System Gain Elevated Privileges on the Host System ***
---------------------------------------------
http://www.securitytracker.com/id/1038025
*** DNSSEC-Schlüsseltausch 2017: ICANN setzt Testseite für Resolver auf ***
---------------------------------------------
Sollte es Angreifern gelingen, einen DNSSEC-Schlüssel zu knacken, können sie glaubwürdig aussehende, aber falsche DNS-Replys verbreiten. Deshalb müssen Schlüssel ab und zu gewechselt werden. Bei der Root-Zone ist das eine heikle Sache.
---------------------------------------------
https://www.heise.de/newsticker/meldung/DNSSEC-Schluesseltausch-2017-ICANN-…
*** Petya ransomware returns, wrapped in extra VX nastiness ***
---------------------------------------------
PetrWrap tries to blame its predecessor for attacks Researchers have spotted a variant of last years Petya ransomware, now with updated crypto and ransomware models.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2017/03/15/petya_retur…
*** Gefälschte Rechnung auf dropboxusercontent.com ***
---------------------------------------------
In einer E-Mail mit dem Betreff "Zahlungsdetails" erhalten Internet-Nutzer/innen angeblich eine Rechnung. Sie steht unter dem Link "dl.dropboxusercontent.com/" als ZIP-Datei zum Download bereit. In Wahrheit handelt es sich bei dem Dokument um Schadsoftware. Aus diesem Grund dürfen Empfänger/innen die angebliche Rechnung nicht öffnen.
---------------------------------------------
https://www.watchlist-internet.at/gefaelschte-rechnungen/gefaelschte-rechnu…
*** Konsumentenschützer wollen Update-Verpflichtung ***
---------------------------------------------
Verbraucherorganisationen aus aller Welt fordern die 20 führenden Industrie- und Schwellenländer (G20) zum grenzüberschreitenden Schutz der Konsumenten im Internet auf.
---------------------------------------------
https://futurezone.at/digital-life/konsumentenschuetzer-wollen-update-verpf…
*** Schwere Sicherheitslücke in den Web-Oberflächen von WhatsApp und Telegram geschlossen ***
---------------------------------------------
Eine Lücke bei WhatsApp Web und Telegram Web erlaubt es Angreifern, die Web-Sessions der Messenger zu kapern. Auf diesem Wege können sie Nachrichten mitlesen, Adressbücher kopieren und Schadcode an Kontakte verschicken.
---------------------------------------------
https://heise.de/-3653793
*** Where Have All The Exploit Kits Gone? ***
---------------------------------------------
For a long time, exploit kits were the most prolific malware distribution vehicle available to attackers. Where did they go and what's replaced them?
---------------------------------------------
http://threatpost.com/where-have-all-the-exploit-kits-gone/124241/
*** Vorsicht Fake: Betrüger locken mit Emulator für Nintendos Switch ***
---------------------------------------------
Derzeit kursiert im Internet eine Anwendung, die Spiele von Nintendos aktueller Konsole Switch auf PCs emulieren können soll: Die "Entwickler" hinter dem vermeintlichen Emulator verfolgen aber ein ganz anderes Ziel.
---------------------------------------------
https://heise.de/-3654299
*** PowerShell Remoting Artifacts: An Introduction ***
---------------------------------------------
Since PowerShell usage by malware is on the rise, in this article series, we will learn about the various artifacts related to PowerShell remoting that can be very beneficial during the investigation and during building stories around Attack Chain.
---------------------------------------------
http://resources.infosecinstitute.com/powershell-remoting-artifacts-part-1/
*** Gaps in NIS standardisation: Mapping the requirements of the NIS Directive to specific standards ***
---------------------------------------------
ENISA publishes a report on European standardisation within the context of the NIS Directive.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/gaps-in-nis-standardisation-map…
*** VU#553503: D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials ***
---------------------------------------------
Vulnerability Note VU#553503 D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials
---------------------------------------------
http://www.kb.cert.org/vuls/id/553503
*** An Introduction to Penetration Testing Node.js Applications ***
---------------------------------------------
In this article, we will have a look at how to proceed when penetration testing Node.js applications or looking for Node.js specific issues.
---------------------------------------------
http://resources.infosecinstitute.com/penetration-testing-node-js-applicati…
*** SAP pushes to patch risky HANA security flaws before hackers strike ***
---------------------------------------------
Europes top software maker SAP said on Tuesday it had patched vulnerabilities in its latest HANA software that had a potentially high risk of giving hackers control over databases and business applications used to run big multinational firms.
---------------------------------------------
http://www.reuters.com/article/us-cyber-sap-idUSKBN16L1FH
*** JSON Libraries Patched Against Invalid Curve Crypto Attack ***
---------------------------------------------
JSON libraries using the JWE specification to create, sign and encrypt access tokens have been patched against an attack that allows for the recovery of a private key.
---------------------------------------------
http://threatpost.com/json-libraries-patched-against-invalid-curve-crypto-a…
*** Security Advisory - DoS Vulnerability in Vibrator Service of Huawei Smart Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170315-…
*** Vuln: SAP NetWeaver Visual Composer Denial of Service Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96865
*** JSA10759 - 2016-10 Security Bulletin: OpenSSL security updates ***
---------------------------------------------
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759&actp=RSS
*** Vuln: SAP ERP Remote Authorization Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96871
*** Vuln: Trend Micro InterScan Messaging Security CVE-2017-6398 Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96859
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM Algo One ARA reports can be accessed by another user ***
http://www.ibm.com/support/docview.wss?uid=swg21999754
---------------------------------------------
*** IBM Security Bulletin: A security vulnerability has been identified in IBM Java SDK that affect IBM Security Directory Suite (CVE-2016-5597) October 2016 CPU ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994296
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Tomcat affect the IBM FlashSystem model V840 ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1010008
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Tomcat affect the IBM FlashSystem models 840 and 900 ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1010007
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Struts affect the IBM FlashSystem models 840 and 900 ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1010009
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Struts affect the IBM FlashSystem model V840 ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1010010
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Jazz Team Server affect IBM Rational products based on IBM Jazz technology ***
http://www.ibm.com/support/docview.wss?uid=swg21999965
---------------------------------------------
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco Mobility Express 1800 Access Point Series Authentication Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Web Security Appliance URL Filtering Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco WebEx Meetings Server XML External Entity Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Meshed Wireless LAN Controller Impersonation Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco WebEx Meetings Server Authentication Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco UCS Director Cross-Site Scripting Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Unified Communications Manager Cross-Site Scripting Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Unified Communications Manager Web Interface Cross-Site Scripting Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco TelePresence Server API Privilege Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Workload Automation and Tidal Enterprise Scheduler Client Manager Server Arbitrary File Read Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Prime Service Catalog Multiple Cross-Site Scripting Vulnerabilities ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Nexus 9000 Series Switches Remote Login Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Nexus 9000 Series Switches Telnet Login Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Prime Optical for Service Providers RADIUS Secret Disclosure Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Prime Infrastructure API Credentials Management Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Nexus 7000 Series Switches Access-Control Filtering Mechanisms Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco StarOS SSH Privilege Escalation Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Adaptive Security Appliance BGP Bidirectional Forwarding Detection ACL Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 13-03-2017 18:00 − Dienstag 14-03-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Stored XSS in WordPress Core ***
---------------------------------------------
As you might remember, we recently blogged about a critical Content Injection Vulnerability in WordPress which allowed attackers to deface vulnerable websites. While our original disclosure only described one vulnerability, ..
---------------------------------------------
https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.htm
*** DSA-3808 imagemagick - security update ***
---------------------------------------------
This update fixes several vulnerabilities in imagemagick: Various memoryhandling problems and cases of missing or incomplete input sanitisingmay result in denial of service or the execution of arbitrary code if malformed TGA, Sun or PSD files are processed.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3808
*** VMSA-2017-0004 ***
---------------------------------------------
VMware product updates resolve remote code execution vulnerability via Apache Struts 2
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2017-0004.html
*** Hintergrund: Vom Leben und Sterben der 0days ***
---------------------------------------------
Viele diskutieren über Zero-Day-Exploits, doch die wenigsten haben je ein lebendiges Exemplar gesehen. Zwei interessante Studien bringen überraschende Erkenntnisse zur Lebenserwartung dieser gefährlichen Spezies.
---------------------------------------------
https://heise.de/-3651392
*** Privatsphäre: Verschleiern der MAC-Adresse bei WLAN ist fast nutzlos ***
---------------------------------------------
Die eigene MAC-Adresse beim WLAN zu verschleiern, gilt als eine der zentralen Funktionen zum Schutz der Privatsphäre. Auf mobilen Geräten ist dieser Schutz weitgehend nutzlos.
---------------------------------------------
https://www.golem.de/news/privatsphaere-verschleiern-der-mac-adresse-bei-wl…
*** Security Bulletins posted for Flash Player and Adobe Shockwave Player ***
---------------------------------------------
Adobe has published security bulletins for Adobe Flash Player (APSB17-07) and Adobe Shockwave Player (APSB17-08). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1449
*** Betreiber kritischer Infrastruktur erhalten Zugang zu Behörden-Funk ***
---------------------------------------------
"Direkter Draht" zu Behörden im Falle eines kompletten "Blackouts" – Innenministerium stellt Funkgeräte ..
---------------------------------------------
http://derstandard.at/2000054157780
*** Red Hat Product Security Risk Report 2016 ***
---------------------------------------------
At Red Hat, our dedicated Product Security team analyzes threats and vulnerabilities against all our products and provides relevant advice and updates ..
---------------------------------------------
https://access.redhat.com/blogs/766093/posts/2957221
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 10-03-2017 18:00 − Montag 13-03-2017 18:00
Handler: Olaf Schwarz
Co-Handler: Alexander Riepl
*** Apache Struts2 Jakarta Multipart Parser File Upload Code Execution Vulnerability Affecting Cisco Products ***
---------------------------------------------
On March 6, 2017, Apache disclosed a vulnerability in the Jakarta multipart parser used in Apache Struts2 that could allow an attacker to execute commands remotely on the targeted system using a .. ---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** Bugtraq: [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540252
*** Bugtraq: [security bulletin] HPESBHF03716 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Remote Authentication Bypass ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540251
*** SF9 Realex Magento Module Targeted by Credit Card Scrapers ***
---------------------------------------------
Attackers are constantly developing new techniques to compromise ecommerce websites and steal sensitive data. Over the last several weeks, we tracked ..
---------------------------------------------
https://blog.sucuri.net/2017/03/sf9-realex-magento-module-targeted-by-credi…
*** Letzter Support-Monat für Windows Vista ***
---------------------------------------------
Am 11. April will Microsoft zum letzten Mal Sicherheits-Updates für Windows Vista veröffentlichen. Alle nach diesem Termin gefundenen Lücken bleiben ungefixt. Vista an sich läuft zwar weiter, sollte danach aber besser nicht mehr ans Internet.
---------------------------------------------
https://www.heise.de/newsticker/meldung/Letzter-Support-Monat-fuer-Windows-…
*** Studie: Viele Webseiten setzen verwundbare JavaScript-Bibliotheken ein ***
---------------------------------------------
Sicherheitsforscher haben über 100.000 Domains gescannt und herausgefunden, dass auf fast 40 Prozent veraltete und unsichere JavaScript-Bibliotheken zum Einsatz kommen.
---------------------------------------------
https://heise.de/-3650648
*** Security Notice - Statement on Remote Code Execution Vulnerability in Apache Struts2 ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2017/huawei-sn-20170313-01-…
*** Betrügerischer Support der US Software Solutions Inc ***
---------------------------------------------
Eine vermeintliche Systembenachrichtigung informiert Nutzer/innen darüber, dass ihr Computer mit Schadsoftware befallen sei. Die US Software Solutions Inc ..
---------------------------------------------
https://www.watchlist-internet.at/scamming/betruegerischer-support-der-us-s…
*** 13 Google Play Store Apps Caught Stealing Instagram Credentials ***
---------------------------------------------
Instagram users are once again the targets of malicious Android apps hosted on the Play Store, apps which steal ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/13-google-play-store-apps-ca…
*** IBM Security Bulletin: Privilege Escalation Vulnerability in WebSphere Application Server (CVE-2017-1151) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21999293
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM MessageSight ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22000120
*** Nintendo Switch: Hacker baut iOS-Exploit um und nutzt Schwachstelle im Browser ***
---------------------------------------------
Im Webbrowser der Switch klafft eine Sicherheitslücke, für deren Ausnutzung es bereits Proof-of-Concept-Code gibt. Zudem sind Hacker in den Recovery-Modus der Spielkonsole eingestiegen.
---------------------------------------------
https://heise.de/-3650977
*** Vorinstallierte Malware auf Smartphones von LG und Samsung ***
---------------------------------------------
Sicherheitsforscher haben Schadsoftware auf neuen Smartphones und Tablets entdeckt. Die Geräte wurden auf dem Vertriebsweg infiziert.
---------------------------------------------
https://futurezone.at/digital-life/vorinstallierte-malware-auf-smartphones-…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 09-03-2017 18:00 − Freitag 10-03-2017 18:00
Handler: Olaf Schwarz
Co-Handler: Stephan Richter
*** After CIA leak, Intel Security releases detection tool for EFI rootkits ***
---------------------------------------------
Intel Security has released a tool that allows users to check if their computers low-level system firmware has been modified and contains unauthorized code.The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apples Macbooks. A rootkit is a malicious program that runs with high privileges -- typically in the kernel -- and hides the existence of other malicious components and activities.The documents from...
---------------------------------------------
http://www.cio.com/article/3179345/security/after-cia-leak-intel-security-r…
*** Over a Third of Websites Use Outdated and Vulnerable JavaScript Libraries ***
---------------------------------------------
More than a third of the websites you visit online may include an outdated JavaScript library thats vulnerable to one or more security flaws. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/over-a-third-of-websites-use…
*** Middle East Government organizations hit with RanRan Ransomware ***
---------------------------------------------
Palo Alto Networks discovered a new strain of ransomware, dubbed RanRan ransomware, that has been used in targeted attacks in Middle East. Malware researchers at Palo Alto Networks have spotted a new strain of ransomware, dubbed RanRan, that has been used in targeted attacks against government organizations in the Middle East.
---------------------------------------------
http://securityaffairs.co/wordpress/57031/malware/ranran-ransomware.html
*** Sicherheit: Tails 2.11 und 3.0 Beta2 freigegeben ***
---------------------------------------------
Nur zwei Tage auseinander liegen die Veröffentlichungen von Tails 2.11 und 3.0 Beta. Während 2.11 eine der letzten Aktualisierungen der Distribution auf der Basis von Debian 8 "Jessie" ist, wird Tails 3.0 bei seinem Erscheinen im Juni auf Debian 9 "Stretch" setzen.
---------------------------------------------
https://www.golem.de/news/sicherheit-tails-2-11-und-3-0-beta2-freigegeben-1…
*** Firefox stellt Support für Windows XP und Vista ein ***
---------------------------------------------
Die aktuelle Version 52 des Browsers ist die letzte, die die veralteten Windows-Betriebsysteme unterstützt.
---------------------------------------------
https://futurezone.at/produkte/firefox-stellt-support-fuer-windows-xp-und-v…
*** How Dutch Police Decrypted BlackBerry PGP Messages For Criminal Investigation ***
---------------------------------------------
The Dutch police have managed to decrypt a number of PGP-encrypted messages sent by criminals using their custom security-focused PGP BlackBerry phones and identified several criminals in an ongoing investigation. PGP, or Pretty Good Privacy, an open source end-to-end encryption standard that can be used to cryptographically sign emails, files, documents, or entire disk partitions in order to...
---------------------------------------------
https://thehackernews.com/2017/03/decrypt-pgp-encryption.html
*** Why the SHA-1 collision means you should stop using the algorithm ***
---------------------------------------------
Realistically speaking, if your software or system uses the SHA-1 hashing algorithm, it is unlikely that it will be exploited in the foreseeable future. But it is also extremely difficult to be certain that your system wont be the exception.
---------------------------------------------
https://www.virusbulletin.com:443/blog/2017/03/why-sha-1-collision-means-yo…
*** CryptoBlock ransomware and its C2 ***
---------------------------------------------
CryptoBlock is an interesting ransomware to keep an eye on. We expect this to be a ransomware that is in development to eventually develop into a RaaS (Ransomware as a Service).Categories: MalwareThreat analysisTags: CryptoBlockraasransomwareRansomware as a Servicevirustotal(Read more...)
---------------------------------------------
https://blog.malwarebytes.com/threat-analysis/2017/03/cryptoblock-and-its-c…
*** DSA-3806 pidgin - security update ***
---------------------------------------------
It was discovered a vulnerability in Pidgin, a multi-protocol instantmessaging client. A server controlled by an attacker can send an invalidXML that can trigger an out-of-bound memory access. This might lead to acrash or, in some extreme cases, to remote code execution in theclient-side.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3806
*** Schneider Electric ClearSCADA ***
---------------------------------------------
This advisory contains mitigation details for an input validation vulnerability in Schneider Electrics ClearSCADA.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-068-01
*** Security Advisory: Apache Struts 2 vulnerability CVE-2017-5638 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/43/sol43451236.html?…
*** NetIQ Privileged User Manager 2.4.1 HF2 (2.4.1-2) ***
---------------------------------------------
Abstract: NetIQ Privileged User Manager 2.4.1 Hot Fix 2 (2.4.1.2). The purpose of the patch is to provide an upgrade of OpenSSL to eliminate potential security vulnerabilities. This release does not contain new features.Document ID: 5276651Security Alert: YesDistribution Type: PublicEntitlement Required: YesFiles:netiq-npum-packages-2.4.1-2.tar.gz (139.85 MB)Products:Privileged User Manager 2.4.1Superceded Patches:PUM2.4.1HF...
---------------------------------------------
https://download.novell.com/Download?buildid=88wYDI-5uRA~
*** VMware Workstation update addresses multiple security issues ***
---------------------------------------------
a. VMware Workstation DLL loading vulnerability
b. VMware Workstation SVGA driver vulnerability
c. VMware Workstation NULL pointer dereference vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2017-0003.html
*** Vuln: F-Secure Anti-Virus CVE-2017-6466 Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96784
*** IBM Security Bulletin: Vulnerabilities in Nagios Core affect IBM Pure Power Integrated Manager (PPIM) (CVE-2016-9565, CVE-2016-9566) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=isg3T1024796
*** IBM Security Bulletin: Security vulnerabilities in Apache Tomcat affect Rational Insight (CVE-2016-6816, CVE-2016-8735) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21997359
*** IBM Security Bulletin: Security vulnerabilities in Apache Tomcat affect Rational Reporting for Development Intelligence (CVE-2016-6816, CVE-2016-8735) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21997358
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 08-03-2017 18:00 − Donnerstag 09-03-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Jetzt patchen! Apache Struts 2 im Visier von Hackern ***
---------------------------------------------
Derzeit nutzen Angreifer gehäuft eine kritische Sicherheitslücke in dem Framework aus und versuchen so Web-Server zu übernehmen. Neue Versionen und Workarounds schaffen Abhilfe.
---------------------------------------------
https://heise.de/-3648065
*** Uncovering cross-process injection with Windows Defender ATP ***
---------------------------------------------
Windows Defender Advanced Threat Protection (Windows Defender ATP) is a post-breach solution that alerts security operations (SecOps) personnel about hostile activity. As the nature of attacks evolve, Windows Defender ATP must advance so that it continues to help SecOps personnel uncover and address the attacks. With increasing security investments from Microsoft...
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/03/08/uncovering-cross-proces…
*** #APF17: Call for Papers ***
---------------------------------------------
ENISA's Annual Privacy Forum (APF) is to be held in Vienna on the 7th and 8th June 2017, in collaboration with the Law Faculty of the University of Vienna.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/apf17-call-for-papers
*** 185.000 unsichere Webcams könnten Hackern private Einblicke gewähren ***
---------------------------------------------
Ein Sicherheitsforscher stieß auf kritische Sicherheitslücken in einer chinesischen Webcam. Das Problem ist, viele Hersteller setzen auf die verwendete Software und verkaufen angreifbare Kameras unter ihrer Marke.
---------------------------------------------
https://heise.de/-3648458
*** Emsisoft Releases a Decryptor for the CryptON Ransomware ***
---------------------------------------------
Yesterday, Emsisofts CTO and malware researcher Fabian Wosar? released a decryptor for the CryptON Ransomware. This ransomware has been around since the end of February and has had a few variants released. It was named CryptON based on a string found within the executable. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emsisoft-releases-a-decrypto…
*** SECURITY BULLETIN: Multiple Vulnerabilities in Trend Micro Deep Discovery Email Inspector 2.5.1 ***
---------------------------------------------
Trend Micro has released a Critical Patch for Deep Discovery Email Inspector (DDEI) 2.5.1. This Critical Patch resolves multiple vulnerabilities related to the user interface (UI) and authentication.
---------------------------------------------
https://success.trendmicro.com/solution/1116750
*** Security Notice - Statement on Security Researcher Revealing XSS Security Vulnerability in Huawei HG658 V2 on Packet Storm Website ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2017/huawei-sn-20170308-01-…
*** VU#305448: D-Link DIR-850L web admin interface contains a stack-based buffer overflow vulnerability ***
---------------------------------------------
D-Link DIR-850L, firmware versions 1.14B07, 2.07.B05, and possibly others, contains a stack-based buffer overflow vulnerability in the web administration interface HNAP service. Other models may also be affected.
---------------------------------------------
http://www.kb.cert.org/vuls/id/305448
*** Bugtraq: [security bulletin] HPESBHF03713 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Deserialization of Untrusted Data, Remote Code Execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540239
*** Bugtraq: [security bulletin] HPESBHF03714 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Local Arbitrary File Download ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540241
*** Services - Highly Critical - Arbitrary Code Execution - SA-CONTRIB-2017-029 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2016-029Project: Services (third-party module)Version: 7.xDate: 2017-March-08Security risk: 21/25 ( Highly Critical) AC:None/A:None/CI:All/II:All/E:Theoretical/TD:DefaultVulnerability: Arbitrary PHP code executionDescriptionThis module provides a standardized solution for building APIs so that external clients can communicate with Drupal.The module accepts user submitted data in PHPs serialization format ("Content-Type: application/vnd.php.serialized")
---------------------------------------------
https://www.drupal.org/node/2858847
*** PRLP - Critical - Access Bypass and Privilege Escalation - SA-CONTRIB-2017-030 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2017-030Project: Password Reset Landing Page (PRLP) (third-party module)Version: 8.xDate: 2017-March-08Security risk: 16/25 ( Critical) AC:None/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypass, Privilege escalationDescriptionThis module adds a form on the password-reset-landing page to allow changing the password of the user during the log in process.The module does not sufficiently validate all access tokens, which allows an attacker to...
---------------------------------------------
https://www.drupal.org/node/2858880
*** Vuln: Apache NiFi CVE-2017-5636 Remote Code Injection Vulnerability ***
--------------------------------------------
http://www.securityfocus.com/bid/96731
*** Vuln: Apache NiFi CVE-2017-5635 Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96730
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities affect Rational Rhapsody Design Manager with potential for security attacks ***
http://www.ibm.com/support/docview.wss?uid=swg21999960
---------------------------------------------
*** IBM Security Bulletin: Information disclosure vulnerability affects IBM Sterling B2B Integrator (CVE-2016-5986) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998463
---------------------------------------------
*** IBM Security Bulletin: IBM Sterling Order Management is affected by Apache Struts 2 security vulnerabilities (CVE-2016-3093 , CVE-2016-4436) ***
http://www.ibm.com/support/docview.wss?uid=swg21999781
---------------------------------------------
*** IBM Security Bulletin: Potential security vulnerability in WebSphere Application Server MQ JCA Resource adapter (CVE-2016-0360) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21996748
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 07-03-2017 18:00 − Mittwoch 08-03-2017 18:00
Handler: Olaf Schwarz
Co-Handler: Petr Sikuta
Co-Handler: Stephan Richter
*** Little Monsters: Nutzerdaten aus Lady Gagas Social Network sollen geleakt sein ***
---------------------------------------------
Bei Lady Gagas App Little Monsters scheinen Nutzerdaten abhanden gekommen zu sein. Im Netz kursiert eine Datenbank mit privaten Daten von knapp einer Million Nutzer.
---------------------------------------------
https://heise.de/-3646447
*** Payments Giant Verifone Investigating Breach ***
---------------------------------------------
Credit and debit card payments giant Verifone [NYSE: PAY] is investigating a breach of its corporate computer networks that could impact companies running its point-of-sale solutions, according to multiple sources. Verifone says the extent of the breach was "limited" and that its payment services network was not impacted. San Jose, Calif.-based Verifone is the largest maker of credit card terminals used in the United States. It sells point-of-sale terminals and services to support the...
---------------------------------------------
https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-b…
*** The HTTPS interception dilemma: Pros and cons ***
---------------------------------------------
HTTPS is the bread-and-butter of online security. Strong cryptography that works on all devices without complicating things for users. Thanks to innovative projects like Let's Encrypt, adoption of HTTPS is rising steadily: in mid-2015 it was at 39%, now it's at 51% of HTTPS requests. Recent research shows however that HTTPS interception happens quite often. In fact, about 10% of connections to CloudFlare are intercepted, and the main culprits are enterprise network monitoring...
---------------------------------------------
https://www.helpnetsecurity.com/2017/03/08/https-interception-dilemma/
*** Start of the Android Security Symposium 2017 ***
---------------------------------------------
Today starts the Android Security Symposium at the Technical University of Vienna, courtesy of the Josef Ressel Center u'smile. The upcoming three days are packed with presentations surrounding the entire Android security ecosystem, ranging from presentations about the security architecture of Android by Google and AT&T right this morning, to secure app development, novel attacks,...
---------------------------------------------
https://www.sba-research.org/2017/03/08/start-of-the-android-security-sympo…
*** 21% of websites still use insecure SHA-1 certificates ***
---------------------------------------------
New research from Venafi Labs shows that 21 percent of the world's websites are still using certificates signed with the vulnerable Secure Hash Algorithm, SHA-1. On February 23, 2017, Google affiliated security researchers announced they cracked the SHA-1 security standard using a collision attack. The incident proved that the deprecated cryptographic secure hash algorithm still used to sign many website digital certificates can be manipulated. Newly issued certificates using the SHA-2...
---------------------------------------------
https://www.helpnetsecurity.com/2017/03/08/insecure-sha-1-certificates-usag…
*** NetIQ Access Manager Directory Traversal Flaw Lets Remote Authenticated Admin Users Download Arbitrary Files on the Target Admin Console System ***
---------------------------------------------
http://www.securitytracker.com/id/1037935
*** Bugtraq: Multiple vulnerabilities found in Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in GoAhead ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540234
*** Bugtraq: [security bulletin] HPESBHF03710 rev.1 - HPE Intelligent Management Center (IMC) PLAT, Multiple Remote Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540233
*** [2017-03-08] Multiple vulnerabilities in Navetti PricePoint ***
---------------------------------------------
Navetti PricePoint is vulnerable against a broad range of typical application based vulnerabilities. On one hand an attacker is able to execute arbitrary JavaScript code in the context of an arbitrary user. On the other hand, an attacker is able to read out the contents of the applications database due to missing input validation. Furthermore an attacker can use cross-site request forgery to perform arbitrary web requests with the identity of the victim without being noticed by the victim.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2017…
*** BlackBerry powered by Android Security Bulletin - March 2017 ***
---------------------------------------------
BlackBerry has released a security update to address multiple vulnerabilities in BlackBerry powered by Android smartphones. We recommend users update to the latest available software build.
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?articleNumber=000039151
*** DFN-CERT-2017-0404: Red Hat JBoss Enterprise Web Server: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0404/
*** Vuln: Mozilla Firefox and Thunderbird Multiple Security Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/96693https://www.mozilla.org/en-US/security/advisories/mfsa2017-05/
*** Bugtraq: [security bulletin] HPESBGN03712 rev.1 - HPE LoadRunner and Performance Center, Remote Code Execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540238
*** [R1] Tenable Appliance 4.5.0 Fixes Multiple Vulnerabilities ***
---------------------------------------------
http://www.tenable.com/security/tns-2017-07
*** Schneider Electric Wonderware Intelligence ***
---------------------------------------------
This advisory contains mitigation details for a credentials management vulnerability in Schneider Electrics Wonderware Intelligence software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7975, CVE-2016-7986, and CVE-2017-5341 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/55/sol55129614.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2017-5202, CVE-2017-5203, CVE-2017-5204, CVE-2017-5205, and CVE-2017-5342 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/04/sol04225025.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7928, CVE-2016-7929, CVE-2016-7930, CVE-2016-7931, and CVE-2016-7933 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/39/sol39512927.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485, and CVE-2017-5486 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/31/sol31997425.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937, and CVE-2016-7939 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/49/sol49144112.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7926, CVE-2016-7932, and CVE-2016-7938 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/72/sol72403108.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925, and CVE-2016-7927 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/77/sol77384526.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7940, CVE-2016-7973, CVE-2016-7974, CVE-2016-7983, and CVE-2016-7984 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/94/sol94010578.html?…
---------------------------------------------
*** Security Advisory: tcpdump vulnerabilities CVE-2016-7985, CVE-2016-7992, CVE-2016-7993, CVE-2016-8574, and CVE-2016-8575 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/94/sol94778122.html?…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in BIND impact AIX (CVE-2016-9131) ***
http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ proliferation of channel agents causes denial of service (CVE-2017-1145) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999672
---------------------------------------------
*** IBM Security Bulletin: IBM Content Navigator Cross Site Scripting Vulnerability ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999736
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Asset Analyzer ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999881
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM MessageSight (CVE-2016-6303, CVE-2016-2182, CVE-2016-2178, CVE-2016-6306, CVE-2016-2183, CVE-2016-2177, CVE-2016-7052) ***
http://www.ibm.com/support/docview.wss?uid=swg21999451
---------------------------------------------
*** IBM Security Bulletin: A security vulnerability has been identified in IBM Reliable Scalable Cluster Technology shipped with IBM Tivoli System Automation for Multiplatforms (CVE-2017-1134). ***
http://www.ibm.com/support/docview.wss?uid=swg21998459
---------------------------------------------
*** IBM Security Bulletin: IBM MessageSight affected by GSKit Sweet32 Birthday attacks (CVE-2016-2183) ***
http://www.ibm.com/support/docview.wss?uid=swg21999452
---------------------------------------------
*** IBM Security Bulletin: OpenNTF project Social Business SDK CVE-2016-3092 ***
http://www.ibm.com/support/docview.wss?uid=swg21999337
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 06-03-2017 18:00 − Dienstag 07-03-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Sicherheitsupdate härtet WordPress gegen XSS-Angriffe ***
---------------------------------------------
Wer das CMS WordPress nutzt sollte sicherstellen, dass die aktuelle Version 4.7.3 installiert ist. Ansonsten könnten Angreifer Sicherheitslücken in vorigen Versionen ausnutzen.
---------------------------------------------
https://heise.de/-3645684
*** River City Media: Spammer vergessen 1,4 Milliarden Mailadressen im Netz ***
---------------------------------------------
Ein Backup-Fehler dürfte das Aus für ein großes Spamnetzwerk aus den USA bedeuten. River City Media verdiente Geld mit Spam-Nachrichten, SMS-Kampagnen und Affiliate-Marketing - inklusive gefälschter Suchmaschinen.
---------------------------------------------
https://www.golem.de/news/river-city-media-spammer-vergessen-1-4-milliarden…
*** SAP Security for Beginners part 7: SAP ABAP Platform Security ***
---------------------------------------------
>From the previous articles of SAP Security for CISO series (especially SAP Risks), you reviewed many examples of potential attacks on these systems. Now it is time to learn how these attacks can be conducted via vulnerabilities discovered in SAP systems. First, let's look at patching process in SAP. When the vendor fixes vulnerabilities in...
---------------------------------------------
http://resources.infosecinstitute.com/sap-security-beginners-part-7-sap-aba…
*** TU Wien-Team auf drittem Platz bei internationalem Hacker-Wettbewerb ***
---------------------------------------------
International Capture The Flag-Bewerb mit Internet-Sicherheits-Teams von 78 Universitäten
---------------------------------------------
http://derstandard.at/2000053747853
*** A tcpdump Tutorial and Primer with Examples ***
---------------------------------------------
Mar 6, 2017 - I just performed a major update to this tutorial after over 10 years. The update includes a fully functional table of contents and a number of additional explanations. Enjoy!
---------------------------------------------
https://danielmiessler.com/study/tcpdump/
*** WikiLeaks Releases CIA Hacking Tools ***
---------------------------------------------
WikiLeaks just released a cache of 8,761 classified CIA documents from 2012 to 2016, including details of its offensive Internet operations.I have not read through any of them yet. If you see something interesting, tell us in the comments.
---------------------------------------------
https://www.schneier.com/blog/archives/2017/03/wikileaks_relea.html
*** DFN-CERT-2017-0394: Google Android Operating System: Mehrere Schwachstellen ermöglichen u.a. die komplette Systemübernahme ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0394/
*** WordPress Multiple Plugins - Remote File Upload ***
---------------------------------------------
Topic: WordPress Multiple Plugins - Remote File Upload Risk: High Text:Id like to report multiple remote file upload vulnerabilities on five plugins, attached is the PoC exploit and screenshot ; It...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2017030065
*** [2017-03-07] Unauthenticated OS command injection & arbitrary file upload in Western Digital WD My Cloud ***
---------------------------------------------
Multiple critical vulnerabilities, such as unauthenticated OS command injection or arbitrary file upload, within the WD My Cloud devices allow an attacker to gain access on the device.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2017…
*** Sicherheitsupdate für Symantec Endpoint Protection ***
---------------------------------------------
Symantec Endpoint Protection ist ein Softwarepaket zum Schutz vor Viren und Malware.In Symantec Endpoint Protection 12.1 existiert eine Sicherheitslücke, die es einem Angreifer mit Zugriff auf Ihren Computer unter bestimmten Umständen ermöglicht, diesen zu übernehmen und massiv zu schädigen. Eine weitere Sicherheitslücke in Symantec Endpoint Protection 12.1 und 14.0 ermöglicht es dem Angreifer, beliebige Befehle auf Ihrem Computer auszuführen.
---------------------------------------------
https://www.bsi-fuer-buerger.de/SharedDocs/Warnmeldungen/DE/TW/warnmeldung_…
*** VU#355151: ACTi cameras models from the D, B, I, and E series contain multiple security vulnerabilities ***
---------------------------------------------
Vulnerability Note VU#355151 ACTi cameras models from the D, B, I, and E series contain multiple security vulnerabilities Original Release date: 07 Mar 2017 | Last revised: 07 Mar 2017 Overview According to the reporter, ACTi devices including D, B, I, and E series models using firmware version A1D-500-V6.11.31-AC are vulnerable to several issues. Description According to the reporter, multiple ACTi devices, including the D, B, I, and E series models, that use firmware version...
---------------------------------------------
http://www.kb.cert.org/vuls/id/355151
*** Security Advisory: The BIG-IP system may respond with the NXDOMAIN status when it receives a DNS query of a certain type on a CNAME wide IP ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/23/sol23022557.html?…
*** Vuln: WePresent WiPG-1500 Device CVE-2017-6351 Hardcoded Password Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96588
*** Vuln: TeX Live CVE-2016-10243 Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96593
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Information Disclosure vulnerability affects IBM DB2 LUW (CVE-2017-1150) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999515
---------------------------------------------
*** IBM Security Bulletin: IBM i is affected by networking BIND vulnerabilities (CVE-2016-9131, CVE-2016-9444, CVE-2016-9147, CVE-2016-9778 and CVE-2017-3135) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021889
---------------------------------------------
*** IBM Security Bulletin: Multiple cross-site scripting vulnerabilities found in IBM UrbanCode Deploy (CVE-2016-9006) ***
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000264
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Apache Tomcat affect IBM Cognos Metrics Manager (CVE-2016-0762, CVE-2016-6816) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999723
---------------------------------------------
*** IBM Security Bulletin: IBM Cognos Business Intelligence Server 2017Q1 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities. ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999671
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in IBM Websphere Application Server affects IBM Cognos Metrics Manager (CVE-2016-5983) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999722
---------------------------------------------
*** IBM Security Bulletin: IBM Tivoli Monitoring Basic Services Vulnerability (CVE-2016-5933) ***
http://www.ibm.com/support/docview.wss?uid=swg21997223
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 03-03-2017 18:00 − Montag 06-03-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** 25 Jahre Michelangelo: Der Tag der großen Virenpanik ***
---------------------------------------------
Am 6. März 1992 hielt die Welt den Atem an. An diesem Tag sollte der Michelangelo-Virus Tausende, wenn nicht gar Millionen Festplatten löschen. Zum 25. Jahrestag beleuchtet c't die Geschichte des berüchtigten Virus.
---------------------------------------------
https://heise.de/-3643630
*** Attacking machine learning with adversarial examples ***
---------------------------------------------
Conclusion Adversarial examples show that many modern machine learning algorithms can be broken in surprising ways. These failures of machine learning demonstrate that even simple algorithms can behave very differently from what their designers intend. We encourage machine learning researchers to get involved and design methods for preventing adversarial examples, in order to close this gap between what designers intend and how algorithms behave. If youre interested in working on adversarial...
---------------------------------------------
https://openai.com/blog/adversarial-example-research/
*** Lets Act Now to Prevent Hacking of the Power Grid ***
---------------------------------------------
Standards, guidelines and exercises have bolstered the security of high-voltage networks but little has been done to protect the low-voltage systems that power our homes and workplaces.
---------------------------------------------
http://europe.newsweek.com/lets-act-now-prevent-hacking-power-grid-563609
*** DFIR Tools ***
---------------------------------------------
Over 600 DFIR tools in an online searchable database.
---------------------------------------------
http://www.dfir.training/index.php/tools/advanced-search
*** Uber Uses Ubiquitous Surveillance to Identify and Block Regulators ***
---------------------------------------------
The New York Times reports that Uber developed apps that identified and blocked government regulators using the app to find evidence of illegal behavior:Yet using its app to identify and sidestep authorities in places where regulators said the company was breaking the law goes further in skirting ethical lines -- and potentially legal ones, too. Inside Uber, some of those who knew about the VTOS program and how the Greyball tool was being used were troubled by it.[...]One method involved...
---------------------------------------------
https://www.schneier.com/blog/archives/2017/03/uber_uses_ubiqu.html
*** Western Digital My Cloud: NAS-Gerät macht jeden zum Admin ***
---------------------------------------------
Western Digital hat in der Hackerszene nicht den Ruf, Schwachstellen schnell zu beheben. Sicherheitslücken, die den Login-Vorgang und die Ausführung von Code betreffen, wurden daher ohne Responsible Disclosure veröffentlicht - damit die Nutzer handeln können.
---------------------------------------------
https://www.golem.de/news/western-digital-my-cloud-nas-geraet-macht-jeden-z…
*** Nextcloud-Scan: Security-Prüfung für Cloud-Speicher ***
---------------------------------------------
Zwei Drittel der öffentlich erreichbaren Installation von ownCloud oder dessen Fork Nextcloud sind angreifbar. Ob die eigene Instanz betroffen ist, können Anwender auf einer Website überprüfen.
---------------------------------------------
https://heise.de/-3645045
*** MMD-0062-2017 - Credential harvesting by SSH Direct TCP Forward attack via IoT botnet ***
---------------------------------------------
In this post there is no malicious software/malware analyzed, but this is one of the impact of the malware infected IoT devices caused by weak credentials are described indirectly. The only malicious aspect written in the post is the individual(s) involved and participate to these attacks, and, well, I personally do not think the tool used is also malicious too since. in a way, it is very useful for UNIX networking and development.
---------------------------------------------
http://blog.malwaremustdie.org/2017/02/mmd-0062-2017-ssh-direct-tcp-forward…
*** Security Advisory - Arbitrary Memory Read Write Vulnerability in Huawei Smart Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170306-…
*** Vuln: EPSON TMNet WebConfig CVE-2017-6443 Multiple HTML Injection Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/96556
*** Vuln: FreeIPA CVE-2017-2590 Multiple Security Bypass Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/96557
*** [R3] SecurityCenter 5.4.4 Fixes File Upload unserialize() Function PHP Object Handling Remote File Deletion ***
---------------------------------------------
Advisory Timeline
2017-02-17 - [R1] Initial Release
2017-02-28 - [R2] Adjust CVSS for worst-case scenario (AV:A -> AV:N)
2017-03-03 - [R3] Add SC upgrade information
---------------------------------------------
https://www.tenable.com/security/tns-2017-05
*** Vuln: Piwik Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96567
*** keepassxc / zxcvbn-c One byte stack buffer overflow ***
---------------------------------------------
Topic: keepassxc / zxcvbn-c One byte stack buffer overflow Risk: High Text:Hi, I recently reported a one byte buffer overflow in keepassxc [1] [2]. Its a pretty typical C bug: An array supposed to ...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2017030044
*** DSA-3802 zabbix - security update ***
---------------------------------------------
An SQL injection vulnerability has been discovered in the Latest datapage of the web frontend of the Zabbix network monitoring system
---------------------------------------------
https://www.debian.org/security/2017/dsa-3802
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSource GNU C library affects IBM Netezza Host Management (CVE-2015-8776) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21997242
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by a vulnerability in the libgcrypt library (CVE-2016-6313) ***
http://www.ibm.com/support/docview.wss?uid=swg21999613
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Sterling Connect:Direct for UNIX (CVE-2016-2177, CVE-2016-6306, CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999357
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by a vulnerability in OpenLDAP (CVE-2015-6908) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999615
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by a vulnerability in IBM WebSphere Application Server (CVE-2016-5986) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999614
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere Commerce admin utilities could lead to disclosure of user personal data (CVE-2016-5894) ***
http://www.ibm.com/support/docview.wss?uid=swg21997408
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 02-03-2017 18:00 − Freitag 03-03-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** WhatsApp - Unsicher trotz Verschlüsselung ***
---------------------------------------------
Die Einführung der Ende-zu-Ende-Verschlüsselung wurde von WhatsApp-Nutzern und Datenschützern sehr begrüßt. Dass es hierbei aber dennoch zu erheblichen Sicherheitsproblemen kommt, haben nun Forscher des Fraunhofer-Instituts für Angewandte und Integrierte Sicherheit AISEC herausgefunden. Betroffen sind vor allem Android-Nutzer.
---------------------------------------------
https://www.aisec.fraunhofer.de/de/presse-und-veranstaltungen/presse/presse…
*** Undocumented Backdoor Account in DBLTek GoIP ***
---------------------------------------------
Trustwave recently reported a remotely exploitable issue in the Telnet administrative interface of numerous DblTek branded devices. The issue permits a remote attacker to gain a shell with root privileges on the affected device due to a vendor backdoor in...
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Undocumented-Backdoor-A…
*** Command Input Typo Caused Massive AWS S3 Outage ***
---------------------------------------------
In a postmortem status report, Amazon blamed a command input typo for the massive AWS S3 outage that took out a large chunk of the Internet three days ago. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/hardware/command-input-typo-caused-ma…
*** Malware Retrieves PowerShell Scripts from DNS Records ***
---------------------------------------------
Malware researchers have come across a new Remote Access Trojan (RAT) that uses a novel technique to evade detection on corporate networks by fetching malicious PowerShell commands stored inside a domains DNS TXT records. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malware-retrieves-powershell…
*** January-February 2017 ***
---------------------------------------------
The NCCIC/ICS-CERT Monitor for January/February 2017 is a summary of ICS-CERT activities for the previous two months.
---------------------------------------------
https://ics-cert.us-cert.gov/monitors/ICS-MM201702
*** Lernkurve mit neuem Feed ***
---------------------------------------------
Wir sammeln aus vielen Quellen Informationen zu Infektionen und anderen Sicherheitsproblemen im österreichischen Internet und geben diese an die Netzbetreiber weiter. Details dazu stehen in unserem Jahresbericht. Kürzlich haben wir eine neuen Anbieter in unser Portfolio aufgenommen, der unser Lagebild zu Infektionen verbessern sollte. Seit vorgestern verteilen wir Daten aus dieser Quelle. Wir bekamen von einigen Seiten Feedback, dass hier was...
---------------------------------------------
http://www.cert.at/services/blog/20170303152402-1946.html
*** IDM 4.5 SAP HR Driver Version 4.0.1.0 ***
---------------------------------------------
Abstract: Patch update for the Identity Manager SAP HR driver with the SAP JCO version 3. This patch will take the driver version to 4.0.1.0. You must have IDM 4.5 with SP2 or later to use this driver. You should only use this if you are using SAP JCO3. It will not work with SAP JCO2. NetIQ/MicroFocus recommends that users of SAP JCO2 transition to SAP JCO3 and use the IDM SAP HR driver for JCO3. Beginning with IDM 4.0 JCO2 is no longer supported.Document ID: 5258492Security Alert:
---------------------------------------------
https://download.novell.com/Download?buildid=KbKm3O1mw4M~
*** VMSA-2017-0002 ***
---------------------------------------------
Horizon DaaS update addresses an insecure data validation issue
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2017-0002.html
*** Vuln: Rapid7 Insight Collector CVE-2017-5234 DLL Loading Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/96545
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by vulnerabilities in Network Security Services (NSS) (CVE-2016-2834, CVE-2016-5285, CVE-2016-8635) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21998918
*** Eaton xComfort Ethernet Communication Interface ***
---------------------------------------------
This advisory contains mitigation details for an improper access controls vulnerability in the Eaton xComfort Ethernet Communication Interface.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-061-01
*** Schneider Electric Conext ComBox ***
---------------------------------------------
This advisory contains mitigation details for a resource exhaustion vulnerability in Schneider Electric's Conext ComBox solar battery monitor.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-061-02
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 01-03-2017 18:00 − Donnerstag 02-03-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Kaspersky Releases Decryptor for the Dharma Ransomware ***
---------------------------------------------
Kaspersky has tested a set of Dharma master decryption keys posted to BleepingComputer and has confirmed they are legitimate. These keys have been included in their RakhniDecryptor, which I have tested against a Dharma infection. The decryptor worked flawlessly! [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/kaspersky-releases-decryptor…
*** The Story of an Expired WHOIS Server ***
---------------------------------------------
We write quite often about SEO spam injections on compromised websites, but this is the first time we have seen this blackhat tactic spreading into the WHOIS results for a domain name. If you are not familiar with "WHOIS", it is a protocol used to check who owns a specific domain name. These simple text records are publicly available and usually contain contact details for the website owner, i.e. their name, address, and phone number (unless the website owner purchased a WHOIS...
---------------------------------------------
https://blog.sucuri.net/2017/03/story-expired-whois-server.html
*** Infected Apps in Google Play Store (its not what you think), (Thu, Mar 2nd) ***
---------------------------------------------
Xavier pointed me towards a new issue posted on Palo Altos Unit 42 blog - the folks at PA found apps in the Google Play store infected with hidden-iframe type malware. 132 apps (so far) are affected, with the most popular one seeing roughly 10,000 downloads. But were not at the end of the trail of breadcrumbs yet .. these apps were traced back to just 7 developers, who arent in the same company, but all have a connection to Indonesia (the smoking gun here was the code signing certificate). But...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22139&rss
*** Researcher Breaks reCAPTCHA Using Googles Speech Recognition API ***
---------------------------------------------
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Googles reCAPTCHA fields using another Google service, the Speech Recognition API. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/researcher-breaks-recaptcha-…
*** Crypt0L0cker Ransomware is Back with Campaigns Targeting Europe ***
---------------------------------------------
Crypt0L0cker, otherwise known as TorrentLocker, has started to make resurgence as it performs targeted campaigns at European countries. These attacks are also now using Italys PEC system to digitaly sign SPAM emails in order to make them look more official. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/crypt0l0cker-ransomware-is-b…
*** Security Advisory - Buffer Overflow Vulnerability in the Boot Loaders of Huawei Mobile Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170302-…
*** DSA-3799 imagemagick - security update ***
---------------------------------------------
This update fixes several vulnerabilities in imagemagick: Variousmemory handling problems and cases of missing or incomplete inputsanitising may result in denial of service or the execution of arbitrarycode if malformed TIFF, WPG, IPL, MPC or PSB files are processed.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3799
*** AES - Critical - Unsupported - SA-CONTRIB-2017-027 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2017-027Project: AES encryption (third-party module)Version: 7.x, 8.xDate: 2017-March-01DescriptionThis module provides an API that allows other modules to encrypt and decrypt data using the AES encryption algorithm.The module does not follow requirements for encrypting data safely. An attacker who gains access to data encrypted with this module could decrypt it more easily than should be possible. The maintainer has opted not to fix these weaknesses. See solution...
---------------------------------------------
https://www.drupal.org/node/2857028
*** Remember Me - Critical - Unsupported - SA-CONTRIB-2017-025 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2017-025Project: Remember Me (third-party module)Version: 7.xDate: 2017-March-01Description Remember me is a module that allows users to check "Remember me" when logging in. The security team is marking this module unsupported. There is a known security issue with the module that has not been fixed by the maintainer. If you would like to maintain this module, please read: https://www.drupal.org/node/251466CVE identifier(s) issuedA CVE identifier will...
---------------------------------------------
https://www.drupal.org/node/2857015
*** Breakpoint Panels - Critical - Unsupported - SA-CONTRIB-2017-028 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2017-028Project: breakpoint panels (third-party module)Version: 7.xDate: 2017-March-01Description Breakpoint panels adds a button to the Panels In-Place Editor for each pane. When selected, it will display checkboxes next to all of the breakpoints specified in that modules UI. Unchecking any of these will hide it from that breakpoint. The security team is marking this module unsupported. There is a known security issue with the module that has not been fixed by...
---------------------------------------------
https://www.drupal.org/node/2857073
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to missing authentication checks (CVE-2016-9729) ***
http://www.ibm.com/support/docview.wss?uid=swg21999545
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to SQL injection (CVE-2016-9728) ***
http://www.ibm.com/support/docview.wss?uid=swg21999543
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM and QRadar Incident Forensics are vulnerable to cross site scripting (CVE-2016-9723, CVE-2017-1133) ***
http://www.ibm.com/support/docview.wss?uid=swg21999534
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM and QRadar Incident Forensics are vulnerable to cross-site request forgery (CVE-2016-9730) ***
http://www.ibm.com/support/docview.wss?uid=swg21999549
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to XML Entity Injection (CVE-2016-9724) ***
http://www.ibm.com/support/docview.wss?uid=swg21999537
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM and QRadar Incident Forensics are vulnerable to OS command injection (CVE-2016-9726, CVE-2016-9727) ***
http://www.ibm.com/support/docview.wss?uid=swg21999542
---------------------------------------------
*** IBM Security Bulletin: Malicious File Download vulnerability in IBM Business Process Manager (BPM) and WebSphere Lombardi Edition (WLE) CVE-2016-9693 ***
https://www-01.ibm.com/support/docview.wss?uid=swg21998655
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM MessageSight (CVE-2016-7053, CVE-2016-7054, CVE-2016-7055) ***
http://www.ibm.com/support/docview.wss?uid=swg21998755
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ administration command could cause denial of service (CVE-2016-8971) ***
https://www-01.ibm.com/support/docview.wss?uid=swg21998663
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in dependent component shipped in IBM Development Package for Apache Spark (CVE-2016-4970) ***
http://www.ibm.com/support/docview.wss?uid=swg21999185
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect Sterling Connect:Express for UNIX (CVE-2016-7055, CVE-2017-3731 and CVE-2017-3732) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999470
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Development Package for Apache Spark ***
http://www.ibm.com/support/docview.wss?uid=swg21999561
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM ILOG CPLEX Optimization Studio ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999668
---------------------------------------------
*** IBM Security Bulletin: IBM Maximo Asset Management could allow a local attacker to obtain sensitive information using HTTP Header Injection (CVE-2017-1124) ***
http://www.ibm.com/support/docview.wss?uid=swg21998053
---------------------------------------------
*** IBM Security Bulletin: Mozilla NSS as used in IBM QRadar SIEM is vulnerable to arbitrary code execution (CVE-2016-2834) ***
http://www.ibm.com/support/docview.wss?uid=swg21999532
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to a denial of service (CVE-2016-9740) ***
http://www.ibm.com/support/docview.wss?uid=swg21999556
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM and QRadar Incident Forensics are vulnerable to information exposure (CVE-2016-9720) ***
http://www.ibm.com/support/docview.wss?uid=swg21999533
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar Incident Forensics is vulnerable to overly permissive CORS access policies (CVE-2016-9725) ***
http://www.ibm.com/support/docview.wss?uid=swg21999539
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-02-2017 18:00 − Mittwoch 01-03-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Dridex Becomes First Malware Family to Integrate AtomBombing Technique ***
---------------------------------------------
Bad news from malware-land after security researchers from IBM reported today theyd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/dridex-becomes-first-malware…
*** Android: Passwort-Manager mit Sicherheitslücken ***
---------------------------------------------
Passwort-Manager verwalten auf Smartphones diverse Zugangsdaten. Das ist zwar praktisch - doch nicht immer sind die Daten auch sicher verwahrt, wie das Frauenhofer SIT herausfand. Einige der untersuchten Apps wiesen gravierende Mängel auf.
---------------------------------------------
https://heise.de/-3640040
*** Botnets ***
---------------------------------------------
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized systems. Among other things, the hackers used the combined computing power of these botnets to launch distributed denial-of-service attacks, which flood websites with traffic to take them down.But now the problem is getting worse, thanks to a flood of cheap webcams, digital video recorders, and other gadgets in the "Internet of...
---------------------------------------------
https://www.schneier.com/blog/archives/2017/03/botnets.html
*** BSI legt Grundstein für Prüfungen gemäß IT-Sicherheitsgesetz ***
---------------------------------------------
Betreiber kritischer Infrastruktur müssen sich zukünftig regelmäßig prüfen lassen und dabei nachweisen, Sicherheitsvorkehrungen gemäß dem Stand der Technik vorgenommen zu haben. Die ersten Schulungen für Prüfer machen klar, was das konkret bedeutet.
---------------------------------------------
https://heise.de/-3632463
*** Wir werden alle an der Cloud verbluten .. oder so ***
---------------------------------------------
http://www.cert.at/services/blog/20170301112306-1918.html
*** [2017-03-01] XXE and XSS vulnerabilities in Aruba AirWave ***
---------------------------------------------
The authenticated XXE and reflected XSS vulnerabilities were found in Aruba AirWave versions prior to 8.2.3.1. The XXE flaw can be exploited by either a low-privileged user or a social engineering attack which could allow an attacker to read sensitive files on the system.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2017…
*** DFN-CERT-2017-0362: Foxit Reader, Foxit PhantomPDF: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0362/
*** SSA-934525 (Last Update 2017-03-01): Vulnerability in SINUMERIK Integrate ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-934525…
*** SSA-701708 (Last Update 2017-03-01): Local Privilege Escalation in Industrial Products ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708…
*** SECURITY BULLETIN: Multiple Vulnerabilities in Trend Micro SafeSync for Enterprise (SSFE) 3.2 ***
---------------------------------------------
Trend Micro has released a new build for Trend Micro SafeSync for Enterprise (SSFE) 3.2. This fix resolves multiple vulnerabilities in the product that could potentially allow a remote attacker to execute arbitrary code on vulnerable installations.
---------------------------------------------
https://success.trendmicro.com/solution/1116749
*** Cisco Prime Infrastructure Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability in the HTTP web-based management interface of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected system.The vulnerability is due to insufficient input validation of a user-supplied value. An attacker could exploit this vulnerability by convincing a user to click a specific link. There are no workarounds that address this vulnerability.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** Cisco NetFlow Generation Appliance Stream Control Transmission Protocol Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition.The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data...
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by a vulnerability in the Expat XML parser (CVE-2016-0718) ***
---------------------------------------------
A vulnerability has been identified in the Expat XML parser, which affects IBM Security Access Manager appliances. CVE(s): CVE-2016-0718 Affected product(s) and affected version(s): IBM Security Access Manager for Web 7.0 appliances, all firmware versions. IBM Security Access Manager for Web 8.0 appliances, all firmware versions. IBM Security Access Manager for Mobile 8.0 appliances, all...
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21998991
*** IBM Security Bulletin: Tivoli Storage Manger (IBM Spectrum Protect) SQL interface vulnerable to unauthorized access (CVE-2016-8940) ***
---------------------------------------------
Tivoli Storage Manager (IBM Spectrum Protect) SQL interface is vulnerable to unauthorized access to user credentials and product sensitive information. CVE(s): CVE-2016-8940 Affected product(s) and affected version(s): This vulnerability affects the following IBM Tivoli Storage Manager (IBM Spectrum Protect) Server levels: 7.1.0.0 through 7.1.7.0 6.3.0.0 through 6.3.6.0 6.2, 6.1, and 5.5 all levels (these releases...
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21998946
*** Novell Patches ***
---------------------------------------------
*** iManager 3.0.2.1 ***
https://download.novell.com/Download?buildid=z_UnDt0kYyM~
---------------------------------------------
*** eDirectory 8.8 SP8 Patch 9 HotFix 2 ***
https://download.novell.com/Download?buildid=KcXKGUw7GSg~
---------------------------------------------
*** eDirectory 9.0.2 Hot Fix 2 ***
https://download.novell.com/Download?buildid=dRl85TKqwOE~
---------------------------------------------
*** iManager 2.7 Support Pack 7 - Patch 9 ***
https://download.novell.com/Download?buildid=v_njeFs4biE~
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-02-2017 18:00 − Dienstag 28-02-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Mac-AV-Software ermöglichte Einschleusen von Schadcode ***
---------------------------------------------
Eine unzureichende Absicherung bei der Lizenzprüfung von Eset Endpoint Antivirus für macOS ermöglichte es einem Angreifer, beliebigen Code mit Root-Rechten auszuführen. Die als kritisch eingestufte Sicherheitslücke wurde inzwischen behoben.
---------------------------------------------
https://heise.de/-3638786
*** MongoDB: Sprechender Teddy teilte alle Daten mit dem Internet ***
---------------------------------------------
Spielzeug aus der Cloudpets-Reihe zeichnet die Stimmen der Kinder auf. Wem das nicht schon zu creepy ist, der dürfte sich spätestens über die offene MongoDB-Datenbank aufregen. 800.000 Nutzer mit über 2 Millionen Sprachsamples sind betroffen. (Spielzeug, Datenschutz)
---------------------------------------------
https://www.golem.de/news/mongodb-sprechender-teddy-teilte-alle-daten-mit-d…
*** Severe SQL Injection Flaw Discovered in WordPress Plugin with Over 1 Million Installs ***
---------------------------------------------
A WordPress plugin installed on over one million sites has just fixed a severe SQL injection vulnerability that can allow attackers to steal data from a websites database. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/severe-sql-injection-flaw-di…
*** Decrypting after a Findzip ransomware infection ***
---------------------------------------------
The Findzip ransomware was discovered on February 22, 2017. At that time, it was thought that files would be irreversibly encrypted by this ransomware, with no chance of decryption. Turns out, thats not quite true.
---------------------------------------------
https://blog.malwarebytes.com/cybercrime/2017/02/decrypting-after-a-findzip…
*** Guidelines on Incident Notification for Digital Service Providers ***
---------------------------------------------
ENISA publishes a comprehensive guideline on how to implement incident notification requirements for Digital Service Providers, in the context of the NIS Directive.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/guidelines-on-incident-notifica…
*** DFN-CERT-2017-0355: TYPO3: Zwei Schwachstellen ermöglichen Cross-Site-Scripting-Angriffe und das Umgehen von Sichherheitsvorkehrungen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0355/
*** DFN-CERT-2017-0340: Red Hat Package Manager (RPM): Mehrere Schwachstellen ermöglichen verschiedene Denial-of-Service-Angriffe ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0340/
*** SAP BusinessObjects Financial Consolidation Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1037910
*** VU#742632: Sage XRT Treasury database fails to properly restrict access to authorized users ***
---------------------------------------------
Vulnerability Note VU#742632 Sage XRT Treasury database fails to properly restrict access to authorized users Original Release date: 28 Feb 2017 | Last revised: 28 Feb 2017 Overview Sage XRT Treasury, version 3, fails to properly restrict database access to authorized users, which may enable any authenticated user to gain full access to privileged database functions. Description CWE-639: Authorization Bypass Through User-Controlled Key - CVE-2017-3183Sage XRT Treasury is a business finance...
---------------------------------------------
http://www.kb.cert.org/vuls/id/742632
*** DFN-CERT-2017-0356: ktnef: Eine Schwachstelle ermöglicht u.a. das Ausführen beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0356/
*** Bugtraq: Advisory X41-2017-001: Multiple Vulnerabilities in X.org ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540180
*** VTS17-003: Multiple Vulnerabilities in Veritas NetBackup and NetBackup Appliance ***
---------------------------------------------
https://www.veritas.com/content/support/en_US/security/VTS17-003.html
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server January 2017 CPU ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998379
---------------------------------------------
*** IBM Security Bulletin: DB2 local escalation of privilege vulnerability affects Tivoli Storage Manager (IBM Spectrum Protect) Server (CVE-2016-5995) ***
http://www.ibm.com/support/docview.wss?uid=swg21998885
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in IBM Jazz for Service Management affects IBM Performance Management products (CVE-2016-9975) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993846&myns=swgtiv&mynp=…
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM Cognos Controller ***
http://www-01.ibm.com/support/docview.wss?uid=swg21983083
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Cognos Controller (CVE-2016-3427) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21983082
---------------------------------------------
*** IBM Security Bulletin: vulnerabilities in IBM WebSphere Application Server Liberty affects IBM Performance Management products ***
http://www.ibm.com/support/docview.wss?uid=swg21993794
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Cognos Controller. ***
http://www-01.ibm.com/support/docview.wss?uid=swg21977636
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Cognos Controller (CVE-2015-3195) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21976531
---------------------------------------------
*** IBM Security Bulletin: OpenSSL as used in IBM QRadar SIEM is vulnerable to various CVEs ***
http://www.ibm.com/support/docview.wss?uid=swg21999478
---------------------------------------------
*** IBM Security Bulletin: Pivotal Spring Framework as used in IBM QRadar SIEM is vulnerable to various CVEs ***
http://www.ibm.com/support/docview.wss?uid=swg21999395
---------------------------------------------
*** IBM Security Bulletin: Apache Solr as used in IBM QRadar SIEM and Incident Forensics is vulnerable to a denial of service (CVE-2014-0050) ***
http://www.ibm.com/support/docview.wss?uid=swg21999474
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM uses broken or risky cryptographic algorithms (CVE-2016-2879) ***
http://www.ibm.com/support/docview.wss?uid=swg21997341
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM contains hard-coded credentials (CVE-2016-2880) ***
http://www.ibm.com/support/docview.wss?uid=swg21997340
---------------------------------------------
*** IBM Security Bulletin: Apache Tomcat as used in IBM QRadar SIEM is vulnerable to various CVEs ***
http://www.ibm.com/support/docview.wss?uid=swg21999488
---------------------------------------------
*** IBM Security Bulletin: IBM Java as used in IBM QRadar SIEM and Incident Forensics is vulnerable to various CVEs ***
http://www.ibm.com/support/docview.wss?uid=swg21999479
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-02-2017 18:00 − Montag 27-02-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Project Zero: Erneut ungepatchter Microsoft-Bug veröffentlicht ***
---------------------------------------------
Project Zero meint es ernst: Zum dritten Mal innerhalb weniger Monate gibt es einen Bugreport ohne Patch von Microsoft. Dieses Mal handelt es sich um einen Type-Confusion-Fehler in Internet Explorer und Edge.
---------------------------------------------
https://www.golem.de/news/project-zero-erneut-ungepatchter-microsoft-bug-ve…
*** DFN-CERT-2017-0348: Microsoft Internet Explorer, Microsoft Edge: Eine Schwachstelle ermöglicht das Ausführen beliebigen Programmcodes ***
---------------------------------------------
Ein entfernter, nicht authentifizierter Angreifer, welcher einen Benutzer zum Besuch einer bösartig manipulierten Webseite verleiten kann, kann die Schwachstelle ausnutzen, um einen Denial-of-Service (DoS)-Zustand zu bewirken oder beliebigen Programmcode zur Ausführung zu bringen. Diese Schwachstelle wird von dem Google Projekt Zero veröffentlicht, da der Zeitraum, der dem Hersteller zum Beheben der Schwachstelle eingeräumt wurde (90 Tage), abgelaufen ist. Ein Sicherheitsupdate steht derzeit noch nicht zur Verfügung. Ein Proof-of-Concept zur Ausnutzung der Schwachstelle ist ebenfalls verfügbar.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0348/
*** Cloudflare data leak...what does it mean to me?, (Fri, Feb 24th) ***
---------------------------------------------
The ISC has received several requests asking us to weigh in on the ramifications of the Cloudflare data leak, also being referred to by some as CloudBleed. The short version of the vulnerability is that in raresituations, a bug in Cloudflares edge servers could be triggered, which would cause a buffer overrun to occur. When these buffer overruns occurred, random data would be returned in the replies from the Cloudflare servers. This data would be data from any of Cloudflares customer...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22113&rss
*** Zahlungsverkehr: Swift verlangt bessere Cyberabwehr ***
---------------------------------------------
Im Kampf gegen Cyberkriminelle verlangt das Zahlungsverkehrssystem Swift größere Anstrengungen seitens der angeschlossenen Banken.
---------------------------------------------
https://futurezone.at/b2b/zahlungsverkehr-swift-verlangt-bessere-cyberabweh…
*** DSA-3795 bind9 - security update ***
---------------------------------------------
It was discovered that a maliciously crafted query can cause ISCsBIND DNS server (named) to crash if both Response Policy Zones (RPZ)and DNS64 (a bridge between IPv4 and IPv6 networks) are enabled. Itis uncommon for both of these options to be used in combination, sovery few systems will be affected by this problem in practice.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3795
*** SHA1 Collision Attack Makes Its First Victim: Subversion Repositories ***
---------------------------------------------
It took only one day for the SHA1 collision attack revealed by Google on Thursday to make its first victims after developers of the WebKit browser engine broke their Subversion (SVN) source code repository on Friday. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/sha1-collision-attack-makes-…
*** DSA-3796 apache2 - security update ***
---------------------------------------------
Several vulnerabilities were discovered in the Apache2 HTTP server.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3796
*** More on Bluetooth Ingenico Overlay Skimmers ***
---------------------------------------------
This blog has featured several stories about "overlay" card and PIN skimmers made to be placed atop Ingenico-brand card readers at store checkout lanes. Im revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, and the images and his story offer a fair bit more detail than in previous articles on Ingenico overlay skimmers.
---------------------------------------------
https://krebsonsecurity.com/2017/02/more-on-bluetooth-ingenico-overlay-skim…
*** Gefälschte Oberbank-Nachricht: Konto gesperrt! ***
---------------------------------------------
Kund/innen erhalten scheinbar eine E-Mail der Oberbank. Darin heißt es, dass es zu einem nicht autorisierten Zugriff auf ihr Konto gekommen sei. [...] Es handelt sich um einen Phishingversuch!
---------------------------------------------
https://www.watchlist-internet.at/phishing/gefaelschte-oberbank-nachricht-k…
*** Cyber extortionists hold MySQL databases for ransom ***
---------------------------------------------
Ransomware has become cyber crooks' favorite attack methodology for hitting businesses, but not all cyber extortion attempts are effected with this particular type of malware. Since the beginning of the year, we have witnessed attackers compromising databases, exfiltrating data from them, wiping them and then asking for money (0.2 BTC) in order to return the data. They ransacked MongoDB, CouchDB and Hadoop databases, and now they've set MySQL databases in their sights. According to...
---------------------------------------------
https://www.helpnetsecurity.com/2017/02/27/mysql-databases-ransom/
*** Security products and HTTPS: lets do it better ***
---------------------------------------------
A recent paper showed that many HTTPS-intercepting security solutions have implemented TLS rather poorly. Does that mean we should avoid such solutions altogether?
---------------------------------------------
https://www.virusbulletin.com:443/blog/2017/02/security-products-and-https-…
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: Slowloris denial-of-service attack vulnerability CVE-2007-6750 ***
https://support.f5.com:443/kb/en-us/solutions/public/12000/600/sol12636.htm…
---------------------------------------------
*** Security Advisory: Linux kernel vulnerability CVE-2016-9555 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/54/sol54095660.html?…
---------------------------------------------
*** Security Advisory: Expat XML library vulnerability CVE-2015-2716 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/50/sol50459349.html?…
---------------------------------------------
*** Security Advisory: libarchive vulnerability CVE-2016-8688 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/35/sol35263486.html?…
---------------------------------------------
*** Security Advisory: libarchive vulnerability CVE-2016-8689 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/52/sol52697522.html?…
---------------------------------------------
*** Security Advisory: libarchive vulnerability CVE-2016-8687 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/13/sol13074505.html?…
---------------------------------------------
*** Security Advisory: Linux kernel vulnerability CVE-2016-4998 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/74/sol74171196.html?…
---------------------------------------------
*** Security Advisory: OpenSSL vulnerability CVE-2017-3732 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/44/sol44512851.html?…
---------------------------------------------
*** Security Advisory: F5 TLS vulnerability CVE-2016-9244 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/05/sol05121675.html?…
---------------------------------------------
*** Security Advisory: PHPMailer vulnerability CVE-2016-10045 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/73/sol73926196.html?…
---------------------------------------------
*** Security Advisory: BIG-IP REST vulnerability CVE-2016-6249 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/12/sol12685114.html?…
---------------------------------------------
*** Security Advisory: GnuTLS vulnerabilities CVE-2017-5335, CVE-2017-5336, and CVE-2017-5337 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/59/sol59836191.html?…
---------------------------------------------
*** Security Advisory: perl-XML-Twig vulnerability CVE-2016-9180 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/08/sol08383757.html?…
---------------------------------------------
*** Security Advisory: OpenSSL vulnerability CVE-2017-3731 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/37/sol37526132.html?…
---------------------------------------------
*** Security Advisory: BIND vulnerability CVE-2017-3135 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/80/sol80533167.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2015-8806 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/04/sol04450715.html?…
---------------------------------------------
*** Security Advisory: GnuTLS vulnerability CVE-2017-5334 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/31/sol31336596.html?…
---------------------------------------------
*** Security Advisory: iControl vulnerability CVE-2016-9256 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/47/sol47284724.html?…
---------------------------------------------
*** Security Advisory: TMM vulnerability CVE-2016-9245 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/22/sol22216037.html?…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-02-2017 18:00 − Freitag 24-02-2017 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Kriminelle versenden gefälschte BAWAK P.S.K.-SMS ***
---------------------------------------------
In einer gefälschten BAWAG P.S.K.-SMS heißt es, dass die Bank das Konto von Kund/innen gesperrt habe. Damit diese ihr Konto wieder aktivieren können, sollen sie eine Website aufurfen und ihre Zugangsdaten bekannt geben. Achtung: Es handelt sich um einen Phishingversuch. Am besten ist es, wenn Sie die SMS löschen.
---------------------------------------------
https://www.watchlist-internet.at/phishing/kriminelle-versenden-gefaelschte…
*** Worlds Largest Spam Botnet Adds DDoS Feature ***
---------------------------------------------
Necurs, the worlds largest spam botnet with nearly 5 million infected bots, of which one million active each day, has added a new module that can be used for launching DDoS attacks. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/worlds-largest-spam-botnet-a…
*** Removing User Admin Rights Mitigates 94% of All Critical Microsoft Vulnerabilities ***
---------------------------------------------
Just by preventing access to admin accounts, a system administrator could safeguard all the computers under his watch and prevent attackers from exploiting 94% of all the critical vulnerabilities Microsoft patched during the past year. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/removing-user-admin-rights-…
*** Bleeding clouds: Cloudflare server errors blamed for leaked customer data ***
---------------------------------------------
While working on something completely unrelated, Google security researcher, Tavis Ormandy, recently discovered that Cloudflare was leaking a wide range of sensitive information, which could have included everything from cookies and tokens, to credentials.Cloudflare moved quickly to fix things, but their postmortem downplays the risk to customers, Ormandy said.The problem on Cloudflares side, which impacted big brands like Uber, Fitbit, 1Password, and OKCupid, was a memory leak. The flaw
---------------------------------------------
http://www.csoonline.com/article/3173639/security/bleeding-clouds-cloudflar…
*** Leaked Android Banking Trojan Spotted in Disguise on the Google Play Store ***
---------------------------------------------
Just as security experts have predicted, the source code of a potent Android banking trojan that was leaked online in mid-December 2016, is now being seen in live attacks on a regular basis. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/leaked-android-banking-troja…
*** LibreOffice Calc and Writer Embedded Object Preview Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System ***
---------------------------------------------
http://www.securitytracker.com/id/1037893
*** [Xen-announce] Xen Security Advisory 209 (CVE-2017-2620) - cirrus_bitblt_cputovideo does not check if memory region is safe ***
---------------------------------------------
A malicious guest administrator can cause an out of bounds memory write, very likely exploitable as a privilege escalation.
---------------------------------------------
https://lists.xen.org/archives/html/xen-announce/2017-02/msg00004.html
*** [Xen-announce] Xen Security Advisory 210 - arm: memory corruption when freeing p2m pages ***
---------------------------------------------
A malicious or buggy guest may corrupt hypervisor state, commonly leading to a host crash (Denial of Service). Privilege escalation or information leaks cannot be excluded.
---------------------------------------------
https://lists.xen.org/archives/html/xen-announce/2017-02/msg00005.html
*** Novell: NetIQ Access Manager 4.3 Support Pack 1 4.3.1.0-53 ***
---------------------------------------------
The purpose of the patch is to provide a bundle of fixes for issues that have surfaced since NetIQ Access Manager 4.3 was released. These fixes include updates to the Access Gateway Appliance, Access Gateway Service, Identity Server, Analytics Server and Admin Console. CVE - 20145183
---------------------------------------------
https://download.novell.com/Download?buildid=30pOHdA3ETQ~
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities may affect IBM WebSphere Real Time ***
https://www.ibm.com/support/docview.wss?uid=swg21997192
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities may affect IBM SDK, Java Technology Edition ***
https://www.ibm.com/support/docview.wss?uid=swg21997194
---------------------------------------------
*** IBM Security Bulletin: IBM Business Process Manager (BPM) document store is affected by clickjacking vulnerability in administrative tool for BPM document store (CVE-2013-5462) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998385
---------------------------------------------
*** IBM Security Bulletin: Security vulnerabilities in Apache Tomcat affect multiple IBM Rational products based on IBM's Jazz technology ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999362
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by a vulnerability in Busybox (CVE-2014-9645) ***
http://www.ibm.com/support/docview.wss?uid=swg21998196
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by a vulnerability in IBM WebSphere Application Server (CVE-2016-5983) ***
http://www.ibm.com/support/docview.wss?uid=swg21996871
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilites in IBM Algorithmics Algo One Algo Risk Application (ARA) related to IBM WebSphere Application Server Liberty ***
http://www.ibm.com/support/docview.wss?uid=swg21999209
---------------------------------------------
*** IBM Security Bulletin: IBM Connections Security Refresh (CVE-2016-5932) ***
http://www.ibm.com/support/docview.wss?uid=swg21998294
---------------------------------------------
*** IBM Security Bulletin: An XML parser vulnerability affects IBM Tivoli Access Manager for e-business and IBM Security Access Manager for Web 7.0 software releases (CVE-2016-4463) ***
http://www.ibm.com/support/docview.wss?uid=swg21996869
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilites in IBM Algorithmics Algo One Algo Risk Application (ARA) Stack trace may be thrown if no default error page was set up and exception occurred ***
http://www.ibm.com/support/docview.wss?uid=swg21997638
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-02-2017 18:00 − Donnerstag 23-02-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Criminals Monetizing Attacks Against Unpatched WordPress Sites ***
---------------------------------------------
Sites still vulnerable to a REST API endpoint flaw in WordPress are now being targeted by attackers trying to turn a profit.
---------------------------------------------
http://threatpost.com/criminals-monetizing-attacks-against-unpatched-wordpr…
*** MSRT February 2017: Chuckenit detection completes MSRT solution for one malware suite ***
---------------------------------------------
In September 2016, we started adding to Microsoft Malicious Software Removal Tool (MSRT) a malware suite of browser modifiers and other Trojans installed by software bundlers. We documented how the malware in this group install other malware or applications silently, without your consent.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/02/22/msrt-february-2017-chuc…
*** Top 8 Reverse Engineering Tools for Cyber Security Professionals ***
---------------------------------------------
Whether it is rebuilding a car engine or diagramming a sentence, people can learn about many things simply by taking them apart and putting them back together again. This process of breaking something down to understand it, build a copy to improve it, is known as reverse engineering.
---------------------------------------------
http://resources.infosecinstitute.com/top-8-reverse-engineering-tools-cyber…
*** Impact of New Linux Kernel DCCP Vulnerability Limited ***
---------------------------------------------
Existing mitigations and limitations around a newly disclosed Linux kernel vulnerability in the DCCP module mute the potential impact of local attacks.
---------------------------------------------
http://threatpost.com/impact-of-new-linux-kernel-dccp-vulnerability-limited…
*** Java, Python FTP Injection Attacks Bypass Firewalls ***
---------------------------------------------
Newly disclosed FTP injection vulnerabilities in Java and Python that are fueled by rather common XML External Entity (XXE) flaws allow for firewall bypasses.
---------------------------------------------
http://threatpost.com/java-python-ftp-injection-attacks-bypass-firewalls/12…
*** Kollissionsangriff: Hashfunktion SHA-1 gebrochen ***
---------------------------------------------
Forscher von Google und der Universität Amsterdam ist es gelungen, zwei unterschiedliche PDF-Dateien mit demselben SHA-1-Hash zu erzeugen. Dass SHA-1 unsicher ist, war bereits seit 2005 bekannt. (SHA-1, Google)
---------------------------------------------
https://www.golem.de/news/kollissionsangriff-hashfunktion-sha-1-gebrochen-1…
*** Putty 0.68 released ***
---------------------------------------------
http://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Buffer Overflow from improperly formatted SELECT command in IBM Tivoli Storage Manager (IBM Spectrum Protect) Server (CVE-2016-8998) ***
http://www.ibm.com/support/docview.wss?uid=swg21998747
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ cluster channel definition causes denial of service to cluster (CVE-2016-9009) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998647
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Netezza PureData System for Analytics (CVE-2016-8610) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21997472
---------------------------------------------
*** IBM Security Bulletin: IBM MQ and IBM MQ Appliance are vulnerable to SWEET32 Birthday attack (CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995099
---------------------------------------------
*** IBM Security Bulletin: Information disclosure CVE-2016-9975 affects IBM Dashboard Application Services Hub (DASH) ***
http://www.ibm.com/support/docview.wss?uid=swg21998714
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM WebSphere MQ (CVE-2016-2106, CVE-2016-2109) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998797
---------------------------------------------