=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 09-12-2016 18:00 − Montag 12-12-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Windows 10: protection, detection, and response against recent Depriz malware attacks ***
---------------------------------------------
A few weeks ago, multiple organizations in the Middle East fell victim to targeted and destructive attacks that wiped data from computers, and in many cases rendering them unstable and unbootable. Destructive attacks like these have been observed repeatedly over the years and the Windows Defender and Windows Defender Advanced Threat Protection Threat Intelligence teams...
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/12/09/windows-10-protection-d…
*** Microsoft Edges malware alerts can be faked, researcher says ***
---------------------------------------------
Fiddle with a URL and you can pop up and tell users to do anything Technical support scammers have new bait with the discovery that Microsofts Edge browser can be abused to display native and legitimate-looking warning messages.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/12/microsoft_e…
*** New Ransomware Offers The Decryption Keys If You Infect Your Friends ***
---------------------------------------------
MalwareHunterTeam has discovered "Popcorn Time," a new in-development ransomware with a twist. Gumbercules!! writes: "With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect two other people and have them pay the ransom in order to get a free key," writes Bleeping Computer. Infected victims are given a "referral code" and, if two people are infected by that code and pay up -- the original victim is given their...
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/BAJPIfARkR0/new-ransomware-…
*** Escaping a restricted shell ***
---------------------------------------------
help command outputs this list of available commands we can use, It's almost basically the web interface disguised as a shell session; Well not really but i'm sure you guys got the point. So let's begin with command substitution (a.k.a command injection) technique:...
---------------------------------------------
https://humblesec.wordpress.com/2016/12/08/escaping-a-restricted-shell/
*** Zcash, or the return of malicious miners ***
---------------------------------------------
Despite this dramatic drop from the initial values (which was anticipated), Zcash mining remains among the most profitable compared to other cryptocurrencies. This has led to the revival of a particular type of cybercriminal activity - the creation of botnets for mining. A few years ago, botnets were created for bitcoin mining, but the business all but died out after it became only marginally profitable.
---------------------------------------------
https://securelist.com/blog/research/76862/zcash-or-the-return-of-malicious…
*** 5 Questions to Ask your IoT Vendors; But Do Not Expect an Answer. ***
---------------------------------------------
1 - For how long, after I purchase a device, should I expect security updates?
2 - How will I learn about security updates?
3 - Can you share a pentest report for your device?
4 - How can I report vulnerabilities?
5 - If you use encryption, then disclose what algorithms you use and how it is implemented
---------------------------------------------
https://isc.sans.edu/diary/5+Questions+to+Ask+your+IoT+Vendors%3B+But+Do+No…
*** VB2016 paper: Modern attacks on Russian financial institutions ***
---------------------------------------------
Today, we publish the VB2016 paper and presentation (recording) by ESET researchers Jean-Ian Boutin and Anton Cherepanov, in which they look at sophisticated attacks against Russian financial institutions.
---------------------------------------------
https://www.virusbulletin.com/blog/2016/december/vb2016-paper-modern-attack…
*** Pentesting ICS Systems ***
---------------------------------------------
Security of ICS systems is one of the most critical issues of this last year. In this article, we will have a brief introduction to ICS systems, risks, and finally, methodology and tools to pentest ICS based systems Introduction Industrial control system (ICS) is a term that includes many types of control systems and instrumentation...
---------------------------------------------
http://resources.infosecinstitute.com/pentesting-ics-systems/
*** Ongoing Windows update bug woes affecting all ISPs ***
---------------------------------------------
Virgin also advising customers knocked offline An ongoing software update bug on Windows 8 and 10 appears affecting users of several UK ISPs, with Virgin Media the latest provider to admit the problem is knocking a number of its customers offline.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/12/ongoing_win…
*** Netgear-Router trivial angreifbar, noch kein Patch in Sicht ***
---------------------------------------------
Im Web-Interface einiger Netgear-Router klafft offenbar eine kritische Sicherheitslücke, die Angreifer leicht ausnutzen können, um Code mit Root-Rechten auszuführen. Schutz verspricht bisher nur ein unorthodoxer Weg: Man soll die Lücke selbst ausnutzen.
---------------------------------------------
https://heise.de/-3568679
*** DDoS tool encourages users to compete against each other for points ***
---------------------------------------------
Sledgehammer tool encourages hackers to launch DDoS attacks - but theres a sting in the tail
---------------------------------------------
https://nakedsecurity.sophos.com/2016/12/12/ddos-tool-encourages-users-to-c…
*** VU#582384: Multiple Netgear routers are vulnerable to arbitrary command injection ***
---------------------------------------------
Vulnerability Note VU#582384 Multiple Netgear routers are vulnerable to arbitrary command injection Original Release date: 09 Dec 2016 | Last revised: 09 Dec 2016 Overview Netgear R7000 and R6400 routers and possibly other models are vulnerable to arbitrary command injection. Description CWE-77: Improper Neutralization of Special Elements used in a Command (Command Injection) Netgear R7000, firmware version 1.0.7.2_1.1.93 and possibly earlier, and R6400, firmware version 1.0.1.6_1.0.4 and...
---------------------------------------------
http://www.kb.cert.org/vuls/id/582384
*** DSA-3730 icedove - security update ***
---------------------------------------------
Multiple security issues have been found in Icedove, Debians version ofthe Mozilla Thunderbird mail client: Multiple memory safety errors,same-origin policy bypass issues, integer overflows, buffer overflowsand use-after-frees may lead to the execution of arbitrary code ordenial of service.
---------------------------------------------
https://www.debian.org/security/2016/dsa-3730
*** Vuln: McAfee VirusScan Enterprise Multiple Security Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/94823
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: One vulnerability in IBM Java SDK affects IBM Application Delivery Intelligence v1.0.1 and v1.0.1.1 (CVE-2016-5597) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995653
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities may affect IBM SDK for Node.js ***
http://www.ibm.com/support/docview.wss?uid=swg21993007
---------------------------------------------
*** IBM Security Bulletin: Open Source Apache Tomcat Commons FileUpload Vulnerabilities affects Atlas Policy Suite (CVE-2016-3092) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995382
---------------------------------------------
*** IBM Security Bulletin: Potential Information Disclosure vulnerability in IBM MessageSight (CVE-2016-5986) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995246
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager appliances are affected by vulnerabilities in OpenSSH (CVE-2015-5352, CVE-2015-6563, CVE-2015-6564) ***
http://www.ibm.com/support/docview.wss?uid=swg21992610
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Tivoli Access Manager for e-business and IBM Security Access Manager for Web version 7 software (CVE-2016-3550, CVE-2016-3485) ***
http://www.ibm.com/support/docview.wss?uid=swg21993132
---------------------------------------------
*** IBM Security Bulletin: Open Redirect vulnerability in IBM MessageSight (CVE-2016-3040) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995247
---------------------------------------------
*** IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU - Apr 2016 - Includes Oracle Apr 2016 CPU affect for IBM Connections (CVE-2016-0264 ) ***
https://www-01.ibm.com/support/docview.wss?uid=swg21988365
---------------------------------------------
*** IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU - Apr 2016 - Includes Oracle Apr 2016 CPU affect Content Collector for Email (CVE-2016-0264) ***
https://www-01.ibm.com/support/docview.wss?uid=swg21988357
---------------------------------------------
*** IBM Security Bulletin: Information Disclosure in IBM MessageSight (CVE-2016-0378) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995238
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 07-12-2016 18:00 − Freitag 09-12-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Produktwarnung für Joomla! ***
---------------------------------------------
[...] In den Joomla! Versionen 3.4.4 bis einschließlich 3.6.4 wurde eine Sicherheitslücke entdeckt, die es einem Angreifer aus dem Internet ermöglicht, beliebigen Programmcode auszuführen und dadurch erheblichen Schaden auf einem betroffenen...
---------------------------------------------
https://www.bsi-fuer-buerger.de/SharedDocs/Warnmeldungen/DE/TW/warnmeldung_…
*** Root-Rechte durch Linux-Lücke ***
---------------------------------------------
Seit fünf Jahren klafft eine Lücke im Linux-Kernel, durch die sich lokale Nutzer erhöhte Rechte verschaffen können. Auch Android ist betroffen.
---------------------------------------------
https://heise.de/-3565365
*** Mobile Ransomware: Pocket-Sized Badness ***
---------------------------------------------
A few weeks ago, I spoke at Black Hat Europe 2016 on Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. While watching mobile ransomware from April 2015 to April 2016, I noticed a big spike in the number of Android ransomware samples. During that year, the number of Android ransomware increased by 140%. In certain areas, mobile ransomware accounts for up to 22 percent of mobile malware overall! (These numbers were obtained from the Trend Micro Mobile App...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/hPA6z0gnzFE/
*** Managed-Exchange-Dienst: Telekom-Cloud-Kunde konnte fremde Adressbücher einsehen ***
---------------------------------------------
Durch einen Konfigurationsfehler konnte ein Nutzer der Telekom-Cloud-Dienste kurzzeitig auf fremde Adressbücher zugreifen, darunter sollen auch Strafverfolgungsbehörden gewesen sein. Schuld war wohl ein Berechtigungsfehler im Exchange-Dienst. (Telekom, Datenschutz)
---------------------------------------------
http://www.golem.de/news/managed-exchange-dienst-telekom-cloud-kunde-konnte…
*** Crooks Start Deploying New "August" Infostealer ***
---------------------------------------------
During the month of November 2016, a cyber-crime group has started deploying a new malware family nicknamed "August," used mainly for information gathering and reconnaissance on the infected targets computer. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/crooks-start-deploying-new-a…
*** PowerShell threats surge: 95.4 percent of analyzed scripts were malicious ***
---------------------------------------------
Symantec analyzed 111 threat families that use PowerShell, finding that they leverage the framework to download payloads and traverse through networks.
---------------------------------------------
https://www.symantec.com/connect/blogs/powershell-threats-surge-954-percent…
*** Kaspersky Security Bulletin 2016. The ransomware revolution ***
---------------------------------------------
Between January and September 2016 ransomware attacks on business increased three-fold - to the equivalent of an attack every 40 seconds. With the ransomware-as-a-service economy booming, and the launch of the NoMoreRansom project, Kaspersky Lab has named ransomware its key topic for 2016.
---------------------------------------------
http://securelist.com/analysis/kaspersky-security-bulletin/76757/kaspersky-…
*** Banking Trojan Uses Gmail Popup to Extend Infection to Victims Android Phone ***
---------------------------------------------
A group of malware authors has come up with a new method of transcending an infection from the users computer to his Android smartphone. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/banking-trojan-uses-gmail-po…
*** Industriespionage: Wie Thyssenkrupp seine Angreifer fand ***
---------------------------------------------
Wie schützt man sein Netzwerk, wenn man 150.000 Mitarbeiter und 500 Tochterunternehmen hat? Thyssenkrupp lernte nach einem Angriff, dass es zwei Dinge braucht: Ausreichend Ressourcen und Freiheit für das Team.
---------------------------------------------
http://www.golem.de/news/industriespionage-wie-thyssenkrupp-seine-angreifer…
*** Now Mirai Has DGA Feature Built in ***
---------------------------------------------
Nearly 2 weeks ago, 2 new infection vectors (aka TCP ports of 7547 and 5555) were found being used to spread MIRAI malwares . My colleague Gensheng quickly set up some honeypots for that sort of vectors and soon had his harvests: 11 samples were captured on Nov 28th. Till now 53 unique samples have been captured by our honeypots from 6 hosting servers.
---------------------------------------------
http://blog.netlab.360.com/new-mirai-variant-with-dga/
*** Krypto-Trojaner: Lockys gieriger Bruder verlangt über 2000 Euro Lösegeld ***
---------------------------------------------
Nicht nur der Erpressungs-Trojaner GoldenEye ist derzeit ein Ärgernis, auch die Verwandschaft des berüchtigten Locky-Trojaners geht weiter auf Raubzug. Eine Osiris genannte Variante schlägt derzeit vermehrt zu und verlangt ein saftiges Lösegeld.
---------------------------------------------
https://heise.de/-3564812
*** Bugtraq: AST-2016-009: ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539888
*** Bugtraq: AST-2016-008: Crash on SDP offer or answer from endpoint using Opus ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539887
*** DFN-CERT-2016-2010: Sophos UTM: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-2010/
*** DFN-CERT-2016-1991: FreeBSD: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1991/
*** DSA-3729 xen - security update ***
---------------------------------------------
Multiple vulnerabilities have been discovered in the Xen hypervisor. TheCommon Vulnerabilities and Exposures project identifies the followingproblems:...
---------------------------------------------
https://www.debian.org/security/2016/dsa-3729
*** Cisco Email Security Appliance Content Filter Bypass Vulnerability ***
---------------------------------------------
A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device.The vulnerability is due to improper filtering of certain TAR format files that are attached to email messages. An attacker could exploit this vulnerability by sending an email message that has a crafted TAR file attachment through an affected device.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: libxml2 vulnerabilities CVE-2016-4447 and CVE-2016-4449 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/24/sol24322529.html?…
---------------------------------------------
*** Security Advisory: PHP vulnerability CVE-2016-6290 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/15/sol15850913.html?…
---------------------------------------------
*** Security Advisory: libarchive vulnerability CVE-2016-5844 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/24/sol24036027.html?…
---------------------------------------------
*** Security Advisory: PHP vulnerability CVE-2016-7126 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/40/sol40564589.html?…
---------------------------------------------
*** Security Advisory: OpenSSL vulnerability CVE-2016-6302 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/70/sol70844615.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1836 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/48/sol48220300.html?…
---------------------------------------------
*** Security Advisory: libarchive vulnerability CVE-2015-8932 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/90/sol90412202.html?…
---------------------------------------------
*** Security Advisory: libarchive vulnerability CVE-2016-5418 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/35/sol35246595.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1835 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/43/sol43314223.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1837 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/05/sol05937379.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1833 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/62/sol62030064.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1762 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/14/sol14338030.html?…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple security vulnerabilities affect Liberty for Java for IBM Bluemix (CVE-2016-5573, CVE-2016-5597, CVE-2016-5983) ***
http://www.ibm.com/support/docview.wss?uid=swg21994945
---------------------------------------------
*** IBM Security Bulletin: IBM i is affected by networking BIND vulnerabilities (CVE-2016-2775, CVE-2016-2776, CVE-2016-8864 and CVE-2016-6170) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021750
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect Power Hardware Management Console (CVE-2016-2180, CVE-2016-2182, CVE-2016-6306) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021733
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Tivoli Network Manager IP Edition 3.9 Fix Pack 4 HTTPS support for Perl Collector ***
http://www.ibm.com/support/docview.wss?uid=swg21990532
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in DHCP affect Power Hardware Management Console (‪CVE-2015-8605 and CVE-2016-2774‬‬) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021703
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities affect IBM Security AppScan Enterprise ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995118
---------------------------------------------
*** IBM Security Bulletin: Open Source Apache Tomcat , Commons FileUpload Vulnerabilities affecting IBM Algo Audit and Compliance (CVE-2016-3092) ***
http://www.ibm.com/support/docview.wss?uid=swg21993305
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Flex System Manager (FSM) Storage Manager Install Anywhere (SMIA) configuration tool ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024507
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Network Advisor (CVE-2016-3425, CVE-2016-3427, CVE-2016-0695). ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009640
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM b-type SAN switches and directors and IBM Network Advisor (CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-0702, CVE-2016-0704, CVE-2016-0704, CVE-2016-2842). ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009631
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in pConsole impacts AIX (CVE-2016-0266) ***
http://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Fabric Manager (CVE-2016-2183) ***
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099504
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Struts affects IBM Social Media Analytics (CVE-2016-4003) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994399
---------------------------------------------
*** IBM Security Bulletin: Apache Commons FileUpload Vulnerability affects IBM Rational ClearQuest (CVE-2016-3092) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993816
---------------------------------------------
*** IBM Security Bulletin:Vulnerabilities in OpenSSL affect IBM SONAS ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009648
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affects IBM Rational ClearCase (CVE-2016-2177, CVE-2016-2178, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6306) ***
http://www.ibm.com/support/docview.wss?uid=swg21993514
---------------------------------------------
*** IBM Security Bulletin: Tivoli Storage Manager (IBM Spectrum Protect) AIX Client Buffer Overflow (CVE-2016-5985) ***
http://www.ibm.com/support/docview.wss?uid=swg21993695
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in IBM Websphere affects IBM Tivoli Netcool Configuration Manager (ITNCM) (CVE-2016-5983) ***
http://www.ibm.com/support/docview.wss?uid=swg21992640
---------------------------------------------
*** IBM Security Bulletin: Multiple security vulnerabilities affect the Report Builder and Data Collection Component that are shipped with Jazz Reporting Service (CVE-2016-5898, CVE-2016-5899, CVE-2016-6054, CVE-2016-6047) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21991154
---------------------------------------------
*** IBM Security Bulletin: Multiple security vulnerabilities affect the Lifecycle Query Engine (LQE) that is shipped with Jazz Reporting Service (CVE-2016-5897, CVE-2016-6039) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21991153
---------------------------------------------
*** IBM Security Bulletin:Samba vulnerability issue on IBM Storwize V7000 Unified (CVE-2016-2119) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009567
---------------------------------------------
*** IBM Security Bulletin:Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2016-3092) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009566
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL, OpenVPN and GNU glibc affect IBM Security Virtual Server Protection for VMware ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 06-12-2016 18:00 − Mittwoch 07-12-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Onlinewerbung: Forscher stoppen monatelange Malvertising-Kampagne ***
---------------------------------------------
Über eine Malvertising-Kampagne ist in den vergangenen Monaten Schadcode verteilt worden. Die Macher des Stegano-Exploit-Kits versteckten dabei unsichtbare Pixel in Werbeanzeigen und nutzen Exploits in Flash und dem Internet Explorer.
---------------------------------------------
http://www.golem.de/news/onlinewerbung-forscher-stoppen-monatelange-malvert…
*** Petya-Variante: Goldeneye-Ransomware verschickt überzeugende Bewerbungen ***
---------------------------------------------
Kurz vor dem Jahresende gibt es erneut eine größere Ransomware-Kampagne in Deutschland. Kriminelle verschicken mit Goldeneye professionell aussehende Bewerbungen an Personalabteilungen - und nutzen möglicherweise Informationen des Arbeitsamtes.
---------------------------------------------
http://www.golem.de/news/petya-variante-goldeneye-ransomware-verschickt-ueb…
*** Kriminelle könnten Daten von Visa-Kreditkarten vergleichsweise einfach erraten ***
---------------------------------------------
In einer Studie zeigen Sicherheitsforscher, wie sie CVV-Nummern und andere Kreditkarten-Daten in wenigen Sekunden erraten und damit anschließend Geld überweisen.
---------------------------------------------
https://heise.de/-3564898
*** Flash Exploit Found in Seven Exploit Kits ***
---------------------------------------------
An Adobe Flash Player vulnerability used by the Sofacy APT gang was also found in seven of the top exploit kits, according to an analysis by Recorded Future.
---------------------------------------------
http://threatpost.com/flash-exploit-found-in-seven-exploit-kits/122284/
*** Explained: Domain Generating Algorithm ***
---------------------------------------------
Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same domain at a given time.Categories: Security world TechnologyTags: algorithmdgadomainDomain Generating AlgorithmgeneratinggenerationPieter Arntz(Read more...)
---------------------------------------------
https://blog.malwarebytes.com/security-world/2016/12/explained-domain-gener…
*** Attacking NoSQL applications, (Tue, Dec 6th) ***
---------------------------------------------
In last couple of years, the MEAN stack (MongoDB, Express.js, Angular.js and Node.js) became the stack of choice for many web application developers. The main reason for this popularity is the fact that the stack supports both client and server side programs written in JavaScript, allowing easy development. The core database used by the MEAN stack, MongoDB, is a NoSQL database program that uses JSON-like documents with dynamic schemas allowing huge flexibility. Although NoSQL databases are not...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21787&rss
*** MSRT December 2016 addresses Clodaconas, which serves unsolicited ads through DNS hijacking ***
---------------------------------------------
In this month's Microsoft Malicious Software Removal Tool (MSRT) release, we continue taking down unwanted software, the pesky threats that force onto our computers things that we neither want nor need. BrowserModifier:Win32/Clodaconas, for instance, displays ads when you're browsing the internet. It modifies search results pages so that you see unsolicited ads related to your...
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/12/06/msrt-december-2016-addr…
*** Unrestricted Backend Login Method Seen in OpenCart ***
---------------------------------------------
>From the attacker's perspective, creating ways to maintain access to a compromised website is desirable. This allows them to further distribute malware and perform different kinds of malicious activities. One of the ways attackers try to secure their access is by adding admin users, or pieces of malicious code throughout the site. This allows them to regain access easily, if needed. However, we recently found a unique way to achieve this kind of breach.
---------------------------------------------
https://blog.sucuri.net/2016/12/unrestricted-backend-login.html
*** Crims using anti-virus exclusion lists to send malware to where it can do most damage ***
---------------------------------------------
When vendors tell you what to whitelist, crims are reading too Advanced malware writers are using anti-virus exclusion lists to better target victims, researchers say.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/07/clever_crim…
*** Deep Analysis of the Online Banking Botnet TrickBot ***
---------------------------------------------
TrickBot aims at stealing online banking information from browsers when victims are visiting online banks. The targeted banks are from Australia, New Zealand, Germany, United Kingdom, Canada, United States, Israel, and Ireland, to name a few.
---------------------------------------------
http://blog.fortinet.com/2016/12/06/deep-analysis-of-the-online-banking-bot…
*** Debugging war story: the mystery of NXDOMAIN ***
---------------------------------------------
The following blog post describes a debugging adventure on Cloudflares Mesos-based cluster. This internal cluster is primarily used to process log file information so that Cloudflare customers have analytics, and for our systems that detect and respond to attacks.The problem encountered didnt have any effect on our customers,
---------------------------------------------
https://blog.cloudflare.com/debugging-war-story-the-mystery-of-nxdomain/
*** Popular smart toys violate children's privacy rights? ***
---------------------------------------------
My Friend Cayla and i-Que, two extremely popular "smart" toys manufactured by Los Angeles-based Genesis Toys, do not safeguard basic consumer (and children's) rights to security and privacy, researchers have found. The toys come with companion apps, and the latter use services by Nuance Communications, a company headquartered in Massachussetts that specializes in voice-and speech-recognition services for a variety of industries.
---------------------------------------------
https://www.helpnetsecurity.com/2016/12/07/smart-toys-privacy-rights/
*** Bugtraq: [ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539883
*** Security Advisory - Privilege Escalation Vulnerability in Some Huawei Storage Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-…
*** Security Advisory - Dirty COW Vulnerability in Huawei Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-…
*** Security Advisory - FRP Bypass Vulnerability in Huawei Smart Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-…
*** Tesla Gateway ECU Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a Gateway ECU vulnerability in Teslas Model S automobile.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-341-01
*** Locus Energy LGate Command Injection Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a command injection vulnerability in Locus Energy's LGate application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01-0
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: Python urllib and urllib2 library vulnerability CVE-2016-5699 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/10/sol10420455.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1839 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/26/sol26422113.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1840 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/14/sol14614344.html?…
---------------------------------------------
*** Security Advisory: PHP vulnerability CVE-2016-7127 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/89/sol89002224.html?…
---------------------------------------------
*** Security Advisory: PHP vulnerabilities CVE-2016-6288 and CVE-2016-6289 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/34/sol34985231.html?…
---------------------------------------------
*** Security Advisory: libxml2 vulnerability CVE-2016-1838 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/71/sol71926235.html?…
---------------------------------------------
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco AnyConnect Secure Mobility Client Local Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Web Security Appliance Drop Decrypt Policy Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Web Security Appliance HTTP URL Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Firepower Management Center Information Disclosure Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Unified Communications Manager IM and Presence Service Information Disclosure Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Prime Collaboration Assurance Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Identity Services Engine Cross-Site Scripting Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Identity Services Engine Active Directory Integration Component Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco IOS XR Software Default Credentials Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOS and Cisco IOS XE Software Zone-Based Firewall Feature Bypass Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco IOS XR Software HTTP 2.0 Request Handling Event Service Daemon Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOS and IOS XE Software SSH X.509 Authentication Bypass Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco IOS Frame Forwarding Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Intercloud Fabric Director Static Credentials Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Hybrid Media Service Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco FirePOWER Malware Protection Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Firepower Management Center and Cisco FireSIGHT System Software Malicious Software Detection Bypass Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco FireAMP Connector Endpoint Software Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Expressway Series Software Security Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Email Security Appliance SMTP Cross-Site Scripting Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Email Security Appliance and Web Security Appliance Content Filter Bypass Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Unified Communications Manager Unified Reporting Upload Tool Directory Traversal Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Unified Communications Manager Administration Page Cross-Site Scripting Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco ONS 15454 Series Multiservice Provisioning Platforms TCP Port Management Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Emergency Responder Directory Traversal Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Emergency Responder Cross-Site Request Forgery Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco IOx Application-Hosting Framework Directory Traversal Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Security Appliances AsyncOS Software Update Server Certificate Validation Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco ASR 5000 Series IKEv2 Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco ASR 5000 Series IPv6 Packet Processing Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
Next End-of-Shift report: 2016-12-09
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 05-12-2016 18:00 − Dienstag 06-12-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Dirty Cow Vulnerability Patched in Android Security Bulletin ***
---------------------------------------------
Todays Android Security Bulletin included a patch for the Dirty Cow vulnerability, a seven-year-old Linux bug that had yet to be patched by Google.
---------------------------------------------
http://threatpost.com/dirty-cow-vulnerability-patched-in-android-security-b…
*** BlackBerry powered by Android Security Bulletin - December 2016 ***
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?articleNumber=000038813
*** Arista CloudVision Portal bug revealed, plus evidence its been used ***
---------------------------------------------
You know the drill: face-palm, download, patch, grumble about state of security, relax Arista customers: if youre running a version of CloudVision Portal (CVP) older than 2016.1.2.1, get an update or risk getting p0wned.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/06/arista_clou…
*** Printer security is so bad HP Inc will sell you services to fix it ***
---------------------------------------------
Finally, FINALLY, someone is turning off Telnet and FTP Printer security is so awful HP Inc is willing to shut off shiny features and throw its own dedicated bodies at the perennial problem.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/06/printer_sec…
*** GNU Netcat 0.7.1 Out-Of-Bounds Write ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016120029
*** In the three years since IETF said pervasive monitoring is an attack, whats changed? ***
---------------------------------------------
IETF Security director Stephen Farrell offers a report card on evolving defences
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/06/ietf_report…
*** [2016-12-06] Backdoor vulnerability in Sony IPELA ENGINE IP Cameras ***
---------------------------------------------
Sony IPELA Engine IP Cameras contain multiple backdoors. Those backdoor accounts allow an attacker to run arbitrary code on the affected IP cameras. An attacker can use cameras to take a foothold in a network and launch further attacks, disrupt camera functionality, send manipulated images/video, add cameras into a Mirai-like botnet or spy on people.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2016…
*** DailyMotion anscheinend gehackt: 87,6 Millionen Nutzer betroffen ***
---------------------------------------------
Unbekannte Hacker sollen in das Server-System die Videoportals eingestiegen sein und neben E-Mail-Adressen auch geschützte Passwörter kopiert haben.
---------------------------------------------
https://heise.de/-3559563
*** Vuln: Joomla! Core CVE-2016-9836 Arbitrary File Upload Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94663
*** International Phone Fraud Tactics ***
---------------------------------------------
This article outlines two different types of international phone fraud.
---------------------------------------------
https://www.schneier.com/blog/archives/2016/12/international_p.html
*** Aufgepasst: Neuer Verschlüsselungstrojaner Goldeneye verbreitet sich rasant ***
---------------------------------------------
Ein bisher unbekannter Verschlüsselungstrojaner tarnt sich als Bewerbungs-E-Mail und versucht, Systeme in ganz Deutschland zu verschlüsseln. Momentan wird er von vielen Virenscannern noch nicht erkannt.
---------------------------------------------
https://heise.de/-3561396
*** Roundcube 1.2.2: Command Execution via Email ***
---------------------------------------------
In this post, we show how a malicious user can execute arbitrary commands on the underlying operating system remotely, simply by writing an email in Roundcube 1.2.2 (>= 1.0). This vulnerability is highly critical because all default installations are affected. We urge all administrators to update the Roundcube installation to the latest version 1.2.3 as soon as possible.
---------------------------------------------
https://blog.ripstech.com/2016/roundcube-command-execution-via-email/
*** Xen Security Advisory 199 (CVE-2016-9637) - qemu ioport array overflow ***
---------------------------------------------
hen qemu is used as a device model within Xen, io requests are generated by the hypervisor and read by qemu from a shared ring. The entries in this ring use a common structure, including a 64-bit address field, for various accesses, including ioport addresses. Xen will write only 16-bit address ioport accesses. However, depending on the Xen and qemu version, the ring may be writeable by the guest. If so, the guest can generate out-of-range ioport accesses, resulting in wild pointer accesses
---------------------------------------------
https://lists.xen.org/archives/html/xen-announce/2016-12/msg00001.html
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Fabric Manager. ***
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5099503
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail Security Affected By Open Source Linux Kernel Vulnerabilities (CVE-2016-5195) ***
http://www.ibm.com/support/docview.wss?uid=swg21994535
---------------------------------------------
*** IBM Security Bulletin: A busybox vulnerability affects IBM DataPower Gateways (CVE-2014-4607) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993006
---------------------------------------------
*** IBM Security Bulletin: Apache POI as used in IBM QRadar SIEM is vulnerable to various CVEs. ***
http://www.ibm.com/support/docview.wss?uid=swg21994719
---------------------------------------------
*** IBM Security Bulletin: Multiple Security Vulnerabilities in Expat affect IBM Netezza Analytics ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994401
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to various CGI vulnerabilities. (CVE-2016-5385, CVE-2016-5387, CVE-2016-5388) ***
http://www.ibm.com/support/docview.wss?uid=swg21994725
---------------------------------------------
*** IBM Security Bulletin: Open Source Apache Xerces-C XML parser vulnerabilities affect IBM Integration Bus and WebSphere Message Broker (CVE-2016-4463, CVE-2016-0729) ***
http://www.ibm.com/support/docview.wss?uid=swg21985691
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in libxml2 affects IBM Streams (CVE-2016-3705) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21991065
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in NTP and OpenSSL affect IBM Netezza Firmware Diagnostics Tools ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994484
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 02-12-2016 18:00 − Montag 05-12-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Bug des Tages: Forwarding issues related to MACs starting with a 4 or a 6 ***
---------------------------------------------
OK aber wieso sollte denn ausgerechnet 4 oder 6 am Anfang ein Problem sein? Weil bei IPv4 und IPv6 die Header mit der "Version" anfangen, die ersten vier Bits sind bei IPv4 immer 4 und bei IPv6 immer 6. Nun kommt der IP-Header nach dem Ethernet-Header, d.h. da gibt es an sich keine Verwechslungsgefahr. Du weißt ja, worauf du gerade guckst. Aber anscheinend haben da einige Hersteller versucht, "selbstdenkende" Geräte zu bauen, die sich die ersten 4 Bits angucken,...
---------------------------------------------
https://blog.fefe.de/?ts=a6bc62fc
*** Studie: Herzschrittmacher lassen sich leicht hacken ***
---------------------------------------------
Sicherheitsforscher aus Belgien und Großbritannien konnten mehrere verschiedene Modelle von Implantaten für Patienten mit Herzrhythmusstörungen aus der Ferne hacken.
---------------------------------------------
https://futurezone.at/digital-life/studie-herzschrittmacher-lassen-sich-lei…
*** Anti-Schnüffler-Tool SAMRi10 soll Windows-Netzwerke schützen ***
---------------------------------------------
Mit dem kostenlosen PowerShell-Skript sollen Admins Schnüfflern den Zutritt zum Security Account Manager effektiver versperren können.
---------------------------------------------
https://heise.de/-3550115
*** The Kings in Your Castle, Pt #4 ***
---------------------------------------------
Oftentimes, there is talk about a "sophisticated" malware-based attack against an individual or an organization. The prevalent assumption is that a great deal of development work has gone into the attack tools. In the 4th part of the article series, Marion Marschalek and Raphael Vinot will demonstrate what sophistication means and what it actually looks like.
---------------------------------------------
https://blog.gdatasoftware.com/2016/12/29343-the-kings-in-your-castle-pt-4
*** Identitätsdiebstahl mit gefälschter PayPal-Nachricht ***
---------------------------------------------
Mit einer gefälschten PayPal-Nachricht wollen Kriminelle die Identität von Empfänger/innen stehlen. Damit sie ihr Ziel erreichen, behaupten sie, dass das Unternehmen das fremde PayPal-Konto deaktiviert habe. Es könne dieses nur reaktiveren, wenn es eine Personalausweis-Kopie der Kund/innen erhalte. Das ist falsch.
---------------------------------------------
https://www.watchlist-internet.at/sonstiges/identitaetsdiebstahl-mit-gefael…
*** Putting security risks on simmer with Chef ***
---------------------------------------------
To remain PCI-compliant, I conduct quarterly security assessments of our infrastructure. This means external testing of our internet-facing PCI resources, using an approved scanning vendor (ASV), and what I call internal PCI full-population scans.Trouble TicketAt issue: Too many servers with too many different configurations make it tough to stay in compliance.Action plan: Use Chef and the CIS guidelines to ensure that servers are properly configured.We do the external scanning every month,...
---------------------------------------------
http://www.cio.com/article/3147055/security/putting-security-risks-on-simme…
*** Vuln: Alcatel-Lucent OmniVista 8770 CVE-2016-9796 Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94649
*** FortiOS Local Admin Password Hash Leak Vulnerability ***
---------------------------------------------
http://fortiguard.com/advisory/FG-IR-16-050
*** Bugtraq: CVE-2016-8740, Server memory can be exhausted and service denied when HTTP/2 is used ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539873
*** IBM Security Bulletin: Vulnerability in Apache Commons FileUpload affects IBM InfoSphere Information Server (CVE-2016-3092) ***
---------------------------------------------
An Apache Commons FileUpload vulnerability while processing file upload requests was addressed by IBM InfoSphere Information Server. CVE(s): CVE-2016-3092 Affected product(s) and affected version(s): The following product, running on all supported platforms, is affected: IBM InfoSphere Information Server: versions 8.5, 8.7, 9.1, 11.3, and 11.5 IBM InfoSphere Metadata Asset Manager: versions 8.7, 9.1, 11.3, and...
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21988564
*** IBM Security Bulletin: Vulnerability has been identified in IBM Cloud Orchestrator teamwork API (CVE-2016-0206 ) ***
---------------------------------------------
A potential denial of service vulnerability has been identified in IBM Cloud Orchestrator teamwork executeServiceByName API if an invalid URL is provided by local authenticated user. IBM Cloud Orchestrator, formerly known as IBM SmartCloud Orchestrator has addressed the issue. CVE(s): CVE-2016-0206 Affected product(s) and affected version(s): IBM Cloud Orchestrator V2.3, V2.3.0.1 V2.4, V2.4.0.1, V2.4.0.2 Refer...
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000141
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 01-12-2016 18:00 − Freitag 02-12-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** BitUnmap: Attacking Android Ashmem ***
---------------------------------------------
Posted by Gal Beniamini, Project ZeroThe law of leaky abstractions states that "all non-trivial abstractions, to some degree, are leaky". In this blog post we'll explore the ashmem shared memory interface provided by Android and see how false assumptions about its internal operation can result in security vulnerabilities affecting core system code.
---------------------------------------------
http://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-as…
*** Exploited Script in WordPress Theme Sends Spam ***
---------------------------------------------
As WordPress continues to grow in popularity, so does its library. New and experienced developers are creating themes and plugins - which creates diverse directories. While this is useful to the WordPress community, the nature of mass creation can account for coding errors and vulnerabilities. Even premium themes have security issues. We often find code that is developed with good intentions but without taking security measures into consideration.
---------------------------------------------
https://blog.sucuri.net/2016/12/exploited-script-wordpress-themes-send-spam…
*** Blockchain Technology Explained - An Executive Summary ***
---------------------------------------------
This article provides an executive summary on the Blockchain technology, what it is, how it works, and why everyone is excited about it.
---------------------------------------------
https://www.whitehatsec.com/blog/blockchain-technology/
*** [0day] Bypassing Apples System Integrity Protection ***
---------------------------------------------
Read how an attacker can bypass Apples SIP, via the local OS upgrade process
---------------------------------------------
https://objective-see.com/blog/blog_0x14.html
*** One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild ***
---------------------------------------------
Recently, Google researchers discovered a local privilege escalation vulnerability in Windows which was being used in zero-day attacks, including those carried out by the Pawn Storm espionage group. This is an easily exploitable vulnerability which can be found in all supported versions of Windows, from Windows 7 to Windows 10. By changing one bit, the attacker can elevate the privileges of a thread, giving administrator access to a process that would not have it under normal circumstances.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/bcdzgHcT2VE/
*** Protecting Powershell Credentials (NOT), (Fri, Dec 2nd) ***
---------------------------------------------
If youre like me, youve worked through at least one Powershell tutorial, class or even a how-to blog. And youve likely been advised to use the PSCredential construct to store credentials. The discussion usually covers that this a secure way to collect credentials, then store them in a variable for later use. You can even store them in a file and read them back later. Awesome - this solves a real problem you thought - or does it? For instance, to collect credentials for a VMware vSphere...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21779&rss
*** Remote management app exposes millions of Android users to hacking ***
---------------------------------------------
Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks.According to researchers from mobile security firm Zimperium, the AirDroid screen sharing and remote control application sends authentication information encrypted with a hard-coded key. This information could allow man-in-the-middle attackers to push out malicious AirDroid add-on updates, which would then gain the permissions of the app...
---------------------------------------------
http://www.cio.com/article/3146916/security/remote-management-app-exposes-m…
*** DFN-CERT-2016-1971: Google Chrome: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1971/
*** ZDI-16-617: Dell SonicWALL Universal Management Suite ImagePreviewServlet SQL Injection Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell SonicWALL Universal Management Suite. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-16-617/
*** F5 Security Advisory: Apache Tomcat vulnerability CVE-2016-6816 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/50/sol50116122.html?…
*** F5 Security Advisory: Apache Tomcat vulnerability CVE-2016-8735 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/49/sol49820145.html?…
*** USN-3148-1: Ghostscript vulnerabilities ***
---------------------------------------------
Ubuntu Security Notice USN-3148-11st December, 2016ghostscript vulnerabilitiesA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Ubuntu 12.04 LTSSummaryGhostscript could be made to crash, run programs, or disclose sensitiveinformation if it processed a specially crafted file.Software description ghostscript - PostScript and PDF interpreter DetailsTavis Ormandy discovered multiple vulnerabilities in the way that
---------------------------------------------
http://www.ubuntu.com/usn/usn-3148-1/
*** ICS-CERT Advisories ***
---------------------------------------------
*** Siemens SICAM PAS Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-01
---------------------------------------------
*** Moxa NPort Device Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02
---------------------------------------------
*** Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03
---------------------------------------------
*** Advantech SUSIAccess Server Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-04
---------------------------------------------
*** Smiths-Medical CADD-Solis Medication Safety Software Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSMA-16-306-01
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in PHP affect PowerKVM ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024545
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in the Linux kernel affect PowerKVM ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024478
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server October 2016 CPU (CVE-2016-5573, CVE-2016-5597) that is bundled with IBM WebSphere Application Server Patterns. ***
http://www.ibm.com/support/docview.wss?uid=swg21993759
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in redis affect PowerKVM (CVE-2015-4335, CVE-2013-7458) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024538
---------------------------------------------
*** IBM Security Bulletin: Authentication vulnerability affects IBM Integration Bus V10.0.0.4 onwards (CVE-2016-8918 ) ***
http://www.ibm.com/support/docview.wss?uid=swg21995079
---------------------------------------------
*** IBM Security Bulletin: The WebAdmin context for WebSphere Message Broker Version 8 allows directory listings (CVE-2016-6080) ***
http://www.ibm.com/support/docview.wss?uid=swg21995004
---------------------------------------------
*** IBM Security Bulletin: IBM Mobile Connect is vulnerable to the Sweet32: Birthday Attacks (CVE-2016-2183) ***
http://www.ibm.com/support/docview.wss?uid=swg21994927
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Process Designer used in IBM Business Process Manager and WebSphere Lombardi Edition (CVE-2016-5573, CVE-2016-5597, CVE-2016-3485) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994297
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Apache Tomcat affect SAN Volume Controller, Storwize family and FlashSystem V9000 products ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009581
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSource libxml2 affect IBM Security Guardium (CVE-2016-2073) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984606
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 30-11-2016 18:00 − Donnerstag 01-12-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** 0-Day: Tor und Firefox patchen ausgenutzten Javascript-Exploit ***
---------------------------------------------
Tor und Mozilla haben schnell reagiert und veröffentlichen einen außerplanmäßigen Patch für eine kritische Sicherheitslücke. Der Fehler lag in einer Animationsfunktion für Vektorgrafiken.
---------------------------------------------
http://www.golem.de/news/0-day-tor-und-firefox-patchen-kritische-schwachste…
*** Avalanche Takedown ***
---------------------------------------------
Am 30. November 2016 wurde durch ein breit angelegte Kooperation von Polizei (Europol, Eurojust, FBI, ...), Staatsanwälten und IT Sicherheitsorganisationen (BSI, Shadowserver, CERTs) das Avalanche Botnet übernommen. Die Zahlen von Shadowserver sind eindrucksvoll:...
---------------------------------------------
http://www.cert.at/services/blog/20161201172722-1851.html
*** IBM warns of rising VoIP cyberattacks ***
---------------------------------------------
Cyber-attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months, according to a report from IBM's Security Intelligence group this week."SIP is one of the most commonly used application layer protocols in VoIP technology... we found that there has been an upward trend in attacks targeting the SIP protocol, with the most notable uptick occurring in the second...
---------------------------------------------
http://www.cio.com/article/3146209/security/ibm-warns-of-rising-voip-cybera…
*** Shamoon 2: Return of the Disttrack Wiper ***
---------------------------------------------
In August 2012, an attack campaign known as Shamoon targeted a Saudi Arabian energy company to deliver a malware called Disttrack. Disttrack is a multipurpose tool that exhibits worm-like behavior by attempting to spread to other systems on a local network using stolen administrator credentials. More importantly, its claim to fame is the ability to destroy data and to render infected systems unusable. The attack four years ago resulted in 30,000 or more systems being damaged. Last week, Unit 42...
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-…
*** Fatal flaws in ten pacemakers make for Denial of Life attacks ***
---------------------------------------------
Brit/Belgian research team decipher signals and devise wounding wireless attacks A global research team has hacked 10 different types of implantable medical devices and pacemakers finding exploits that could allow wireless remote attackers to kill victims.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/01/denial_of_l…
*** New SmsSecurity Variant Roots Phones, Abuses Accessibility Features and TeamViewer ***
---------------------------------------------
In January of 2016, we found various "SmsSecurity" mobile apps that claimed to be from various banks. Since then, weve found some new variants of this attack that add new malicious capabilities. These capabilities include: anti-analysis measures, automatic rooting, language detection, and remote access via TeamViewer. In addition, SmsSecurity now cleverly uses the accessibility features of Android to help carry out its routines in a stealthy manner, without interaction from the...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/ckweihUN7n8/
*** SAMRi10: Windows 10 hardening tool for thwarting network recon ***
---------------------------------------------
Microsoft researchers Itay Grady and Tal Be'ery have released another tool to help admins harden their environment against reconnaissance attacks: SAMRi10 (pronounced "Samaritan"). User2 (non-admin) gets access denied by SAMRi10 when calling Net User remotely to a hardened Domain Controller Both the Net Cease tool they released in October and SAMRi10 are simple PowerShell scripts and are aimed at preventing attackers that are already inside a corporate network from mapping it...
---------------------------------------------
https://www.helpnetsecurity.com/2016/12/01/samri10-windows-10-hardening/
*** Security Notice - Statement on Newsmth.net Forum Revealing Security Issue in Huawei P9 Smart Phone ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2016/huawei-sn-20161130-01-…
*** USN-3141-1: Thunderbird vulnerabilities ***
---------------------------------------------
Ubuntu Security Notice USN-3141-130th November, 2016thunderbird vulnerabilitiesA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Ubuntu 12.04 LTSSummarySeveral security issues were fixed in Thunderbird.Software description thunderbird - Mozilla Open Source mail and newsgroup client DetailsChristian Holler, Jon Coppeard, Olli Pettay, Ehsan Akhgari, Gary Kwong,Tooru Fujisawa, and Randell Jesup discovered multiple memory safety...
---------------------------------------------
http://www.ubuntu.com/usn/usn-3141-1/
*** Security Advisories Relating to Symantec Products - Norton App Lock Bypass ***
---------------------------------------------
Symantec has addressed an issue where on some Android devices, Norton App Lock could have been bypassed, which could have allowed locked applications to be opened.
---------------------------------------------
https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=s…
*** OpenAFS Security Advisory 2016-003 ***
---------------------------------------------
Due to incomplete initialization or clearing of reused memory, OpenAFS directory objects are likely to contain "dead" directory entry information. This extraneous information is not active - that is, it is logically invisible to the fileserver and client. However, the leaked information is physically visible on the fileserver vice partition,...
---------------------------------------------
https://www.openafs.org/pages/security/OPENAFS-SA-2016-003.txt
*** Bugtraq: [security bulletin] HPSBHF03682 rev.1 - HPE Comware 7 Network Products using SSL/TLS, Local Gain Privileged Access ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539855
*** Bugtraq: [security bulletin] HPSBGN03677 rev.1 - HPE Network Automation using RPCServlet and Java Deserialization, Remote Code Execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539857
*** Bugtraq: [security bulletin] HPSBGN03680 rev.1 - HPE Propel, Local Denial of Service (DoS), Escalation of Privilege ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539863
*** Bugtraq: [security bulletin] HPSBUX03665 rev.3 - HP-UX Tomcat-based Servlet Engine, Remote Denial of Service (DoS), URL Redirection ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539864
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in wget affects PowerKVM ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024556
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in DHCP affects PowerKVM (CVE-2016-5410) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024551
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in krb5 affect PowerKVM (CVE-2016-3119, CVE-2016-3120) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024550
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in util-linux affects PowerKVM (CVE-2016-5011) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024543
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in powerpc-utils-python affects PowerKVM (CVE-2014-8165) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024540
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in fontconfig affects PowerKVM (CVE-2016-5384) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024533
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in sudo affects PowerKVM (CVE-2016-7091) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024532
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in Python-RSA affects PowerKVM (CVE-2016-1494) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024409
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in bind affect PowerKVM (CVE-2016-2776, CVE-2016-8864) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024402
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect PowerKVM ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024401
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 29-11-2016 18:00 − Mittwoch 30-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Kritische Sicherheitslücke in Mozilla Firefox - aktiv ausgenützt - keine Patches verfügbar ***
---------------------------------------------
Wie in diversen Medien berichtet wird, gibt es eine kritische Sicherheitslücke in aktuellen Versionen des Mozilla Firefox Browsers, für die noch kein Patch zur Verfügung steht. Diese wird auch bereits aktiv ausgenützt.
---------------------------------------------
https://cert.at/warnings/all/20161130.html
*** Port 7547 in Österreich ***
---------------------------------------------
seit meinem letzten Blogpost zu Mirai/TR-069 sind ein paar neue Informationen dazugekommen
---------------------------------------------
https://cert.at/services/blog/20161130165710-1834.html
*** Ask Sucuri: Can Your cPanel Page Be Maliciously Redirected? ***
---------------------------------------------
Many webmasters may not be aware that hackers are able to maliciously redirect cPanel pages. The specific tactic we describe in this article is unique. Included are recommendations to prevent it, along with other suspicious issues, through logs kept on cPanel servers.
---------------------------------------------
https://blog.sucuri.net/2016/11/ask-sucuri-can-cpanel-page-maliciously-redi…
*** Vuln: Dell iDRAC7 and iDRAC8 Devices CVE-2016-5685 Code Injection Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94585
*** Emerson Liebert SiteScan XML External Entity Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for an XML External Entity vulnerability affecting Emerson's Liebert SiteScan application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-334-01
*** Emerson DeltaV Easy Security Management Application Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a vulnerability that affects Emerson's DeltaV Easy Security Management application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-334-02
*** Emerson DeltaV Wireless I/O Card Open SSH Port Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a vulnerability in the Emerson DeltaV Wireless I/O Card.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-334-03
*** Security Advisory: BIG-IP FastL4 profile vulnerability ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/36/sol36300805.html?…
*** Security Advisory - XSS Vulnerability in Huawei eSpace IAD ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161130-…
*** Security Advisory - DoS Vulnerability in Huawei Switches ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161130-…
*** DFN-CERT-2016-1960/">Apache Subversion: Eine Schwachstelle ermöglicht Denial-of-Service-Angriffe ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1960/
*** Security Advisory - Command Injection Vulnerability in Huawei FusionAccess ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161130-…
*** GCHQ presents CyberChef, an Open Source Data Analysis Tool ***
---------------------------------------------
The GCHQ has released the code of a new open source web tool dubbed CyberChef, specifically designed for analyzing and decoding data.
---------------------------------------------
http://securityaffairs.co/wordpress/53908/intelligence/gchq-cyberchef.html
*** Multiple I-O DATA network camera products multiple vulnerabilities ***
---------------------------------------------
Multiple network camera products provided by I-O DATA DEVICE, INC. contain multiple vulnerabilities.
---------------------------------------------
http://jvn.jp/en/jp/JVN25059363/
*** New Cerber Variant Leverages Tor2Web Proxies, Google Redirects ***
---------------------------------------------
Researchers have discovered that criminals behind the latest Cerber ransomware variant are leveraging Google redirects and Tor2Web proxies in a new and novel way to evade detection.
---------------------------------------------
http://threatpost.com/new-cerber-variant-leverages-tor2web-proxies-google-r…
*** An overview of the Payment Card Industry (PCI) ***
---------------------------------------------
The payment card industry consists of all the organizations which store, process and transmit cardholder data and carry transactions through debit and credit cards. Many standards are developed to conduct these types of services in a secure way. The well-known standard for this purpose is Payment Card Industry Data Security Standards.
---------------------------------------------
http://resources.infosecinstitute.com/an-overview-of-the-payment-card-indus…
*** Großstörung bei der Telekom: Was wirklich geschah ***
---------------------------------------------
Ein Sicherheitsexperte hat die Reaktion eines der anfälligen Speedport-Modelle analysiert und kommt zu einer überraschenden Erkenntnis: Die Geräte waren gar nicht anfällig für die TR-069-Sicherheitslücke.
---------------------------------------------
https://heise.de/-3520212
*** GET pwned: Web CCTV cams can be hijacked by single HTTP request ***
---------------------------------------------
An insecure web server embedded in more than 35 models of internet-connected CCTV cameras leaves countless devices wide open to hijacking, it is claimed.
---------------------------------------------
http://www.theregister.co.uk/2016/11/30/iot_cameras_compromised_by_long_url/
*** Vuln: OpenJPEG CVE-2016-9675 Incomplete Fix Multiple Remote Heap Based Buffer Overflow Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/94589
*** Cobalt Malware Threatens ATM Security ***
---------------------------------------------
The hackers typically initiated the malware infection through phishing and spearphishing attacks. They sent malware laced emails to employees working at the banks. If some how a cyber security naive-employee clicked on a malicious link in an email or opened an attachment then their system would get infected.
---------------------------------------------
https://blog.comodo.com/malware/cobalt-malware-threatens-atm-security/
*** Android-Malware Gooligan soll über 1 Million Google-Konten gekapert haben ***
---------------------------------------------
Der Tojaner soll Smartphones rooten und Authentifizierungs-Tokens von Google-Accounts kopieren. Über einen Online-Service kann man prüfen, ob das eigene Konto betroffen ist.
---------------------------------------------
https://heise.de/-3520778
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSH affects IBM i (CVE-2016-8858) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021734
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in SSL affect IBM DataPower Gateways ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992996
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM Worklight and IBM MobileFirst Platform Foundation ***
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000213
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities affect IBM Domino & IBM iNotes ***
http://www.ibm.com/support/docview.wss?uid=swg21992835
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Struts affects IBM Social Media Analytics (CVE-2016-0785) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994386
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 28-11-2016 18:00 − Dienstag 29-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Bruce Schneier zur Netz-Sicherheit: "Die Ära von Spaß und Spielen ist vorbei" ***
---------------------------------------------
Der renommierte Sicherheits-Experte warnte auf dem Security-Kongress der Telekom vor einer grenzenlosen Vernetzung. Staatliche Regulierung sei unausweichlich.
---------------------------------------------
https://www.heise.de/newsticker/meldung/Bruce-Schneier-zur-Netz-Sicherheit-…
*** PayPal Fixes OAuth Token Leaking Vulnerability ***
---------------------------------------------
PayPal fixed an issue that could have allowed an attacker to hijack OAuth tokens associated with any PayPal OAuth application. The vulnerability was publicly disclosed on Monday by Antonio Sanso, a senior software engineer at Adobe, after he came across the issue while testing his own OAuth client.
---------------------------------------------
http://threatpost.com/paypal-fixes-oauth-token-leaking-vulnerability/122136/
*** Vuln: WordPress Image Gallery Plugin HTML Injection Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94565
*** A Rowhammer ban-hammer for all, and its all in software ***
---------------------------------------------
Sorry to go all MC Hammer on you, but boffins tell bit-flippers you cant touch this A group of German researchers reckon theyve cracked a pretty hard nut indeed: how to protect all x86 architectures from the 'Rowhammer' memory bug.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/11/29/a_rowhammer…
*** Tenda / D-Link / TP-Link DHCP Cross Site Scripting ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110233
*** Every Windows 10 in-place Upgrade is a SEVERE Security risk ***
---------------------------------------------
[...] There is a small but CRAZY bug in the way the "Feature Update" (previously known as "Upgrade") is installed. The installation of a new build is done by reimaging the machine and the image installed by a small version of Windows called Windows PE (Preinstallation Environment).
---------------------------------------------
http://blog.win-fu.com/2016/11/every-windows-10-in-place-upgrade-is.html
*** F-Secure: QUICK TIP: How To Make Your Passwords Uncrackable ***
---------------------------------------------
TL;DR: 'The trick is to use a really long random password for each online account,' he tells us. 'The password length should be at least 20 symbols and numbers, but preferably 32.'
---------------------------------------------
https://safeandsavvy.f-secure.com/2016/09/14/quick-tip-how-to-make-your-pas…
*** Azure Security Best Practices ***
---------------------------------------------
Moving applications and workloads to the cloud is a big draw for organizations, primarily due to the favorable economics, ease of deployment, and the flexibility and scale that the cloud provides. Microsoft Azure is one cloud platform seeing rising adoption in the past year. You may be contemplating moving workloads to Azure, particularly if you are a Microsoft shop. But like most organizations moving to the cloud, you are probably concerned about the security of your Azure environment.
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/azure-security-best-pr…
*** TYPO3 CMS 7.6.14 released ***
---------------------------------------------
This version is a regression fix release for TYPO3 CMS 7.6.13 concerning the usage of the Composer mode with additional third party PHP libraries. This version contains bugfixes concerning Composer only.
---------------------------------------------
https://typo3.org/news/article/typo3-cms-7614-released/
*** Kontonummern und E-Mail: Daten von Mitfahrgelegenheit.de gestohlen ***
---------------------------------------------
Kontonummern und E-Mail-Adressen von ehemaligen Nutzern betroffen - Wenige Österreicher betroffen
---------------------------------------------
http://derstandard.at/2000048456695
*** TR-069 NewNTPServer Exploits: What we know so far, (Tue, Nov 29th) ***
---------------------------------------------
[This is a cleaned up version to summarize yesterdays diary about the attacks against DSL Routers] What is TR-069 TR-069 (or its earlier version TR-064) is a standard published by the Broadband Forum. The Broadband Forum is an industry organization defining standards used to manage broadband networks. It focuses heavily on DSL type modems and more recently included fiber optic connections. TR stands for Technical Report. TR-069 is considered the Broadband Forums Flagship Standard.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21763&rss
*** Security Advisory: BIG-IP SPDY and HTTP/2 profile vulnerability CVE-2016-7475 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/01/sol01587042.html?…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Development Package for Apache Spark ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994185
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in IBM Java Runtime affect WebSphere Dashboard Framework (CVE-2016-5573, CVE-2016-5597) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994184
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in IBM Java SDK and IBM Java Runtime affect Web Experience Factory (CVE-2016-5573, CVE-2016-5597) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994181
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities may affect IBM SDK, Java Technology Edition ***
https://www-01.ibm.com/support/docview.wss?uid=swg21985393
---------------------------------------------
*** IBM Security Bulletin: Multiple OpenSource Expat XML Vulnerabilities affect IBM DB2 Net Search Extender for Linux, Unix and Windows ***
http://www.ibm.com/support/docview.wss?uid=swg21992933
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect WebSphere Extreme Scale (CVEs-2016-3485) ***
http://www.ibm.com/support/docview.wss?uid=swg21993946
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect WebSphere Message Broker and IBM Integration Bus ( CVE-2016-2107,CVE-2016-2176) ***
http://www.ibm.com/support/docview.wss?uid=swg21992894
---------------------------------------------
*** IBM Security Bulletin: IBM Integration Bus and WebSphere Message Broker, upon installation, set incorrect permissions for an object ( CVE-2016-0394 ) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985013
---------------------------------------------
*** IBM Security Bulletin: Vulnerability has been identified in View All User Domain Tasks of IBM Cloud Orchestrator (CVE-2016-0202 ) ***
http://www.ibm.com/support/docview.wss?uid=swg2C1000134
---------------------------------------------
*** IBM Security Bulletin: FileNet Workplace XT can be affected by the File Extension validation vulnerability (CVE-2016-8921) ***
http://www.ibm.com/support/docview.wss?uid=swg21994018
---------------------------------------------
*** IBM Security Bulletin: Multiple Mozilla Firefox vulnerability issues in IBM Storwize V7000 Unified. ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009589
---------------------------------------------
*** IBM Security Bulletin: GPFS security vulnerabilities in IBM Storwize V7000 Unified (CVE-2016-2985 and CVE-2016-2984) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009324
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 25-11-2016 18:00 − Montag 28-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Mirai goes TR-069 ***
---------------------------------------------
Zu Mirai hab ich hier schon viel geschrieben. Bis jetzt hat sich dieses Botnet rein über das Erraten von Passwörtern auf Telnet-Interfaces weiterverbreitet. Das hat sich jetzt geändert: Am 7. November hat jemand einen Proof-of-concept exploit für ein CPE (Customer premise equipment -- also DSL-Modem, Kabelmodem & co) veröffentlicht, der zeigt, wie man per TR-069 dem Gerät Schadsoftware unterschieben kann.
---------------------------------------------
http://www.cert.at/services/blog/20161128173929-1823.html
*** DSA-3725 icu - security update ***
---------------------------------------------
Several vulnerabilities were discovered in the International Componentsfor Unicode (ICU) library.
---------------------------------------------
https://www.debian.org/security/2016/dsa-3725
*** [2016-11-28] Denial of service & heap-based buffer overflow in Guidance Software EnCase Forensic ***
---------------------------------------------
EnCase Forensic Imager and the EnCase Forensic suite are widely used by computer forensic experts to analyze hard disks. Due to flaws in these products an attacker could manipulate a hard disk to keep an investigator from fully analyzing it (denial of service). Potentially, an attacker could execute malicious code on the investigators machine.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2016…
*** DFN-CERT-2016-1949/">ImageMagick: Mehrere Schwachstellen ermöglichen u.a. Denial-of-Service-Angriffe ***
---------------------------------------------
Mehrere Schwachstellen in ImageMagick ermöglichen einem entfernten, nicht authentisierten Angreifer die Durchführung verschiedener Denial-of-Service (DoS)-Angriffe sowie das Ausspähen von Informationen.
Debian stellt für die Distribution Debian Jessie (stable) ein Sicherheitsupdate bereit.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1949/
*** Erpressungs-Trojaner: Locky setzt auf .zzzzz-Endung, Cerber geht in Version 5.0.1 um ***
---------------------------------------------
Kriminelle sollen Berichten nach aktuell neue Versionen von Cerber und Locky verbreiten. Vorsicht: Viele Viren-Wächter springen offensichtlich noch nicht auf Cerber an.
---------------------------------------------
https://heise.de/-3506049
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 24-11-2016 18:00 − Freitag 25-11-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Kriminelle bieten Mirai-Botnetz mit 400.000 IoT-Geräten zur Miete an ***
---------------------------------------------
Was macht das Mirai-Botnetz gerade? Die beiden Sicherheitsforscher mit den Pseudonymen 2sec4u und MalwareTech überwachen das Mirai-Botnetz und teilen aktuelle Aktivitäten via Twitter und eine Webseite. Aus der Live Map der Webseite geht hervor, dass bislang über die ganze Welt verteilt insgesamt mehr als 3 Millionen Geräte im Mirai-Botnetz gefangen waren. In den letzten 24 Stunden waren es knapp unter 100.000.
---------------------------------------------
https://www.heise.de/security/meldung/Kriminelle-bieten-Mirai-Botnetz-mit-4…
*** Gehackte Zugänge: Kriminelle versenden Malware mit Mailchimp-Accounts ***
---------------------------------------------
Kriminelle nutzen offenbar übernommene Mailchimp-Accounts, um Malware zu verbreiten. Das geschieht vor allem über Mails mit angeblichen Rechnungen. Alle 2.000 betroffenen Accounts wurden vorläufig stillgelegt.
---------------------------------------------
http://www.golem.de/news/gehackte-zugaenge-kriminelle-versenden-malware-mit…
*** Locky hidden in image file hitting Facebook, LinkedIn users ***
---------------------------------------------
Malware masquerading as an image file is still spreading on Facebook, LinkedIn, and other social networks. Check Point researchers have apparently discovered how cyber crooks are embedding malware in graphic and image files, and how they are executing the malicious code within these images to infect social media users with Locky ransomware variants. The attackers exploit a misconfiguration on the social media infrastructure to deliberately force their victims to download the image file.
---------------------------------------------
https://www.helpnetsecurity.com/2016/11/25/locky-image-file-facebook-linked…
*** The Week in Ransomware - November 25th 2016 - Locky, Decryptors, Cerber, Open Source Ransomware sucks, and More ***
---------------------------------------------
Lots of ransomware stories this week. We have two new decryptors, quite a few new ransomware infections, PadCrypt being hidden inside a fake credit card generator, and a few new variants. The biggest news is two new variants of the Locky ransomware that append the .zzzzz and .aesir extensions for encrypted files. [...]
---------------------------------------------
http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-novemb…
*** Free Software Quick Security Checklist, (Fri, Nov 25th) ***
---------------------------------------------
Free software (open source or not) is interesting for many reasons. It can be adapted to your own needs, it can be easily integrated within complex architectures but the most important remains, of course, the price. Even if they are many hidden costs related to free software. In case of issues, a lot of time may be spent in searching for a solution or diving into the source code (and everybody knows that time is money!). Today, more and more organisationsare not afraid anymore to deployfree...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21751&rss
*** DFN-CERT-2016-1945: phpMyAdmin: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebiger SQL-Befehle ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1945/
*** Security Advisory - Buffer Overflow Vulnerability in Huawei Firewall Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161125-…
*** Citrix XenServer Multiple Security Updates ***
---------------------------------------------
A number of security vulnerabilities have been identified in Citrix XenServer that may allow malicious code running within a guest VM to compromise the host. These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 7.0. CVE-2016-9379, CVE-2016-9380, CVE-2016-9381, CVE-2016-9382, CVE-2016-9383, CVE-2016-9385, CVE-2016-9386
---------------------------------------------
https://support.citrix.com/article/CTX218775
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 23-11-2016 18:00 − Donnerstag 24-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Don't let this Black Friday/Cyber Monday spam deliver Locky ransomware to you ***
---------------------------------------------
We see it every year: social engineering attacks that take advantage of the online shopping activities around Black Friday and Cyber Monday, targeting customers of online retailers. This year, we're seeing a spam campaign that Amazon customers need to be wary of.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/11/23/dont-let-this-black-fri…
*** LXC CVE-2016-8649 Directory Traversal Vulnerability ***
---------------------------------------------
An attacker can exploit this issue using directory-traversal characters (../) to access or read arbitrary files that contain sensitive information or to access files outside of the restricted directory to obtain sensitive information and perform other attacks.
---------------------------------------------
http://www.securityfocus.com/bid/94498/info
*** Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability ***
---------------------------------------------
Multiple Samsung Galaxy products are prone to a security-bypass vulnerability. An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Samsung Galaxy devices with Marshmallow 6.0 are vulnerable.
---------------------------------------------
http://www.securityfocus.com/bid/94494/info
*** w3m Multiple Security Vulnerabilities ***
---------------------------------------------
Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. Versions prior to w3m 0.5.3-33 are vulnerable.
---------------------------------------------
http://www.securityfocus.com/bid/94464/discuss
*** Research on unsecured Wi-Fi networks across the world ***
---------------------------------------------
We compared the situation with Wi-Fi traffic encryption in different countries using data from our threat database. We counted the number of reliable and unreliable networks in each country that has more than 10 thousand access points known to us
---------------------------------------------
https://securelist.com/blog/research/76733/research-on-unsecured-wi-fi-netw…
*** DFN-CERT-2016-1942/">RealNetworks RealPlayer: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ***
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann eine Schwachstelle im RealPlayer ausnutzen, mit Hilfe einer schädlichen präparierten QCP-Mediendatei, zu deren Wiedergabe er einen Benutzer verleitet, um einen Denial-of-Service (DoS)-Angriff durchzuführen.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1942/
*** Windows-Update für Secure-Boot-Fehler macht BIOS-Updates erforderlich ***
---------------------------------------------
Mit dem Patch 3193479 beziehungsweise 3200970 für aktuelle Windows-(Server-)Versionen korrigiert Microsoft einen Bug in UEFI Secure Boot, doch einige Server starten danach nicht mehr.
---------------------------------------------
https://heise.de/-3503589
*** Diagnosing cyber threats for smart hospitals ***
---------------------------------------------
ENISA presents a study that sets the scene on information security for the adoption of IoT in Hospitals. The study which engaged information security officers from more than ten hospitals across the EU, depicts the smart hospital ICT ecosystem; and through a risk based approach focuses on relevant threats and vulnerabilities, analyses attack scenarios, and maps common good practices.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/diagnosing-cyber-threats-for-sm…
*** Security Advisory: PHP vulnerability CVE-2016-6288 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/71/sol71814571.html?…
*** Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016 ***
---------------------------------------------
Multiple Cisco products incorporate a version of the Network Time Protocol daemon (ntpd) package. Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or modify the time being advertised by a device acting as a Network Time Protocol (NTP) server.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 22-11-2016 18:00 − Mittwoch 23-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** The November 2016 issue of our SWITCH Security Report is available! ***
---------------------------------------------
The topics covered in this report are:
* IT security researchers reveal vulnerabilities in photoTAN procedure for mobile banking
* DDoS attack via IoT botnet shuts down parts of Internet
* Triple record: Yahoo loses half a billion customers’ details, more trust than ever and USD 1 billion from its acquisition price
---------------------------------------------
https://securityblog.switch.ch/2016/11/23/the-november-2016-issue-of-our-sw…
*** Securing Drupal with ModSecurity and the Core Rule Set (CRS3) ***
---------------------------------------------
Here is a guide aimed at the Drupal community to learn how to work with ModSecurity. OWASP ModSecurity Core Rule Set is a horrible name for a project, that's why we speak of CRS3. This is a security project and for those not familiar with the CRS, I will first give a brief intro first.
---------------------------------------------
https://www.netnea.com/cms/2016/11/22/securing-drupal-with-modsecurity-and-…
*** DomainTools 101: How to Spot Phishy Domains on Cyber Monday ***
---------------------------------------------
Just as the Grumeti River in Tanzania harbors dangerous crocodiles just below its surface, a Phishing email usually contains malicious domains waiting for you to click. I read a great article by Bleeping Computer about finding some Google domains that were spoofed using what is known as small caps. This piqued my curiosity ...
---------------------------------------------
https://blog.domaintools.com/2016/11/domaintools-101-how-to-spot-phishy-dom…
*** [DSA 3722-1] vim security update ***
---------------------------------------------
CVE ID : CVE-2016-1248 Florian Larysch and Bram Moolenaar discovered that vim, an enhanced vi editor, does not properly validate values for the the filetype, syntax and keymap options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
---------------------------------------------
https://lists.debian.org/debian-security-announce/2016/msg00305.html
*** Mapping Attack Methodology to Controls, (Wed, Nov 23rd) ***
---------------------------------------------
Recently weve seen lots of malicious documents make it through our first protection layers. (https://www.virustotal.com/en/file/79ff976c5ca6025f3bb90ddfa7298286217c2130…) . In the last week, these emails have a word document that spawns a command shell that kicks off a PowerShell script. When working incidents, it is important to map out the attacker lifecycle to determine where to improve your defenses.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21749&rss
*** Telegram API ransomware wrecked three weeks after launch ***
---------------------------------------------
Crypto so bad that getting around it is shooting fish in a barrel Ransomware scum abusing the protocol of the popular Telegram encrypted chat app have been wrecked and their malware ransom system decrypted.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/11/23/owned_teleg…
*** Vuln: TP-LINK TL-WA5210G Buffer Overflow and Information Disclosure Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/94481
*** Pentest-Report cURL 08.2016 [PDF] ***
---------------------------------------------
This report documents findings of a source code audit dedicated to assessing the cURL software. The assessment of the tool was performed by Cure53 as part of the Mozilla's Secure Open Source track program. The results of the project encompass twenty-three security-relevant discoveries.
---------------------------------------------
https://wiki.mozilla.org/images/a/aa/Curl-report.pdf
*** Acunetix 10.0 DLL Hijacking ***
---------------------------------------------
Topic: Acunetix 10.0 DLL Hijacking Risk: Medium Text:Title: Acunetix 10 Multi DLL Hajacking Application: Acunetix Versions Affected: 10.0 Vendor URL: http://www.acunetix.com Di...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110196
*** Schneider Electric Magelis HMI Resource Consumption Vulnerabilities (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-16-308-02 Schneider Electric Magelis HMI Resource Consumption Vulnerabilities that was published November 3, 2016, on the NCCIC/ICS-CERT web site. This advisory contains mitigation details for resource consumption vulnerabilities affecting Schneider Electric's Magelis human-machine interface products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-308-02
*** Security updates available in Foxit Reader 8.1.1 and Foxit PhantomPDF 8.1.1 ***
---------------------------------------------
Foxit has released Foxit Reader 8.1.1 and Foxit PhantomPDF 8.1.1, which address potential security and stability issues
---------------------------------------------
https://www.foxitsoftware.com/support/security-bulletins.php
*** Security Advisory: PHP vulnerability - CVE-2016-6288 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/71/sol71814571.html?…
*** Siemens ***
---------------------------------------------
*** Siemens SIMATIC CP 1543-1 Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01
---------------------------------------------
*** Siemens SIMATIC CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs Vulnerabilities ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-327-02
---------------------------------------------
*** Siemens Industrial Products Local Privilege Escalation Vulnerability (Update A) ***
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02
*** Huawei ***
---------------------------------------------
*** Security Advisory - Multiple Security Vulnerabilities in Huawei Smart Phone Products ***
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161123-…
---------------------------------------------
*** Security Advisory - Privilege Escalation Vulnerability in the FusionStorage ***
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161123-…
---------------------------------------------
*** Security Advisory - Buffer Overflow Vulnerability in TP Driver of Huawei Smart Phone ***
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161123-…
---------------------------------------------
*** Security Advisory - Integer Overflow Vulnerability in Some Huawei Devices ***
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161123-…
---------------------------------------------
*** Security Advisory - Buffer Overflow Vulnerability in HIFI Driver of Huawei Smart Phone ***
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161123-…
*** VMware ***
---------------------------------------------
*** VMSA-2016-0022 ***
https://www.vmware.com/security/advisories/VMSA-2016-0022.html
---------------------------------------------
*** VMSA-2016-0021 ***
https://www.vmware.com/security/advisories/VMSA-2016-0021.html
---------------------------------------------
*** VMSA-2016-0018.3 ***
https://www.vmware.com/security/advisories/VMSA-2016-0018.html
*** Novell ***
---------------------------------------------
*** eDirectory 9.0.2 (non-root) for Linux ***
https://download.novell.com/Download?buildid=dgSdIXwk2Cc~
---------------------------------------------
*** iManager 2.7 Support Pack 7 - Patch 8 for Linux ***
https://download.novell.com/Download?buildid=OFnb6Ew8wPM~
---------------------------------------------
*** iManager 2.7 Support Pack 7 - Patch 8 for Windows ***
https://download.novell.com/Download?buildid=wPIC5t8Drqo~
---------------------------------------------
*** eDirectory 8.8 SP8 Patch 9 for Linux ***
https://download.novell.com/Download?buildid=zJBqj6SjCzg~
---------------------------------------------
*** iManager 3.0.2 for Linux ***
https://download.novell.com/Download?buildid=rIhWBDnLYU8~
---------------------------------------------
*** iManager 3.0.2 for Windows ***
https://download.novell.com/Download?buildid=iMupD_KbGcA~
---------------------------------------------
*** eDirectory 9.0.2 for Linux ***
https://download.novell.com/Download?buildid=TLXIiZ6uoho~
---------------------------------------------
*** eDirectory 9.0.2 for Windows ***
https://download.novell.com/Download?buildid=_N2FUsWAalg~
---------------------------------------------
*** eDirectory 8.8 SP8 Patch 9 (non-root) for Linux ***
https://download.novell.com/Download?buildid=Y9WDuLNbJxE~
---------------------------------------------
*** eDirectory 8.8 SP8 Patch 9 for Windows ***
https://download.novell.com/Download?buildid=aDcgeiAEaYc~
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 21-11-2016 18:00 − Dienstag 22-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Windows 10 Cannot Protect Insecure Applications Like EMET Can ***
---------------------------------------------
Recently, Microsoft published a blog post called Moving Beyond EMET that appears to make two main points: (1) Microsoft will no longer support EMET after July 31, 2018, and (2) Windows 10 provides protections that make EMET unnecessary. In this blog post, I explain why Windows 10 does not provide the additional protections that EMET does and why EMET is still an important tool to help prevent exploitation of vulnerabilities.
---------------------------------------------
https://insights.sei.cmu.edu/cert/2016/11/windows-10-cannot-protect-insecur…
*** SSA-603476 (Last Update 2016-11-21): Web Vulnerabilities in SIMATIC CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-603476…
*** Facebook Messenger: Malware via SVG ***
---------------------------------------------
Vorsicht bei Dateianhängen in Facebooks Chat: Gekaperte Accounts versenden Schadsoftware - neuerdings in Form einer SVG-Grafik.
---------------------------------------------
https://www.heise.de/newsticker/meldung/Facebook-Messenger-Malware-via-SVG-…
*** Moodle Vulns ***
---------------------------------------------
*** Vuln: Moodle MSA-16-0026 Information Disclosure Vulnerability ***
http://www.securityfocus.com/bid/94456
---------------------------------------------
*** Vuln: Moodle CVE-2016-8643 Security Bypass Vulnerability ***
http://www.securityfocus.com/bid/94457
---------------------------------------------
*** Vuln: Moodle CVE-2016-8644 Information Disclosure Vulnerability ***
http://www.securityfocus.com/bid/94458
*** Exploit Code Released for NTP Vulnerability ***
---------------------------------------------
NTP 4.2.8p9 includes a patch for a vulnerability that could crash ntpd with a single malformed packet.
---------------------------------------------
http://threatpost.com/exploit-code-released-for-ntp-vulnerability/122104/
*** The Kings in Your Castle, Pt. #3 ***
---------------------------------------------
In the third episode of Marion Marschaleks and Raphael Vinots series of articles on modern APTs, they will shine some light on the prevalence of Zero-Day vulnerabilities. In reality, the use of Zero-Days is far less common than expected. In fact, APT groups in some cases exploit vulnerabilities which are a couple of years old. On the side of the analysts, they will explain that identical hashes are by no means a reliable indicator for dealing with identical files.
---------------------------------------------
https://blog.gdatasoftware.com/2016/11/29302-kings-in-your-castle-pt-3
*** TYPO3 ***
---------------------------------------------
*** Path Traversal in TYPO3 Core ***
https://typo3.org/news/article/path-traversal-in-typo3-core/
---------------------------------------------
*** Insecure Unserialize in TYPO3 Backend ***
https://typo3.org/news/article/insecure-unserialize-in-typo3-backend/
*** Businesses as Ransomware's Goldmine: How Cerber Encrypts Database Files ***
---------------------------------------------
Possibly to maximize the earning potential of Cerber's developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/KntWjaKLssw/
*** Android-Trojaner GT!tr.spy soll vor allem deutsche Bank-Kunden ins Visier nehmen ***
---------------------------------------------
Fortinet ist nach eigenen Angaben auf einen aktuellen Android-Trojaner mit der Bezeichnung GT!tr.spy gestoßen, der es in erster Linie auf Kreditkarten- und Log-in-Daten von deutschen und österreichischen Bank-Kunden abgesehen hat. Davon sollen Kunden von nicht näher beschriebenen 15 deutschen und fünf österreichischen Banken bedroht sein ...
---------------------------------------------
https://heise.de/-3494472
*** Exploit Code Released for NTP Vulnerability ***
---------------------------------------------
NTP 4.2.8p9 includes a patch for a vulnerability that could crash ntpd with a single malformed packet.
---------------------------------------------
http://threatpost.com/exploit-code-released-for-ntp-vulnerability/122104/
*** FortiOS flow-mode detection bypass under certain conditions ***
---------------------------------------------
A FortiGate configured to use flow-based protection will stop monitoring network sessions that are active when a scanning engine is reloaded after an update (nearly instantaneous process).This tends to impact long lived network sessions...
---------------------------------------------
http://fortiguard.com/advisory/fortios-flow-mode-detection-bypass-under-cer…
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: OpenSSL vulnerability CVE-2016-8610 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/11/sol11307303.html?…
---------------------------------------------
*** Security Advisory: ImageMagick vulnerabilities CVE-2015-8895 and CVE-2015-8896 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/30/sol30403302.html?…
---------------------------------------------
*** Security Advisory: ImageMagick vulnerability CVE-2015-8898 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/68/sol68785753.html?…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Security Network Protection ***
http://www-01.ibm.com/support/docview.wss?uid=swg21991724
---------------------------------------------
*** IBM Security Bulletin: IBM Tivoli Storage Manager FastBack for Bare Machine Recovery Stack-Based Buffer Overflow Elevation of Privilege Vulnerability (CVE-2016-6091) ***
http://www.ibm.com/support/docview.wss?uid=swg21993925
---------------------------------------------
*** IBM Security Bulletin: IBM Tivoli Storage Manager FastBack Stack-Based Buffer Overflow Elevation of Privilege Vulnerability (CVE-2016-6091) ***
http://www.ibm.com/support/docview.wss?uid=swg21993916
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in busybox affect IBM Security Network Protection (CVE-2014-4607, and CVE-2014-9645 ) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21990083
---------------------------------------------
*** IBM Security Bulletin: Multiple Denial of Service vulnerabilities with Expat might affect IBM HTTP Server used with IBM Security Network Protection ***
http://www-01.ibm.com/support/docview.wss?uid=swg21989336
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in IBM Java SDK affect IBM Spectrum Control and Tivoli Storage Productivity Center (CVE-2016-3485) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993565
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in IBM WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) CVE-2016-0377 ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993522
---------------------------------------------
*** IBM Vulnerabilities in BIND impact AIX (CVE-2016-2776, CVE-2016-2775) ***
http://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect AIX ***
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 18-11-2016 18:00 − Montag 21-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Vuln: Huawei Smart Phones Multiple Local Denial of Service Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/94404
*** Vuln: Multiple Lenovo ThinkPad Products CVE-2016-8222 Local Security Bypass Vulnerability ***
---------------------------------------------
Local attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions.
---------------------------------------------
http://www.securityfocus.com/bid/94409
*** Security Advisory: PHP vulnerability CVE-2016-6289 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/52/sol52430518.html?…
*** SSA-672373 (Last Update 2016-11-18): Vulnerabilities in SIMATIC CP 1543-1 ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373…
*** SSA-701708 (Last Update 2016-11-18): Local Privilege Escalation in Industrial Products ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708…
*** SAP NetWeaver AS ABAP 7.4 Directory Traversal ***
---------------------------------------------
The code provides access to the file specified after the READ DATASET
statement. The variable transmitted to the input of the statement is
entered in it by user input. Thus, the user can access the files
stored on the operating system. This vulnerability is called a
Directory Traversal.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110168
*** Update wichtig: Sicherheitswarnung zu Symantec-Software ***
---------------------------------------------
Das BSI hat eine Sicherheitswarnung der Stufe 4 bezüglich der Symantec-Produkte Endpoint Security herausgegeben und empfiehlt ein sofortiges Update.
---------------------------------------------
https://heise.de/-3492125
*** Second Chinese Firm In a Week Found Hiding a Backdoor In Android Firmware ***
---------------------------------------------
An anonymous reader quotes Bleeping Computer: Security researchers have discovered that third-party firmware included with over 2.8 million low-end Android smartphones allows attackers to compromise Over-the-Air (OTA) update operations and execute commands on the targets phone with root privileges. This is the second issue of its kind that came to light this week after researchers from Kryptowire discovered a similar secret backdoor in the firmware of Chinese firm Shanghai Adups Technology Co.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/A1TnPdkseTU/second-chinese-…
*** Putty Cleartext Password Storage ***
---------------------------------------------
Putty.exe stores Passwords unencrypted for sessions that use a Proxy connection and specify a password to save.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110172
*** WordPress Plugin MailChimp 4.0.7 - Cross-Site Request Forgery / XSS ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110174
*** Vuln: Apache OpenOffice CVE-2016-6803 Local Privilege Escalation Vulnerability ***
---------------------------------------------
Apache OpenOffice is prone to a local privilege-escalation vulnerability.
Local attackers can exploit this issue to gain elevated privileges.
Apache OpenOffice 4.1.2 and prior versions are vulnerable.
---------------------------------------------
http://www.securityfocus.com/bid/94418
*** DFN-CERT-2016-1916/">GStreamer-Plugin: Eine Schwachstelle ermöglicht die Ausführung beliebigen Programmcodes ***
---------------------------------------------
Ein entfernter, nicht authentifizierter Angreifer kann mit Hilfe einer speziell präparierten Mediendatei einen Pufferüberlauf auf dem Heap erzeugen, dadurch große Speicherbereiche kontrollieren und in der Folge beliebigen Programmcode ausführen.
Die Schwachstelle kann im Kombination mit anderen Sicherheitslücken und Design-Entscheidungen auf bestimmten Linux-Systemen einfach durch den Besuch einer speziell präparierten Webseite ausgenutzt werden. Es ist dabei keine Interaktion des Benutzers notwendig.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1916/
*** Bugtraq: [security bulletin] HPSBHF03675 rev.1 - HPE Integrated Lights-Out 3 and 4 (iLO 3, iLO 4), Cross-Site Scripting (XSS) ***
---------------------------------------------
HPE has made the following firmware updates available to resolve the
vulnerability in iLO 3 and iLO 4:
For iLO3, please upgrade to firmware v1.88
For iLO4, please upgrade to firmware v2.44
---------------------------------------------
http://www.securityfocus.com/archive/1/539791
*** Oil and Gas Cybersecurity part 3: Midstream Security for Oil ***
---------------------------------------------
I hope you enjoyed the previous parts of Oil and Gas Cyber Security series (Upstream Cyber Security and Oil and Gas Cyber Security 101). Today we will talk about OT and ICS with a special focus on the Midstream sector of the petroleum industry.
---------------------------------------------
http://resources.infosecinstitute.com/oil-and-gas-cybersecurity-part-3-mids…
*** Nemucod Infections Spreading Locky Over Facebook ***
---------------------------------------------
Researchers have spotted an increase in Nemucod downloader infections moving via Facebook Messenger spam, with some victims being infected with Locky ransomware.
---------------------------------------------
http://threatpost.com/nemucod-infections-spreading-locky-over-facebook/1220…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Cross-Site Scripting Vulnerability in IBM Social Rendering Templates for Digital Data Connector (CVE-2016-8936) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993895
---------------------------------------------
*** IBM Security Bulletin: IBM Tivoli Netcool Configuration Manager (ITNCM) is affected by a vulnerability discovered in XSTREAM (CVE-2016-3674) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992217
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Cisco MDS Directors and Switches (CVE-2016-0701, CVE-2015-3197) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009610
---------------------------------------------
*** IBM Security Bulletin: Security Bulletin: Vulnerabilities in OpenSSL affect IBM Cisco MDS Directors and switches (CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-1794) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009608
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 17-11-2016 18:00 − Freitag 18-11-2016 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Webseite aufgerufen, Linux gehackt ***
---------------------------------------------
Linux-Nutzer können sich durch das bloße Aufrufen einer Webseite Schadcode einfangen. Die Ursache ist eine Kombination eigentlich harmloser Ereignisse – und eine Zero-Day-Lücke. Betroffen ist vor allem Fedora Workstation.
---------------------------------------------
https://heise.de/-3489774
*** Google Removing SHA-1 Support in Chrome 56 ***
---------------------------------------------
Google released its final SHA-1 deprecation deadlines, and crypto services provider Venafi said that 35 percent of the web is still running weak SHA-1 certificates.
---------------------------------------------
http://threatpost.com/google-removing-sha-1-support-in-chrome-56/122041/
*** MacBook Pro 2016: Malware-Schutz teils ab Werk deaktiviert ***
---------------------------------------------
Apple hat offenbar verpasst, den macOS-Systemintegritätsschutz (System Integrity Protection) auf allen MacBook-Pro-Modellen mit Touch Bar zu aktivieren. SIP soll die Möglichkeiten von Schad-Software begrenzen.
---------------------------------------------
https://heise.de/-3491210
*** 8 million GitHub profiles scraped, data found leaking online ***
---------------------------------------------
Technology recruitment site GeekedIn has scraped 8 million GitHub profiles and left the information exposed in an unsecured MongoDB database. The backup of the database ..
---------------------------------------------
https://www.helpnetsecurity.com/2016/11/18/8-million-github-profiles-scrape…
*** DSA-3718 drupal7 - security update ***
---------------------------------------------
Multiple vulnerabilities has been found in the Drupal content managementframework. For additional information, please refer to the upstream advisoryat https://www.drupal.org/SA-CORE-2016-005
---------------------------------------------
https://www.debian.org/security/2016/dsa-3718
*** Metadaten: Apple speichert Verbindungsdaten mehrere Monate in iCloud ***
---------------------------------------------
Apple bezeichnet sich gern als Datenschutzkonzern. Eine jetzt entdeckte Funktion zeigt aber, dass Apple Verbindungsdaten mehrere Monate im iCloud-Backup ablegt. Das dürfte nicht jedem gefallen.
---------------------------------------------
http://www.golem.de/news/metadaten-apple-speichert-verbindungsdaten-mehrere…
*** Top-Level-Domain .box macht Fritzbox-Routern Probleme ***
---------------------------------------------
Router ist im internen Netz über den Domainnamen fritz.box erreichbar
---------------------------------------------
http://derstandard.at/2000047782737
*** iPhone: Lockscreen-Lücke erlaubt Zugriff auf Kontakte und Fotos ***
---------------------------------------------
Angriffsmethode soll auch bei den neuesten Versionen von iOS funktionieren
---------------------------------------------
http://derstandard.at/2000047783306
*** Google Project Brillo: IoT-Android wird sicherer als Smartphone-Android ***
---------------------------------------------
Google krempelt die Zusammenarbeit mit Herstellern für sein Internet-of-Things-System Brillo im Vergleich zu Android völlig um. So gibt es nur einen Linux-Kernel, der ..
---------------------------------------------
http://www.golem.de/news/google-project-brillo-iot-android-wird-sicherer-al…
*** The Rampage of Locky ***
---------------------------------------------
Locky has been a constant in the malware zoo for a considerable time. And while we are aware that there are still victims being hit by the variant sporting the .ODIN extension, ..
---------------------------------------------
https://blog.gdatasoftware.com/2016/11/29310-the-rampage-of-locky
*** Filesharing: Hacker erbeuten Sourcecoude von Mega.nz ***
---------------------------------------------
Mehrere Gbyte an Quellcode und einige Admin-Zugänge wurden bei Kim Dotcoms Dienst Mega.nz kopiert. Nach Angaben des Unternehmens sind keine Nutzerdaten betroffen, die veröffentlichten Zugänge seien zudem veraltet.
---------------------------------------------
http://www.golem.de/news/filesharing-hacker-erbeuten-sourcecoude-von-mega-n…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 16-11-2016 18:00 − Donnerstag 17-11-2016 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** VMSA-2016-0020 ***
---------------------------------------------
vRealize Operations update addresses REST API deserialization vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-0020.html
*** VMSA-2016-0016.1 ***
---------------------------------------------
vRealize Operations (vROps) updates address privilege escalation vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-0016.html
*** Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2016-005 ***
---------------------------------------------
https://www.drupal.org/SA-CORE-2016-005
*** VMSA-2016-0018.1 ***
---------------------------------------------
VMware product updates address local privilege escalation vulnerability in Linux kernel
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-00201.html
*** VMSA-2016-0018.1 ***
---------------------------------------------
VMware product updates address local privilege escalation vulnerability in Linux kernel
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-0018.html
*** Antivirus tools are a useless box-ticking exercise says Google security chap ***
---------------------------------------------
Advocates whitelists and other tools that genuinely help security Kiwicon Google senior security engineer Darren Bilby has asked fellow hackers to expend less effort ..
---------------------------------------------
www.theregister.co.uk/2016/11/17/google_hacker_pleads_try_whitelists_not_ju…
*** DSA-3716 firefox-esr - security update ***
---------------------------------------------
Multiple security issues have been found in the Mozilla Firefox webbrowser: Multiple memory safety errors, buffer overflows and otherimplementation errors may ..
---------------------------------------------
https://www.debian.org/security/2016/dsa-3716
*** Tails 2.7 is out ***
---------------------------------------------
https://tails.boum.org/news/version_2.7/
*** Malware Hunters Catch New Android Spyware For Governments In The Wild ***
---------------------------------------------
A group of malware hunters has caught a new Android spyware in the wild. The spyware is marketed to governments and police forces and was made in Italy—but it wasn’t built by the infamous surveillance tech vendor Hacking Team.
---------------------------------------------
https://motherboard.vice.com/read/malware-hunters-catch-new-android-spyware…
*** Internet of Things: US-Regierung veröffentlicht Security-Strategie ***
---------------------------------------------
Sechs Empfehlungen für ein weniger unsicheres Internet of Things hat die US-Regierung ausgearbeitet. Das offizielle Dokument könnte Entwicklern und Sicherheitsabteilungen Rückenwind geben.
---------------------------------------------
https://heise.de/-3488886
*** Erpressungs-Trojaner Ransoc soll Social-Media-Accounts ausspionieren ***
---------------------------------------------
Sicherheitsforschern zufolge droht Ransoc damit, persönliche Daten zu veröffentlichen. Dafür soll er eine individuelle Erpresserbotschaft mit privaten Bildern und Informationen bauen.
---------------------------------------------
https://heise.de/-3488976
*** Call for Papers Domain pulse 2017 ***
---------------------------------------------
Das Generalthema des Domain pulse 2017 lautet „Netzwerken in Netzwerken“ – im weitesten Sinne des Begriffs. Wer oder was wird vernetzt? Wie wichtig ist Vernetzung? Wo findet sie statt? Wie kann sie bestmöglich gelingen? Und welche Probleme kann sie lösen?
---------------------------------------------
http://www.domainpulse.at/de/call-for-papers
*** Forensik-Tool-Hersteller: Apple speichert iPhone-Anrufprotokolle in iCloud – für viele Monate ***
---------------------------------------------
Apple synchronisiert die Anrufhistorie von iCloud-Nutzern automatisch ohne darauf explizit hinzuweisen. Die Software des Herstellers soll Strafverfolgungsbehörden ..
---------------------------------------------
https://heise.de/-3490866
*** Confessions of a Google Spammer ***
---------------------------------------------
Before I became an inbound marketer, I once made $50,000 a month spamming Google. I worked a maximum of 10 hours a week. And I am telling you from the bottom of my heart: never, never ever follow in my footsteps.
---------------------------------------------
https://readthink.com/confessions-of-a-google-spammer-4f2e0c3e9869
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 15-11-2016 18:00 − Mittwoch 16-11-2016 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Chinese company installed secret backdoor on hundreds of thousands of phones ***
---------------------------------------------
http://arstechnica.com/security/2016/11/chinese-company-installed-secret-ba…
*** Carbanak Attacks Shift to Hospitality Sector ***
---------------------------------------------
The Carbanak cybercrime gang has shifted strategy and targets the hospitality and restaurant industries with new techniques and malware.
---------------------------------------------
http://threatpost.com/carbanak-attacks-shift-to-hospitality-sector/121966/
*** Cloned Spam Sites in Subdirectories ***
---------------------------------------------
In a recent post, we covered how attackers were abusing server resources to create WordPress sites in subdirectories and distribute spam. By adding a complete WordPress CMS installation into a directory and using ..
---------------------------------------------
https://blog.sucuri.net/2016/11/cloned-spam-sites-in-subdirectories.html
*** Fake fax ushers in revival of a ransomware family ***
---------------------------------------------
“Criminal case against you” is a message that may understandably cause panic. That’s what a recent spam campaign hopes happens, increasing the likelihood of ..
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/11/15/fake-fax-ushers-in-revi…
*** Malspam distributing Troldesh ransomware ***
---------------------------------------------
Earlier this week on Monday 2016-11-14, I found an example of malicious spam (malspam) distributing Troldesh ransomware. Troldesh (also called ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21717
*** Lynxspring JENEsys BAS Bridge Vulnerabilities ***
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01
*** VMware-Produkte abgesichert: Angreifer können aus Gast-System ausbrechen ***
---------------------------------------------
In Fusion und Workstation klafft eine kritische Sicherheitslücke.
---------------------------------------------
https://heise.de/-3484180
*** Ermittlungen gegen Skidata im Betriebsspionage-Verfahren eingestellt ***
---------------------------------------------
Salzburger Firma soll Kundendaten auf IT-Server eines Konkurrenten ausgespäht haben – Laut Staatsanwaltschaft kein widerrechtlicher Datenzugriff
---------------------------------------------
http://derstandard.at/2000047640813
*** Datenschutz bei Mac-App: Shazam will nicht mehr dauerhaft mithören ***
---------------------------------------------
Ein Mikrofon, das dauerhaft angeschaltet ist, dürfte vielen Nutzern Unbehagen bereiten. Genau das tat Shazam auf dem Mac mindestens seit 2014. Jetzt will das ..
---------------------------------------------
http://www.golem.de/news/datenschutz-bei-mac-app-shazam-will-nicht-mehr-dau…
*** Sicherheitsupdates: Symantec-Software kann sich an DLL verschlucken ***
---------------------------------------------
Verschiedene Symantec-Produkte sind angreifbar. Im schlimmsten Fall können Angreifer Systeme kapern.
---------------------------------------------
https://heise.de/-3484233
*** Analysts apply Occams razor to Tesco Bank breach ***
---------------------------------------------
Unexpected items in the banking area Analysis Security analysts have narrowed down the range of possible explanations for the Tesco Bank breach.
---------------------------------------------
www.theregister.co.uk/2016/11/16/tesco_bank_breach_competing_theories_analy…
*** Wickedly Clever USB Stick Installs a Backdoor on Locked PCs ***
---------------------------------------------
The proof-of-concept tool PoisonTap uses a series of subtle design flaws to steal a victims cookies and even hack their router or intranet.
---------------------------------------------
https://www.wired.com/2016/11/wickedly-clever-usb-stick-installs-backdoor-l…
*** IT-Sicherheit: Facebook kauft Passwörter im Darknet ***
---------------------------------------------
Die Doppelverwendung von Passwörtern bezeichnet der Sicherheitschef von Facebook als "größte Gefahr für ..
---------------------------------------------
http://www.golem.de/news/it-sicherheit-facebook-kauft-passwoerter-im-darkne…
*** Automobilzulieferer: Leoni schreibt nach 40-Millionen-Betrug Verluste ***
---------------------------------------------
Der Betrugsfall geht an Leoni nicht spurlos vorbei. Nachdem rund 40 Millionen Euro entwendet wurden, schreibt das Unternehmen im vergangenen Quartal Verluste. Die Ermittlungen gehen weiter.
---------------------------------------------
http://www.golem.de/news/automobilzulieferer-leoni-schreibt-nach-40-million…
*** Nach Adobe-Hack: Einigung auf eine Million US-Dollar Strafe ***
---------------------------------------------
Adobe hat sich mit insgesamt 15 US-Bundesstaaten auf eine Strafzahlung von zusammen einer Million US-Dollar geeinigt, weil das Unternehmen 2013 Millionen Nutzerdaten verloren hatte. Die hatten Angreifer bei einem Hack an sich gebracht.
---------------------------------------------
https://heise.de/-3485542
*** Cisco Email Security Appliance MIME Header Processing Filter Bypass Vulnerability ***
---------------------------------------------
A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote ..
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 14-11-2016 18:00 − Dienstag 15-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Vuln: Git for Windows CVE-2016-9274 Unspecified Untrusted Search Path vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94289
*** CVE-2016-4484: Cryptsetup Initrd root Shell ***
---------------------------------------------
An attacker with access to the console of the computer and with the ability to reboot the computer can launch a shell (with root permissions) when he/she is prompted for the password to unlock the system partition. The shell is executed in the initrd environment. Obviously, the system partition is encrypted and it is not possible to decrypt it (AFAWK). But other partitions may be not encrypted, and so accessible.
---------------------------------------------
http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.…
*** phpWebAdmin Version 1.0 SQL Injection Proof Of Concept Exploit ***
---------------------------------------------
The user parameter in the index.php file is vulnerable to a blind SQL time-based Injection attack. Proof of concept is exploit attached below
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110127
*** ImageMagick MagickCore/fx.c Heap Buffer Overflow Vulnerability ***
---------------------------------------------
ImageMagick is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploits may result in denial-of-service condition.
---------------------------------------------
http://www.securityfocus.com/bid/94310/discuss
*** The Kings in Your Castle, Pt #2 ***
---------------------------------------------
The second part of Marion Marschaleks and Raphael Vinots article series deals with questions that surround the tools and the data used by analysts. They shine a light on some of the challenges facing analysts when it comes to Indicators of Compromise. While those are easily created and implemented, they can end up being outdated rather quickly. For an effective strategy, other metrics are required which are less easy to create.
---------------------------------------------
https://blog.gdatasoftware.com/2016/11/29304-the-kings-in-your-castle-pt-2
*** Beliebte Chrome-Erweiterungen zur Werbeschleuder mutiert ***
---------------------------------------------
Einige beliebte Chrome-Erweiterungen werden offenbar zur Verbreitung dubioser Werbeanzeigen missbraucht. Wer eine davon installiert hat, sollte sie umgehend entfernen.
---------------------------------------------
https://heise.de/-3465981
*** Windows Mobile Application Penetration Testing Part 4: Intercepting HTTP/HTTPS Traffic on Windows Phones ***
---------------------------------------------
Introduction and Background: In the previous article of the series, we have discussed Sideloading concepts associated with Windows Phone 8.1 apps and UWP apps. In this article, we will discuss how to get your phones/emulators ready for intercepting HTTP/HTTPS traffic to proceed with further analysis of the application.
---------------------------------------------
http://resources.infosecinstitute.com/windows-mobile-application-penetratio…
*** Bypassing Mixed Content Warnings - Loading Insecure Content in Secure Pages ***
---------------------------------------------
There are no doubts that the web is moving forward to HTTPS (secure) content. Most important names have today their certificates ready and their websites are in effect, secure. But have you ever wandered: secure to what extent?
---------------------------------------------
https://www.brokenbrowser.com/loading-insecure-content-in-secure-pages/
*** Cisco IOS XE Software Directory Traversal Vulnerability ***
---------------------------------------------
A vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system.The vulnerability is due to insufficient validation of files submitted to the affected installation utility. An attacker could exploit this vulnerability by uploading a crafted file to an affected system and running the installation utility command.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Single Sign-on: Eine Milliarde Accounts für Hijacking anfällig ***
---------------------------------------------
Single Sign-on ist praktisch, wird aber oft falsch implementiert. Sicherheitsforscher haben demonstriert, welche Fehler App-Entwickler dabei machen. Mehrere hundert Apps machten dabei Probleme.
---------------------------------------------
http://www.golem.de/news/single-sign-on-eine-milliarde-accounts-fuer-hijack…
*** DLL Loading Issue in Symantec Enterprise Products ***
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: OpenSSL vulnerability CVE-2016-2180 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/02/sol02652550.html?…
---------------------------------------------
*** Security Advisory: BIG-IP ASM vulnerability CVE-2016-7472 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/17/sol17119920.html?…
---------------------------------------------
*** Security Advisory: Apache Tomcat vulnerabilities CVE-2016-5018, CVE-2016-6794, and CVE-2016-6796 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/65/sol65230547.html?…
---------------------------------------------
*** Security Advisory: Apache Tomcat vulnerability CVE-2016-6797 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/36/sol36302720.html?…
---------------------------------------------
*** Security Advisory: Apache Tomcat vulnerability CVE-2016-0762 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/36/sol36784855.html?…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime IBM affect IBM Decision Optimization Center (CVE-2016-5554, CVE-2016-5556, CVE-2016-5568) ***
http://www.ibm.com/support/docview.wss?uid=swg21993861
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM ILOG CPLEX Optimization Studio and IBM ILOG CPLEX Enterprise Server (CVE-2016-5554, CVE-2016-5556, CVE-2016-5568, CVE-2016-5582) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993857
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by multiple php vulnerabilities ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024488
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Perl affects Power Hardware Management Console (‪‪CVE-2016-1238‬) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021704
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by multiple perl vulnerabilities (CVE-2016-1238, CVE-2016-2381, CVE-2016-8853) ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024470
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by a vulnerability in fontconfig (CVE-2016-5384) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024468
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by a vulnerability in sqlite (CVE-2016-6153) ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024467
---------------------------------------------
*** IBM Security Bulletin: IBM PowerVC Local escalation of privilege vulnerability in DB2 for Linux (CVE-2016-5995) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021652
---------------------------------------------
*** IBM Security Bulletin: Samba vulnerability issue in IBM SONAS (CVE-2016-2119) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009570
---------------------------------------------
*** IBM Security Bulletin: GPFS security vulnerabilities in IBM SONAS (CVE-2016-2985 and CVE-2016-2984 ) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009323
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 11-11-2016 18:00 − Montag 14-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** No payment necessary: Fighting back against ransomware ***
---------------------------------------------
Any IT professional who's ever had an experience with malware knows how fast an intrusive attack can happen, and how difficult it can be to educate employees to be vigilant against such threats. And with ransomware attacks only growing, having information, tools and technologies to help protect your network can mean the difference between serious...
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/11/11/no-payment-necessary-fi…
*** New Guide on How to Fix Hacked Joomla! Sites ***
---------------------------------------------
Joomla! is one of the most popular open-source content management systems (CMS) on the market, powering a large percentage of websites on the internet today. For that reason, we are glad that our team includes a former contributor who helped create the official Joomla! docs on website security. We have also participated in various Joomla! events around the world, and our cofounder Dre Armeda is a keynote speaker at the upcoming Joomla! World Conference in Vancouver, Canada. Continue reading New
---------------------------------------------
https://blog.sucuri.net/2016/11/new-guide-fix-hacked-joomla-sites.html
*** Vuln: Docker Multiple Security Bypass Vulnerabilities ***
---------------------------------------------
Vulnerable: Docker 1.12, Docker 1.6.1, Docker 1.6, Docker 1.3.3, Docker 1.4.1, Docker 1.3.2, Docker 1.3.1, Docker 1.3.0, Docker 1.12.3, Docker 1.12.2, Docker 1.0.0
---------------------------------------------
http://www.securityfocus.com/bid/94272
*** Vuln: Sophos Web Appliance Privilege Escalation and Remote Code Execution Vulnerabilities ***
---------------------------------------------
Sophos Web Appliance is prone to a privilege-escalation vulnerability and remote code-execution vulnerabilities.
Attackers can leverage these issues to gain elevated privileges or execute arbitrary commands within the context of the affected application.
Sophos Web Appliance 4.2.1.3 is vulnerable; other versions may also be affected.
---------------------------------------------
http://www.securityfocus.com/bid/94274
*** OWASP ModSecurity Core Rule Set Version 3.0 Released ***
---------------------------------------------
Need a new set of generic attack detection rules for your web application firewall? Try the new OWASP ModSecurity Core Rule Set version 3.0.0! Long-time Slashdot reader dune73 writes: The OWASP CRS is a widely-used Open Source set of generic rules designed to protect users against threats like the OWASP Top 10. The rule set is most often deployed in conjunction with an existing Web Application Firewall like ModSecurity.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/DKhaxHVZD-s/owasp-modsecuri…
*** MikroTik RouterOS 6.36.2 Cross Site Scripting ***
---------------------------------------------
Topic: MikroTik RouterOS 6.36.2 Cross Site Scripting
Risk: Low
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110115
*** VMSA-2016-0019 ***
---------------------------------------------
VMware product updates address local privilege escalation vulnerability in linux kernel
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-0019.html
*** Kaspersky Lab Black Friday Threat Overview 2016 ***
---------------------------------------------
Our research shows that, over the last few years, the holiday period which starts on so-called Black Friday was marked by an increase in phishing and other types of attacks, which suggests that the pattern will be repeated this year.
---------------------------------------------
http://securelist.com/analysis/publications/76615/kaspersky-lab-black-frida…
*** [2016-11-14] Multiple vulnerabilities in I-Panda SolarEagle - Solar Controller Administration Software / MPPT Solar Controller SMART2 ***
---------------------------------------------
Attackers are able to control the SolarEagle V2.00 / MPPT Solar Controller SMART2 device as authentication is broken. Furthermore attackers can eavesdrop the unencrypted communication or denial service.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2016…
*** Adult Friend Finder: 412 Milionen Accounts von Datingseite gehackt ***
---------------------------------------------
Nach dem Ashley-Madison-Hack gibt es einen weiteren großen Einbruch in ein Datingnetzwerk. Angreifer veröffentlichten 412 Millionen Accountdaten des Webseitennetzwerkes rund um Adult Friend Finder.
---------------------------------------------
http://www.golem.de/news/adult-friend-finder-412-milionen-accounts-von-dati…
*** Vuln: Jenkins Java Deserialization Remote Code Execution Vulnerability ***
---------------------------------------------
Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions.
---------------------------------------------
http://www.securityfocus.com/bid/94281
*** [TYPO3-announce] Vulnerabilities in multiple third party TYPO3 CMS extensions ***
---------------------------------------------
several vulnerabilities have been found in the following third party TYPO3 extensions:
- "Store Locator" (locator)
- "Code Highlighter" (mh_code_highlighter)
- "Shibboleth Authentication" (shibboleth_auth)
- "Secure Download Form" (rs_securedownload)
- "Member Infosheets" (if_membersheet)
- "TC Directmail" (tcdirectmail)
---------------------------------------------
http://lists.typo3.org/pipermail/typo3-announce/2016/000388.html
*** NIST Small Business Information Security guide for Small businesses ***
---------------------------------------------
The NIST Small Business Information Security: The Fundamentals guide aims to provide basic cybersecurity recommendations to small businesses.
---------------------------------------------
http://securityaffairs.co/wordpress/53423/breaking-news/nist-small-business…
*** [CVE-2016-8736] Apache Openmeetings RMI Registry Java Deserialization RCE ***
---------------------------------------------
Versions Affected: Apache OpenMeetings 3.1.0
Description: Apache Openmeetings is vulnerable to Remote Code Execution via RMI deserialization attack The issue was fixed in 3.1.2. All users are recommended to upgrade to Apache OpenMeetings 3.1.3
---------------------------------------------
http://www.securityfocus.com/archive/1/539751
*** Recordings from AppSecUSA 2016 in Washington, DC ***
---------------------------------------------
https://www.youtube.com/playlist?list=PLpr-xdpM8wG8DPozMmcbwBjFn15RtC75N
*** E-Mail-Sicherheitslücke in LTE-Router von Drei ***
---------------------------------------------
Jeder Nutzer, der sich mit einem Drei-Smartphone bei einem Drei-LTE-Router anmeldet, hat Zugriff auf die E-Mails des Router-Besitzers.
---------------------------------------------
https://futurezone.at/produkte/e-mail-sicherheitsluecke-in-lte-router-von-d…
*** Updated Good Practice Guide on National Cyber Security Strategies by ENISA ***
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/updated-good-practice-guide-on-…
*** Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: November 2016 ***
---------------------------------------------
On November 10, 2016, the OpenSSL Software Foundation released a security advisory that describes three vulnerabilities.
...
Cisco investigated its product line to determine which products may be affected by these vulnerabilities and the impact of the vulnerabilities on each affected product. For information about whether a product is affected, refer to the “Vulnerable Products” and “Products Confirmed Not Vulnerable” sections of this advisory.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Master Decryption Keys and Decryptor for the Crysis Ransomware Released. ***
---------------------------------------------
The master decryption keys for the CrySiS Ransomware have been released this morning in a post on the BleepingComputer.com forums. At approximately 1 AM EST, a member named crss7777 created a post in the CrySiS support topic at BleepingComputer with a Pastebin link to a file containing the master decryption keys and how to use them. [...]
---------------------------------------------
http://www.bleepingcomputer.com/news/security/master-decryption-keys-and-de…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple security vulnerabilities have been addressed in LMS 5.0 on Cloud ***
http://www.ibm.com/support/docview.wss?uid=swg21993982
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Storwize V7000 Unified (CVE-2016-6304, CVE-2016-6303, CVE-2016-2178, CVE-2016-6306 and CVE-2016-2183) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009586
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect Tivoli Provisioning Manager for OS Deployment and Tivoli Provisioning Manager for Images ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992898
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM SONAS (CVE-2016-2183) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009585
---------------------------------------------
*** IBM Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server Liberty which may impact IBM Streams (CVE-2016-5986) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993612
---------------------------------------------
*** IBM Security Bulletin: A Security Vulnerability has been fixed in IBM Security Privileged Identity Manager (CVE-2016-5964) ***
http://www.ibm.com/support/docview.wss?uid=swg21994065
---------------------------------------------
*** IBM Security Bulletin: Multiple Mozilla Firefox vulnerability issues in IBM SONAS. ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009590
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Commons FileUpload affects IBM WebSphere Portal (CVE-2016-3092) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21989359
---------------------------------------------
*** IBM Security Bulletin: IBM Connections Security Update ***
http://www.ibm.com/support/docview.wss?uid=swg21990864
---------------------------------------------
*** IBM Security Bulletin: GPFS security vulnerabilities in IBM Storwize V7000 Unified (CVE-2016-0392) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1009571
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 10-11-2016 18:00 − Freitag 11-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Benevolent malware? reincarna/Linux.Wifatch, (Fri, Nov 11th) ***
---------------------------------------------
In the new to me department. It looks like this one has been around for more thanthree years. Today I was doing some banner grabbing looking for a Mirainodethat had gotten away from me, and came across the Telnet banner below. It appears this device is infected with a piece of malware called Reincarna/Linux.Wifatch. It purports to being a memory resident malware that defends the device from more malicious malware.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21703&rss
*** BSI-Bericht zur Lage der IT-Sicherheit: Die Lage bleibt angespannt ***
---------------------------------------------
In seinem neuesten Bericht beurteilt das Bundesamt für Sicherheit in der Informationstechnik die aktuelle Gefährdungslage der IT-Sicherheit in Deutschland. Dabei zeigt es Schwachstellen auf und bewertet unter anderem Angriffsmethoden.
---------------------------------------------
https://www.heise.de/newsticker/meldung/BSI-Bericht-zur-Lage-der-IT-Sicherh…
*** CA Unified Infrastructure Management Directory Traversal Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a directory traversal vulnerability in CA Technologies Unified Infrastructure Management application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-315-01
*** F5 Security Advisory: Linux TCP stack vulnerability CVE-2016-5696 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/46/sol46514822.html?…
*** Vuln: Brocade NetIron OS CVE-2016-8203 Memory Corruption Vulnerability ***
---------------------------------------------
An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed.
Brocade NetIron OS 5.8.00 through 5.8.00e, 5.9.00 through 5.9.00bd, 6.0.00, and 6.0.00a are vulnerable.
---------------------------------------------
http://www.securityfocus.com/bid/94232
*** F5 Security Advisory: TMM vulnerability CVE-2016-7476 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/87/sol87416818.html?…
*** MyBB 1.8.6 Cross Site Scripting ***
---------------------------------------------
These issues may lead to the injection of JavaScript keyloggers, injection of content such as ads, or the bypassing of CSRF protection, which would for example allow the creation of a new admin user.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110096
*** Security Advisory - Path Traversal Vulnerability in Huawei Home Gateway Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2015/hw-462908
*** Vuln: Multiple I-O DATA Network Camera Products CVE-2016-7814 Information Disclosure Vulnerability ***
---------------------------------------------
An attacker can exploit this issue to obtain sensitive information. This may aid in further attacks.
The following products and versions are vulnerable:
TS-WRLP firmware version 1.00.01 and prior
TS-WRLA firmware version 1.00.01 and prior
---------------------------------------------
http://www.securityfocus.com/bid/94250
*** Security Advisory - Input Validation Vulnerability in Some Huawei Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161111-…
*** Windows Mobile Application Penetration Testing Part 3: Sideloading ***
---------------------------------------------
Introduction and Background: In the First article of the series, we have covered the introduction and background required to start learning Windows Mobile Application Penetration Testing. We have also seen the requirements for setting up Windows Phone 8.1 emulators as well as Windows 10 mobile emulators.
---------------------------------------------
http://resources.infosecinstitute.com/windows-mobile-application-penetratio…
*** TYPO3: Cross-Site Scripting in extension "HTML5 Video Player" (html5videoplayer) ***
---------------------------------------------
It has been discovered that the extension "HTML5 Video Player" (html5videoplayer) is susceptible to Cross-Site Scripting.
---------------------------------------------
https://typo3.org/news/article/cross-site-scripting-in-extension-html5-vide…
*** TYPO3: Multiple vulnerabilities in extension "TC Directmail " (tcdirectmail) ***
---------------------------------------------
It has been discovered that the extension "TC Directmail " (tcdirectmail) is susceptible to Cross Site-Scripting and SQL Injection.
---------------------------------------------
https://typo3.org/news/article/multiple-vulnerabilities-in-extension-tc-dir…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in PAM affect Power Hardware Management Console (‪CVE-2013-7041 and CVE-2015-3238‬) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021702
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDKs affect IBM Virtualization Engine TS7700 April 2016 ***
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009348
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 09-11-2016 18:00 − Donnerstag 10-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** VMSA-2016-0018 VMware product updates address local privilege escalation vulnerability in linux kernel ***
---------------------------------------------
Relevant Products
* VMware Identity Manager
* vRealize Automation
* vRealize Operations
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-0018.html
*** FortiWLC Undocumented Hardcoded core Account ***
---------------------------------------------
FortiWLC comes with a hardcoded account named core which is used by Meru Access Points to send core dumps to the FortiWLC and has read/write privileges over various parts of the system.
Impact: Unauthorized read/write remote access
Affected Products: FortiWLC 7.0-9-1, 7.0-10-0, 8.1-2-0, 8.1-3-2 and 8.2-4-0
---------------------------------------------
https://fortiguard.com/advisory/fortiwlc-undocumented-hardcoded-core-account
*** Deepsec: "Unternehmen interessieren sich nicht für Privacy, außer zum Marketing" ***
---------------------------------------------
Sicherheitsexperte Marcus J. Ranum übt auch scharfe Kritik an eigener Branche: Teure Lösungen für wenig Nutzen
---------------------------------------------
http://derstandard.at/2000047306876
*** OpenSSL Security Advisory [10 Nov 2016] (CVE-2016-7054, CVE-2016-7053, CVE-2016-7055) ***
---------------------------------------------
CVE-2016-7054: TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
CVE-2016-7053: Applications parsing invalid CMS structures can crash with a NULL pointer dereference.
---------------------------------------------
https://www.openssl.org/news/secadv/20161110.txt
*** ICMP Unreachable DoS Attacks (aka "Black Nurse"), (Thu, Nov 10th) ***
---------------------------------------------
It is not recommended to block all Type 3 ICMP messages. In particular Type 3 Code 4 (Fragmentation Needed and Don't Fragment was Set) messages are requied for path MTU discovery, which many modern operating systems use.
...
So what should you do?
* Don't panic. This is not a big deal. Test your firewall if you can, or check if is on the vulnerable list
* You are vulnerable if you use a smaller Cisco ASA firewall. Newer/Larger multi-core versions appear to be fine. SonicWall and "some" Palo Alto firewalls appear to be vulnerable too.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21699&rss
*** Bugtraq: Secunia Research: Oracle Outside In "GetTxObj()" Use-After-Free Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539732
*** Bugtraq: Secunia Research: Oracle Outside In "VwStreamRead()" Buffer Overflow Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539731
*** Internet Of Things: Sorgenkind Sicherheit ***
---------------------------------------------
Das Geschäft mit smarten Devices und vernetzten Produktionsanlagen brummt, doch die Sicherheit ist oft nur Nebensache. Auf einer Konferenz in Köln zeichneten Branchenvertreter ein düsteres Bild.
---------------------------------------------
https://heise.de/-3463589
*** Windows Mobile Application Penetration Testing Part 2: Understanding Applications ***
---------------------------------------------
In the First article of the series, we have covered the introduction and background required to start learning Windows Mobile Application Penetration Testing. We have also seen the requirements for setting up Windows Phone 8.1 emulators as well as Windows 10 mobile emulators. In this article, we will discuss the basics of Windows Phone 8.1 applications and UWP applications.
---------------------------------------------
http://resources.infosecinstitute.com/windows-mobile-application-penetratio…
*** [R3] Nessus 6.9 Fixes Multiple Vulnerabilities ***
---------------------------------------------
http://www.tenable.com/security/tns-2016-16
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: BIG-IP ASM Proactive Bot Defense vulnerability CVE-2016-7472 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/17/sol17119920.html?…
---------------------------------------------
*** Security Advisory: SSL renegotiation vulnerability CVE-2011-1473 ***
https://support.f5.com:443/kb/en-us/solutions/public/15000/200/sol15278.htm…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in lquerylv in LVM impacts AIX (CVE-2016-6079) ***
http://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc
---------------------------------------------
*** IBM Security Bulletin: IBM Resilient Cross Site Scripting Vulnerability (CVE-2016-6062) ***
https://success.resilientsystems.com/hc/en-us/articles/213457065-Security-B…
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Struts affect IBM WebSphere Portal (CVE-2015-0899, CVE-2016-1181, CVE-2016-1182) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21988770
---------------------------------------------
*** IBM Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server Liberty which may impact IBM Streams (CVE-2016-0378) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993571
---------------------------------------------
*** IBM Security Bulletin: HTTP response splitting attack affects IBM TS7700 Virtualization Engine (CVE-2015-2017) ***
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1008115
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 08-11-2016 18:00 − Mittwoch 09-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Admins aufgepasst: SHA1-Zertifikate vor dem endgültigen Aus ***
---------------------------------------------
Ab Januar 2017 wird es ernst: die großen Browser werden ab dann richtige Fehlermeldungen anzeigen, wenn sie auf Zertifikate treffen, die eine Signatur mit SHA1 aufweisen. Die sind aber immer noch im Einsatz, wie ein Kurztest von heise Security zeigt.
---------------------------------------------
https://heise.de/-3460868
*** Adsense: Google entfernt Bankentrojaner aus Werbenetzwerk ***
---------------------------------------------
Erneut ist über ein Werbenetzwerk Schadsoftware verteilt worden. Eine Google-Adsense-Kampagne hatte versucht, Android-Nutzern einen Bankentrojaner unterzuschieben. Die entsprechenden Anzeigen wurden mittlerweile deaktiviert. (Malware, Virus)
---------------------------------------------
http://www.golem.de/news/adsense-google-entfernt-bankentrojaner-aus-werbene…
*** MS16-NOV - Microsoft Security Bulletin Summary for November 2016 - Version: 1.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS16-NOV
*** App-Schwachstelle: Angreifer können iPhone-Anrufe auslösen ***
---------------------------------------------
Ein Fehler in populären iOS-Apps ermöglicht es, das iPhone zum automatischen Anwählen einer bestimmten Rufnummer zu bringen und den Nutzer zugleich am sofortigen Abbruch des Telefonats zu hindern.
---------------------------------------------
https://heise.de/-3460552
*** November 2016 security update release ***
---------------------------------------------
Today we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released. More information about this month's security updates and advisories can be found in the Security TechNet Library.
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2016/11/08/november-2016-security-…
*** Thoughts on the recent 'NtSetWindowLongPtr' vulnerability ***
---------------------------------------------
On October 31, Google security team has announced it has discovered a vulnerability, actively exploited the wild, in (unspecified) versions of Microsoft Windows. The vulnerability is a local privilege escalation, allowing an unprivileged user to gain kernel privileges.
---------------------------------------------
https://labs.bromium.com/2016/11/08/thoughts-on-the-recent-ntsetwindowlongp…
*** New XM1RPC SEO Spam and Backdoor Campaign ***
---------------------------------------------
We have been monitoring a new campaign specifically targeting WordPress sites, using hundreds of them for SEO spam distribution. We call it the XM1RPC campaign due to the common backdoor used across all of the compromised sites. The file is named in such a way as to confuse WordPress administrators who are familiar with XML-RPC. This malware usually infects all sites that share the same FTP account, which means cleaning just one website won't help...
---------------------------------------------
https://blog.sucuri.net/2016/11/xm1rpc-spam-backdoor.html
*** Phoenix Contact ILC PLC Authentication Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation details for authentication vulnerabilities in Phoenix Contact's ILC PLCs.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-313-01
*** Siemens Industrial Products Local Privilege Escalation Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a privilege escalation vulnerability that affects several Siemens industrial products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02
*** OSIsoft PI System Incomplete Model of Endpoint Features Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for an incomplete model of endpoint features vulnerability in OSIsoft's PI System software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICS-VU-313-03
*** TrickBot Banking Trojan Adds New Browser Manipulation Tools ***
---------------------------------------------
The banking Trojan TrickBot is evolving fast, according to researchers, and within weeks will expand its victim list and attack scope.
---------------------------------------------
http://threatpost.com/trickbot-banking-trojan-adds-new-browser-manipulation…
*** DSA-3709 libxslt - security update ***
---------------------------------------------
Nick Wellnhofer discovered that the xsltFormatNumberConversion functionin libxslt, an XSLT processing runtime library, does not properly checkfor a zero byte terminating the pattern string. This flaw can be exploited to leak a couple of bytes after the buffer that holds thepattern string.
---------------------------------------------
https://www.debian.org/security/2016/dsa-3709
*** Security Advisory - Input Validation Vulnerability in Wi-Fi Driver of Huawei Smart Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161109-…
*** Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched ***
---------------------------------------------
The effectiveness of a zero-day quickly deteriorates as an attack tool after it gets discovered and patched by the affected software vendors. Within the time between the discovery of the vulnerability and the release of the fix, a bad actor might try to get the most out of his previously valuable attack assets.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/QdtwFJ1RHyQ/
*** Vuln: SAP NetWeaver Java AS Webdynpro Component Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94174
*** New BEC scams seek to build trust first, request wire transfer later ***
---------------------------------------------
Business email compromise scammers have gradually changed their tactics to improve their scam success rate.
---------------------------------------------
https://www.symantec.com/connect/blogs/new-bec-scams-seek-build-trust-first…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple OpenSSL vulnerabilities affect IBM Aspera Shares 1.9.4 or earlier and IBM Aspera Console 3.0.6 or earlier ***
https://support.asperasoft.com/hc/en-us/articles/229505687-Security-Bulleti… -IBM-Aspera-Console-3-0-6-or-earlier
---------------------------------------------
*** IBM Security Bulletin: The BigFix Platform has a vulnerability involving missing the HTTP Strict-Transport-Security Header (CVE-2016-0297) ***
http://www.ibm.com/support/docview.wss?uid=swg21993214
---------------------------------------------
*** IBM Security Bulletin: BigFix Platform has a vulnerability where information is exposed through Log Files (CVE-2016-0296) ***
http://www.ibm.com/support/docview.wss?uid=swg21993213
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail Security Affected By Multiple Open Source CURL Vulnerabilities (CVE-2016-7167) ***
http://www.ibm.com/support/docview.wss?uid=swg21993246
---------------------------------------------
*** IBM Security Bulletin: IBM Connections Mobile Server Security Refresh for Apache Struts (CVE-2016-0785, CVE-2016-0785, CVE-2016-3093, CVE-2016-4003) ***
http://www.ibm.com/support/docview.wss?uid=swg21984206
---------------------------------------------
*** IBM Security Bulletin: IBM Connections Security Refresh for Apache Struts CVE-IDs: CVE-2016-0785 CVE-2016-2162 ***
http://www.ibm.com/support/docview.wss?uid=swg21985424
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 07-11-2016 18:00 − Dienstag 08-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Android: Sicherheitsupdate für November lässt kritische Lücke offen ***
---------------------------------------------
Linux-Kernel-Bug auf Nexus- und Pixel-Geräten noch nicht geschlossen - Update schließt Dutzende Sicherheitslücken
---------------------------------------------
http://derstandard.at/2000047142975
*** Android Security Bulletin November 2016 ***
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Alongside the bulletin, we have released a security update to Google devices through an over-the-air (OTA) update.
---------------------------------------------
https://source.android.com/security/bulletin/2016-11-01.html
*** DDoS attack halts heating in Finland amidst winter ***
---------------------------------------------
The systems that were attacked tried to respond to the attack by rebooting the main control circuit. This was repeated over and over so that heating was never working.
---------------------------------------------
http://metropolitan.fi/entry/ddos-attack-halts-heating-in-finland-amidst-wi…
*** Security Updates for Adobe Connect (APSB16-35) and Adobe Flash Player (APSB16-37) Available ***
---------------------------------------------
Adobe has published security bulletins for Adobe Connect (APSB16-35) and Adobe Flash Player (APSB16-37). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1420
*** MSRT November 2016: Unwanted software has nowhere to hide in this month's release ***
---------------------------------------------
We came across a browser modifier that sports rootkit capabilities. Not only does the threat, detected as BrowserModifier:Win32/Soctuseer, cross the line that separates legitimate software from unwanted, it also takes staying under the radar to the next level. Rootkit capabilities, which make it difficult to detect and remove applications, are usually associated with malware.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/11/08/msrt-november-2016-unwa…
*** Vuln: phpMyAdmin CVE-2016-6610 Full Path Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94118
*** BlackBerry powered by Android Security Bulletin November 2016 ***
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?articleNumber=000038666
*** Vuln: Multiple D-Link DIR Routers CVE-2016-6563 Remote Stack Overflow Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94130
*** Piwik 2.16.0 PHP Object Injection ***
---------------------------------------------
Affected Versions: Version 2.16.0 and prior versions.
Vulnerability Description: The vulnerability can be triggered through the saveLayout() method defined in /plugins/Dashboard/Controller.php:
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110055
*** f5 Security Advisories ***
---------------------------------------------
*** Security Advisory: Configuration utility CSRF vulnerability ***
https://support.f5.com:443/kb/en-us/solutions/public/k/21/sol21485342.html?…
---------------------------------------------
*** Security Advisory: Linux kernel vulnerability CVE-2016-7117 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/51/sol51201255.html?…
---------------------------------------------
*** Security Advisory: Multiple LibTIFF vulnerabilities ***
https://support.f5.com:443/kb/en-us/solutions/public/k/35/sol35155453.html?…
---------------------------------------------
*** Security Advisory: LibTIFF vulnerabilities CVE-2016-5320 and CVE-2015-8784 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/89/sol89096577.html?…
---------------------------------------------
*** Security Advisory: PHP vulnerabilities CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, and CVE-2015-6838 ***
https://support.f5.com:443/kb/en-us/solutions/public/17000/300/sol17377.htm…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Sterling Connect:Direct for HP NonStop (CVE-2016-2177, CVE-2016-6306, CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993601
---------------------------------------------
*** IBM Security Bulletin: Password Disclosure via application tracing in IBM Tivoli Storage Manager for Space Management (CVE-2016-0371) ***
http://www.ibm.com/support/docview.wss?uid=swg21990042
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect the BigFix Platform ***
http://www.ibm.com/support/docview.wss?uid=swg21993215
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect the BigFix Platform ***
http://www.ibm.com/support/docview.wss?uid=swg21993210
---------------------------------------------
*** IBM Security Bulletin: The BigFIx platform has a vulnerability where WebReports executes with unnecessary privileges (CVE-2016-0396) ***
http://www.ibm.com/support/docview.wss?uid=swg21993206
---------------------------------------------
*** IBM Security Bulletin: BigFix Platform has a vulnerability allowing unrestricted file upload (CVE-2016-0214) ***
http://www.ibm.com/support/docview.wss?uid=swg21993203
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 04-11-2016 18:00 − Montag 07-11-2016 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Sophos Web Appliance 4.2.1.3 Remote Code Execution ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110036
*** Two Critical MySQL Bugs Discovered ***
---------------------------------------------
An anonymous reader quotes InfoWorld: Two critical privilege escalation vulnerabilities in MySQL, MariaDB, and PerconaDB can help take control of ..
---------------------------------------------
https://developers.slashdot.org/story/16/11/05/056227/two-critical-mysql-bu…
*** Tech support scammers use denial of service bug to hang victims ***
---------------------------------------------
Process pig keeps eyes glued on fraudsters phone number. Tech support fraudsters have taught an old denial of service bug new tricks to add a convincing layer of authenticity to scams.
---------------------------------------------
www.theregister.co.uk/2016/11/07/tech_support_scammers_use_denial_of_servic…
*** Vuln: cURL/libcURL CVE-2016-8625 Remote Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94107
*** Disassembling a Mobile Trojan Attack ***
---------------------------------------------
In fact, any site using AdSense to display adverts could potentially have displayed messages that downloaded the dangerous Svpeng and automatically saved it to ..
---------------------------------------------
http://securelist.com/blog/research/76286/disassembling-a-mobile-trojan-att…
*** Hintergrund: Threat Intelligence: IT-Sicherheit zum Selbermachen? ***
---------------------------------------------
Viele IT-Sicherheitsfirmen erweitern ihr Portfolio derzeit um sogenannte Threat Intelligence. Die ist jedoch kein Allheilmittel sondern muss gezielt eingesetzt werden, um einen echten Mehrwert zu erzielen. Dr. Timo Steffens vom ..
---------------------------------------------
https://heise.de/-3453595
*** SSA-701708 (Last Update 2016-11-07): Local Privilege Escalation in Industrial Products ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708…
*** SSA-378531 (Last Update 2016-11-07): Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC Runtime Professional ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531…
*** IBM Security Bulletin: Vulnerability in IBM Java SDK affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2016-5597) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21993700
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM MessageSight (CVE-2016-3598) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21992715
*** IBM Security Bulletin: IBM WebSphere Cast Iron Solution is affected by Apache Tomcat vulnerability (CVE-2016-5388) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21992977
*** Login Form Hijacking Vulnerability in Citrix NetScaler Gateway ***
---------------------------------------------
https://support.citrix.com/article/CTX213313
*** Citrix XenServer Security Update for CVE-2016-0800 ***
---------------------------------------------
A security vulnerability has been identified in Citrix XenServer that could, if exploited, allow a malicious attacker with access to the XenServer ..
---------------------------------------------
https://support.citrix.com/article/CTX208403
*** Multiple Security Vulnerabilities in Citrix NetScaler Platform ... ***
---------------------------------------------
A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler ..
---------------------------------------------
https://support.citrix.com/article/CTX216642