=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 27-05-2014 18:00 − Mittwoch 28-05-2014 18:00
Handler: Christian Wojner
Co-Handler: Stephan Richter
*** Spam Campaign Spreading Malware Disguised as HeartBleed Bug Virus Removal Tool ***
---------------------------------------------
At the beginning of April, a vulnerability in the OpenSSL cryptography library, also known as the Heartbleed bug, made headlines around the world.read more
---------------------------------------------
http://www.symantec.com/connect/blogs/spam-campaign-spreading-malware-disgu…
*** [2014-05-28] Root Backdoor & Unauthenticated access to voice recordings in NICE Recording eXpress ***
---------------------------------------------
Attackers are able to completely compromise the voice recording / surveillance solution "NICE Recording eXpress" as they can gain access to the system and database level and listen to recorded calls without prior authentication or exploit a root backdoor account.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Apple Ransomware Targeting iCloud Users Hits Australia ***
---------------------------------------------
A handful of iPhone, iPad and Mac users, largely confined to Australia, awoke Tuesday to discover their devices had been taken hostage by ransomware.
---------------------------------------------
http://threatpost.com/apple-ransomware-targeting-icloud-users-hits-australi…
*** iPhone-"Entführung" per Fernzugriff: Apple betont, dass iCloud sicher ist ***
---------------------------------------------
In einem Statement heißt es, die derzeit in Australien die Runde machenden Erpressungsversuche, bei denen Angreifer Apple-Hardware aus der Ferne sperren, hätten nichts mit Sicherheitsproblemen in der iCloud zu tun. Schlechte Passwörter seien schuld.
---------------------------------------------
http://www.heise.de/security/meldung/iPhone-Entfuehrung-per-Fernzugriff-App…
*** Bugtraq: LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/532224
*** Kali-Linux: Pentesting-Stick mit Verschlüsselung und Notfallknopf ***
---------------------------------------------
Wer Kali Linux auf einen USB-Stick installiert, kann die Datenpartition mit Version 1.0.7 endlich verschlüsseln. Das schützt brisante Daten vor neugierigen Blicken. Darüber hinaus gibt es einen Selbstzerstörungs-Mechanismus.
---------------------------------------------
http://www.heise.de/security/meldung/Kali-Linux-Pentesting-Stick-mit-Versch…
Next End-of-Shift report on 2015-05-30
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 26-05-2014 18:00 − Dienstag 27-05-2014 18:00
Handler: Christian Wojner
Co-Handler: Stephan Richter
*** Mac OS X: VirusTotal veröffentlicht Uploader ***
---------------------------------------------
Der von Google aufgekaufte Viren-Scan-Dienst hat ein Tool veröffentlicht, mit dem Mac-Nutzer suspekte Dateien und Programme zur Prüfung hochladen können. VirusTotal erhofft sich tieferen Einblick in OS-X-Schadsoftware.
---------------------------------------------
http://www.heise.de/security/meldung/Mac-OS-X-VirusTotal-veroeffentlicht-Up…
*** Malicious Redirections to Porn Websites ***
---------------------------------------------
The past week has brought about a large number of cases where compromised websites had hidden redirections to porn injected into their code. All the infections had a similar pattern where they only targeted mobile devices. They are highly conditional as well making it challenging for webmasters to detect. Lets take a minute to explain...
---------------------------------------------
http://feedproxy.google.com/~r/sucuri/blog/~3/aMQhA3--dfg/website-infection…
*** Unsafe cookies leave WordPress accounts open to hijacking, 2-factor bypass ***
---------------------------------------------
Accounts accessed from Wi-Fi hotspots and other unsecured networks are wide open.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/yKbonlXYDrk/
*** Youve got Mail! But someone else is reading it in Outlook for Android ***
---------------------------------------------
Researchers say Redmond forgot to encrypt messages stored on Android SD cards Researchers have plucked privacy holes in Microsofts Outlook Android app that expose user data when user security setting screws were not tightened.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/05/27/prying_priv…
*** Mt. Gox: Bitcoin-Preise angeblich durch Bots manipuliert ***
---------------------------------------------
Neue Spekulation um die insolvente Bitcoin-Börse Mt. Gox: Laut einer Analyse sollen Bots die Preise an der Börse getrieben und mindestens rund 570.000 Bitcoins aufgekauft haben.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Mt-Gox-Bitcoin-Preise-angeblich-durc…
*** Fernwartungsfunktion: Onlineganoven entführen Macs und iPhones ***
---------------------------------------------
Mit "Find My iPhone" und "Find My Mac" können Nutzer geklaute Hardware über ihre Apple ID sperren. Gerät diese in falsche Hände, können das aber auch Erpresser. In Australien sollen solche "Entführungen" gerade öfter vorkommen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Fernwartungsfunktion-Onlineganoven-e…
*** cPanel cgiemail Character Injection Flaw Lets Remote Users Send SPAM via the System ***
---------------------------------------------
A remote user can inject newline characters via certain parameters to modify email fields and send SPAM to arbitrary destination addresses via cgiemail.
---------------------------------------------
http://www.securitytracker.com/id/1030287
*** Avast-Forum fällt Hackerangriff zum Opfer ***
---------------------------------------------
Unbekannten gelang es, Nutzernamen, E-Mail-Adressen und verschlüsselte Passwörter von 350.000 Nutzern zu kopieren. Der Firmenchef des Antivirenherstellers hält es für möglich, dass die Hacker an Klartext-Passwörter kommen.
---------------------------------------------
http://www.heise.de/security/meldung/Avast-Forum-faellt-Hackerangriff-zum-O…
*** Multiple Vulnerabilities in TYPO3 CMS ***
---------------------------------------------
It has been discovered that TYPO3 CMS is vulnerable to Cross-Site Scripting, Insecure Unserialize, Improper Session Invalidation, Authentication Bypass, Information Disclosure and Host Spoofing.
---------------------------------------------
http://typo3.org/news/article/multiple-vulnerabilities-in-typo3-cms-1/
*** Amazons AWS bietet Verschlüsselung auf Blockebene ***
---------------------------------------------
Nutzer von Amazons Cloud-Angeboten können ihre auf virtuellen Laufwerken gespeicherten Daten verschlüsseln.
---------------------------------------------
http://www.heise.de/security/meldung/Amazons-AWS-bietet-Verschluesselung-au…
*** Top 10 Windows Server Security Misconfigurations ***
---------------------------------------------
Introduction According to Wikipedia, 32.6% of servers on the Internet are running Microsoft Windows. The purpose of this article is to create awareness among system administrators and managers about some of the areas on which it is important to focus when implementing a new Windows build or when hardening the security of an existing server. The Survey One of the activities of the @NCCGroupInfosec team is to perform build reviews on clients' systems, looking for any misconfigurations that...
---------------------------------------------
https://www.nccgroup.com/en/blog/2014/05/top-10-windows-server-security-mis…
*** Zeus-Carberp Hybrid Trojan Pops Up ***
---------------------------------------------
Researchers have discovered a new hybrid Trojan that combines elements of two of the more notorious crimeware strains of the last few years: Zeus and Carberp. It's not uncommon for malware writers to steal bits and pieces of code from one another, but both Zeus and Carberp were once exclusively private tools, but the source...
---------------------------------------------
http://threatpost.com/zeus-carberp-hybrid-trojan-pops-up/106283
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 23-05-2014 18:00 − Montag 26-05-2014 18:00
Handler: Christian Wojner
Co-Handler: Stephan Richter
*** Long run compromised accounting data based type of managed iframe-ing service spotted in the wild ***
---------------------------------------------
In a cybercrime ecosystem dominated by DIY (do-it-yourself) malware/botnet generating releases, populating multiple market segments on a systematic basis, cybercriminals continue seeking new ways to acquire and efficiently monetize fraudulently obtained accounting data, for the purpose of achieving a positive ROI (Return on Investment) on their fraudulent operations. In a series of blog posts, we've been detailing the existence of commercially available server-based malicious...
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/HvVQ_hnfyXQ/
*** RAT in a jar: A phishing campaign using Unrecom + IOC's ***
---------------------------------------------
In the past two weeks, we have observed an increase in attack
activity against the U.S. state and local government, technology,
advisory services, health, and financial sectors through phishing
emails with what appears to be a remote access trojan (RAT) known as Unrecom. The attack has also been observed against the financial sector in Saudi Arabia and Russia.
---------------------------------------------
http://www.fidelissecurity.com/webfm_send/382 (PDF)
http://www.fidelissecurity.com/files/files/FTA1013_RAT_in_a_jar_IOCs.xlsx
*** Hackers claim MitM attack enables iCloud security feature bypass ***
---------------------------------------------
Hackers claim that the iOS Activation Lock, a feature that makes it harder for crooks to use and sell lost or stolen Apple mobile devices, can be bypassed in a MitM attack.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/kJtdTS-KQeU/
*** US may block visas for Chinese hackers attending DefCon, Black Hat ***
---------------------------------------------
Organizers of those conferences skeptical of the move to exclude Chinese nationals.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/Cny7FF2H8rU/
*** Warnung vor Update-Hack für Windows XP ***
---------------------------------------------
Mit einem Trick kann man dem Update-Server von Microsoft vormachen, man betreibe eine Spezialversion von Windows XP, die noch bis April 2019 mit Updates versorgt wird. Das ist allerdings nicht ganz ungefährlich.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Warnung-vor-Update-Hack-fuer-Windows…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 21-05-2014 18:00 − Donnerstag 22-05-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** 145 Millionen Kunden von eBay-Hack betroffen ***
---------------------------------------------
Unbekannte haben einen grossen Teil der Kundendatenbank der Online-Handelsplattform kopiert. Während der Druck auf eBay steigt, gibt es erste Hinweise, dass die gestohlenen Daten schon missbraucht werden.
---------------------------------------------
http://www.heise.de/security/meldung/145-Millionen-Kunden-von-eBay-Hack-bet…
*** Multiple Vulnerabilities in Cisco NX-OS-Based Products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** SA-CONTRIB-2014-057 - Password policy - General logic error ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-057, Project: Password policy (third-party module), Version: 7, Security risk: Moderately critical; This module enables you to define password policies with various constraints on allowable user passwords. The history constraint, when enabled, disallows a users password from being changed to match a specified number of their ..
---------------------------------------------
https://drupal.org/node/2271839
*** SA-CONTRIB-2014-055 - Require Login - Access bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-055, Project: Require Login (third-party module), Version: 7, Security risk: Moderately critical; This module enables you to restrict access to a site for all non-authenticated users.The module does not protect the front page, thereby exposing any sensitive information on the front page to anonymous users.This vulnerability is mitigated by the fact that private/sensitive information ..
---------------------------------------------
https://drupal.org/node/2271837
*** SA-CONTRIB-2014-056 - Commerce Moneris - Information Disclosure ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-056, Project: Commerce Moneris (third-party module), Version: 7, Security risk: Critical; Commerce Moneris is a payment module that integrates the Moneris payment system with Drupal Commerce.The module stores credit card data in a commerce order object unnecessarily for the purpose of passing the credit card information to the payment gateway. The credit card information is ..
---------------------------------------------
https://drupal.org/node/2271823
*** SA-CONTRIB-2014-054 - Views - Access Bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-054, Project: Views (third-party module), Version: 7, Security risk: Moderately critical; The Views module provides a flexible method for Drupal site designers to control how lists and tables of content, users, taxonomy terms and other data are presented.The module doesnt sufficiently check handler access when returning the list of handlers ..
---------------------------------------------
https://drupal.org/node/2271809
*** IBM Security Bulletin: Security vulnerabilities have been identified in IBM WebSphere Application Server shipped with IBM WebSphere Portal ***
---------------------------------------------
IBM WebSphere Application Server is shipped as a component of IBM WebSphere Portal. Information about a security vulnerabilities affecting IBM WebSphere Application Server has been published in security bulletins. CVE(s): CVE-2014-0963 Affected product(s) ..
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** A peek inside a newly launched all-in-one E-shop for cybercrime-friendly services ***
---------------------------------------------
Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious 'know-how', further contributing to the growth of the cybercrime ecosystem. In a series of blog posts highlighting the emergence of the boutique cybercrime-friendly E-shops, we've been emphasizing on the over-supply of compromised/stolen accounting data, efficiently aggregated ..
---------------------------------------------
http://www.webroot.com/blog/2014/05/21/peek-inside-newly-launched-one-e-sho…
*** Redmond wont fix IE 8 zero day, says harden up instead ***
---------------------------------------------
Phishers get fresh code execution bait Microsoft has decided not to fix an IE 8 zero-day first identified seven months ago, instead telling users to harden up their browsers.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/05/22/ie_8_zero_d…
*** Hacker wollen Apples iOS-Aktivierungssperre geknackt haben ***
---------------------------------------------
Eine Team aus den Niederlanden und Marokko behauptet, die in iCloud integrierte Funktion ausgehebelt zu haben, mit der Apple die Nutzung geklauter iPhones und iPads verhindern will - angeblich per Man-in-the-Middle-Angriff. Bislang fehlen viele Details.
---------------------------------------------
http://www.heise.de/security/meldung/Hacker-wollen-Apples-iOS-Aktivierungss…
*** Multiple Vulnerabilities in TYPO3 CMS ***
---------------------------------------------
It has been discovered that TYPO3 CMS is vulnerable to Cross-Site Scripting, Insecure Unserialize, Improper Session Invalidation, Authentication Bypass, Information Disclosure and Host Spoofing. Vulnerability Types: Cross-Site Scripting, Insecure Unserialize, Improper Session Invalidation, Authentication Bypass, Information Disclosure and Host Spoofing. Overall Severity: Medium
---------------------------------------------
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-s…
*** XML Schema, DTD, and Entity Attacks - A Compendium of Known Techniques ***
---------------------------------------------
The eXtensible Markup Language (XML) is an extremely pervasive technology used in countless software projects. ... When used incorrectly, certain aspects of these document definition and validation features can lead to security vulnerabilities in applications that use XML. This document attempts to provide an up to date reference on these attacks, enumerating all publicly known techniques applicable to the most popular XML parsers in use while exploring a few novel attacks as well.
---------------------------------------------
http://packetstorm.interhost.co.il/papers/general/XMLDTDEntityAttacks.pdf
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 20-05-2014 18:00 − Mittwoch 21-05-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Ebay: Kundendaten bei Hackerangriff gestohlen ***
---------------------------------------------
Hacker hatten im Februar und März Zugriff auf Kundendaten
---------------------------------------------
http://derstandard.at/2000001422781
*** Enterprises Still Lax on Privileged User Access Controls ***
---------------------------------------------
The results of a survey commissioned by Raytheon demonstrate that enterprises still dont have a firm grasp on privileged users and their activities on corporate networks.
---------------------------------------------
http://threatpost.com/enterprises-still-lax-on-privileged-user-access-contr…
*** iBanking: Exploiting the Full Potential of Android Malware ***
---------------------------------------------
http://www.symantec.com/connect/blogs/ibanking-exploiting-full-potential-an…
*** World's most pricey trojan is veritable Swiss Army knife targeting Android ***
---------------------------------------------
Malicious Android app contains remote bugging, SMS interception, and much more.
---------------------------------------------
http://arstechnica.com/security/2014/05/worlds-most-pricey-trojan-is-verita…
*** Siemens Industrial Products OpenSSL Heartbleed Vulnerability (Update B) ***
---------------------------------------------
http://ics-cert.us-cert.gov//advisories/ICSA-14-105-03B
*** [2014-05-21] Multiple critical vulnerabilities in CoSoSys Endpoint Protector 4 ***
---------------------------------------------
The software CoSoSys Endpoint Protector is affected by critical, unauthenticated SQL injection vulnerabilities and backdoor accounts.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Security App of the Week: WP Security Audit Log ***
---------------------------------------------
WP Security Audit Log is a WordPress plugin that logs all the actions and events that take place under your website's hood. The plugin is useful not only in case of a data breach, but also for preventing one. The plugin is designed to generate a security alert when certain actions are detected. For instance, ..
---------------------------------------------
http://news.softpedia.com/news/Security-App-of-the-Week-WP-Security-Audit-L…
*** Hook Analyser 3.1 - Malware Analysis Tool ***
---------------------------------------------
Hook Analyser is a freeware application which allows an investigator/analyst to perform 'static & run-time / dynamic' analysis of suspicious applications, also gather (analyse & co-related) threat intelligence related information (or data) from various open sources on the Internet.
---------------------------------------------
http://www.darknet.org.uk/2014/05/hook-analyser-3-1-malware-analysis-tool/
*** Why You Should Ditch Adobe Shockwave ***
---------------------------------------------
This author has long advised computer users who have Adobes Shockwave Player installed to junk the product, mainly on the basis that few sites actually require the browser plugin, and because its yet another plugin that requires constant updating. But I was positively shocked this week to learn that this software introduces a far more pernicious problem: Turns out, ..
---------------------------------------------
http://krebsonsecurity.com/2014/05/why-you-should-ditch-adobe-shockwave/
*** LSE stellt Authentifizierungs-Tool LinOTP unter Open-Source-Lizenz ***
---------------------------------------------
Das Authentifizierungswerkzeug LinOTP steht ab sofort als Open-Source-Produkt zum kostenlosen Download bereit.
---------------------------------------------
http://www.heise.de/newsticker/meldung/LSE-stellt-Authentifizierungs-Tool-L…
*** Bugs in your TV ***
---------------------------------------------
Introduction As part of our research into the Internet of Things (IoT), we were asked to look at the current generation of Smart TVs and see whether they posed any new issues when used in the home or office. In particular, the latest sets come with built-in cameras (for use with video chat applications, ..
---------------------------------------------
https://www.nccgroup.com/en/blog/2014/05/bugs-in-your-tv/
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 19-05-2014 18:00 − Dienstag 20-05-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Blackshades - Coordinated Takedown Leads to Multiple Arrests ***
---------------------------------------------
The FBI, Europol and several other law enforcement agencies have arrested dozens of individuals suspected of cybercriminal activity centered around the malware known as Blackshades (a.k.a. W32.Shadesrat).read more
---------------------------------------------
http://www.symantec.com/connect/blogs/blackshades-coordinated-takedown-lead…
*** Moodle Bugs Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1030256
*** Silverlight finally becomes popular ... with criminals ***
---------------------------------------------
Angler exploit kit targets Redmonds unloved rich web application kit Silverlight has become a choice target for VXers who are foisting nasty exploit kits on users through hacked advertising networks.
---------------------------------------------
http://www.theregister.co.uk/2014/05/20/silverlight_attacks_spike_as_ekers_…
*** Cisco IOS XR DHCPv6 Processing Flaw Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1030259
*** Bugtraq: t214: Call for Papers 2014 (Helsinki / Finland) ***
---------------------------------------------
http://www.securityfocus.com/archive/1/532154
*** When Networks Turn Hostile ***
---------------------------------------------
We've previously discussed how difficult it is to safely connect to networks when on the go. This is particularly true on vacations and holidays, where the availability of Internet access is one of the most important factors when looking for a place to stay.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/when-networks-tu…
*** Cisco IOS Software IPv6 Denial of Service Vulnerability ***
---------------------------------------------
cisco-sa-20110928-ipv6
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Sicherheitslücke in iTunes: BSI drängt zum Update ***
---------------------------------------------
Eine durch Apples Medien-Software verursachte Schwachstelle erlaubt lokalen Nutzern einen umfassenden Zugriff auf andere Benutzerkonten - das Bundesamt für Sicherheit in der Informationstechnik rät zum Update auf Version 11.2.1.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-in-iTunes-BSI-draeng…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 16-05-2014 18:00 − Montag 19-05-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** January-April 2014 ***
---------------------------------------------
The 'NCCIC/ICS-CERT Monitor' newsletter offers a means of promoting preparedness, information sharing, and collaboration with the 16 critical infrastructure sectors. ICS-CERT accomplishes this on a day-to-day basis through sector briefings, meetings, conferences, and information product releases.
This publication highlights recent activities and information products affecting industrial control systems (ICSs), and provides a look ahead at upcoming ICS-related events.
---------------------------------------------
http://ics-cert.us-cert.gov//monitors/ICS-MM201404
*** IBM Security Bulletin: Fixes available for vulnerability in Apache Commons FileUpload contained in IBM WebSphere Portal (CVE-2014-0050) ***
---------------------------------------------
Fixes available for a denial of service vulnerability in the open source library Apache Commons FileUpload which affects IBM WebSphere Portal.
CVE(s): CVE-2014-0050
Affected product(s) and affected version(s):
WebSphere Portal 8
WebSphere Portal 7
WebSphere Portal 6.1.x
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: A security vulnerability has been identified in WebSphere Application Server shipped with Rational ClearCase ***
---------------------------------------------
IBM WebSphere Application Server is shipped as a component of IBM Rational ClearCase. Information about a security vulnerability affecting WebSphere Application Server has been published in a security bulletin.
CVE(s): CVE-2014-0964
Affected product(s) and affected version(s):
IBM Rational ClearCase, CM Server component, release 7.1.x (7.1.0.x, 7.1.1.x, and 7.1.2.x).
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Mozilla gründet "Winter of Security" ***
---------------------------------------------
Studenten können bei Mozillas Programm für ihr Studium ein Projekt durchführen, das eine Bedeutung auch außerhalb der Universität hat. Begleitet wird die Arbeit von einem Entwickler.
---------------------------------------------
http://www.heise.de/security/meldung/Mozilla-gruendet-Winter-of-Security-21…
*** Malvertising Up By Over 200% ***
---------------------------------------------
An anonymous reader writes "Online Trust Alliance (OTA) Executive Director and President Craig Spiezle testified before the U.S. Senates Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations, outlining the risks of malicious advertising, and possible solutions to stem the rising tide. According to OTA research, malvertising increased by over 200% in 2013 to over 209,000 incidents, generating over 12.4 billion malicious ad impressions.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/ZUq6VAva50Y/story01.htm
*** DDoS Trojans attack Linux ***
---------------------------------------------
May 15, 2014 The fallacy that Linux is fully protected against malware thanks to the specific features of its architecture makes life much easier for intruders distributing such software. In May 2014, Doctor Webs security analysts identified and examined a record-high number of Trojans for Linux, a large portion of which is designed to (distributed denial of service) attacks. These programs share common features: first, they carry out DDoS attacks via various protocols, and second, they appear ..
---------------------------------------------
http://news.drweb.com/show/?i=5760&lng=en&c=9
*** Security: Datenbank informiert über Identitätsklau ***
---------------------------------------------
Eine Datenbank gibt Informationen darüber, ob Passwörter oder Kontodaten eines Nutzers auf einschlägigen Foren zu finden sind. Die vom Hasso-Plattner-Institut bereitgestellten Informationen unterscheiden sich von denen des BSI.
---------------------------------------------
http://www.golem.de/news/security-datenbank-informiert-ueber-identitaetskla…
*** Cisco ASA Crafter RADIUS Packets Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the implementation of the Remote Authentication Dial-in User Services (RADIUS) code of Cisco ASA Software could allow an authenticated, remote attacker to cause an affected system to reload.
The vulnerability is due to insufficient validation of RADIUS packets including crafted attributes. An attacker could exploit this vulnerability by sending crafted RADIUS packets to the affected system. The attacker must know the RADIUS shared secret and inject the crafted packet while a RADIUS exchange is in progress.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Mid-2014 Tech Security Rundown: 5 Current Exploits Worth Knowing About ***
---------------------------------------------
Here are just a few of the security threats that have risen to prominence in recent months.
...
Rotbrow
Mobile Side Channel Leakage
IoT Hardware & Software
Ad Network Intrusion
Out of Harm's Way
Besides these exploits, web users must contend with on-going threats like SQL injection and cross-site scripting.
---------------------------------------------
http://hackersnewsbulletin.com/2014/05/mid-2014-tech-security-rundown-5-cur…
*** Online-Banking: Verstärkte Angriffe auf das mTAN-Verfahren ***
---------------------------------------------
Experten warnen vor verstärkten Infektionen mit dem Android-Trojaner FakeToken. Die Software kopiert empfangene SMS, die TANs enthalten. Ganoven können dann das Konto des Opfers leer räumen.
---------------------------------------------
http://www.heise.de/security/meldung/Online-Banking-Verstaerkte-Angriffe-au…
*** Kryptographie: Schnellerer Algorithmus für das diskrete Logarithmusproblem ***
---------------------------------------------
Auf der Eurocrypt-Konferenz ist ein schnellerer Algorithmus für eine spezielle Variante des diskreten Logarithmusproblems vorgestellt worden. Dieses Problem ist die Grundlage zahlreicher kryptographischer Verfahren, doch eine direkte Bedrohung für real eingesetzte Algorithmen gibt es zur Zeit nicht.
---------------------------------------------
http://www.golem.de/news/kryptographie-schnellerer-algorithmus-fuer-das-dis…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 15-05-2014 18:00 − Freitag 16-05-2014 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** CSWorks Software SQL Injection Vulnerability ***
---------------------------------------------
Researcher John Leitch, working with HP's Zero Day Initiative (ZDI), has identified an SQL injection vulnerability in CSWorks' CSWorks software framework. CSWorks has produced an updated version that mitigates this vulnerability.
This vulnerability could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov//advisories/ICSA-14-135-01
*** Statistik: Verschlüsselter Datenverkehr nimmt zu ***
---------------------------------------------
Laut einer Studie steigt seit Beginn der Enthüllungen des Whistleblowsers Edward Snowden der Anteil an SSL-verschlüsselten Verbindungen im Internet. Die Zunahmen in den USA und Europa unterscheiden sich aber.
---------------------------------------------
http://www.heise.de/security/meldung/Statistik-Verschluesselter-Datenverkeh…
*** Torque 2.5.13 Buffer Overflow ***
---------------------------------------------
Topic: Torque 2.5.13 Buffer Overflow Risk: High Text:A buffer overflow exists in versions of TORQUE which can be exploited in order to remotely execute code from an unauthenticated...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050086
*** Apple Releases OS X 10.9.3, Fixes Serious Flaw in iTunes ***
---------------------------------------------
Apple has released a new version of OS X Mavericks, which includes all of the security fixes it pushed out last month. OS X 10.9.3 includes the patches for the so-called triple handshake SSL vulnerability, as well as fixes for several remote code-execution vulnerabilities.
---------------------------------------------
http://threatpost.com/apple-releases-os-x-10-9-3-fixes-serious-flaw-in-itun…
*** Understanding how Fuzzing Relates to a Vulnerability like Heartbleed ***
---------------------------------------------
Fuzzing is a security-focused testing technique in which a compiled program is executed so that the attack surface can be tested as it actually runs. The attack surfaces are the components of code that accept user input. Since this is the most vulnerable part of code, it should be rigorously tested with anomalous data.
---------------------------------------------
http://labs.bromium.com/2014/05/14/understanding-how-fuzzing-relates-to-a-v…
*** iTunes: Apple schließt problematische Lücke in PC-Version ***
---------------------------------------------
Das Update 11.2 stopft ein Leck, über das es unter Windows XP SP3 bis 8 möglich war, iTunes-Zugangsdaten zu stehlen.
---------------------------------------------
http://www.heise.de/security/meldung/iTunes-Apple-schliesst-problematische-…
*** PayPal Fixes Serious Account Hijacking Bug in Manager ***
---------------------------------------------
PayPal patched a hole in its Manager functionality this week that could have made it easy for an attacker to hijack an admin's account, change their password and steal their personal information -- not to mention their savings.
---------------------------------------------
http://threatpost.com/paypal-fixes-serious-account-hijacking-bug-in-manager…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 13-05-2014 18:00 − Mittwoch 14-05-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Microsoft Security Bulletin Summary for May 2014 - Version: 2.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-MAY
*** Assessing risk for the May 2014 security updates ***
---------------------------------------------
Today we released eight security bulletins addressing 13 unique CVEs. Two bulletins have a maximum severity rating of Critical while the other six have a maximum severity rating of Important. The table is designed to help you prioritize the deployment of updates appropriately for your ..
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/05/13/assessing-risk-for-the-ma…
*** Operation Saffron Rose ***
---------------------------------------------
There is evolution and development underway within Iranian-based hacker groups that coincides with Iran's efforts at controlling political dissent and expanding offensive cyber capabilities. The capabilities of ..
---------------------------------------------
http://www.fireeye.com/blog/technical/malware-research/2014/05/operation-sa…
*** Yokogawa Multiple Products Vulnerabilities ***
---------------------------------------------
http://ics-cert.us-cert.gov//advisories/ICSA-14-133-01
*** DSA-2927 libxfont ***
---------------------------------------------
http://www.debian.org/security/2014/dsa-2927
*** WordPress Formidable Forms Remote Code Execution ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050069
*** Patchday: Adobe flickt Flash und Illustrator ***
---------------------------------------------
Adobe hat am Mai-Patchday Sicherheitsupdates für Lücken im Flash-Player und in Adobe Illustrator CS6 herausgegeben. Die Updates für beide Programme werden von der Firma als kritisch eingeschätzt.
---------------------------------------------
http://www.heise.de/security/meldung/Patchday-Adobe-flickt-Flash-und-Illust…
*** Security updates available for Adobe Flash Player ***
---------------------------------------------
Adobe has released security updates for Adobe Flash Player 13.0.0.206 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.356 and earlier versions for Linux. These updates address vulnerabilities that could ..
---------------------------------------------
https://helpx.adobe.com/security/products/flash-player/apsb14-14.html
*** Security hotfix available for Adobe Illustrator (CS6) ***
---------------------------------------------
Adobe has released a security hotfix for Adobe Illustrator (CS6) for Windows and Macintosh. This hotfix addresses a vulnerability that could be exploited to gain remote code execution on the affected system. Adobe recommends users ..
---------------------------------------------
https://helpx.adobe.com/security/products/illustrator/apsb14-11.html
*** Heartbleed-Betroffene stecken Kopf in den Sand ***
---------------------------------------------
Wer einen Server mit einer für Heartbleed anfälligen OpenSSL-Version betrieben hat, muss damit rechnen, dass seine Private Keys kompromittiert wurden. Trotzdem sind diese in den meisten Fällen immer noch im Einsatz.
---------------------------------------------
http://www.heise.de/security/meldung/Heartbleed-Betroffene-stecken-Kopf-in-…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 12-05-2014 18:00 − Dienstag 13-05-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** NSA manipuliert per Post versandte US-Netzwerktechnik ***
---------------------------------------------
Bereits Anfang des Jahres hatte Jacob Appelbaum behauptet, die NSA fange per Post versandte Geräte ab, um darauf Spyware zu installieren. Nun untermauert Glenn Greenwald diese Anschuldigung: Betroffen seien unter anderem Router und Server von Cisco.
---------------------------------------------
http://www.heise.de/security/meldung/NSA-manipuliert-per-Post-versandte-US-…
*** AV-Firma warnt wieder vor Adware-Trojaner für OS X ***
---------------------------------------------
Nach Angabe von Doctor Web ist aktuell neue Adware im Umlauf, die auf Mac-Nutzer abzielt. Die unerwünschten Browser-Plugins werden bei der Installation von OS-X-Software mit eingespielt.
---------------------------------------------
http://www.heise.de/security/meldung/AV-Firma-warnt-wieder-vor-Adware-Troja…
*** Zertifikate: DANE und DNSSEC könnten mehr Sicherheit bringen ***
---------------------------------------------
DANE könnte die Echtheitsprüfung von Zertifikaten bei TLS-Verbindungen verbessern. Allerdings benötigt das System DNSSEC - und das ist bislang kaum verbreitet. Der Mailanbieter Posteo prescht jetzt voran und will das System etablieren.
---------------------------------------------
http://www.golem.de/news/zertifikate-dane-und-dnssec-koennten-mehr-sicherhe…
*** Lücken in AVG Remote Administration bleiben offen ***
---------------------------------------------
Auf Anfrage teilte die Firma mit, dass sie Angriffe aus dem LAN heraus nicht verhindern könne und deswegen drei Lücken in der Software nicht schliessen wolle. Durch die Lücken können Angreifer den Virenschutz einer Organisation von innen abschalten.
---------------------------------------------
http://www.heise.de/security/meldung/Luecken-in-AVG-Remote-Administration-b…
*** Proactively Hardening Systems Against Intrusion: Configuration Hardening ***
---------------------------------------------
The concept of 'hardening' has nice imagery to it. When we use it to describe battle-hardened soldiers who have been tested in combat a grim, determined image invariably leaps to mind. The same thing happens when we speak of hardened steel that's been repeatedly quenched and tempered, or ..
---------------------------------------------
http://www.tripwire.com/state-of-security/security-data-protection/automati…
*** Adobe Security Bulletins Posted ***
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1100
*** Linux Kernel raw_cmd_copyin() privilege escalation ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/93050
*** RSA Security Analytics Lets Remote Users Bypass Authentication ***
---------------------------------------------
http://www.securitytracker.com/id/1030220
*** RSA NetWitness Lets Remote Users Bypass Authentication ***
---------------------------------------------
http://www.securitytracker.com/id/1030219
*** Flag Module for importer code execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/93086
*** grub-mkconfig local access to password ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050063
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 09-05-2014 18:00 − Montag 12-05-2014 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** Collabtive folder SQL injection ***
---------------------------------------------
Collabtive is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the managefile.php script using the folder parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/93029
*** Cobbler kickstart value file include ***
---------------------------------------------
Cobbler could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL request using the Kickstart value when creating new profiles, to specify a malicious file from the local system, which could allow the attacker to obtain sensitive information or execute arbitrary code on the vulnerable Web server.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/93033
*** Bitcoin Miner Utilizing IRC Worm ***
---------------------------------------------
Bitcoin miners have given a new reason for attackers to communicate en mass with infected users. IRC worms are not exactly the most hip way to communicate, but they remain effective at sending and receiving commands. I recently came across several samples which bit coin mining examples leveraging IRC. The malicious binary, once installed, queries for the network shares connected to the
---------------------------------------------
http://feedproxy.google.com/~r/zscaler/research/~3/2xQ7VPxF-ms/bitcoin-mine…
*** strongSwan Null Pointer Dereference in Processing ID_DER_ASN1_DN ID Payloads Lets Remote Users Deny Service ***
---------------------------------------------
A vulnerability was reported in strongSwan. A remote user can cause denial of service conditions.
A remote user can send a specially crafted ID_DER_ASN1_DN ID payload to trigger a null pointer dereference and cause the target IKE service to crash.
---------------------------------------------
http://www.securitytracker.com/id/1030209
*** G Data: Symantecs "Ende der Antivirensoftware" verunsichert Nutzer ***
---------------------------------------------
Nicht verunsichern lassen und weiter Antivirensoftware kaufen - so lautet ein Aufruf von G Data. Symantec hatte zuvor erklärt, dass nur noch durchschnittlich 45 Prozent aller Angriffe von Antivirensoftware erkannt werden.
---------------------------------------------
http://www.golem.de/news/g-data-symantecs-ende-der-antivirensoftware-veruns…
*** Drupal Flag 7.x-3.5 Command Execution ***
---------------------------------------------
Topic: Drupal Flag 7.x-3.5 Command Execution Risk: High Text:Drupal Flag 7.x-3.5 Module Vulnerability Report Author: Ubani Anthony Balogun Reported: May 07, 2014 ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050054
*** Nach Heartbleed: Neues Zertifikat, alter Key ***
---------------------------------------------
Nach dem Heartbleed-Bug haben viele Administratoren Zertifikate für TLS-Verbindungen ausgetauscht. Viele haben dabei jedoch einen fatalen Fehler begangen: Sie erstellten zwar ein neues Zertifikat, aber keinen neuen Schlüssel. (Technologie, Applikationen)
---------------------------------------------
http://www.golem.de/news/nach-heartbleed-neues-zertifikat-alter-key-1405-10…
*** Backdoor Xtrat Continues to Evade Detection ***
---------------------------------------------
While reviewing recent reports scanned by ZULU, we came across a malicious report that drew our attention. It was notable as the final redirection downloaded ZIP content by accessing a PHP file on the domain www.stisanic.com. URL: hxxp://www[.]stisanic[.]com/wp-content/coblackberrycomnotasdevozdate07052014[.]php ZULUs virustotal check scored the file as higher risk. At the time 10
---------------------------------------------
http://feedproxy.google.com/~r/zscaler/research/~3/OqS4L1x6ebQ/backdoor-xtr…
*** Link-shortening service Bit.ly suffers data breach ***
---------------------------------------------
We have reason to believe that Bitly account credentials have been compromised; specifically, users' email addresses, encrypted passwords, API keys and OAuth tokens. We have no indication at this time that any accounts have been accessed without permission. We have taken steps to ensure the security of all accounts, including disconnecting all users' Facebook and Twitter accounts. All users can safely reconnect these accounts at their next login.
---------------------------------------------
http://blog.bitly.com/post/85169217199/urgent-security-update-regarding-you…
*** Falsche Zertifikate unterwandern HTTPS-Verbindungen ***
---------------------------------------------
Forscher sprechen von signifikantem Teil der verschlüsselten Kommunikation - Vor allem Firewalls und Antivirensoftware verantwortlich
---------------------------------------------
http://derstandard.at/1399507237936
*** Linux-Kernel: Root-Rechte für Nutzer ***
---------------------------------------------
Durch einen Fehler im Linux-Kernel kann ein einfacher Nutzer Root-Rechte erlangen. Bekannt ist der Fehler schon seit gut einer Woche, aber jetzt gibt es einen öffentlichen Exploit.
---------------------------------------------
http://www.golem.de/news/linux-kernel-root-rechte-fuer-nutzer-1405-106407-r…
*** Race Condition in the Linux kernel ***
---------------------------------------------
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
---------------------------------------------
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196
*** Unbekannte bieten 33 Millionen E-Mail-Adressen feil ***
---------------------------------------------
Das könnte die nächste Spam-Welle auslösen: Unbekannte bieten per E-Mail mehrere Millionen Mailadressen von deutschen Providern zum Kauf an. Angeblich handelt es sich um 100 Prozent gültige Adressen.
---------------------------------------------
http://www.heise.de/security/meldung/Unbekannte-bieten-33-Millionen-E-Mail-…
*** HPSBST03038 rev.1 - HP H-series Fibre Channel Switches, Remote Disclosure of Information ***
---------------------------------------------
A potential security vulnerability has been identified with certain HP H-series Fibre Channel Switches. This vulnerability could be exploited remotely to disclose information.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Bugtraq: ESA-2014-027: RSA NetWitness and RSA Security Analytics Authentication Bypass Vulnerability ***
---------------------------------------------
RSA NetWitness and RSA Security Analytics each contain a security fix for an authentication bypass vulnerability that could potentially be exploited to compromise the affected system. When PAM for Kerberos is enabled, an attacker can authenticate to the vulnerable system with a valid user name and without specifying a password. This issue does not affect other authentication methods.
---------------------------------------------
http://www.securityfocus.com/archive/1/532077
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 08-05-2014 18:00 − Freitag 09-05-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Advance Notification Service for the May 2014 Security Bulletin Release ***
---------------------------------------------
Today we provide Advance Notification Service (ANS) for the release of eight bulletins, two rated Critical and six rated Important in severity. These updates will address vulnerabilities for .NET Framework, Office, Internet Explorer, and Windows. As we do every month, we've scheduled the security bulletin release for the second Tuesday of the month, May 13, 2014, at approximately 10:00 a.m. PDT. Revisit this blog then for deployment guidance and further analysis together with a brief
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/05/08/advance-notification-ser…
*** Prenotification Security Advisory for Adobe Reader and Acrobat ***
---------------------------------------------
Adobe is planning to release security updates on Tuesday, May 13, 2014 for Adobe Reader and Acrobat XI (11.0.06) and earlier versions for Windows and Macintosh.
---------------------------------------------
https://helpx.adobe.com/security/products/reader/apsb14-15.html
*** SQL Injection In Insert, Update, And Delete ***
---------------------------------------------
This is a brief whitepaper that goes over different payloads that can be leveraged in SQL injection attacks.
---------------------------------------------
http://packetstormsecurity.com/files/126527/SQL-Injection-In-Insert-Update-…
*** SNMP: The next big thing in DDoS Attacks? ***
---------------------------------------------
It started with DNS: Simple short DNS queries are easily spoofed and the replies can be much larger then the request, leading to an amplification of the attack by orders of magnitude. Next came NTP. Same game, different actors: NTPs "monlist" feature allows for small requests (again: UDP, so trivially spoofed) and large responses. Today, we received a packet capture from a reader showing yet another reflective DDoS mode: SNMP. The "reflector" in this case...
---------------------------------------------
https://isc.sans.edu/diary/SNMP%3A+The+next+big+thing+in+DDoS+Attacks%3F/18…
*** Heartbleed, IE Zero Days, Firefox vulnerabilities - Whats a System Administrator to do? ***
---------------------------------------------
With the recent headlines, weve seen heartbleed (which was not exclusive to Linux, but was predominately there), an IE zero day that had folks over-reacting with headlines of "stop using IE", but Firefox and Safari vulnerabilities where not that far back in the news either. So what is "safe"? And as an System Administrator or CSO what should you be doing to protect your organization?
---------------------------------------------
https://isc.sans.edu/diary/Heartbleed%2C+IE+Zero+Days%2C+Firefox+vulnerabil…
*** Exploit Kit Roundup: Best of Obfuscation Techniques ***
---------------------------------------------
The world of exploit kits is an ever-changing one, if you happen to look away even just for one month, you'll come back to find that most everything has changed around you. Because of this, people like us, who work on a secure web gateway product, are continuously immersed in the world of exploit kits. Every once in a while it's a good idea to stop, take a look around us, and review what's changed. We would like to share some of the more interesting obfuscation techniques
---------------------------------------------
http://feedproxy.google.com/~r/SpiderlabsAnterior/~3/R9KtNDgyouY/exploit-ki…
*** Surge in Viknok infections bolsters click fraud campaign ***
---------------------------------------------
Researchers detected over 16,500 Viknok infections in the first week of May alone.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/6mC7Lf47bgY/
*** Malicious DIY Java applet distribution platforms going mainstream - part two ***
---------------------------------------------
In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to trick gullible end users into knowingly/unknowingly installing malware. In a series of blog posts, we've been highlighting the existence of DIY (do-it-yourself), social engineering driven, Java drive-by type of Web based platforms, further enhancing the current efficient state of social...
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/6wG1i4Gl5HQ/
*** Bitly shortens life of users passwords after credential compromise ***
---------------------------------------------
OAuth tentacles mean its time to change ANOTHER password URL-shortening and online marketing outfit Bit.ly has warned its systems have been accessed by parties unknown and suggested users change their passwords.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/05/09/bitly_short…
*** Weekly Metasploit Update: Disclosing Usernames, More Flash Bugs, and Wireshark Targets ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/05/08/weekly-me…
*** Heartbleed: Noch immer 300.000 Server verwundbar ***
---------------------------------------------
Vier Wochen nach Auftauchen der Lücke zeigt Untersuchung nur wenig Fortschritte
---------------------------------------------
http://derstandard.at/1399507030882
*** Cyber Security Challenge sucht österreichische IT-Talente ***
---------------------------------------------
Bereits zum dritten Mal wird im Rahmen der Cyber Security Challenge Austria nach jungen Hacker-Talenten gesucht. Dieses Jahr gibt es auch einen europaweiten Wettbewerb.
---------------------------------------------
http://futurezone.at/netzpolitik/cyber-security-challenge-sucht-oesterreich…
*** CVE-2014-3214: A Defect in Prefetch Can Cause Recursive Servers to Crash ***
---------------------------------------------
A defect in the pre-fetch feature (which is enabled by default) can cause BIND 9.10.0 to terminate with a "REQUIRE" assertion failure if it processes queries whose answers have particular attributes. This can be triggered as the result of normal query processing.
---------------------------------------------
https://kb.isc.org/article/AA-01161
*** QNAP-Photostation V.3.2 XSS ***
---------------------------------------------
XSS-Lücke in QNAP-Photostation V.3.2 (auf QNAP NAS TS259+ Pro - Firmware 4.0.7 vom 12.04.2014)
---------------------------------------------
http://sdcybercom.wordpress.com/2014/04/25/qnap-cross-site-scripting-nicht-…
*** Digi International OpenSSL Vulnerability ***
---------------------------------------------
Digi International has identified five products that are vulnerable to the OpenSSL Heartbleed bug. Digi International has produced downloadable firmware upgrade versions that mitigate this vulnerability.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-128-01
*** IBM Security Bulletins for TADDM ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Kaspersky Internet Security Null Pointer Dereference in prremote.dll Lets Remote Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1030203
*** Multiple BIG-IP products iControl command execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/93015
*** Security Bulletin: IBM iNotes Cross-Site Scripting Vulnerability (CVE-2014-0913) ***
---------------------------------------------
IBM iNotes versions 9.0.1 and 8.5.3 Fix Pack 6 contain a cross-site scripting vulnerability. The fixes for these issues were introduced in IBM Domino and IBM iNotes versions 9.0.1 Fix Pack 1 and 8.5.3 Fix Pack 6 Interim Fix 2.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21671981
*** HPSBMU03035 rev.1 - HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Cross-Site Scripting (XSS) ***
---------------------------------------------
A potential security vulnerability has been identified with HP Network Node Manager I (NNMi) on HP-UX, Linux, Solaris, and Windows. This vulnerability could be exploited remotely to allow cross-site scripting (XSS).
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HPSBGN03008 rev.2 - HP Software Service Manager, "HeartBleed" OpenSSL Vulnerability, Remote Disclosure of Information ***
---------------------------------------------
The Heartbleed vulnerability was detected in specific OpenSSL versions. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** R7-2013-19.2 Disclosure: Yokogawa CENTUM CS 3000 BKESimmgr.exe Buffer Overflow (CVE-2014-0782) ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/05/09/r7-2013-1…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 07-05-2014 18:00 − Donnerstag 08-05-2014 18:00
Handler: L. Aaron Kaplan
Co-Handler: Stephan Richter
*** The State of Cryptography in 2014, Part 2: Hardware, Black Swans, and What To Do Now ***
---------------------------------------------
We continue our look into the state of cryptography in 2014; Part 1 was posted earlier this week. Is Hardware Security Any Better? We closed the first post by asking: is hardware any more trustworthy? One would think that it is - but it's not. Recently, chip vendors have been incorporating cryptography into their CPUs or chipsets. Usually,...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/5erAjAwWMmU/
*** SIRv16: Cybercriminal tactics trend toward deceptive measures ***
---------------------------------------------
Microsoft's Security Intelligence Report volume 16 (SIRv16) was released today, providing threat trends on malware encounter rates, infection rates, vulnerabilities, exploits, and more for 110 countries/regions worldwide. The report is designed to help IT and security professionals better protect themselves and their organizations from cyberattacks. Malware data is gathered from the Malicious Software Removal Tool (MSRT), which is used to calculate the infection rate...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/05/07/sirv16-cybercriminal-tac…
*** Case Study: Analyzing the Origins of a DDoS Attack ***
---------------------------------------------
Recently a client was experiencing a massive layer 7 DDOS attack, generating tens of thousands of random HTTP requests per second to the server. The architecture of the website included a cluster of three web servers responsible for handling all incoming traffic, which did little to alleviate the pressures brought about the attack. An interestingRead More
---------------------------------------------
http://feedproxy.google.com/~r/sucuri/blog/~3/7nrfa2OwFuo/map-of-a-ddos-att…
*** Systemkamera Samsung NX300 öffnet Hackern Tür und Tor ***
---------------------------------------------
Die Kamera enthält eine ganze Reihe von Sicherheitslücken, inklusive einem weit offen stehenden X-Server und einem reprogrammierbaren NFC-Chip. Angreifer könnten diese nutzen, um Schadcode auf dem Gerät auszuführen.
---------------------------------------------
http://www.heise.de/security/meldung/Systemkamera-Samsung-NX300-oeffnet-Hac…
*** April 2014 virus activity review from Doctor Web ***
---------------------------------------------
April 30, 2014 April 2014 proved to be quite fruitful in terms of the emergence of new threats. In particular, Doctor Webs security researchers discovered a new multi-purpose backdoor targeting Windows. Also registered were numerous incidents involving adware browser extensions for Mac OS X. In addition, a variety of signatures for Android malware were added to the virus databases.
---------------------------------------------
http://news.drweb.com/show/?i=4376&lng=en&c=9
*** Volafox Mac OS X Memory Analysis Toolkit ***
---------------------------------------------
Volafox is an open source toolkit that you can use for Mac OS X and BSD forensics. The tool is a python based and allows investigating security incidents and finding information for malwares and any malicious program on the system. Security analyst can have the following information using this tool:...
---------------------------------------------
http://www.sectechno.com/2014/05/04/volafox-mac-os-x-memory-analysis-toolki…
*** Security: Gravierende Lücke in AVG Remote Administration ***
---------------------------------------------
Nutzer, die das Fernwartungspaket AVG Remote Administration nutzen, sollten dringend einen aktuellen Patch installieren. Bisher war es möglich, dass Angreifer über das Programm Code einschleusen konnten - aber das ist nicht die einzige Lücke, weitere stehen noch offen.
---------------------------------------------
http://www.golem.de/news/security-gravierende-luecke-in-avg-remote-administ…
*** [2014-05-08] Multiple critical vulnerabilities in AVG Remote Administration ***
---------------------------------------------
Attackers are able to completely compromise the AVG Admin server (part of AVG Remote Administration) system as they can gain full access at the application and system level by exploiting remote code execution, authentication bypass, missing entity authentication and insecure encryption vulnerabilities. Attackers can also manage endpoints and possibly deploy attacker-controlled code on endpoints.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Multiple Vulnerabilities in the Cisco WebEx Recording Format and Advanced Recording Format Players ***
---------------------------------------------
Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players. Exploitation of these vulnerabilities could allow a remote attacker to cause an affected player to crash and, in some cases, could allow a remote attacker to execute arbitrary code on the system of a targeted user.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** SA-CONTRIB-2014-049 - Organic Groups (OG) - Access Bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-049Project: Organic groups (third-party module)Version: 7.xDate: 2014-May-07Security risk: Moderately criticalExploitable from: RemoteVulnerability: Access bypassDescriptionOrganic groups (OG) enables users to create and manage their own groups. Each group can have subscribers, and maintains a group home page where subscribers communicate amongst themselves.OG doesnt sufficiently check the permissions when a group member is pending or blocked status within...
---------------------------------------------
https://drupal.org/node/2261245
*** Ruby on Rails Implicit Render Bug Lets Remote Users Obtain Files From the Target System ***
---------------------------------------------
http://www.securitytracker.com/id/1030210
*** HP Security Bulletins ***
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Vuln: vBulletin Multiple Cross Site Scripting Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/66972
*** Vuln: SAP Solution Manager Background Processing Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/67107
*** Vuln: SAP NetWeaver Portal WD Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/67104
*** Security Advisory-Radius Vulnerability on Some Huawei Devices ***
---------------------------------------------
On huawei Campus Switch, AR, SRG,WLAN devices, the RADIUS component cannot handle malformed RADIUS packets. This vulnerability allows attackers to repeatedly restart the device, causing a DoS attack (Vulnerability ID: HWPSIRT-2014-0307).
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 06-05-2014 18:00 − Mittwoch 07-05-2014 18:00
Handler: L. Aaron Kaplan
Co-Handler: Stephan Richter
*** TLS 1.3 Working Group Has Consensus to Deprectate RSA Key Transport ***
---------------------------------------------
RSA key transport cipher suites could be deprecated in TLS 1.3 in favor of Diffie-Hellman Exchange or Elliptic curve Diffie-Hellman.
---------------------------------------------
http://threatpost.com/tls-1-3-working-group-has-consensus-to-deprectate-rsa…
*** Antivirus is Dead: Long Live Antivirus! ***
---------------------------------------------
An article in The Wall Street Journal this week quoted executives from antivirus pioneer Symantec uttering words that would have been industry heresy a few years ago, declaring antivirus software "dead" and stating that the company is focusing on developing technologies that attack online threats from a different angle. This hardly comes as news for anyone in the security industry whos been paying attention over the past few years, but Im writing about it because this is a great
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/INOFThmd17Q/
*** Sicherheit im Fokus der Linuxwochen in Wien ***
---------------------------------------------
Von 8. bis 10. Mai finden auf der FH Technikum Wien zahlreiche Vorträge und Workshops zu Linux, Open Data und Open Source statt.
---------------------------------------------
http://futurezone.at/digital-life/sicherheit-im-fokus-der-linuxwochen-in-wi…
*** Video: NEXT Berlin ***
---------------------------------------------
Mikko spoke at NEXT Berlin yesterday:And the video is now online: Arms Race. [24m15s] On 06/05/14 At 12:31 PM
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002701.html
*** Erpressungstrojaner drohen Android-Nutzern ***
---------------------------------------------
Sicherheitsforscher haben den ersten Trojaner entdeckt, der Android-Geräte befällt und von seinen Opfern Lösegeld erpresst. Der Schadcode mit dem Namen Koler.A befällt bereits Smartphones weltweit.
---------------------------------------------
http://www.heise.de/security/meldung/Erpressungstrojaner-drohen-Android-Nut…
*** Security: Gegen die Angst vor Angriffen aufs Smartphone ***
---------------------------------------------
Für das Re:publica-Publikum haben die Sicherheitsexperten Linus Neumann und Ben Schlabs ein paar Tipps parat, wie Smartphones gesichert werden können. Und sie zeigen, wie Siri als Einbruchhelfer missbraucht werden kann.
---------------------------------------------
http://www.golem.de/news/security-gegen-die-angst-vor-angriffen-aufs-smartp…
*** Hintergrund: SSL-Fuzzing mit "Frankencerts" ***
---------------------------------------------
Durch das Zusammenstückeln von Tausenden von echten SSL-Zertifikaten zu über acht Millionen "Frankencerts" haben Forscher Lücken in gängigen SSL-Bibliotheken gefunden.
---------------------------------------------
http://www.heise.de/security/artikel/SSL-Fuzzing-mit-Frankencerts-2166135.h…
*** New DNS Spoofing Technique: Why we havent covered it., (Wed, May 7th) ***
---------------------------------------------
The last couple of days, a lot of readers sent us links to articles proclaiming yet another new flaw in DNS. "Critical Vulnerability in BIND Software Puts DNS Protocol Security At Risk" [1] claimed one article, going forward to state: "The students have found a way to compel DNS servers to connect with a specific server controlled by the attacker that could respond with a false IP address. “ So how bad is this really? First of all, here is a the
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=18079&rss
*** OpenBSD-Entwickler bezweifeln angebliche OpenSSH-Schwachstelle ***
---------------------------------------------
Der Exploit soll so schlimm wie der SSL-GAU Heartbleed sein und die wichtige Unix-Bibliothek OpenSSH betreffen. Allerdings sagen viele Entwickler, dass die Lücke wahrscheinlich nicht existiert.
---------------------------------------------
http://www.heise.de/security/meldung/OpenBSD-Entwickler-bezweifeln-angeblic…
*** Advanced Evasion Techniques (AET) a Major Concern for CIOs ***
---------------------------------------------
According to a new Vanson Bourne study sponsored by McAfee, CIOs are adding yet another threat to their ever-growing list of network security concerns: Advanced Evasion Techniques, or AETs. Unlike Advanced Persistent Threats (APTs) and other advanced malware, Advanced Evasion Techniques are not types of malicious software. Rather, they are a technique used by threat [...]The post Advanced Evasion Techniques (AET) a Major Concern for CIOs appeared first on Seculert Blog on Advanced Threats and
---------------------------------------------
http://www.seculert.com/blog/2014/05/advanced-evasion-techniques-aet-a-majo…
*** ABB Relion 650 Series OpenSSL Vulnerability ***
---------------------------------------------
ABB has identified an OpenSSL vulnerability in its Relion 650 series application. ABB is in the process of creating a patch that mitigates this vulnerability. This vulnerability could be exploited remotely. Exploits that target this vulnerability are known to be publicly available.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-126-01
*** Security Advisory- BootRom Menu and Boot Menu Vulnerabilities on Huawei Campus Switches ***
---------------------------------------------
Some versions of Huawei Campus S7700/S9300/S9700 switches are affected by the BootRom and Boot Menu vulnerability.
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** VU#902790: Fortinet Fortiweb 5.1 contains a cross-site request forgery vulnerability ***
---------------------------------------------
Vulnerability Note VU#902790 Fortinet Fortiweb 5.1 contains a cross-site request forgery vulnerability Original Release date: 07 May 2014 | Last revised: 07 May 2014 Overview Fortinet Fortiweb prior to version 5.2.0 do not sufficiently verify whether a valid request was intentionally provided by the user, which results in a cross-site request forgery (CSRF) vulnerability. (CWE-352) Description CWE-352: Cross-Site Request Forgery (CSRF)Fortinet Fortiweb prior to version 5.2.0 do not...
---------------------------------------------
http://www.kb.cert.org/vuls/id/902790
*** HPSBMU02994 rev.4 - HP BladeSystem c-Class Onboard Administrator (OA) running OpenSSL, Remote Disclosure of Information ***
---------------------------------------------
A potential security vulnerability has been identified in HP BladeSystem c-Class Onboard Administrator (OA) running OpenSSL. This is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 05-05-2014 18:00 − Dienstag 06-05-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** NIST updates Transport Layer Security (TLS) guidelines ***
---------------------------------------------
The National Institute of Standards and Technology (NIST) has released an update to a document that helps computer administrators maintain the security of information traveling across their networks.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16794
*** Finding Weak Remote Access Passwords on POS Devices ***
---------------------------------------------
One of my key take-aways in the Verizon Data Breach Incident Report was that credentials are a major attack vector in 2013. Especially within the POS Intrusions, brute forcing and use of stolen creds was a major problem.
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/05/05/finding-w…
*** Analyzing CVE-2014-0515 - The Recent Flash Zero-Day ***
---------------------------------------------
Last week, Adobe released an advisory disclosing a new zero-day vulnerability in Flash Player. Looking into the exploit code used in attacks targeting this vulnerability, we found several interesting ties to other vulnerabilities - not all of them for Flash Player, either. To explain this, we will discuss the highlights of how this exploit was performed.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/H6laAIdlckU/
*** Live from InfoSecurity Europe 2014: The Nitty Gritty of Sandbox Evasion ***
---------------------------------------------
Infosecurity Europe 2014 was a great gathering of the top minds in cybersecurity, and in case you missed the event, we were excited to capture live content from the show floor to share with our readers. Over the next few...
---------------------------------------------
http://www.fireeye.com/blog/corporate/2014/05/live-from-infosecurity-europe…
*** And the Web it keeps Changing: Recent security relevant changes to Browsers and HTML/HTTP Standards, (Tue, May 6th) ***
---------------------------------------------
As we all know, web standards are only leaving "draft" status once they start becoming irrelevant. It is a constant challenge to keep up with how web browsers interpret standards and how the standards themselves keep changing. We are just going through one of the perpetual updates for our "Defending Web Applications" class, and I got reminded again about some of the changes we had to make over the last year or so. Autocomplete=Off This weekend we just had yet another post...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=18075&rss
*** Watch a bank-raiding ZeuS bot command post get owned in 60 seconds ***
---------------------------------------------
RC4? Shoddy PHP coding? You VXers should try a little harder Vid Web thieves may get more than they bargained for if tech pros follow the lead of one researcher - who demonstrated how to hack the systems remote-controlling the infamous ZeuS crime bot in 60 seconds.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/05/06/zeus_pwned_…
*** The State of Cryptography in 2014, Part 1: On Fragility and Heartbleed ***
---------------------------------------------
It seems like cryptography has been taking a knock recently. This is both good and bad, but is not actually true: cryptography is always under attack, and for that reason constantly evolves. That's bad, but it's good to realize that cryptography needs constant attention. The threat to cryptography can be very disruptive, as we most recently...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/kwDfInwBFvo/
*** Dropbox schließt Referer-Lücke ***
---------------------------------------------
In begrenzten Rahmen geteilte Dropbox-Dokumente können beim Klick auf darin enthaltene Links enttarnt werden. Durch den Fix macht der Cloud-Dienstleister allerdings alle existierenden Dokumente unerreichbar. Diese müssen neu geteilt werden.
---------------------------------------------
http://www.heise.de/security/meldung/Dropbox-schliesst-Referer-Luecke-21835…
*** Security Bulletin: Multiple Vulnerabilities in IBM iNotes (CVE-2013-0589, CVE-2013-0592, CVE-2013-0594, CVE-2013-0595) ***
---------------------------------------------
IBM iNotes versions prior to 8.5.3 Fix Pack 6 and 9.0.1 contain multiple security vulnerabilities: CVE-2013-0589, CVE-2013-0592, CVE-2013-0594 and CVE-2013-0595.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21671622
*** Update for Vulnerability in Juniper Networks Windows In-Box Junos Pulse Client - Version: 1.0 ***
---------------------------------------------
Microsoft is announcing the availability of an update for the Juniper Networks Windows In-Box Junos Pulse Client for Windows 8.1 and Windows RT 8.1. The update addresses a vulnerability in the Juniper VPN client by updating the affected Juniper VPN client libraries contained in affected versions of Microsoft Windows.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/2962393
*** Bugtraq: ESA-2014-028: EMC Cloud Tiering Appliance XML External Entity (XXE) and Information Disclosure Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/532031
*** Bugtraq: [security bulletin] HPSBGN03010 rev.4 - HP Software Server Automation running OpenSSL, Remote Disclosure of Information ***
---------------------------------------------
http://www.securityfocus.com/archive/1/532037
*** Cisco Nexus 1000V Access Control List Bypass Vulnerability ***
---------------------------------------------
A vulnerability in Cisco Nexus 1000V switches could allow an unauthenticated, remote attacker to bypass deny statements in access control lists (ACLs) with certain types of Internet Group Management Protocol version 2 (IGMPv2) or IGMP version 3 (IGMPv3) traffic. IGMP version 1 (IGMPv1) is not affected.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Broadcast Access Center for Telco and Wireless Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability in the web framework of the Cisco Broadcast Access Center for Telco and Wireless (BAC-TW) could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack against the Cisco BAC-TW web interface.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Broadcast Access Center for Telco and Wireless Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability in the web framework of the Cisco Broadcast Access Center for Telco and Wireless (BAC-TW) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the Cisco BAC-TW web interface.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Struts 2.3.16.3 Manipulation Fix ***
---------------------------------------------
Topic: Struts 2.3.16.3 Manipulation Fix Risk: Medium Text:The Apache Struts group is pleased to announce that Struts 2.3.16.3 is available as a "General Availability" release.The GA de...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050026
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 02-05-2014 18:00 − Montag 05-05-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Lnk files in Email Malware Distribution ***
---------------------------------------------
Recently I have noticed more use of .lnk files used in malware distribution via email. These files are Windows Shortcut files, typically used for shortcuts on your system, such as on your desktop. The use of .lnk files in emails is not new, but a recent sample caught my eye and I took a closer look. The original email, as it would appear to the recipient, looked like this, purporting to be from an individual at Automatic Data Processing, and containing what looks to be a PDF document and a ZIP
---------------------------------------------
http://feedproxy.google.com/~r/SpiderlabsAnterior/~3/VEYzrNB7xos/lnk-files-…
*** PHP Updated to Fix OpenSSL Flaws, Other Bugs ***
---------------------------------------------
The maintainers of PHP have released two new versions of the scripting language that fix a number of bugs, including a pair of vulnerabilities related to OpenSSL. Versions 5.4.28 and 5.5.12 both contain that important patch, as well as fixes for more than a dozen other vulnerabilities. The fix for the OpenSSL flaws is in both...
---------------------------------------------
http://threatpost.com/php-updated-to-fix-heartbleed-other-bugs/105867
*** iOS 7 Update Silently Removes Encryption For Email Attachments ***
---------------------------------------------
An anonymous reader writes "Apple has removed encrypted email attachments from iOS 7. Apple said back in June 2010 in regards to iOS 4.0: Data protection is available for devices that offer hardware encryption, including iPhone 3GS and later, all iPad models, and iPod touch (3rd generation and later). Data protection enhances the built-in hardware encryption by protecting the hardware encryption keys with your passcode. This provides an additional layer of protection for your email
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/FyN_d8fBQgo/story01.htm
*** Attack Prediction: Malicious gTLD Squatting May Be The Next Big Threat ***
---------------------------------------------
Late last year, ICANN began expanding the generic Top-Level Domains (gTLDs). In addition to the standard .COM, .ORG, and .NET TLDs, over 1,300 new names could become available in the next few years. These new gTLDs and internationalized domain names (IDNs) are awesome ideas if you think about the creativity sparked around the names one can possibly register.
---------------------------------------------
http://labs.opendns.com/2014/04/23/malicious-gtld-squatting/
*** Spear Phishing Emails: A Psychological Tactic of Threat Actors ***
---------------------------------------------
By exploiting network security vulnerabilities, today's generation of threat actors are able to install advanced polymorphic malware to steal data and damage reputations. But their manipulation efforts aren't limited to codes and machines - they extend to people, too.
---------------------------------------------
http://www.seculert.com/blog/2014/05/spear-phishing-emails-a-psychological-…
*** Evolution of Encrypting Ransomware ***
---------------------------------------------
Recently we've seen a big change in the encrypting ransomware family and we're going to shed light on some of the newest variants and the stages of evolution that have led the high profile malware to where it is today. For those that aren't aware of what encrypting ransomware is, its a cryptovirus that encrypts all your data from local hard drives, network shared drives, removable hard drives and USB. The encryption is done using an RSA -2048 asymmetric public key which makes...
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/hp9iym0nxN0/
*** Symantec Critical System Protection for Windows Default Policy Bypass ***
---------------------------------------------
Revisions None Severity Symantec does not believe that this bypass represents Symantec Critical System Protection (SCSP) vulnerability. The policy bypass ...
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** Bugtraq: [ANN][SECURITY] Struts 1 - CVE-2014-0114 -Mitigation Advice Available, Possible RCE Impact ***
---------------------------------------------
http://www.securityfocus.com/archive/1/532008
*** Vuln: F5 Networks BIG-IQ Remote Privilege Escalation Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/67191
*** F5 BIG-IQ 4.1.0.2013.0 Password Change Exploit ***
---------------------------------------------
Topic: F5 BIG-IQ 4.1.0.2013.0 Password Change Exploit Risk: High Text:## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-fr...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050012
*** OpenSSL Null Pointer Dereference in do_ssl3_write() Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1030188
*** [webapps] - Seagate BlackArmor NAS - Multiple Vulnerabilities ***
---------------------------------------------
http://www.exploit-db.com/exploits/33159
*** Vuln: WordPress NextCellent Gallery Plugin CVE-2014-3123 Multiple Cross Site Scripting Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/67085
*** IBM Tivoli Netcool/Portal vulnerable to CVE-2014-0160 & CVE-2014-0076 ***
---------------------------------------------
Security vulnerabilities have been discovered in OpenSSL. CVE(s): CVE-2014-0160 and CVE-2014-0076 Affected product(s) and affected version(s): IBM Tivoli Netcool/Portal 2.1.2 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21671783 X-Force Database: http://xforce.iss.net/xforce/xfdb/92322 X-Force Database: http://xforce.iss.net/xforce/xfdb/91990
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_tivoli_netcool_po…
*** IBM Security Bulletin: Multiple OpenSSL vulnerabilities in Tivoli Endpoint Manager for Remote Control. (CVE-2013-4353,CVE-2013-6449) ***
---------------------------------------------
Security vulnerabilities exist in the version of OpenSSL shipped with Tivoli Endpoint Manager for Remote Control. CVE(s): CVE-2013-4353 and CVE-2013-6449 Affected product(s) and affected version(s): Tivoli Endpoint Manager for Remote Control version 8.2.1. Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www.ibm.com/support/docview.wss?uid=swg21669040 X-Force Database: http://xforce.iss.net/xforce/xfdb/90201 X-Force
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Bugtraq: [HP security bulletins] ***
---------------------------------------------
http://www.securityfocus.com/archive/1/532002http://www.securityfocus.com/archive/1/532001http://www.securityfocus.com/archive/1/532003http://www.securityfocus.com/archive/1/532004http://www.securityfocus.com/archive/1/532007http://www.securityfocus.com/archive/1/532010http://www.securityfocus.com/archive/1/532011http://www.securityfocus.com/archive/1/532012http://www.securityfocus.com/archive/1/532013http://www.securityfocus.com/archive/1/532014http://www.securityfocus.com/archive/1/532022http://www.securityfocus.com/archive/1/532023
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 30-04-2014 18:00 − Freitag 02-05-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Serious security flaw in OAuth, OpenID discovered ***
---------------------------------------------
Attackers can use the "Covert Redirect" vulnerability in both open-source login systems to steal your data and redirect you to unsafe sites.
---------------------------------------------
http://www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discover…
*** Ubuntu schließt weitere Lücken im Unity-Sperrbildschirm ***
---------------------------------------------
Mit zwei Updates für ihren Unity-Desktop haben die Entwickler der Linux-Distribution weitere Sicherheitsprobleme behoben. Diese hätten es ermöglicht, den Sperrbildschirm unter bestimmten Umständen zu umgehen.
---------------------------------------------
http://www.heise.de/security/meldung/Ubuntu-schliesst-weitere-Luecken-im-Un…
*** Security Update Released to Address Recent Internet Explorer Vulnerability ***
---------------------------------------------
Today, we released a security update to address the Internet Explorer (IE) vulnerability first described in Security Advisory 2963983. This security update addresses every version of Internet Explorer. While we've seen only a limited number of targeted attacks, customers are advised to install this update promptly. The majority of our customers have automatic updates enabled and so will not need to take any action as protections will be downloaded and installed automatically. If...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/05/01/security-update-released…
*** Sefnit Botnet Swaps Tor for SSH ***
---------------------------------------------
Facebook security researchers spot a Sefnit/Mevade click-fraud and Bitcoin-mining botnet returning to its previous SSH command-and-control communications infrastructure.
---------------------------------------------
http://www.darkreading.com/attacks-breaches/sefnit-botnet-swaps-tor-for-ssh…
*** Factsheet DNS Amplification ***
---------------------------------------------
DDoS-attacks have been hitting headlines the last year. In some of these attacks, attackers use a technique called DNS amplification. This factsheet will help network administrators in preventing DNS amplification attacks via their systems.
---------------------------------------------
http://www.ncsc.nl/english/current-topics/news/factsheet-dns-amplification.…
*** Apple Fixes Critical Hole in Developer Center ***
---------------------------------------------
Apple patched a potentially serious hole in its Developer Center that could have given anyone unfettered access to personal contact information for Apple employees and partners.
---------------------------------------------
http://threatpost.com/apple-fixes-critical-hole-in-developer-center/105848
*** All About Windows Tech Support Scams ***
---------------------------------------------
*Editors Notes: The purpose of this research was to see exactly how this scam is carried out, and the extent to which it is done. DO NOT TRY THIS AT HOME. We used a clean machine, off network, to monitor the activity of the scammer. Have you ever received a phone call from a tech support person claiming to be from Microsoft, and that your Windows based machine has been found to have a virus on it? These cold calls typically come from loud call centers, and are targeting the uninformed and...
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/qw_08fRmr5o/
*** SA-CONTRIB-2014-047 - Zen - Cross Site Scripting ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-047Project: Zen (third-party theme)Version: 7.xDate: 2014-April-30Security risk: Moderately criticalExploitable from: RemoteVulnerability: Cross Site ScriptingDescriptionThe Zen theme is a powerful, yet simple, HTML5 starting theme with a responsive, mobile-first grid design.The theme does not properly sanitize theme settings before they are used in the output of a page. Custom themes that have copied Zens template files (e.g. subthemes) may suffer from this
---------------------------------------------
https://drupal.org/node/2254925
*** Cross-Site Scripting Vulnerability in Citrix NetScaler Gateway, formerly Citrix Access Gateway Enterprise Edition ***
---------------------------------------------
Severity: Medium Description of Problem A Cross-Site Scripting (XSS) vulnerability has been identified in Citrix NetScaler Gateway, formerly known as Citrix Access Gateway Enterprise Edition...
---------------------------------------------
http://support.citrix.com/article/CTX140291
*** Cisco TelePresence TC and TE Bugs Let Remote Users Execute Arbitrary Code and Deny Service and Let Local Users Gain Elevated Privileges ***
---------------------------------------------
http://www.securitytracker.com/id/1030181
*** AMTELCO miSecure Vulnerabilities ***
---------------------------------------------
Researcher Jared Bird of Allina Health reported multiple vulnerabilities in the AMTELCO miSecureMessage (MSM) medical messaging system. AMTELCO has an update available to all customers that mitigates the vulnerabilities.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-121-01
*** WordPress plugin EZPZ One Click Backup Command Injection ***
---------------------------------------------
Topic: WordPress plugin EZPZ One Click Backup Command Injection Risk: High Text:Product: WordPress plugin EZPZ One Click Backup Vulnerability type: CWE-78 OS Command Injection Vulnerable versions: 12.03.10...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050008
*** WordPress leaflet maps marker plugin SQL Injection Vulnerability ***
---------------------------------------------
Topic: WordPress leaflet maps marker plugin SQL Injection Vulnerability Risk: Medium Text: # # Exploit Title: WordPress leaflet maps marker plugin SQL Injection Vulnerability # # Author: neo.hapsis #memb...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014050010
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 29-04-2014 18:00 − Mittwoch 30-04-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** PHP Callback Functions: Another Way to Hide Backdoors ***
---------------------------------------------
We often find new techniques employed by malware authors. Some are very interesting, others are pretty funny, and then there are those that really stump us in their creativity and effectiveness. This post is about the latter. Everyone who writes code in PHP knows what the eval() function is ..
---------------------------------------------
http://blog.sucuri.net/2014/04/php-callback-functions-another-way-to-hide-b…
*** [papers] - Introduction to Android Malware Analysis ***
---------------------------------------------
http://www.exploit-db.com/download_pdf/33093
*** Xen HVMOP_set_mem_type Page Transition Flaw Lets Local Users on the Guest System Cause Denial of Service Conditions on the Host System ***
---------------------------------------------
http://www.securitytracker.com/id/1030160
*** "Bypassing endpoint protections" @ BSides London ***
---------------------------------------------
This week I presented at BSides London. The talk is titled "Layers on layers: bypassing endpoint protection". The purpose of this talk is to reiterate on the (well-known) common weakness of most endpoint protection products - their reliance on kernel integrity. Once the attacker achieves arbitrary code execution in the kernel, there ..
---------------------------------------------
http://labs.bromium.com/2014/04/29/bypassing-endpoint-protections-bsides-lo…
*** Cisco WebEx Meetings Server Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Be on the Lookout: Odd DNS Traffic, Possible C&C Traffic, (Wed, Apr 30th) ***
---------------------------------------------
We got an email from one of our readers, including an interesting port 53 packet. While Wireshark and TCPDump try to decode it as DNS, it is almost certainly not DNS. The payload of the packet is ..
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=18047&rss
*** Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges ***
---------------------------------------------
http://www.securitytracker.com/id/1030165
*** Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges ***
---------------------------------------------
http://www.securitytracker.com/id/1030163
*** [2014-04-30] SQL injection and XSS vulnerabilities in Typo3 si_bibtex extension ***
---------------------------------------------
By exploiting the SQL injection vulnerability in the Typo3 extension "si_bibtex", an attacker is able to gain full access to the Typo3 database. Depending on the location where the extension is used in the web application, this may be possible by an unauthenticated attacker. Furthermore, it is affected by persistent XSS.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Symantec Encryption Desktop (PGP) Memory Access Flaws Let Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1030170
*** Friends dont let friends use Internet Explorer - advice from US, UK, EU ***
---------------------------------------------
IE 6 to 11 at risk of hijacking, patch coming - but not for XP Microsoft has warned of a new security flaw in all versions of its Internet Explorer web browser for Windows PCs. A patch has yet to be released for the crocked code.
---------------------------------------------
www.theregister.co.uk/2014/04/27/oops_we_did_it_again_microsoft_warns_of_ie…
*** Botnetz für Altcoin-Mining nutzt Lücke in Nagiosüberwachung aus ***
---------------------------------------------
Eine kürzlich veröffentlichte Sicherheitslücke im Netzwerkmonitor Nagios wird offenbar bereits ausgenutzt. Betroffen sind weit über 1000 weltweit verteilte Server, die für Mining-Zwecke missbraucht werden.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Botnetz-fuer-Altcoin-Mining-nutzt-Lu…
*** Neuer Erpressungs-Trojaner verschlüsselt mit RSA-2048 ***
---------------------------------------------
Es häufen sich Berichte über infizierte Windows-Systeme, auf denen ein Schadprogramm Dateien verschlüsselt und nur gegen Zahlung eines Lösegelds von 500 Euro wieder freigibt. Die sind via Tor in Bitcoins zu entrichten.
---------------------------------------------
http://www.heise.de/security/meldung/Neuer-Erpressungs-Trojaner-verschluess…
*** Protection strategies for the Security Advisory 2963983 IE 0day ***
---------------------------------------------
We've received a number of customer inquiries about the workaround steps documented in Security Advisory 2963983 published on Saturday evening. We hope this blog post answers those questions. Steps you can take to stay safe The security advisory lists several options customers can take to stay safe. Those options are ..
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for…
*** Six infosec tips I learned from Game of Thrones ***
---------------------------------------------
In Westeros - the land of dark knights, backstabbing royals, dragons, wildings, wargs, red witches, and White Walkers - even the youngest ones have to learn basic self-defense if they're to have any hope of surviving the cruel fictional world imagined by A Game of Thrones (GOT) author, George R. R. Martin. And so too, must every CISO and security pro learn the latest information security best practices if they're to survive today's Internet threat landscape.
---------------------------------------------
http://www.net-security.org/article.php?id=2001&p=1
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 28-04-2014 18:00 − Dienstag 29-04-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Update for Vulnerabilities in Adobe Flash Player in Internet Explorer - Version: 23.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/2755801
*** Ubuntu 14.04 lockscreen bypass, (Mon, Apr 28th) ***
---------------------------------------------
Upgraded to Ubuntu 14.04? Hold down enter to bypass the lockscreen (what is old is new again): https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1308572 …" The reporter indicates that he was running Ubuntu 14.04 with all the packages updated. When the screen is locked with password, if holding ENTER, after some seconds the screen freezes and the lock screen ..
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=18039
*** Cisco ASA DHCPv6 Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Researchers warn of resurgent Sefnit malware ***
---------------------------------------------
Botnet returns using new tactics A malware infection which drew headlines January has returned and is using new techniques to infect and spread amongst users.
---------------------------------------------
www.theregister.co.uk/2014/04/29/researchers_warn_of_resurgent_sefnit_malwa…
*** Citrix NetScaler Application Delivery Controller and NetScaler Gateway Multiple Security Updates ***
---------------------------------------------
A number of security vulnerabilities have been identified in the management component of the Citrix NetScaler Application Delivery Controller ..
---------------------------------------------
http://support.citrix.com/article/CTX140651
*** Massenhack bei AOL: Millionen Nutzer betroffen ***
---------------------------------------------
Unbekannte verschaffen sich Zugang zu privaten Informationen - Unternehmen fordert zum ändern des Passworts auf
---------------------------------------------
http://derstandard.at/1397521927406
*** The FireEye Advanced Threat Report 2013: European Edition ***
---------------------------------------------
We recently published the 2013 FireEye Advanced Threat Report during RSA Conference, providing a global overview of the advanced attacks that FireEye discovered last year. We are now drilling that global analysis down into the European threat ..
---------------------------------------------
http://www.fireeye.com/blog/corporate/2014/04/the-fireeye-advanced-threat-r…
*** Cybercriminals Take Advantage Of Heartbleed With Spam ***
---------------------------------------------
Since news about Heartbleed broke out earlier this month, the Internet has been full of updates, opinions and details about the vulnerability, with personalities ranging from security experts to celebrities talking about it. Being as opportunistic as they are, cybercriminals have taken notice of this and ..
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/RKpGQ6-RSA8/
*** Q1 2014 Mobile Threat Report ***
---------------------------------------------
Our Mobile Threat Report for Q1 2014 is out! Heres a couple of the things we cover in it:The vast majority of the new threats found was on Android (no surprise there), which accounted for 275 out of 277 new families we saw in this period, leaving 1 new malware apiece on iOS and Symbian.In Q1, ..
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002699.html
*** 6 free network vulnerability scanners ***
---------------------------------------------
Vulnerability scanners can help you automate security auditing and can play a crucial role in your IT security. They can scan your network and websites for up to thousands of different security risks, produce a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process. While these tools can ..
---------------------------------------------
http://www.csoonline.com/article/2148841/data-protection/6-free-network-vul…
*** Hashcat-Utils v1.0 Released ***
---------------------------------------------
Hashcat-utils are a set of small utilities that are useful in advanced password cracking. They all are packed into multiple stand-alone binaries. All of these utils are designed to execute only one specific function. Since they all work with STDIN and STDOUT you can group them into chains. The programs are available for Linux and Windows on both 32 bit and 64 bit architectures. The programs are also available as open source.
---------------------------------------------
http://www.toolswatch.org/2014/04/hashcat-utils-v1-0-released/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 25-04-2014 18:00 − Montag 28-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Using Facebook Notes to DDoS any website ***
---------------------------------------------
Facebook Notes allows users to include tags. Whenever a tag is used, Facebook crawls the image from the external server and caches it. Facebook will only cache the image once however using random get parameters the cache can be by-passed and the feature can be abused to cause a huge HTTP GET flood.
---------------------------------------------
http://chr13.com/2014/04/20/using-facebook-notes-to-ddos-any-website/
*** Mozilla entschlackt Zertifkats-Überprüfung ***
---------------------------------------------
Statt 81.865 sind jetzt nur noch 4167 Zeilen Code zum überprüfen von SSL-Zertifikaten nötig. Wer Sicherheitslücken in darin findet, erhält einen üppigen Finderlohn.
---------------------------------------------
http://www.heise.de/security/meldung/Mozilla-entschlackt-Zertifkats-Ueberpr…
*** Examining the Heartbleed-based FUD thats pitched to the public ***
---------------------------------------------
The Heartbleed vulnerability has created a massive news cycle, and generated technical risk-based discussions that might actually do some good. But some of these discussions boggle the mind, spreading misinformation in order to generate clicks or sales.When security issues hit the mass media, such as Heartbleed, there is a good deal of Fear, Uncertainty, and Doubt - better known as FUD - that gets promoted on the airwaves and in print.
---------------------------------------------
http://www.csoonline.com/article/2148461/application-security/examining-the…
*** Sicherheitslücke bei Messaging-App Viber aufgedeckt ***
---------------------------------------------
Bilder, Videos und Standortdaten, die man mit der Messaging-App Viber übermittelt, werden unverschlüsselt auf Servern gespeichert. Der Zugang dazu ist äußerst einfach.
---------------------------------------------
http://futurezone.at/digital-life/sicherheitsluecke-bei-messaging-app-viber…
*** Microsoft Warns of Attacks on IE Zero-Day ***
---------------------------------------------
Microsoft is warning Internet Explorer users about active attacks that attempt to exploit a previously unknown security flaw in every supported version of IE. The vulnerability could be used to silently install malicious software without any help from users, save for perhaps merely browsing to a hacked or malicious site.
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/PUm3t0AZZzc/
*** Neue Internet-Explorer-Lücke wird zum Ernstfall für Windows XP ***
---------------------------------------------
Wird bereits aktiv ausgenutzt - Kein Update mehr für XP, andere Betriebssystemversion derzeit ebenfalls noch ungeschützt
---------------------------------------------
http://derstandard.at/1397521804143
*** Biggest EU cyber security exercise to date: Cyber Europe 2014 taking place today ***
---------------------------------------------
Today, 28 April 2014, European countries kick off the Cyber Europe 2014 (CE2014). CE2014 is a highly sophisticated cyber exercise, involving more than 600 security actors across Europe.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/biggest-eu-cyber-security-e…
*** Cisco IOS XE Software Malformed L2TP Packet Vulnerability ***
---------------------------------------------
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) module of Cisco IOS XE on Cisco ASR 1000 Series Routers could allow an authenticated, remote attacker to cause a reload of the processing ESP card.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Security updates available for Adobe Flash Player (APSB14-13) ***
---------------------------------------------
A Security Bulletin (APSB14-13) has been published regarding security updates for Adobe Flash Player. These updates address a critical vulnerability, and Adobe recommends users update their product installations to the latest versions
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1093
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 24-04-2014 18:00 − Freitag 25-04-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Number of Sites Vulnerable to Heartbleed Plunges by Two-Thirds ***
---------------------------------------------
Two weeks ago, we talked about how many sites in the top 1 million domains (as judged by Alexa) were vulnerable to the Heartbleed SSL vulnerability. How do things stand today? Figure 1. Sites vulnerable to Heartbleed as of April 22 Globally, the percentage of sites that is vulnerable to Heartbleed has fallen by two-thirds,...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/qyKz0tQVjAY/
*** Fareit trojan observed spreading Necurs, Zbot and CryptoLocker ***
---------------------------------------------
The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/XrcbQ8kwwQo/
*** It's Insanely Easy to Hack Hospital Equipment ***
---------------------------------------------
When Scott Erven was given free reign to roam through all of the medical equipment used at a chain of large midwest health care facilities, he knew he would find security problems with the systems -- but he wasnt prepared for just how bad it would be.
---------------------------------------------
http://feeds.wired.com/c/35185/f/661467/s/39be98e1/sc/36/l/0L0Swired0N0C20A…
*** Update für Windows 7 außer der Reihe ***
---------------------------------------------
Windows-7-Nutzer bekommen von der Update-Funktion derzeit ein Update mit der Nummer 2952664 angeboten. Irritierend daran: Es erscheint außer der Reihe und Microsoft verrät auch nicht, welche Probleme das Update genau behebt.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Update-fuer-Windows-7-ausser-der-Rei…
*** Acunetix 8 Scanner Buffer overflow ***
---------------------------------------------
Topic: Acunetix 8 Scanner Buffer overflow Risk: High Text:#!/usr/bin/python # Title: Acunetix Web Vulnerability Scanner Buffer Overflow Exploit # Version: 8 # Build: 20120704 # Test...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040162
*** Security Notice-Statement on Patch Bypassing of Apache Struts2 ***
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-notices…
*** Hitachi Multiple Products OpenSSL TLS/DTLS Heartbeat Two Information Disclosure Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/58022
*** Global Technology Associates GB-OS OpenSSL TLS/DTLS Heartbeat Two Information Disclosure Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/58007
*** Certec atvise scada OpenSSL Heartbleed Vulnerability ***
---------------------------------------------
Researcher Bob Radvanovsky of Infracritical has notified NCCIC/ICS-CERT that Certec has released new libraries that mitigate the OpenSSL Heartbleed vulnerability in atvise scada.This vulnerability could be exploited remotely. Exploits that target the OpenSSL Heartbleed vulnerability are known to be publicly available.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-114-01
*** Siemens SIMATIC S7-1200 CPU Web Vulnerabilities ***
---------------------------------------------
Siemens ProductCERT and Ralf Spenneberg, Hendrik Schwartke, and Maik Brüggemann from OpenSource Training have reported two vulnerabilities in the Siemens SIMATIC S7-1200 CPU family. Siemens has produced a new product release that mitigates these vulnerabilities.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-114-02
*** InduSoft Web Studio Directory Traversal Vulnerability ***
---------------------------------------------
This advisory was originally posted to the US-CERT secure Portal library on April 17, 2014, and is now being released to the NCCIC/ICS-CERT web site.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02
*** Festo CECX-X-(C1/M1) Controller Vulnerabilities ***
---------------------------------------------
K. Reid Wightman of IOActive, Inc. has identified vulnerabilities in Festo’s CECX-X-C1 and CECX-X-M1 controllers. Festo has decided not to resolve these vulnerabilities because of compatibility reasons with existing engineering tools. This places critical infrastructure asset owners using this product at risk. This advisory is being published to alert critical infrastructure asset owners of the risk of using this equipment and for them to increase compensating measures if possible.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01
*** Oracle Solaris ntpd Query Function Lets Remote Users Conduct Amplified Denial of Service Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1030142
*** Synology DiskStation Manager cUrl Connection Re-use and Certificate Verification Security Issues ***
---------------------------------------------
https://secunia.com/advisories/58145
*** SSA-635659 (Last Update 2014-04-25): Heartbleed Vulnerability in Siemens Industrial Products ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** Halon Security Router Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57507
*** HP Security Bulletins ***
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 23-04-2014 18:00 − Donnerstag 24-04-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** NetSupport Information Leakage Using Nmap Script ***
---------------------------------------------
NetSupport allows corporations to remotely manage and connect to PCs and servers from a central location for the purposes of desktop support. In my last post I discussed how I wrote a script using the NetSupport scripting language to find versions of NetSupport running on clients with default installations that didnt require authentication to remotely connect to them. Essentially you could use NetSupport to bypassany Domain or local credentials to remotely connect to the PC and...
---------------------------------------------
http://blog.spiderlabs.com/2014/04/netsupport-information-leakage-using-nma…
*** DHCPv6 and DUID Confusion, (Wed, Apr 23rd) ***
---------------------------------------------
In IPv6, DHCP is taking somewhat a back seat to router advertisements. Many smaller networks are unlikely to use DHCP. However, in particular for Enterprise/larger networks, DHCPv6 still offers a lot of advantages when it comes to managing hosts and accounting for IP addresses in use. One of the big differences when it comes to DHCPv6 is that a host identifies itself with a DUID (DHCP Unique Identifier) which can be different from a MAC address. There are essentially three ways to come up with...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=18015&rss
*** Cisco: Hey, IT depts. Youre all malware hosts ***
---------------------------------------------
Security report also notes skills shortage Everybody - at least every multinational that Cisco checked out for its 2014 Annual Security Report - is hosting malware of some kind, and there arent enough security professionals to go around.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/04/24/cisco_youre…
*** DrDoS attacks to reach 800 Gbps in 2015 ***
---------------------------------------------
While the network time protocol (NTP) DrDoS threats that became prevalent in early 2014 have been contained, new distributed reflected denial of service threats will lead to attacks in excess of 800 Gbps during the next 12 to 18 months.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16733
*** Zero-Day-Lücke in Apache Struts 2 ***
---------------------------------------------
Durch eine kleine Abwandlung einer bereits gepatchten Lücke können Angreifer wieder Code in den Server einschleusen.
---------------------------------------------
http://www.heise.de/security/meldung/Zero-Day-Luecke-in-Apache-Struts-2-217…
*** Situational Awareness Alert for OpenSSL Vulnerability (Update D) ***
---------------------------------------------
This alert update is a follow-up to the updated NCCIC/ICS-CERT Alert titled ICS-ALERT-14-009-01C Situational Awareness Alert for OpenSSL Vulnerability that was published April 17, 2014, on the ICS-CERT web site.
---------------------------------------------
http://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-099-01D
*** Drupal - Vulnerabilities in Third-Party Modules ***
---------------------------------------------
https://drupal.org/node/2248073https://drupal.org/node/2248077https://drupal.org/node/2248145https://drupal.org/node/2248171
*** Attachmate Reflection OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information ***
---------------------------------------------
http://www.securitytracker.com/id/1030144
*** Bugtraq: Weak firmware encryption and predictable WPA key on Sitecom routers ***
---------------------------------------------
http://www.securityfocus.com/archive/1/531920
*** SSA-892012 (Last Update 2014-04-24): Web Vulnerabilities in SIMATIC S7-1200 CPU ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** Vuln: Check_MK Multiple Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/66389http://www.securityfocus.com/bid/66391http://www.securityfocus.com/bid/66394http://www.securityfocus.com/bid/66396
*** Notice: (Revision) CUSTOMER ATTENTION REQUIRED: HP Integrated Lights-Out and Integrated Lights-Out 2 - Scanning First-Generation iLO or iLO 2 Devices for the Heartbleed Vulnerability Results in iLO Lockup Requiring Power to be PHYSICALLY Removed ***
---------------------------------------------
The first-generation iLO and iLO 2 products use the RSA SSL libraries and there is a bug in these libraries that will cause first-generation iLO and iLO 2 devices to enter a live lockup situation when a vulnerability scanner runs to check for the Heartbleed vulnerability. Although the servers operating system will continue to function normally, first-generation iLO and iLO 2 will no longer be responsive over the management network.
---------------------------------------------
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispl…
*** HPSBHF03006 rev.1 - HP Integrated Lights-Out 2 (iLO 2) Denial of Service ***
---------------------------------------------
A potential security vulnerability has been identified in HP Integrated Lights-Out 2 (iLO 2) servers that allows for a Denial of Service. The denial of service condition occurs only when the iLO 2 is scanned by vulnerability assessment tools that test for CVE-2014-0160 (Heartbleed vulnerability).
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HP Security Bulletins for CVE 2014-0160 ***
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Vuln: EMC Connectrix Manager Converged Network Edition Remote Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/66308
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 22-04-2014 18:00 − Mittwoch 23-04-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Wartungsarbeiten Mailing-Listen-Server 24. April 2014 ***
---------------------------------------------
Am Nachmittag des 24. April werden wir Wartungsarbeiten an unserem Mailing-Listen-Server (lists.cert.at) durchführen. Auswirkungen: verzögerte Zustellung von Listen-Mails Administrations-Interface (Subscribe/Unsubscribe etc.) der Mailing-Listen nicht verfügbar Mailing-Listen-Archive nicht verfügbar. Wir werden uns bemühen, die Ausfälle so kurz wie möglich zu halten, können jedoch keine genaue...
---------------------------------------------
http://www.cert.at/services/blog/20140423085410-1134.html
*** DBIR: Poor Patching, Weak Credentials Open Door to Data Breaches ***
---------------------------------------------
Weak or default credentials, poor configurations and a lack of patching are common denominators in most data breaches, according to the 2014 Verizon Data Breach Investigations Report.
---------------------------------------------
http://threatpost.com/dbir-poor-patching-weak-credentials-open-door-to-data…
*** Millions Feedly users vulnerable to Javascript Injection attack ***
---------------------------------------------
A security researcher discovered a serious Javascript Injection vulnerability in the popular Feedly Android App impacting Millions Users.
---------------------------------------------
http://securityaffairs.co/wordpress/24209/hacking/feedly-javascript-vulnera…
*** Apple stopft Sicherheitslücken in iOS, OS X und WLAN-Basisstationen ***
---------------------------------------------
Die Updates sollen kritische Schwachstellen in Apples Betriebssystemen beseitigen - darunter eine weitere Lücke, die das Ausspähen von SSL-Verbindungen erlaubt. Für die AirPort-Stationen steht ein Heartbleed-Fix bereit.
---------------------------------------------
http://www.heise.de/security/meldung/Apple-stopft-Sicherheitsluecken-in-iOS…
*** Operation Francophoned: The Persistence and Evolution of a Dual-Pronged Social Engineering Attack ***
---------------------------------------------
Operation Francophoned, first uncovered by Symantec in May 2013, involved organizations receiving direct phone calls and spear phishing emails impersonating a known telecommunication provider in France, all in an effort to install malware and steal information and ultimately money from targets.
---------------------------------------------
http://www.symantec.com/connect/blogs/operation-francophoned-persistence-an…
*** Blog: An SMS Trojan with global ambitions ***
---------------------------------------------
Recently, we’ve seen SMS Trojans starting to appear in more and more countries. One prominent example is Trojan-SMS.AndroidOS.Stealer.a: this Trojan came top in Kaspersky Lab's recent mobile malware ТОР 20. It can currently send short messages to premium-rate numbers in 14 countries around the world.
---------------------------------------------
http://www.securelist.com/en/blog/8209/An_SMS_Trojan_with_global_ambitions
*** ISC stellt Entwicklung an seinem BIND10-DNS-Server ein ***
---------------------------------------------
Das Unternehmen hat die letzte von ihm entwickelte Version veröffentlicht und zieht sich aus der weiteren Entwicklung zurück. Dabei sollte BIND10 ursprünglich BIND9 ablösen, das seinerzeit Hochleistungs-Server nur unzureichend ausschöpfen konnte.
---------------------------------------------
http://www.heise.de/newsticker/meldung/ISC-stellt-Entwicklung-an-seinem-BIN…
*** Nine patterns make up 92 percent of security incidents ***
---------------------------------------------
Verizon security researchers have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16725
*** Dissecting the unpredictable DDoS landscape ***
---------------------------------------------
DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and brand damage, according to Neustar.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16726
*** Special Edition of OUCH: Heartbleed - Why Do I Care? http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-2014-special_e…, (Wed, Apr 23rd) ***
---------------------------------------------
-- Alex Stanford - GIAC GWEB, Research Operations Manager, SANS Internet Storm Center (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=18013&rss
*** Apple splats new SSL snooping bug in iOS, OS X - but its no Heartbleed ***
---------------------------------------------
Triple-handshake flaw stalks Macs and iThings Apple has squashed a significant security bug in its SSL engine for iOS and OS X as part of a slew of patches for iThings and Macs.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/04/23/apple_ssl_u…
*** Joomla Plugin Constructor Backdoor ***
---------------------------------------------
We recently wrote about backdoors in pirated commercial WordPress plugins. This time it will be a short post about an interesting backdoor we found in a Joomla plugin. It was so well organized that at first we didn't realize there was a backdoor even though we knew something was wrong. That's how the code of...
---------------------------------------------
http://blog.sucuri.net/2014/04/joomla-plugin-constructor-backdoor.html
*** Citrix Security Advisory for CVE-2014-0160, aka the Heartbleed vulnerability ***
---------------------------------------------
A vulnerability has been recently disclosed in OpenSSL that could result in remote attackers being able to obtain sensitive data from the process address space of a vulnerable OpenSS...
---------------------------------------------
http://support.citrix.com/article/CTX140605
*** IBM PSIRT - OpenSSL Heartbleed (CVE-2014-0160) ***
---------------------------------------------
We will continue to update this blog to include information about products. The following is a list of products affected by the Heartbleed vulnerability. Please follow the links below to view the security bulletins for the affected products.
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/openssl_heartbleed_cv…
*** Information on Norton products and the Heartbleed vulnerability ***
---------------------------------------------
This article answers many of the questions that are currently being asked about the Heartbleed bug and the role that Norton products play in defending against this attack.
---------------------------------------------
https://support.norton.com/sp/en/us/home/current/solutions/v98431836_EndUse…
*** OpenSSL Security Vulnerability - aka. "Heartbleed Bug" - CVE-2014-0160 - Security Incident Response for D-Link Devices and Services ***
---------------------------------------------
D-Link is investigating all devices and systems that utilize the OpenSSL software library to determine if our devices and customers are affected by this security vulnerability. You will find current status below and can contact us at security(a)dlink.com about specific questions.
---------------------------------------------
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10022
*** Heartbleed Vulnerability in Various Products ***
---------------------------------------------
http://tomcat.apache.org/native-doc/news/2014.htmlhttp://tomcat.apache.org/native-doc/miscellaneous/changelog.htmlhttp://www.fortiguard.com/advisory/FG-IR-14-011/http://www.sybase.com/detail?id=1099387https://secunia.com/advisories/58188 (Symantec Multiple Products)
https://secunia.com/advisories/58148 (Xerox WorkCentre 3315/3325)
*** VU#350089: IBM Notes and Domino on x86 Linux specify an executable stack ***
---------------------------------------------
Vulnerability Note VU#350089 IBM Notes and Domino on x86 Linux specify an executable stack Original Release date: 22 Apr 2014 | Last revised: 22 Apr 2014 Overview IBM Notes and Domino on x86 Linux are incorrectly built requesting an executable stack. This can make it easier for attackers to exploit vulnerabilities in Notes, Domino, and any of the child processes that they may spawn. Description The build environment for the x86 Linux versions of IBM Notes and Domino incorrectly specified the...
---------------------------------------------
http://www.kb.cert.org/vuls/id/350089
*** Cisco ASA SIP Inspection Memory Leak Vulnerability ***
---------------------------------------------
A vulnerability in the Session Initiation Protocol (SIP) inspection engine code could allow an unauthenticated, remote attacker to cause a slow memory leak, which may cause instability on the affected system.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** AirPort Extreme and AirPort Time Capsule OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information ***
---------------------------------------------
http://www.securitytracker.com/id/1030132
*** Apple OS X Multiple Bugs Let Remote Users Execute Arbitrary Code and Deny Service and Local Users Gain Elevated Privileges ***
---------------------------------------------
http://www.securitytracker.com/id/1030133
*** Sixnet Sixview 2.4.1 Directory Traversal ***
---------------------------------------------
Topic: Sixnet Sixview 2.4.1 Directory Traversal Risk: Medium Text:#Exploit Title: Sixnet sixview web console directory traversal #Date: 2014-04-21 #Exploit Author: daniel svartman #Vendor Ho...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040150
*** Parallels Plesk Panel 12.x Key Disclosure ***
---------------------------------------------
Topic: Parallels Plesk Panel 12.x Key Disclosure Risk: High Text:While auditing the source code for Parallels Plesk Panel 12.x on Linux I noticed the following feature that leads to leakage o...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040151
*** [2014-04-23] Path Traversal/Remote Code Execution in WD Arkeia Network Backup Appliances ***
---------------------------------------------
An unauthenticated remote attacker can exploit the identified Path Traversal vulnerability in order to retrieve arbitrary files from the affected WD Arkeia Network Backup appliances and execute system commands.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Security Advisory-Improper Input Validation Vulnerability on Multiple Quidway Switch Products ***
---------------------------------------------
Once exploited, the vulnerability might cause a excessive resource (e.g. memory) consumption of the vulnerable system and even cause the system to restart in serious cases.
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** HP Security Bulletins ***
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Security Advisories Relating to Symantec Products - Symantec Messaging Gateway Management Console Reflected XSS ***
---------------------------------------------
Symantec's Messaging Gateway management console is susceptible to a reflected cross-site scripting (XSS) issue found in one of the administrative interface pages. Successful exploitation could result in potential session hijacking or unauthorized actions directed against the console with the privileges of the targeted user's browser.
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** Security Bulletin: IBM Sterling Order Management is affected by Cross Site Scripting (XSS) Vulnerability (CVE-2014-0932) ***
---------------------------------------------
IBM Sterling Order Management is vulnerable to a cross-site scripting attack which could lead to unauthorized access through the injected scripts.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21670912
*** Django Security Issue and Multiple Vulnerabilities ***
---------------------------------------------
A security issue and multiple vulnerabilities have been reported in Django, which can be exploited by malicious people to potentially disclose certain sensitive information, manipulate certain data, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/58201
*** Hitachi Multiple Cosminexus / uCosminexus Products Java Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/58197
*** Hitachi Multiple Cosminexus / uCosminexus Products SSL/TLS Initialization Vector Selection Weakness ***
---------------------------------------------
https://secunia.com/advisories/58240
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 17-04-2014 18:00 − Freitag 18-04-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Looking for malicious traffic in electrical SCADA networks - part 2 - solving problems with DNP3 Secure Authentication Version 5, (Thu, Apr 17th) ***
---------------------------------------------
I received this week a very valuable e-mail from the DNP Technical Committee Chair, Mr. Adrew West, who pointed an excellent observation and its the very slow adoption of DNP3 Secure Authentication Version 5, which is the latest security enhancement for the DNP3 protocol. I want to talk today about this standard and the advantages of adopting it into your DNP3 SCADA system. This standard has two specific objectives: Help DNP3 outstation to determine beyond any reasonable doubt that its...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17981&rss
*** Heartbleed Bug Sends Bandwidth Costs Skyrocketing ***
---------------------------------------------
The exposure of the Heartbleed vulnerability last week had a number of repercussions, one of which was to set off a mad scramble by companies to revoke the SSL certificates for their domains and services and obtain new ones. The total costs of Heartbleed are yet to be calculated, but CloudFlare has come up with...
---------------------------------------------
http://feeds.wired.com/c/35185/f/661467/s/397cb2f7/sc/5/l/0L0Swired0N0C20A1…
*** Heartbleed bereitet Anonymisierungsnetzwerk Tor Schwierigkeiten ***
---------------------------------------------
Rund ein Fünftel der Exit Nodes von OpenSSL-Lücke betroffen - Vorschlag diese aus dem Netz zu werfen...
---------------------------------------------
http://derstandard.at/1397520979826
*** Mac OS X Trojans display ads ***
---------------------------------------------
April 16, 2014 Malicious programs designed to generate a profit for intruders by displaying annoying ads are very common, but until recently they have mostly been a nuisance for Windows users. Thats why a few Trojans that were recently examined by Doctor Webs security researchers stand out among such applications...
---------------------------------------------
http://news.drweb.com/show/?i=4352&lng=en&c=9
*** Heartbleed Update ***
---------------------------------------------
Adobe has evaluated the Creative Cloud and its related services (including Behance and Digital Publishing Suite), the Marketing Cloud solutions and products (including Analytics, Analytics Premium and Experience Manager), EchoSign, Acrobat.com, the Adobe.com store, and other Adobe services. All Adobe internet-facing services known to have been using a version of OpenSSL containing the Heartbleed vulnerability have been mitigated. We are continuing our analysis of Adobe internet-facing servers to identify and remediate any remaining Heartbleed-related risks.
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1085
*** Security Advisory-OpenSSL Heartbeat Extension vulnerability (Heartbleed bug) on Huawei multiple products ***
---------------------------------------------
Some OpenSSL software versions used in multiple Huawei products have the following OpenSSL vulnerability. Unauthorized remote attackers can dump 64 Kbytes of memory of the connected server or client in each attack. The leaked memory may contain sensitive information, such as passwords and private keys (Vulnerability ID: HWPSIRT-2014-0414).
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** McAfee Security Bulletin - OpenSSL Heartbleed vulnerability patched in McAfee products ***
---------------------------------------------
Several McAfee products are vulnerable to OpenSSL Heartbleed. See the McAfee Product Vulnerability Status lists below for the status of each product.
---------------------------------------------
https://kc.mcafee.com/corporate/index?page=content&id=SB10071
*** Nagios Remote Plugin Executor 2.15 Remote Command Execution ***
---------------------------------------------
Topic: Nagios Remote Plugin Executor 2.15 Remote Command Execution Risk: High Text: - Release date: 17.04.2014 - Discovered by: Dawid Golunski - Severity: High I. VULNER...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040126
*** MariaDB Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/58106
*** Debian update for qemu and qemu-kvm ***
---------------------------------------------
https://secunia.com/advisories/58088
*** OpenVZ update for kernel ***
---------------------------------------------
https://secunia.com/advisories/58060
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 16-04-2014 18:00 − Donnerstag 17-04-2014 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** Entwickler-Modus gefährdet Blackberries ***
---------------------------------------------
Bei aktiviertem Entwickler-Modus können Angreifer über das WLAN oder die USB-Verbindung Schadcode mit vollen Root-Rechten ausführen. Wird der Modus wieder abgeschaltet, ist das Gerät immer noch bis zum nächsten Neustart angreifbar.
---------------------------------------------
http://www.heise.de/security/meldung/Entwickler-Modus-gefaehrdet-Blackberri…
*** Heartbleed: BSI sieht keinen Grund für Entwarnung ***
---------------------------------------------
Das Bundesamt für Sicherheit in der Informationstechnik sieht beim "Heartbleed Bug" weiteren Handlungsbedarf. Kleinere Websites sind nach wie vor verwundbar, auch nehmen Angreifer jetzt andere Dienste ins Visier.
---------------------------------------------
http://www.heise.de/security/meldung/Heartbleed-BSI-sieht-keinen-Grund-fuer…
*** Bugtraq: [SECURITY] [DSA 2907-1] Announcement of long term support for Debian oldstable ***
---------------------------------------------
http://www.securityfocus.com/archive/1/531856
*** mAdserve id SQL injection ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/92545
*** SA-CONTRIB-2014-041 - Block Search - SQL Injection ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-041
Project: Block Search (third-party module)
Version: 6.x
Date: 2014-April-16
Security risk: Highly critical
Exploitable from: Remote
Vulnerability: SQL Injection
Description: Block Search module provides an alternative way of managing blocks.The module doesnt properly use Drupals database API resulting in user-provided strings being passed directly to the database allowing SQL Injection.This vulnerability is mitigated by the fact that an attacker must either use a
---------------------------------------------
https://drupal.org/node/2242463
*** SA-CORE-2014-002 - Drupal core - Information Disclosure ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CORE-2014-002
Project: Drupal core
Version: 6.x, 7.x
Date: 2014-April-16
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Information Disclosure
Description: Drupals form API has built-in support for temporary storage of form state, for example user input. This is often used on multi-step forms, and is required on Ajax-enabled forms in order to allow the Ajax calls to access and update interim user input on the server.When pages are cached for anonymous
---------------------------------------------
https://drupal.org/SA-CORE-2014-002
*** Heartbleed CRL Activity Spike Found, (Wed, Apr 16th) ***
---------------------------------------------
It looks like, as I had suspected, the CRL activity numbers we have been seeing did not reflect the real volume caused by the OpenSSL Heartbleed bug. This evening I noticed a massive spike in the amount of revocations being reported by this CRL: http://crl.globalsign.com/gs/gsorganizationvalg2.crl The spike is so large that we initially thought it was a mistake, but we have since confirmed that its real! Were talking about over 50,000 unique recovations from a single CRL: This is by an order
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17977&rss
*** Confirmed: Nasty Heartbleed bug exposes OpenVPN private keys, too ***
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/cz_Y-Ayd5tw/
*** OpenSSL-Bug Heartbleed: Die meisten Router sind laut Herstellerangaben nicht verwundbar ***
---------------------------------------------
Die meisten Router-Hersteller geben an, ältere OpenSSL-Versionen zu nutzen. Etliche liefern aber keine Belege dafür, dass ihre Geräte nicht verwundbar sind. Sicherheitsbewusste Nutzer müssen also die Ärmel hochkrempeln und die Geräte selbst testen.
---------------------------------------------
http://www.heise.de/security/meldung/OpenSSL-Bug-Heartbleed-Die-meisten-Rou…
*** SAP Router Password Timing Attack ***
---------------------------------------------
Topic: SAP Router Password Timing Attack Risk: High Text:Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ SAP Router Password Timing Attack 1. *Advisory Inf...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040118
*** Whats worse than Heartbleed? Bugs in Heartbleed detection scripts. ***
---------------------------------------------
As of the writing of this blog post, Nessus, Metasploit, Nmap, and others have released methods for detecting whether your systems are affected. The problem is, most of them have bugs themselves which lead to false negatives results, that is, a result which says a system is not vulnerable when in reality it is. With many people likely running detection scripts or other scans against hosts to check if they need to be patched, it is important that these bugs be addressed before too many people
---------------------------------------------
http://www.hut3.net/blog/cns---networks-security/2014/04/14/bugs-in-heartbl…
*** Definitionsupdate für Microsoft-Virenscanner bremst Windows XP aus ***
---------------------------------------------
http://derstandard.at/1397520906230
*** Zugriff auf SMS-Nachrichten und Tor-Traffic dank Heartbleed ***
---------------------------------------------
Hackern ist es gelungen, die von SMS-Gateways verschickten Nachrichten auszulesen - Tokens zur Zwei-Faktor-Authentisierung inklusive. Und auch Tor-Exitnodes geben beliebige Speicherinhalte preis.
---------------------------------------------
http://www.heise.de/security/meldung/Zugriff-auf-SMS-Nachrichten-und-Tor-Tr…
*** Bleichenbacher-Angriff: TLS-Probleme in Java ***
---------------------------------------------
In der TLS-Bibliothek von Java wurde ein Problem gefunden, welches unter Umständen das Entschlüsseln von Verbindungen erlaubt. Es handelt sich dabei um die Wiederbelebung eines Angriffs, der bereits seit 1998 bekannt ist. (Java, Technologie)
---------------------------------------------
http://www.golem.de/news/bleichenbacher-angriff-tls-probleme-in-java-1404-1…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 15-04-2014 18:00 − Mittwoch 16-04-2014 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** Phishing-Mail: BSI warnt vor BSI-Warnung ***
---------------------------------------------
Die regelmäßigen Warnungen des BSI vor gehackten Online-Konten haben offenbar Kriminelle zu einer Phishing-Attacke animiert. Von "verdachtigen Aktivitäten" und "anwaltlichen Schritten" ist darin die Rede. (Phishing, Internet)
---------------------------------------------
http://www.golem.de/news/phishing-mail-bsi-warnt-vor-bsi-warnung-1404-10589…
*** RSA BSAFE Micro Edition Suite security bypass ***
---------------------------------------------
RSA BSAFE Micro Edition Suite (MES) could allow a remote attacker to bypass security restrictions, caused by an error within the certificate chain processing logic. An attacker could exploit this vulnerability to create an improperly authenticated SSL connection.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/92408
*** Chef Multiple Vulnerabilities ***
---------------------------------------------
Chef Software has acknowledged multiple security issues and vulnerabilities in Chef, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, bypass certain security restrictions, disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/57836
*** WordPress Twitget Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
dxwsecurity has reported a vulnerability in the Twitget plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.
The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. change plugin configuration settings when a logged-in administrative user visits a specially crafted web page.
---------------------------------------------
https://secunia.com/advisories/57892
*** Critical Patch Update - April 2014 ***
---------------------------------------------
Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Products and Versions column.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
*** Innominate mGuard OpenSSL HeartBleed Vulnerability ***
---------------------------------------------
OVERVIEW Researcher Bob Radvanovsky of Infracritical has notified NCCIC/ICS-CERT that Innominate has released a new firmware version that mitigates the OpenSSL HeartBleed vulnerability in the mGuard products.This vulnerability could be exploited remotely. Exploits that target the OpenSSL Heartbleed vulnerability are known to be publicly available.AFFECTED PRODUCTSThe following Innominate mGuard versions are affected:
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-105-02
*** Siemens Industrial Products OpenSSL HeartBleed Vulnerability ***
---------------------------------------------
OVERVIEWSiemens reported to NCCIC/ICS-CERT a list of products affected by the OpenSSL vulnerability (known as 'Heartbleed'). Joel Langill of Infrastructure Defense Security Services reported to ICS-CERT and Siemens the OpenSSL vulnerability affecting the S7-1500.Siemens has produced an update and Security Advisory (SSA-635659) that mitigates this vulnerability in eLAN and is currently working on updates for the other affected products.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-105-03
*** Looking for malicious traffic in electrical SCADA networks - part 1, (Tue, Apr 15th) ***
---------------------------------------------
When infosec guys are performing intrusion detection, they usually look for attacks like portscans, buffer overflows and specific exploit signature. For example, remember OpenSSL heartbleed vulnerability?
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17967&rss
*** New Feature: Monitoring Certification Revocation Lists https://isc.sans.edu/crls.html, (Wed, Apr 16th) ***
---------------------------------------------
Certificate Revocation Lists (“CRLs”) are used to track revoked certificates. Your browser will download these lists to verify if a certificate presented by a web site has been revoked. The graph above shows how many certificates were revoked each day by the different CRLs we are tracking.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17969&rss
*** Adobe Flash ExternalInterface Use-After-Free ***
---------------------------------------------
VUPEN Vulnerability Research Team discovered a critical vulnerability in Adobe Flash.
The vulnerability is caused by a use-after-free error when interacting with the "ExternalInterface" class from the browser, which could be exploited to achieve code execution via a malicious web page.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040102
*** Netgear N600 Password Disclosure / Account Reset ***
---------------------------------------------
While i was lurking around the Netgear firmware today i came across various tweaking and others i was able to find a password disclosure,File uploading vulnerably which could compromise the entire router.as of now no patch from the
vendor.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040101
*** Apache Syncope 1.0.8 / 1.1.6 Code Execution ***
---------------------------------------------
In the various places in which Apache Commons JEXL expressions are allowed (derived schema definition, user / role templates, account links
of resource mappings) a malicious administrator can inject Java code that can be executed remotely by the JEE container running the Apache
Syncope core.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040106
*** Bugtraq: CVE-2014-2735 - WinSCP: missing X.509 validation ***
---------------------------------------------
A user can not recognize an easy to perform man-in-the-middle attack, because the client does not validate the "Common Name" of the servers X.509 certificate. In networking environment that is not trustworthy, like a wifi network, using FTP AUTH TLS with WinSCP the servers identity can not be trusted.
---------------------------------------------
http://www.securityfocus.com/archive/1/531847
*** Qemu: out of bounds buffer access, guest triggerable via IDE SMART ***
---------------------------------------------
An out of bounds memory access flaw was found in Qemu's IDE device model. It leads to Qemu's memory corruption via buffer overwrite(4 bytes). It occurs while executing IDE SMART commands.
A guest's user could use this flaw to corrupt Qemu process's memory on the host.
---------------------------------------------
http://seclists.org/oss-sec/2014/q2/116
*** Hintergrund: Warum wir Forward Secrecy brauchen ***
---------------------------------------------
Der SSL-GAU zeigt nachdrücklich, dass Forward Secrecy kein exotisches Feature für Paranoiker ist. Es ist vielmehr das einzige, was uns noch vor einer vollständigen Komplettüberwachung aller Kommunikation durch die Geheimdienste schützt.
---------------------------------------------
http://www.heise.de/security/artikel/Warum-wir-Forward-Secrecy-brauchen-217…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 14-04-2014 18:00 − Dienstag 15-04-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Barracuda Multiple Products OpenSSL TLS/DTLS Heartbeat Two Information Disclosure Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57869
*** DSA-2903 strongswan ***
---------------------------------------------
http://www.debian.org/security/2014/dsa-2903
*** Occupy Your Icons Silently on Android ***
---------------------------------------------
FireEye mobile security researchers have discovered a new Android security issue: a malicious app with normal protection level permissions can probe icons on Android home screen and modify them to point to phishing ..
---------------------------------------------
http://www.fireeye.com/blog/uncategorized/2014/04/occupy_your_icons_silentl…
*** From the Trenches: AV Evasion With Dynamic Payload Generation ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/04/14/from-the-…
*** Critical Patch Update - April 2014 - Pre-Release Announcement ***
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
*** First Phase of TrueCrypt Audit Turns Up No Backdoors ***
---------------------------------------------
A initial audit of the popular open source encryption software TrueCrypt turned up fewer than a dozen vulnerabilities, none of which so far point toward a backdoor surreptitiously inserted into the codebase. A report on the first phase of the audit was released ..
---------------------------------------------
http://beta.slashdot.org/story/200749
*** Microsoft Confirms It Is Dropping Windows 8.1 Support ***
---------------------------------------------
Microsoft TechNet blog makes clear that Windows 8.1 will not be patched, and that users must get Windows 8.1 Update if they want security patches, InfoWorlds Woody Leonhard reports. In what is surely the most customer-antagonistic move of the new Windows regime, Steve Thomas at Microsoft posted a TechNet article on Saturday stating categorically that Microsoft will ..
---------------------------------------------
http://tech.slashdot.org/story/14/04/15/0053213/microsoft-confirms-it-is-dr…
*** VMware reveals 27-patch Heartbleed fix plan ***
---------------------------------------------
Go buy your vSysadmins a big choccy egg: their Easter in peril VMware has confirmed that 27 of its products need patches for the Heartbleed bug.
---------------------------------------------
http://www.theregister.co.uk/2014/04/15/vmware_reveals_27patch_heartbleed_f…
*** Cyberwar-Doku "netwars / out of CTRL": Webdoc bei heise ***
---------------------------------------------
heise online präsentiert parallel zur Arte-Doku den ersten Teil der innovativen Multimedia-Dokumentation zum Thema Cyberwar. Sie entscheiden selbst, ob Sie beispielsweise lieber Details zu Stuxnet oder einen Kommentar des Star-Hackers FX sehen möchten.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Cyberwar-Doku-netwars-out-of-CTRL-We…
*** Samsung Galaxy S5: Fingerabdrucksensor auch schon gehackt ***
---------------------------------------------
Mit einer für das iPhone 5S entwickelten Fingerkuppenattrappe trickste Ben Schlabs die Sperre des neuen Samsung-Flagschiffs aus. Er konnte damit dann sogar Geld überweisen.
---------------------------------------------
http://www.heise.de/security/meldung/Samsung-Galaxy-S5-Fingerabdrucksensor-…
*** SSA-364879 (Last Update 2014-04-15): Vulnerabilities in SINEMA Server ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** SSA-654382 (Last Update 2014-04-15): Vulnerabilities in SIMATIC S7-1200 CPU ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** Akamai Withdraws Proposed Heartbleed Patch ***
---------------------------------------------
As researchers demonstrate OpenSSL bug exploits that retrieve private keys, Akamai rescinds a patch suggestion for the SSL/TLS library after a security researcher punches holes in it.
---------------------------------------------
http://www.darkreading.com/application-security/akamai-withdraws-proposed-h…
*** (ISC) launches cyber forensics credential in Europe ***
---------------------------------------------
Information and software security professional body (ISC)2 has announced the availability of its Certified Cyber Forensics Professional certification in Europe. Registration for CCFP-EU is now open, with the first exam available on 30 April 2014 at Pearson VUE test centres across the region. The German translation of the exam is to be available from 15 June 2014.
---------------------------------------------
http://www.computerweekly.com/news/2240218864/ISC2-launches-cyber-forensics…
*** BSI warnt vor BSI-Mails ***
---------------------------------------------
Betrüger missbrauchen den Namen des BSI für eine Phishing-Kampagne, die vorgibt, dass der Empfänger bei "illegalen Aktivitäten" erwischt wurde. Das BSI rät, den Anhang keinesfalls zu öffnen.
---------------------------------------------
http://www.heise.de/security/meldung/BSI-warnt-vor-BSI-Mails-2170549.html
*** Hardware Giant LaCie Acknowledges Year-Long Credit Card Breach ***
---------------------------------------------
Computer hard drive maker LaCie has acknowledged that a hacker break-in at its online store exposed credit card numbers and contact information on customers for the better part of the past ..
---------------------------------------------
http://krebsonsecurity.com/2014/04/hardware-giant-lacie-acknowledges-year-l…
*** Synology räumt nach Heartbleed auf: Passwort-Wechsel und Updates ***
---------------------------------------------
Nachdem es durch die Heartbleed-Lücke gelang, auf Mail-Adressen und Passwörter von Synology-Nutzern zuzugreifen, fordert der Hersteller seine Kunden nun nachdrücklich zum Passwortwechsel auf. Ausserdem gibt es Security-Updates für die Synology-NAS.
---------------------------------------------
http://www.heise.de/security/meldung/Synology-raeumt-nach-Heartbleed-auf-Pa…
*** Exploiting CSRF under NoScript Conditions ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/04/15/exploitin…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 11-04-2014 18:00 − Montag 14-04-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Heartbleed FAQ ***
---------------------------------------------
Heartbleed FAQ11. April 2014Wir haben jetzt auch unsere Version einer FAQ zur "Heartbleed" veröffentlicht.Dieses Dokument ist kein finaler Bericht, sondern eine Bestandsaufnahme, die mit neuen Daten aktualisiert werden wird. So sind wir etwa dabei, den Status in Österreich noch genauer zu vermessen. Autor: Otmar Lendl
---------------------------------------------
http://www.cert.at/services/blog/20140411232912-1127.html
*** Heartbleed: Keys auslesen ist einfacher als gedacht ***
---------------------------------------------
Zwei Personen ist es gelungen, private Schlüssel mit Hilfe des Heartbleed-Bugs aus einem nginx-Testserver auszulesen. Der Server gehört der Firma Cloudflare, die mit einem Wettbewerb sicherstellen wollte, dass das Auslesen privater Schlüssel unmöglich ist. (Server, OpenSSL)
---------------------------------------------
http://www.golem.de/news/heartbleed-keys-auslesen-ist-einfacher-als-gedacht…
*** NSA will nichts von "Heartbleed"-Lücke gewusst haben ***
---------------------------------------------
In einem Bericht hatte die Nachrichtenagentur Bloomberg behauptet, die OpenSSL-Lücke sei der NSA seit zwei Jahren bekannt gewesen. Die US-Behörden wiesen das jedoch rasch zurück.
---------------------------------------------
http://www.heise.de/security/meldung/NSA-will-nichts-von-Heartbleed-Luecke-…
*** Heartbleed zeigt: Google muss Android-Updates in den Griff bekommen ***
---------------------------------------------
Nur eine fast zwei Jahre alte Version betroffen, aber viele Millionen Geräte gefährdet - Updates unwahrscheinlich
---------------------------------------------
http://derstandard.at/1397301984464
*** "Heartbleed": Noch immer tausende österreichische Webseiten betroffen ***
---------------------------------------------
Sicherheitslücke findet sich auf Webservern öffentlicher Einrichtungen - Schulen und Gemeinden betroffen
---------------------------------------------
http://derstandard.at/1397302008116
*** Identitätsdiebstahl: 7.500 Domain-Betreiber in Österreich betroffen ***
---------------------------------------------
Das Bundeskriminalamt informiert nun alle Betreiber betroffener Domains
---------------------------------------------
http://derstandard.at/1397302034346
*** OpenSSL use-after-free race condition read buffer ***
---------------------------------------------
Topic: OpenSSL use-after-free race condition read buffer Risk: High Text:About two days ago, I was poking around with OpenSSL to find a way to mitigate Heartbleed. I soon discovered that in its defaul...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040079
*** Citrix VDI-in-a-Box Discloses Administrator Password to Local Users ***
---------------------------------------------
http://www.securitytracker.com/id/1030068
*** Arbitrary Code Execution Bug in Android Reader ***
---------------------------------------------
A security vulnerability in Adobe Reader for Android could give an attacker the ability to execute arbitrary code.
---------------------------------------------
http://threatpost.com/arbitrary-code-execution-bug-in-android-reader/105421
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 10-04-2014 18:00 − Freitag 11-04-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Heartbleed vendor informations / statistics ***
---------------------------------------------
https://isc.sans.edu/diary/Heartbleed+vendor+notifications/17929https://www.cert.fi/en/reports/2014/vulnerability788210.htmlhttp://securityaffairs.co/wordpress/23878/intelligence/statistics-impact-he…
*** Gehackte Online-Konten: Mehr als zehn Millionen Abrufe von Sicherheitstest ***
---------------------------------------------
Auch der zweite Sicherheitscheck des BSI zu gehackten Online-Konten stößt auf großes Interesse. Für Verwirrung sorgt aber weiter eine Sicherheitssperre von GMX und web.de.
---------------------------------------------
http://www.golem.de/news/gehackte-online-konten-mehr-als-zehn-millionen-abr…
*** The Heartbleed Hit List: The Passwords You Need to Change Right Now ***
---------------------------------------------
... it hasnt always been clear which sites have been affected. Mashable reached out to various companies included on a long list of websites that could potentially have the flaw. Below, weve rounded up the responses from some of the most popular social, email, banking and commerce sites on the web.
---------------------------------------------
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
*** Heartbleed Vulnerability Affects 5% of Select Top Level Domains from Top 1M ***
---------------------------------------------
In trying to gauge the impact of the Heartbleed vulnerability, we proceeded to scanning the Top Level Domain (TLD) names of certain countries extracted from the top 1,000,000 domains by Alexa. We then proceeded to separate the sites which use SSL and further categorized those under "vulnerable" or "safe". The data we were able to...
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/heartbleed-vulne…
*** Spionage-Botnet nutzte Heartbleed-Lücke schon vor Monaten aus ***
---------------------------------------------
Bereits im November hat ein auf Spionage ausgelegtes Botnet offenbar versucht, durch die OpenSSL-Lücke Daten abzugreifen - möglicherweise im Auftrag eines Geheimdienstes. Die gute Nachricht ist: Die Anzahl der noch verwundbaren Server ist rückläufig.
---------------------------------------------
http://www.heise.de/security/meldung/Spionage-Botnet-nutzte-Heartbleed-Luec…
*** Heartbleed: Apple-Nutzer sind nicht betroffen ***
---------------------------------------------
Weder Mac OS X, iOS noch Apples Dienste wie iCloud sind von der Heartbleed-Schwachstelle betroffen. Denn Apple verzichtet auf OpenSSL. Einige Apps verwenden die Kryptobibliothek jedoch. (Apple, Server-Applikationen)
---------------------------------------------
http://www.golem.de/news/heartbleed-apple-nutzer-sind-nicht-betroffen-1404-…
*** Heartbleed Explanation ***
---------------------------------------------
http://xkcd.com/1354/
*** Critical Update for JetPack WordPress Plugin ***
---------------------------------------------
The Jetpack team just released a critical security update to fix a security vulnerability in the Jetpack WordPress plugin. The vulnerability allows an attacker to bypass the site's access control and publish posts on the site. All versions of JetPack since October, 2012 (Jetpack 1.9) are vulnerable, and all users should update to version 2.9.3
---------------------------------------------
http://blog.sucuri.net/2014/04/critical-update-for-jetpack-wordpress-plugin…
*** Security Updates for VMware vSphere ***
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0002.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0003.html
*** IBM SPSS Analytic Server Discloses Passwords to Remote Authenticated Users ***
---------------------------------------------
http://www.securitytracker.com/id/1030051
*** [2014-04-11] Multiple vulnerabilities in Plex Media Server ***
---------------------------------------------
Plex Media Server contains several vulnerability that allow an attacker to intercept traffic between Plex Media Server and clients in plaintext. Furthermore Cross Site Request Forgery (CSRF) vulnerabilities allow an attacker to execute privileged commands in the context of Plex Media Server.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 09-04-2014 18:00 − Donnerstag 10-04-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Hintergrund: Passwörter in Gefahr - was nun? ***
---------------------------------------------
Durch Heartbleed sind theoretisch schon wieder viele Millionen Passwörter in Gefahr. Sicherheitsexperten raten dazu, alle zu ändern. heise-Security-Chefredakteur Jürgen Schmidt schätzt das anders ein.
---------------------------------------------
http://www.heise.de/security/artikel/Passwoerter-in-Gefahr-was-nun-2167584.…
*** Heartbleed: 600.000 Server immer noch ungeschützt ***
---------------------------------------------
Die Sicherheitslücke Heartbleed zieht immer weitere Kreise. Möglicherweise wurde die Schwachstelle schon seit Monaten ausgenutzt.
---------------------------------------------
http://futurezone.at/digital-life/heartbleed-600-000-server-immer-noch-unge…
*** Sicherheitslücke: Unternehmen können für Schäden durch Heartbleed haftbar sein ***
---------------------------------------------
Der Heartbleed-Bug gilt als eine der gravierendsten Sicherheitslücken aller Zeiten. Millionen SSL-gesicherte Websites waren betroffen, erste Missbrauchsfälle sind bekanntgeworden. Können Unternehmen und Admins, die den Fehler nicht behoben haben, für Schäden belangt werden? Golem.de hat nachgefragt. (Ruby, OpenSSL)
---------------------------------------------
http://www.golem.de/news/sicherheitsluecke-unternehmen-koennen-fuer-schaede…
*** Smartphones vom SSL-GAU (fast) nicht betroffen ***
---------------------------------------------
Keine der wichtigen Smartphone-Plattformen setzt in der aktuellen Version eine der für Heartbleed anfälligen OpenSSL-Bibliotheken ein. Lediglich Android-Nutzer mit einer mittelalten Version benötigen ein Update.
---------------------------------------------
http://www.heise.de/security/meldung/Smartphones-vom-SSL-GAU-fast-nicht-bet…
*** OpenSSL-Bug: Spuren von Heartbleed schon im November 2013 ***
---------------------------------------------
Ein Systemadministrator hat angeblich in einem Logfile vom November letzten Jahres Exploit-Code für den Heartbleed-Bug gefunden. Die EFF ruft andere Administratoren zu Nachforschungen auf. (Technologie, Server)
---------------------------------------------
http://www.golem.de/news/openssl-bug-spuren-von-heartbleed-schon-im-novembe…
*** Kriminalität: Der Untergrund ist digital ***
---------------------------------------------
Wie lässt sich gemeinsam gegen die Kriminalität 2.0 vorgehen? Die Antwort auf dem Kongress des Verbandes für Sicherheitstechnik: Verzahnung, engere Kooperationen, Zusammenarbeit & und Hoffen auf aktive Bürger und die Vorratsdatenspeicherung.
---------------------------------------------
http://www.heise.de/security/meldung/Kriminalitaet-Der-Untergrund-ist-digit…
*** Windows XP: Wechselmuffel im Patch-Dilemma ***
---------------------------------------------
Das offizielle Ende des XP-Supports bedeutet nicht, dass keine Patches mehr im Netz auftauchen dürften. Für Nutzer könnte es aber gefährlich werden, solche Dateien zu installieren. (Microsoft, Spam)
---------------------------------------------
http://www.golem.de/news/windows-xp-wechselmuffel-im-patch-dilemma-1404-105…
*** "Heartbleed"-Lücke - Chance nutzen ***
---------------------------------------------
Wie F-Secure in einem Blog-Post schreibt, sollten Administratoren die Aufräumarbeiten im Zuge der "Heartbleed"-Lücke auch gleich nutzen, um die entsprechenden Konfigurationen auf aktuellen Stand zu bringen. F-Secure empfiehlt dazu den OWASP Transport Layer Protection Cheat Sheet, wir schliessen uns dem an und ergänzen um das Better Crypto Hardening Paper (PDF) von bettercrypto.org.
---------------------------------------------
http://www.cert.at/services/blog/20140409164644-1090.html
*** JSA10623 - 2014-04 Out of Cycle Security Bulletin: Multiple products affected by OpenSSL "Heartbleed" issue (CVE-2014-0160) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10623&actp=RSS
*** JSA10618 - 2014-04 Security Bulletin: Junos: Kernel panic processing high rate of crafted IGMP packets (CVE-2014-0614) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10618&actp=RSS
*** OpenVPN Access Server OpenSSL TLS Heartbeat Information Disclosure Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/57755
*** Multiple Vulnerabilities in Cisco ASA Software ***
---------------------------------------------
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:
Cisco ASA ASDM Privilege Escalation Vulnerability
Cisco ASA SSL VPN Privilege Escalation Vulnerability
Cisco ASA SSL VPN Authentication Bypass Vulnerability
Cisco ASA SIP Denial of Service Vulnerability
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 08-04-2014 18:00 − Mittwoch 09-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Security updates available for Adobe Flash Player (APSB14-09) ***
---------------------------------------------
A Security Bulletin (APSB14-09) has been published regarding security updates for Adobe Flash Player. These updates address critical vulnerabilities, and Adobe recommends users update their product installations to the latest versions using the instructions referenced in the security bulletin.
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1081
*** Assessing risk for the April 2014 security updates ***
---------------------------------------------
Today we released four security bulletins addressing 11 unique CVE’s. Two bulletins have a maximum severity rating of Critical while the other two have a maximum severity rating of Important. We hope that the table below helps you prioritize the deployment of the updates appropriately for your environment.
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/04/08/assessing-risk-for-the-ap…
*** Summary for April 2014 - Version: 1.0 ***
---------------------------------------------
* Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution
* Cumulative Security Update for Internet Explorer
* Vulnerability in Windows File Handling Component Could Allow Remote Code Execution
* Vulnerability in Microsoft Publisher Could Allow Remote Code Execution
---------------------------------------------
http://technet.microsoft.com/en-ca/security/bulletin/ms14-apr
*** WordPress 3.8.2 Security Release ***
---------------------------------------------
WordPress 3.8.2 is now available. This is an important security release for all previous versions and we strongly encourage you to update your sites immediately.
This releases fixes a weakness that could let an attacker force their way into your site by forging authentication cookies
---------------------------------------------
http://wordpress.org/news/2014/04/wordpress-3-8-2/
*** OSISoft PI Interface for DNP3 Improper Input Validation ***
---------------------------------------------
OVERVIEWAdam Crain of Automatak and Chris Sistrunk, Sr. Consultant for Mandiant, have identified an improper input validation vulnerability in the OSIsoft PI Interface for DNP3 product. OSIsoft has produced an update that mitigates this vulnerability. OSIsoft and Automatak have tested the new version to validate that it resolves the vulnerabilityThis vulnerability can be remotely exploited.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-098-01
*** WellinTech KingSCADA Stack-Based Buffer Overflow ***
---------------------------------------------
An anonymous researcher working with HP’s Zero Day Initiative has identified a stack-based buffer overflow in the WellinTech KingSCADA Stack. WellinTech has produced a patch that mitigates this vulnerability.This vulnerability could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-098-02
*** OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products ***
---------------------------------------------
Multiple Cisco products incorporate a version of the OpenSSL package affected by a vulnerability that could allow an unauthenticated, remote attacker to retrieve memory in chunks of 64 kilobytes from a connected client or server.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** The April 2014 Security Updates ***
---------------------------------------------
Today, we release four bulletins to address 11 CVEs in Microsoft Windows, Internet Explorer and Microsoft Office.
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/04/08/the-april-2014-security-…
*** Heartbleed SSL-GAU: Neue Zertifikate braucht das Land ***
---------------------------------------------
Ein simples Update reicht nicht: Nach der OpenSSL-Lücke müssen Serverbetreiber Zertifikate austauschen. Bei manchen CAs geht das kostenlos, andere Zertifikats-Anbieter und Hoster belassen es bei Warnungen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Heartbleed-SSL-GAU-Neue-Zertifikate-…
*** Juniper SSL VPN (IVEOS) OpenSSL TLS Heartbeat Information Disclosure Vulnerability ***
---------------------------------------------
Juniper has acknowledged a vulnerability in Juniper SSL VPN (IVEOS), which can be exploited by malicious people to disclose potentially sensitive information.
---------------------------------------------
https://secunia.com/advisories/57758
*** Bugtraq: CVE-2014-0160 mitigation using iptables ***
---------------------------------------------
Following up on the CVE-2014-0160 vulnerability, heartbleed. We've created some iptables rules to block all heartbeat queries using the very powerful u32 module.
The rules allow you to mitigate systems that can't yet be patched by blocking ALL the heartbeat handshakes. We also like the capability to log external scanners :)
---------------------------------------------
http://www.securityfocus.com/archive/1/531779
*** Heartbleed vendor notifications, (Wed, Apr 9th) ***
---------------------------------------------
As people are running around having an entertaining day we thought it might be a good idea to keep track of the various vendor notifications. Id like to start a list here and either via comments or sending it let us know of vendor notifications relating to this issue. Please provide comments to the original article relating to the vulnerability itself, and use this post to only provide links to vendor notifications rather than articles etc about the issue.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17929&rss
*** Bugtraq: SQL Injection in Orbit Open Ad Server ***
---------------------------------------------
High-Tech Bridge Security Research Lab discovered vulnerability in Orbit Open Ad Server, which can be exploited to perform SQL Injection attacks, alter SQL requests to database of vulnerable application and potentially gain control over the vulnerable website.
---------------------------------------------
http://www.securityfocus.com/archive/1/531781
*** Office für Mac: Update stopft kritische Lücke ***
---------------------------------------------
Mit einer neuen OS-X-Version von Office 2011 hat Microsoft die RTF-Schwachstelle in Word beseitigt. Die Aktualisierung soll verschiedene Probleme in Outlook, Excel und Word beheben.
---------------------------------------------
http://www.heise.de/security/meldung/Office-fuer-Mac-Update-stopft-kritisch…
*** Sophos Web Appliance Security Bypass Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Sophos Web Appliance, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an unspecified error related to the "Change Password" dialog box and can be exploited to change the administrative password.
---------------------------------------------
https://secunia.com/advisories/57706
*** Security Notice-Statement on OpenSSL Heartbeat Extension Vulnerability ***
---------------------------------------------
Huawei has noticed information regarding OpenSSL heartbeat extension security vulnerability and immediately launched a thorough investigation.
The investigation is still ongoing. Huawei PSIRT will keep updating the SN and will provide conclusions as soon as possible. Please stay tuned.
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-notices…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 07-04-2014 18:00 − Dienstag 08-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Der GAU für Verschlüsselung im Web: Horror-Bug in OpenSSL ***
---------------------------------------------
Ein äußerst schwerwiegender Programmierfehler gefährdet offenbar Verschlüsselung, Schlüssel und Daten der mit OpenSSL gesicherten Verbindungen im Internet. Angesichts der Verbreitung der OpenSource-Biliothek eine ziemliche Katastrophe.
---------------------------------------------
http://www.heise.de/security/meldung/Der-GAU-fuer-Verschluesselung-im-Web-H…
*** VU#568252: Websense Triton Unified Security Center 7.7.3 information disclosure vulnerability ***
---------------------------------------------
Vulnerability Note VU#568252 Websense Triton Unified Security Center 7.7.3 information disclosure vulnerability Original Release date: 07 Apr 2014 | Last revised: 07 Apr 2014 Overview Websense Triton Unified Security Center 7.7.3 and possibly earlier versions contains an information disclosure vulnerability which could allow an authenticated attacker to view stored credentials of a possibly higher privileged user. Description CWE-200: Information ExposureWhen logged into the Websense Triton
---------------------------------------------
http://www.kb.cert.org/vuls/id/568252
*** Energieversorger testet Sicherheit – und fällt durch ***
---------------------------------------------
In „Stirb langsam 4.0“ fahren Cyber-Gauner übers Internet die komplette Stromversorgung im Osten der USA herunter. Ein unrealistisches Szenario? Nicht ganz ...
---------------------------------------------
http://www.heise.de/newsticker/meldung/Energieversorger-testet-Sicherheit-u…
*** The Muddy Waters of XP End-of-Life and Public Disclosures ***
---------------------------------------------
Security researchers who have privately disclosed Windows XP vulnerabilities to Microsoft may never see patches for their bugs with XPs end of life date at hand. Will there be a rash of public disclosures?
---------------------------------------------
http://threatpost.com/the-muddy-waters-of-xp-end-of-life-and-public-disclos…
*** 2013 wurden Daten von über 500 Millionen Nutzern geklaut ***
---------------------------------------------
Daten von mehr als einer halben Milliarde Internet-Nutzer sind im vergangenen Jahr nach Berechnung von IT-Sicherheitsexperten bei Online-Angriffen gestohlen worden.
---------------------------------------------
http://futurezone.at/digital-life/2013-wurden-daten-von-ueber-500-millionen…
*** Hintergrund: ct-Fritzbox-Test spürt verborgene Geräte auf ***
---------------------------------------------
Manche Nutzer des Fritzbox-Tests erhalten unerwartete Ergebnisse. Nicht selten sind WLAN-APs, Repeater oder andere AVM-Geräte die Ursache. Darüber hinaus gibt es auch einige Fehlerquellen, die einen händischen Test erforderlich machen können.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Hintergrund-c-t-Fritzbox-Test-spuert…
*** The 2013 Internet Security Threat Report: Year of the Mega Data Breach ***
---------------------------------------------
Once again, it’s time to reveal the latest findings from our Internet Security Threat Report (ISTR), which looks at the current state of the threat landscape, based on our research and analysis from the past year. Key trends from this year’s report include the large increase in data breaches and targeted attacks, the evolution of mobile malware and ransomware, and the potential threat posed by the Internet of Things.
---------------------------------------------
http://www.symantec.com/connect/blogs/2013-internet-security-threat-report-…
*** Cacti Multiple Vulnerabilities ***
---------------------------------------------
Some vulnerabilities have been reported in Cacti, which can be exploited by malicious users to conduct script insertion and SQL injection attacks and compromise a vulnerable system.
* CVE-2014-2326
* CVE-2014-2708
* CVE-2014-2709
---------------------------------------------
https://secunia.com/advisories/57647
*** Open-Xchange Email Autoconfiguration Information Disclosure Weakness ***
---------------------------------------------
A weakness has been reported in Open-Xchange, which can be exploited by malicious people to disclose certain sensitive information.
The weakness is caused due to the application communicating certain information via parameters of a GET request when using the email autoconfiguration, which can be exploited to disclose the account password.
---------------------------------------------
https://secunia.com/advisories/57654
*** VU#345337: J2k-Codec contains multiple exploitable vulnerabilities ***
---------------------------------------------
Vulnerability Note VU#345337 J2k-Codec contains multiple exploitable vulnerabilities Original Release date: 08 Apr 2014 | Last revised: 08 Apr 2014 Overview J2k-Codec contains multiple exploitable vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Description J2k-Codec is a JPEG 2000 decoding library for Windows. J2k-Codec contains multiple exploitable exploitable vulnerabilities that can lead to arbitrary code execution.
---------------------------------------------
http://www.kb.cert.org/vuls/id/345337
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 04-04-2014 18:00 − Montag 07-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** BSI-Webseite mit Prüfung ob die eigene Emailadresse im aktuellen Fall betroffen ist ***
---------------------------------------------
Im Rahmen eines laufenden Ermittlungsverfahrens der Staatsanwaltschaft Verden (Aller) ist erneut ein Fall von großflächigem Identitätsdiebstahl aufgedeckt worden.
...
Diese Webseite bietet eine Überprüfungsmöglichkeit, ob Sie von dem Identitätsdiebstahl betroffen sind.
---------------------------------------------
https://www.sicherheitstest.bsi.de/
*** VirusShield: Nur ein Logo - sonst nichts ***
---------------------------------------------
Die App VirusShield für Android erreichte innerhalb kürzester Zeit enorme Verkaufszahlen. Jedoch: Die App tut überhaupt nichts. (Google, Virenscanner)
---------------------------------------------
http://www.golem.de/news/virusshield-nur-ein-logo-sonst-nichts-1404-105677-…
*** Hash-Funktion: Entwurf für SHA-3-Standard liegt vor ***
---------------------------------------------
Die US-Behörde Nist hat einen Entwurf für die Standardisierung der Hashfunktion SHA-3 vorgelegt. Drei Monate lang besteht nun die Möglichkeit, diesen zu kommentieren. (Technologie, Verschlüsselung)
---------------------------------------------
http://www.golem.de/news/hash-funktion-entwurf-fuer-sha-3-standard-liegt-vo…
*** Those strange e-mails with URLs in them can lead to Android malware, (Sat, Apr 5th) ***
---------------------------------------------
Youve probably gotten a few of these e-mails over the last few months (I saw the first one of this latest kind in early Feb), we got one to the handlers list earlier this week which prompted this diary. They seem pretty innocuous, they have little or no text and a URL like the one shown below. Note: the above link doesnt lead to the malware anymore, so I didnt obscure it. Most seem to be sent from Yahoo! (or Yahoo!-related e-mail addresses), so they may be coming from addresses that were
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17909&rss
*** XMPP-Layer Compression Uncontrolled Resource Consumption ***
---------------------------------------------
Topic: XMPP-Layer Compression Uncontrolled Resource Consumption Risk: Medium Text:Uncontrolled Resource Consumption with XMPP-Layer Compression Original Release Date: 2014-04-04 Last Updated: 2014-04-04 ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040034
*** Fake Voting Campaign Steals Facebook Users’ Identities ***
---------------------------------------------
Contributor: Parag SawantPhishers continuously come up with various plans to enhance their chances of harvesting users’ sensitive information. Symantec recently observed a phishing campaign where data is collected through a fake voting site which asks users to decide whether boys or girls are greater.read more
---------------------------------------------
http://www.symantec.com/connect/blogs/fake-voting-campaign-steals-facebook-…
*** Advice for Enterprises in 2014: Protect Your Core Data ***
---------------------------------------------
Some companies may think – “if it can happen to a spy agency, there’s nothing we could do. We should just give up and not protect our data anymore.” Others may say: “let’s build a bigger wall around our data.” Both approaches are incorrect. Obviously, you have to protect your data. However, neither can enterprises just try and protect everything with the same rigor. ... What an enterprise needs to focus on is what really needs to be protected.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/advice-for-enter…
*** Microsoft spells out new rules for exiling .EXEs ***
---------------------------------------------
Microsoft has updated the methodology it uses to define adware, a move designed to make it clearer just what the company considers worthy for removal by its malware tools. ... The kinds of “unwanted behaviours” that Redmond is looking for will be familiar to anyone whos been burned by mistakenly clicking on the link, with lack of user choice or control topping the list.
---------------------------------------------
http://www.theregister.co.uk/2014/04/07/microsoft_puts_adware_in_the_crossh…
*** Netgear schließt Hintertür in Modemrouter DGN1000 ***
---------------------------------------------
Die Firma hat ein Firmware-Update veröffentlicht, das die Hintertür auf Port 32764 des DSL-Modemrouters schließen soll. Über die Lücke können Angreifer die Passwörter der Geräte abgreifen.
---------------------------------------------
http://www.heise.de/security/meldung/Netgear-schliesst-Hintertuer-in-Modemr…
*** RSA Data Loss Prevention Security Bypass Security Issue ***
---------------------------------------------
A security issue has been reported in RSA Data Loss Prevent, which can be exploited by malicious users to bypass certain security restrictions.
The security issue is caused due an error within the session management and can be exploited to access otherwise restricted content.
---------------------------------------------
https://secunia.com/advisories/57464
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 03-04-2014 18:00 − Freitag 04-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** SMBEXEC Rapid Post Exploitation Tool ***
---------------------------------------------
Smbexec is a tool that you can use for penetration testing domain controllers, the program allows to run post exploitation for domain accounts and expand the access to targeted network. this makes pentester have a full access without any privilege requirement.
---------------------------------------------
http://www.sectechno.com/2014/03/30/smbexec-rapid-post-exploitation-tool/
*** IBM Security Bulletin: Fixes available for Cross Site Scripting vulnerabilities in IBM WebSphere Portal (CVE-2014-0828 and CVE-2014-0901) ***
---------------------------------------------
Fixes are available for Cross Site Scripting vulnerabilities in IBM WebSphere Portal.
CVE(s): CVE-2014-0828 and CVE-2014-0901
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: WebSphere Partner Gateway Advanced/Enterprise is affected by vulnerabilities that exist in the IBM SDK for Java (CVE-2014-0411) ***
---------------------------------------------
WebSphere Partner Gateway Advanced/Enterprise uses IBM SDK for Java that is based on Oracle JDK . Oracle has released January 2014 critical patch updates (CPU) which contain security vulnerability fixes. The IBM SDK for Java has been updated to incorporate these fixes. CVE(s): CVE-2014-0411
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** OTRS Help Desk clickjacking ***
---------------------------------------------
OTRS Help Desk could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could send a specially-crafted HTTP request to hijack the victim's click actions or launch other client-side browser attacks.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/92233
*** iOS 7.1 bug enables iCloud account deletion, disabling Find My iPhone, without password ***
---------------------------------------------
A bug demonstrated by a YouTube user on Wednesday may enable a thief to delete an iCloud account, disable Find My iPhone, and ultimately restore the device, without the need of a password.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/kToL7uqo4FE/
*** Your files held hostage by CryptoDefense? Dont pay up! The decryption key is on your hard drive ***
---------------------------------------------
Blunder discovered in latest ransomware infecting PCs A basic rookie programming error has crippled an otherwise advanced piece of ransomware dubbed CryptoDefense – but the crap coders are still pulling in more than $30,000 a month from unwary punters.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/04/03/cryptodefen…
*** Advance Notification Service for the April 2014 Security Bulletin Release ***
---------------------------------------------
Today we provide advance notification for the release of four bulletins, two rated Critical and two rated Important in severity. These updates address issues in Microsoft Windows, Office and Internet Explorer. The update provided through MS14-017 fully addresses the Microsoft Word issue first described in Security Advisory 2953095. This advisory also included a Fix it to disable opening rich-text format (RTF) files within Microsoft Word. Once the security update is applied, you should disable
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/04/03/advance-notification-ser…
*** Schneider Electric OPC Factory Server Buffer Overflow ***
---------------------------------------------
OVERVIEW Researcher Wei Gao, formerly of IXIA, has identified a buffer overflow vulnerability in the Schneider Electric OPC Factory Server (OFS) application. Schneider Electric has produced a patch that mitigates this vulnerability. Wei Gao has tested the patch to validate that it resolves the vulnerability.This vulnerability could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-093-01
*** Adware: A new approach ***
---------------------------------------------
Here at the Microsoft Malware Protection Center (MMPC) we understand advertising is part of the modern computing experience. However, we want to give our customers choice and control regarding what happens with their computers. To that end we have recently undergone some changes to both the criteria we use to classify a program as adware and how we remediate it when we find it. This blog will help explain the new criteria and how it affects some programs. Our updated objective criteria
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/04/03/adware-a-new-approach.as…
*** Zeus malware found with valid digital certificate ***
---------------------------------------------
A recently discovered variant of the Zeus banking Trojan was found to use a legitimate digital signature to avoid detection from Web browsers and anti-virus systems.Security vendor Comodo reported Thursday finding the variant 200 times while monitoring and analyzing data from users of its Internet security system. The variant includes the digital signature, a rootkit and a data-stealing malware component."Malware with a valid digital signature is an extremely dangerous situation," the
---------------------------------------------
http://www.csoonline.com/article/2140021/data-protection/zeus-malware-found…
*** Linux-PAM "pam_timestamp" Module Two Directory Traversal Vulnerabilities ***
---------------------------------------------
Two vulnerabilities have been reported in Linux-PAM, which can be exploited by malicious people to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/57317
*** E-Mail-Konten gehackt: BSI will Millionen betroffene Nutzer informieren ***
---------------------------------------------
Behörden und Provider wollen die Nutzer über den Hack von E-Mail-Konten informieren. Wie und wann die Aktion starten soll, steht aber noch nicht fest. (Spam, Computer)
---------------------------------------------
http://www.golem.de/news/e-mail-konten-gehackt-bsi-will-millionen-betroffen…
*** TLS-Bibliotheken: Fehler finden mit fehlerhaften Zertifikaten ***
---------------------------------------------
Mit Hilfe von fehlerhaften X.509-Zertifikaten haben Forscher zahlreiche zum Teil sicherheitskritische Bugs in TLS-Bibliotheken gefunden. Erneut wurde dabei eine gravierende Sicherheitslücke in GnuTLS entdeckt. (Browser, Technologie)
---------------------------------------------
http://www.golem.de/news/tls-bibliotheken-fehler-finden-mit-fehlerhaften-ze…
*** Cisco Emergency Responder - Multiple vulnerabilities ***
---------------------------------------------
Cross-Site Scripting - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
Cross-Site Request Forgery - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
Open Redirect - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
Dynamic Content Modification - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** PHP 5.4.27 released, (Fri, Apr 4th) ***
---------------------------------------------
A new version of PHP has been released. The announcement comments: "The PHP development team announces the immediate availability of PHP 5.4.27. 6 bugs were fixed in this release, including CVE-2013-7345 in fileinfo module."
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17901&rss
*** April 8th: Not Just About XP ***
---------------------------------------------
April 8th will soon be upon us! And that means…Countdown Clocks…the end of extended support for Windows XP. But not just XP. Office 2003 is also reaching its life.And thats especially important to know because theres currently an Office vulnerability in the wild.Microsoft released its Security Bulletin Advance Notification yesterday: And the good news is: a patch for the Word vulnerability appears to be in the pipeline.
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002690.html
*** Dealing with Disaster - A Short Malware Incident Response, (Fri, Apr 4th) ***
---------------------------------------------
I had a client call me recently with a full on service outage - his servers werent reachable, his VOIP phones were giving him more static than voice, and his Exchange server wasnt sending or receiving mail - pretty much everything was offline. I VPNd in (I was not onsite) and started with the firewall, because things were bad enough thats all I could initially get to from a VPN session.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17905&rss
*** Cisco IOS XR Software ICMPv6 Redirect Vulnerability ***
---------------------------------------------
A vulnerability in Internet Control Message Protocol version 6 (ICMPv6) processing of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to affect IPv4 and IPv6 traffic passing through an affected device.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Researchers Uncover Interesting Browser-Based Botnet ***
---------------------------------------------
Security researchers discovered an odd DDoS attack against several sites recently that relied on a persistent cross-site scripting vulnerability in a major video Web site and hijacked users’ browsers in order to flood the site with traffic. The attack on the unnamed site involved the use of injected Javascript on the site which would execute in […]
---------------------------------------------
http://threatpost.com/researchers-uncover-interesting-browser-based-botnet/…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 02-04-2014 18:00 − Donnerstag 03-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Researchers Divulge 30 Oracle Java Cloud Service Bugs ***
---------------------------------------------
Upset with the vulnerability handling process at Oracle, researchers yesterday disclosed over two dozen issues with the company’s Java Cloud Service platform.
---------------------------------------------
http://threatpost.com/researchers-divulge-30-oracle-java-cloud-service-bugs…
*** Ad Violations: Why Search Engines Won’t Display Your Site If it’s Infected With Malware ***
---------------------------------------------
As your site’s webmaster, have you ever seen an e-mail from Google like this: Hello, We wanted to alert you that one of your sites violates our advertising policies. Therefore, we won’t be able to run any of your ads that link to that site, and any new ads pointing to that site will alsoRead More
---------------------------------------------
http://feedproxy.google.com/~r/sucuri/blog/~3/kz7JGX2ydIU/ad-violations-why…
*** IBM Lotus Web Content Managemen cross-site scripting ***
---------------------------------------------
IBM Lotus Web Content Management is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/90566
*** Watching the watchers, (Thu, Apr 3rd) ***
---------------------------------------------
A lot of companies today have various IDS and IPS devices implemented in their internal network (especially if you must be compliant with PCI DSS, for example). So these devices get implemented to monitor various traffic at various interfaces/perimeters in a company, but the question I got asked is how can we be sure that the IDS/IPS is doing its job? Obviously, some simple monitoring should be in place – this typically consists of pinging the device or collecting various counters such
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17895&rss
*** Macro-Enabled Files Used as Infection Vectors (Again) ***
---------------------------------------------
Macro-based attacks were popular in the early 2000s, but they gained much notoriety with the much publicized coverage of the Melissa virus. However, macro-based attacks soon began to drop off the radar. One major reason for this would be the security measures implemented by Microsoft to address malicious macro files. Another probable reason would also […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMacro-Enabled Files Used as Infection Vectors (Again)
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/1X49GtDdVuU/
*** New Check_MK stable release 1.2.4p1 ***
---------------------------------------------
The most important changes are security patches for two CVEs (CVE-2014-2330 and CVE-2014-2331) which have been published on 2014-03-24 and 2014-03-28 on the bugtraq mailinglist. The mail from 2014-03-24 contained wrong information on the not-fixed issues, which had been corrected with the mail from 2014-03-28. All of the reported security related issues are fixed with this release.
---------------------------------------------
http://lists.mathias-kettner.de/pipermail/checkmk-announce/2014-April/00008…
*** A Series of Introductory Malware Analysis Webcasts ***
---------------------------------------------
If you are looking to get started with malware analysis, tune into the webcast series I created to illustrate key tools and techniques for examining malicious software.
---------------------------------------------
http://blog.zeltser.com/post/80874760857/introductory-malware-analysis-webc…
*** Twelve sources of global cyber attack maps ***
---------------------------------------------
1 - Cyber Warfare Real Time Map by Kaspersky
2 - Top Daily DDoS Attacks Worldwide by Google
3 - Security Tachometer by Deutche Telekom
4 - Cyberfeed Live Botnet Map by AnubisNetworks
5 - Real-time Web Monitor by Akamai
6 - IpViking Live Map by Norse
7 - Honeypots from the Honeynet Project
8 - Global Activity Maps by Arbor
9 - Global Botnet Threat Activity Map by Trend Micro
10 - DDoS Attacks by ShadowServer
11 - Internet Malicious Activity Maps by TeamCymru
12 - Globe and WorldMap by F-Secure
---------------------------------------------
http://sseguranca.blogspot.com.br/2014/03/ten-sources-of-global-cyber-attac…
*** SNMPCheck - Enumerate the SNMP devices ***
---------------------------------------------
Like to snmpwalk, snmpcheck allows you to enumerate the SNMP devices and places the output in a very human readable friendly format. It could be useful for penetration testing or systems monitoring.
---------------------------------------------
http://hack-tools.blackploit.com/2014/04/snmpcheck-enumerate-snmp-devices.h…
*** The Right Stuff: Staffing Your Corporate SOC ***
---------------------------------------------
In my experience, passing a certification exam or getting a degree simply shows that a potential employee is a good test-taker or has the determination to plow through a degree program. Neither substitutes for the wealth of experience SOC analysts need to be good at their jobs.
Don’t get me wrong. Certification programs can be an important piece of a cyber-security practitioner’s complete education.
---------------------------------------------
http://www.darkreading.com/operations/careers-and-people/the-right-stuff-st…
*** FortiBalancer SSH Access Security Bypass Vulnerability ***
---------------------------------------------
A vulnerability has been reported in FortiBalancer, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to a configuration error related to SSH access and can be exploited to gain otherwise restricted SSH access.
The vulnerability is reported in FortiBalancer 400, 1000, 2000, and 3000.
---------------------------------------------
https://secunia.com/advisories/57673
*** Sicherheit: Fahnder entdecken Datensatz mit 18 Millionen Mailkonten ***
---------------------------------------------
Schon wieder ist eine Datei mit Millionen gehackten Mailkonten sichergestellt worden. Alle großen deutschen E-Mail-Provider und mehrere internationale Anbieter sollen betroffen sein. (Spam, Computer)
---------------------------------------------
http://www.golem.de/news/sicherheit-fahnder-entdecken-datensatz-mit-18-mill…
*** Tool Estimates Incident Response Cost for Businesses ***
---------------------------------------------
A new tool called CyberTab will help businesses estimate the cost of real and potential cyberattacks, and the amount a company could possibly save by investing in preventative measures and technologies.
---------------------------------------------
http://threatpost.com/tool-estimates-incident-response-cost-for-businesses/…
*** Bugtraq: [softScheck] Denial of Service in Microsoft Office 2007-2013 ***
---------------------------------------------
softScheck has identified a Denial of Service vulnerability in Microsoft Outlook 2007-2013. A remote attacker can send a plaintext email containing an XML bomb as the message body, causing Outlook to freeze while opening the email. This forces the user to terminate the Outlook process.
In the default Outlook configuration, in which email contents are displayed in a reading pane in the main window, the impact is more severe: Outlook will freeze while starting and will not be able to start anymore, since it tries to open and display the email during startup.
To resolve the issue, Outlook needs to be started in safe mode and the email needs to be deleted.
---------------------------------------------
http://www.securityfocus.com/archive/1/531722
*** DFRWS EU 2014 Annual Conference ***
---------------------------------------------
DFRWS has a long history of being the foremost digital forensics research venue and has decided to hold a sister conference to bring the same opportunities to Europe. The first annual DFRWS EU conference will be held from May 7 to 9, 2014 in Amsterdam, NL.
---------------------------------------------
http://www.dfrws.org/2014eu/
*** Cisco IOS Software IKE Main Mode Vulnerability ***
---------------------------------------------
A vulnerability in the Internet Key Exchange (IKE) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to delete established security associations on an affected device.
The vulnerability is due to improper handling of rogue IKE Main Mode packets. An attacker could exploit this vulnerability by sending a crafted IKE Main Mode packet to an affected device. An exploit could allow the attacker to cause valid, established IKE security associations on an affected device to drop.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 01-04-2014 18:00 − Mittwoch 02-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Whitehat Securitys Aviator browser is coming to Windows ***
---------------------------------------------
I have had the privilege of knowing Jeremiah Grossman, the iCEO of Whitehat Security, for many years now. He has spoken on many occasions about web security and specifically web browser security or rather, the lack thereof. I recall at one point asking him, "OK, what do you use as a web browser?" He paused, smiled and said, "My own". That Cheshire cat response played over again in my head when Whitehat Security released their browser offering called Aviator. This is a
---------------------------------------------
http://www.csoonline.com/article/2136258/application-security/whitehat-secu…
*** 110,000 Wordpress Databases Exposed ***
---------------------------------------------
For years now Ive been writing my various blog posts and I have used many different kinds of CMS platforms right back to posting using VI back in the 90s. My favourite platform that Ive used to create content has been Wordpress by far. I can almost here the security folks cringe. Yes, it is a massive headache to lockdown. But, I fight on as the user experience makes the pain worthwhile. OK, maybe worthwhile isnt the correct word. This is a platform that has had a long history of security
---------------------------------------------
http://www.csoonline.com/article/2136246/application-security/110-000-wordp…
*** "ct wissen Windows": So meistern Sie das Support-Ende von Windows XP ***
---------------------------------------------
Pünktlich zum Support-Ende von Windows XP veröffentlichen wir mit dem "ct wissen Windows" ein Handbuch für alle Betroffenen. Es erläutert nicht nur, was das Support-Ende genau bedeutet, sondern liefert vor allem Praxis-Anleitungen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/c-t-wissen-Windows-So-meistern-Sie-d…
*** Call for packets udp/137 broadcast, (Tue, Apr 1st) ***
---------------------------------------------
One of our readers have reported that he has seen a broadcast traffic to udp/137 . He suspected that the traffic cause a denial of service to some of his systems. If you have seen such traffic and you would like to share some packets we would appreciate that. (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17887&rss
*** AlienVault Open Source SIM date_from SQL injection ***
---------------------------------------------
AlienVault Open Source SIM (OSSIM) is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to the ISO27001Bar1.php script using the date_from parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/92172
*** Password bug let me see shoppers credit cards in eBay ProStores, claims infosec bod ***
---------------------------------------------
Online bazaar fixes store account hijack flaw, were told A serious vulnerability that potentially allowed shoplifters to empty eBay ProStores shops and swipe customer credit cards has been fixed according to the security researcher who says he found the hole.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/04/01/ebay_stores…
*** Fake Google apps removed from Window Phone Store by Microsoft ***
---------------------------------------------
Five phony Google apps appeared in the app store, each with a $1.99 price tag, before being removed by the company.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/fXb73Il-oZg/
*** Hack of Boxee.tv exposes password data, messages for 158,000 users ***
---------------------------------------------
Huge file circulating online contains e-mail addresses, full message histories.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/B676MRE54C8/
*** IT Analyst Highlights 6 IT Security 'Worst Practices' ***
---------------------------------------------
In a new Network World article, prominent IT analyst and researcher Linda Musthaler is highlighting 6 'worst practices' that companies commit on their way to undermining, destabilizing, or just plain wrecking their IT security efforts: Failing to stay up-to-date with the latest technologies and techniques. Neglecting to take a comprehensive network security approach that also [...]The post IT Analyst Highlights 6 IT Security 'Worst Practices' appeared first on Seculert
---------------------------------------------
http://www.seculert.com/blog/2014/04/it-analyst-highlights-6-it-security-wo…
*** HP integrated Lights Out (iLO) IPMI Protocol Flaw Lets Remote Users Obtain Hashed Passwords ***
---------------------------------------------
A vulnerability was reported in HP integrated Lights Out (iLO). A remote user can gain obtain hashed passwords.
A remote user can invoke the IPMI 2.0 protocol to obtain the target user's salted SHA1 or MD5 hash.
The vulnerability resides in the protocol design and is mandated by the IPMI 2.0 specification.
---------------------------------------------
http://www.securitytracker.com/id/1029981
*** Extended Random: The PHANTOM NSA-RSA backdoor that never was ***
---------------------------------------------
Profs paper was all about attacking Dual EC DRBG, not a Snowden-esque spy bombshell Over the last day or so the security press has been touting stories of a second NSA-induced backdoor in RSAs encryption software BSafe. But it appears to be more sound and fury than substance.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/04/02/extended_ra…
*** Safari für Mac OS X: Update schließt Sicherheitslücken und bringt einige Neuerungen ***
---------------------------------------------
Der Apple-Webbrowser ist für OS X Mavericks und OS X Mountain Lion in neuen Versionen verfügbar. Neben Patches gegen Sicherheitslücken gibt es Bugfixes und Änderungen an der Benachrichtigungsfunktion.
---------------------------------------------
http://www.heise.de/security/meldung/Safari-fuer-Mac-OS-X-Update-schliesst-…
*** [2014-04-02] Multiple vulnerabilities in Rhythm File Manager ***
---------------------------------------------
An attacker being able to connect to the Android device (e.g. if he uses the same Wireless network), can access arbitrary local files from the device while the File Manager app is being used to stream media. Moreover, a malicious Android app or an attacker being able to connect to the Android device may issue system commands as the user "root" if "root browsing" is enabled.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Analysis: Financial cyber threats in 2013. Part 1: phishing ***
---------------------------------------------
It has been quite a few years since cybercriminals started actively stealing money from user accounts at online stores, e-payment systems and online banking systems.
---------------------------------------------
http://www.securelist.com/en/analysis/204792330/Financial_cyber_threats_in_…
*** Bugtraq: [IMF 2014] Call for Participation ***
---------------------------------------------
See the program at:
http://www.imf-conference.org/imf2014/program.html
The conference will take place from Monday, May 12th through Wednesday,
May 14th in Münster, Germany.
Registration details:
http://www.imf-conference.org/imf2014/registration.html
---------------------------------------------
http://www.securityfocus.com/archive/1/531707
*** VU#917700: Huawei Echo Life HG8247 optical router XSS vulnerability ***
---------------------------------------------
Vulnerability Note VU#917700 Huawei Echo Life HG8247 optical router XSS vulnerability Original Release date: 02 Apr 2014 | Last revised: 02 Apr 2014 Overview Huawei Echo Life HG8247 optical router contains a stored cross-site scripting (XSS) vulnerability Description It has been reported that Huawei Echo Life HG8247 optical routers running software version V1R006C00S120 or earlier contain a stored cross-site scripting (XSS) vulnerability. An unauthenticated attacker can perform a stored
---------------------------------------------
http://www.kb.cert.org/vuls/id/917700
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 31-03-2014 18:00 − Dienstag 01-04-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Report: RSA endowed crypto product with second NSA-influenced code ***
---------------------------------------------
Extended Random like "dousing yourself with gasoline," professor warns.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/TbwAXYKTq34/
*** Old School Code Injection in an ATM .dll ***
---------------------------------------------
During our last ATM review engagement, we found some interesting executable files that were run by Windows Services under Local System account. These binaries had weak file permissions that allowed us to modify them using the standard ATM user account. As a proof of concept, I decided to inject some code into one of them to take full control of the system. This post is about the technique I used to inject the code into a .dll used by one of the Windows Services. I’m sure there are many
---------------------------------------------
http://feedproxy.google.com/~r/SpiderlabsAnterior/~3/CRAp6jZhvVE/injecting-…
*** A Look at the GnuTLS X.509 Verification Code Flaw ***
---------------------------------------------
... it was found that the GnuTLS X.509 certificate verification code fails to properly handle certain error conditions that may occur during the certificate verification process. While verifying the certificate, GnuTLS would report it as successful verification of the certificate, even though verification should have resulted in a failure. This means that invalid certificates may be accepted as valid,
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/iSFhF7R9kFI/
*** Creating an intelligent “sandbox” for coordinated malware eradication ***
---------------------------------------------
Hello from China where I am presenting on coordinated malware eradication at the 2014 PC Security Labs Information Security Conference. Coordinated malware eradication was also the topic of my last blog. I said the antimalware ecosystem must begin to work with new types of partners if we are going to move from the current state of uncoordinated malware disruption, to a state of coordinated malware eradication.
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/03/31/creating-an-intelligent-…
*** Its not the breach that kills you, its the cover-up ***
---------------------------------------------
Its how you handle yourself during and after a breach that will determine just how detrimental the breach actually is for your organization.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/Mi55LWhfA9c/
*** Managing Windows XP’s Risks in a Post-Support World ***
---------------------------------------------
There are now less than two weeks left until Microsoft terminates support for the incredibly long-lived Windows XP. Rarely has a tech product lasted as long as XP has – from XP’s launch on October 25, 2001 to its last Patch Tuesday on April 8, 2014 a total of 12 years, 5 months, and two […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroManaging Windows XP’s Risks in a Post-Support World
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/fSwrdK2qOeg/
*** EMC Cloud Tiering Appliance Request Validation Flaw Lets Remote Users View Files ***
---------------------------------------------
A vulnerability was reported in EMC Cloud Tiering Appliance. A remote user can view files on the target system.
The '/api/login' script does not properly validate user-supplied input. A remote user can supply a specially crafted XML External Entity (XXE) link to view files on target system with root privileges.
---------------------------------------------
http://www.securitytracker.com/id/1029979
*** Grazer Linuxtage 2014: "Sicherheit im Netz" mit freier Software ***
---------------------------------------------
Alternative Software-Szene lädt an der FH-Joanneum zu Workshops und Vorträgen
---------------------------------------------
http://derstandard.at/1395363812795
*** Horde webmail - Open Redirect Vulnerability ***
---------------------------------------------
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation.
This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014040004
*** ModSecurity HTTP Requests Chunked Encoding Security Bypass Vulnerability ***
---------------------------------------------
Martin Holst Swende has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an error in the "modsecurity_tx_init()" function (apache2/modsecurity.c), which can be exploited to bypass the HTTP request body processing via a specially crafted request using chunked encoding.
---------------------------------------------
https://secunia.com/advisories/57444
*** ct-Special "Umstieg auf Linux" am Kiosk erhältlich ***
---------------------------------------------
Umsteigen auf Linux – warum nicht? Linux bietet eine Menge Vorteile – nicht nur für XP-Anwender, die demnächst keine Sicherheits-Fixes von Microsoft mehr erhalten. Das neue Sonderheft der ct-Redaktion hilft beim sanften Umstieg von Windows auf Linux.
---------------------------------------------
http://www.heise.de/newsticker/meldung/c-t-Special-Umstieg-auf-Linux-am-Kio…
*** IBM WebSphere Portal Two Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
Two vulnerabilities have been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/57592
*** cPanel Multiple Vulnerabilities ***
---------------------------------------------
Two weaknesses, a security issue, and multiple vulnerabilities have been reported in cPanel, which can be exploited by malicious, local users to disclose potentially sensitive information and manipulate certain data, by malicious users to disclose potentially sensitive information, conduct script insertion attacks, manipulate certain data, and compromise a vulnerable system and by malicious people to conduct spoofing and cross-site scripting attacks and bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/57576
*** VU#893726: Zyxel P660 series modem/router denial of service vulnerability ***
---------------------------------------------
Zyxel P660 series modem/router contains a denial of service vulnerability when parsing a high volume of SYN packets on the web management interface.
---------------------------------------------
http://www.kb.cert.org/vuls/id/893726
*** Cisco Security Manager HTTP Header Redirection Vulnerability ***
---------------------------------------------
A vulnerability in the web framework of Cisco Security Manager could allow an unauthenticated, remote attacker to inject a crafted HTTP header which will cause a web page redirection to a possible malicious website.
The vulnerability is due to insufficient validation user input of user input before using it as an HTTP header value. An attacker could exploit this vulnerability by convincing a user to access a crafted URL.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco WSA HTTP Header Injection Vulnerability ***
---------------------------------------------
A vulnerability in the web framework of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to inject a crafted HTTP header that could cause a web page redirection to a possible malicious website.
The vulnerability is due to insufficient validation of user input before using it as an HTTP header value. An attacker could exploit this vulnerability by persuading a user to access a crafted URL.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-03-2014 18:00 − Montag 31-03-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Siemens ROS Improper Input Validation ***
---------------------------------------------
Researcher Aivar Liimets from Martem Telecontrol Systems reported an improper input validation vulnerability in the Siemens Rugged Operating System (ROS), which could cause a denial-of-service (DoS) condition against the device's management web interface. Siemens coordinated the vulnerability details with NCCIC/ICS-CERT and has provided information for mitigation of the vulnerability.This vulnerability can be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-087-01
*** WiFi Bug Plagues Philips Internet-Enabled TVs ***
---------------------------------------------
Some versions of Philips internet-enabled SmartTVs are vulnerable to cookie theft and an array of other tricks that abuse a lax WiFi setting.
---------------------------------------------
http://threatpost.com/wifi-bug-plagues-philips-internet-enabled-tvs/105119
*** VulDB: Adobe Reader 11.0.06 Sandbox erweiterte Rechte ***
---------------------------------------------
Die Schwachstelle wurde am 28.03.2014 von VUPEN via Pwn2Own 2014 publiziert. Die Identifikation der Schwachstelle wird seit dem 20.12.2013 mit CVE-2014-0512 vorgenommen. Sie ist schwierig auszunutzen. Der Angriff kann über das Netzwerk erfolgen. Zur Ausnutzung ist keine spezifische Authentisierung erforderlich. Es sind zwar keine technische Details, jedoch ein privater Exploit zur Schwachstelle bekannt.
---------------------------------------------
http://www.scip.ch/?vuldb.12723
*** Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code ***
---------------------------------------------
A remote user can create specially crafted content that, when loaded by the target user on a Windows-based system, will trigger a use-after-free and execute arbitrary code on the target system [CVE-2014-0506]. The code will run with the privileges of the target user.
VUPEN reported this vulnerability (via Pwn2Own at CanSecWest 2014).
A remote user can create specially crafted content that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target system [CVE-2014-0510]. The code will run with the privileges of the target user.
Zeguang Zhao and Liang Chen reported this vulnerability (via Pwn2Own at CanSecWest 2014).
---------------------------------------------
http://www.securitytracker.com/id/1029969
---------------------------------------------
(Notiz: soweit wir bisher herausfinden konnten, sind noch keine Exploits dazu "in the wild" aufgetaucht.)
---------------------------------------------
*** nginx 1.4.6/1.5.11 Heap-based buffer overflow in the SPDY ***
---------------------------------------------
A bug in the experimental SPDY implementation in nginx was found, which
might allow an attacker to cause a heap memory buffer overflow in a
worker process by using a specially crafted request, potentially
resulting in arbitrary code execution (CVE-2014-0133).
The problem affects nginx 1.3.15 - 1.5.11, compiled with the
ngx_http_spdy_module module (which is not compiled by default) and
without --with-debug configure option, if the "spdy" option of the
"listen" directive is used in a configuration file.
The problem is fixed in nginx 1.5.12, 1.4.7.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030250
*** Chip.de-Forum offenbar gehackt: 2,5 Millionen Nutzerdaten betroffen ***
---------------------------------------------
Forumsmitglieder wurden per Mail über Hack informiert - Passwörter wurden außerdem unzureichend geschützt
---------------------------------------------
http://derstandard.at/1395363600546
*** Who's Behind the "BLS Weblearn" Credit Card Scam? ***
---------------------------------------------
A new rash of credit and debit card scams involving bogus sub-$15 charges and attributed to a company called "BLS Weblearn" is part of a prolific international scheme designed to fleece unwary consumers. This post delves deeper into the history and identity of the credit card processing network that has been enabling this type of activity for years.
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/MxEDIVQPC94/
*** More Device Malware: This is why your DVR attacked my Synology Disk Station, (Mon, Mar 31st) ***
---------------------------------------------
Last week, we reported that some of the hosts scanning for port 5000 are DVRs (to be more precise: Hikvision DVRs, commonly used to record video from surveillance cameras [1] ). Today, we were able to recover the malware responsible. You can download the malware here https://isc.sans.edu/diaryimages/hikvision.zip (password: infected) . The malware resides in /dev/cmd.so . A number of additional suspect files where located in the /dev directory which we still need to recover / analyze from the
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17879&rss
*** Crack team of cyber warriors arrives to SAVE UK from grid-crippling HACK ATTACKS ***
---------------------------------------------
National CERT goes live today The UK is finally getting a national Computer Emergency Response Team (CERT), with the delayed launch of the organisation taking place today.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/03/31/cert_uk_lau…
*** Cisco Security Response Team Opens Its Toolbox ***
---------------------------------------------
With a variety of security tools, CSIRT is able to detect and analyze malicious traffic throughout the network, including virus propagation, targeted attacks, and commonplace exploits. Because CSIRT continually identifies new security threats, the team needs some historical look-back at what occurred on the network. They also need a solution that can dissect the finer details of security incidents while facing the ever-present restrictions with data storage.
---------------------------------------------
https://blogs.cisco.com/security/cisco-security-response-team-opens-its-too…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-03-2014 18:00 − Freitag 28-03-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** New PGP keys ***
---------------------------------------------
At CERT.at we had to phase out some old 1024 bit DSA keys as well as create new master-signing keys. This turned out to be a major effort. Key roll-overs are never easy.In order to easy the key roll-over pains, we created a key transition document. This document is signed by the old keys in order to prove authorship. ...
---------------------------------------------
http://www.cert.at/services/blog/20140328155445-1086.html
*** NTP Amplification, SYN Floods Drive Up DDoS Attack Volumes ***
---------------------------------------------
The potency of distributed denial of service attacks has increased steadily but dramatically over the last 14 months.
---------------------------------------------
http://threatpost.com/ntp-amplification-syn-floods-drive-up-ddos-attack-vol…
*** Schneider Electric Serial Modbus Driver Buffer Overflow ***
---------------------------------------------
OVERVIEW Carsten Eiram of Risk-Based Security has identified a stack-based buffer overflow vulnerability in Schneider Electric’s Serial Modbus Driver that affects 11 Schneider Electric products. Schneider Electric has produced patches that mitigate this vulnerability. This vulnerability can be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-086-01
*** Apple Credential Phishing via appleidconfirm.net, (Thu, Mar 27th) ***
---------------------------------------------
ISC user Craig Cox wrote in alerting us of a fairly sophisticated phishing campaign that is currently in progress. The website appleidconfirm.net has a seemingly realistic Apple login page that is being sent out by email. The site even includes JavaScript code which validates your Apple ID as an email in an attempt to obtain only valid credentials. Upon submitting what it considers valid credentials, youre redirected to the /?2 page of the site which contains another form which appears to
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17869&rss
*** SonicWALL Email Security Input Validation Flaw in License Management’ and ‘Advanced Pages Permits Cross-Site Scripting Attacks ***
---------------------------------------------
A vulnerability was reported in SonicWALL Email Security. A remote user can conduct cross-site scripting attacks.
The 'License Management' and 'Advanced' pages do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.
---------------------------------------------
http://www.securitytracker.com/id/1029965
*** Word and Excel Files Infected Using Windows PowerShell ***
---------------------------------------------
Malware targeting Word and Excel files has been around for some time, but we recently encountered a new malware family, CRIGENT (also known as “Power Worm”) which brings several new techniques to the table. (We detect these files as W97M_CRIGENT.JER and X97M_CRIGENT.A.) Most significantly, instead of creating or including executable code, CRIGENT uses the Windows PowerShell
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/9hUmCpAOj9M/
*** OpenSSH 6.6 bypass SSHFP DNS RR checking by HostCertificate ***
---------------------------------------------
I've been looking at handling host keys better, and tripped over this bug. Essentially, if the server offers a HostCertificate that the client doesn't accept, then the client doesn't then check for SSHFP records.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030239
*** [2014-03-28] Multiple vulnerabilities in Symantec LiveUpdate Administrator ***
---------------------------------------------
Attackers are able to compromise Symantec LiveUpdate Administrator at the application and database levels because of vulnerable password reset functionality and SQL injection vulnerabilities. This enables access to credentials of update servers on the network without prior authentication.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Python "os._get_masked_mode()" Race Condition Security Issue ***
---------------------------------------------
A security issue has been reported in Python, which can be exploited by malicious, local users to potentially disclose or manipulate certain data.
The security issue is caused due to a race condition within the "os._get_masked_mode()" function (Lib/os.py), which can be exploited to cause certain application-created files to be world-accessible.
The security issue is reported in versions 3.4, 3.3, and 3.2.
---------------------------------------------
https://secunia.com/advisories/57672
*** IBM Security Bulletin: IBM Operational Decision Manager and WebSphere ILOG JRules: Multiple security vulnerabilities in IBM JRE ***
---------------------------------------------
This Security Bulletin addresses the security vulnerabilities that have shipped with the IBM Java Runtime Environment (JRE) included in IBM Operational Decision Manager and IBM ILOG JRules. IBM ODM and ILOG JRules now include the most recent version of the IBM JRE which fixes the security vulnerabilities reported in Oracles Critical Patch Update releases of January 2014. CVE(s): CVE-2014-0423, CVE-2014-0416 and CVE-2014-0411 Affected product(s) and affected version(s): IBM WebSphere ILOG
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Cisco IOS Software High Priority Queue Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the packet driver code of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a reload of the affected device, resulting in a denial of service (DoS) condition.
CVE-2014-2131
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 26-03-2014 18:00 − Donnerstag 27-03-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Allied Telesis AT-RG634A ADSL router unauthenticated webshell ***
---------------------------------------------
Risk: High, Allied Telesis AT-RG634A ADSL Broadband router hidden administrative unauthenticated webshell ..
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030221
*** HP Multiple StoreOnce Products Unauthorised Access Security Bypass Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/57601
*** Linux Kernel ath9k "ath_tx_aggr_sleep()" Race Condition Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/57468
*** When ZOMBIES attack: DDoS traffic triples as 20Gbps becomes the new normal ***
---------------------------------------------
Junk traffic mostly floods in from botnets DDoS traffic has more than trebled since the start of 2013, according to a new study released on Thursday that fingers zombie networks as the primary source of junk traffic that can be used to flood websites.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/03/27/ddos_trends…
*** DSA-2885-1 libyaml-libyaml-perl -- security update ***
---------------------------------------------
Ivan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
---------------------------------------------
https://www.debian.org/security/2014/dsa-2885
*** Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication ***
---------------------------------------------
Cisco released its semiannual Cisco IOS Software Security Advisory Bundled Publication on March 26, 2014. In direct response to customer feedback, Cisco releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of the month in March and September of each calendar year. The publication includes 5 Security Advisories that address vulnerabilities in Cisco IOS Software and 1 Security Advisory that addresses ..
---------------------------------------------
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
*** Malware Hijacks Android Mobile Devices to Mine Cryptocurrency ***
---------------------------------------------
Several bits of malware targeting Android mobile devices hijack the smartphone or tablets resources to mine digital currency such as Litecoin or Dogecoin.
---------------------------------------------
http://threatpost.com/malware-hijacks-android-mobile-devices-to-mine-crypto…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 25-03-2014 18:00 − Mittwoch 26-03-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** A few updates on "The Moon" worm, (Tue, Mar 25th) ***
---------------------------------------------
It has been over a month since we saw the "Moon" worm first exploiting various Linksys routers. I think it is time for a quick update to summarize some of the things we learned since then: Much of what we found so far comes thanks to the malware analysis done by Bernado Rodriges. Bernado used QEMU to run the code in a virtual environment. QEMU is as far as I know the only widely available virtualization technique that can simulate a MIPS CPU while running on an x86 host.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17855&rss
*** WordPress Pingback-Funktion für DDoS-Attacken missbraucht ***
---------------------------------------------
WordPress Pingback-Funktion für DDoS-Attacken missbraucht24. März 2014
In den letzten Tagen gab es zahlreiche Medienberichte zu DDoS-Angriffen durch Missbrauch der XML-RPC-Pingback-Funktion von WordPress. Einige dieser Beiträge möchte ich, zur weiterführenden Lektüre für Betroffene und Interessierte, im Folgenden auflisten. Blog Post von Daniel Cid vom Security-Dienstleister Sucuri mit Erklärungen zur Funktionsweise der Attacke. Weiters wird beschrieben,
---------------------------------------------
http://www.cert.at/services/blog/20140324230619-1079.html
*** Bugtraq: CVE-2013-6955 Synology DSM remote code execution ***
---------------------------------------------
webman/imageSelector.cgi in Synology DiskStation Manager (DSM) 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1 allows remote attackers to append data to arbitrary files, and consequently execute arbitrary code, via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header.
---------------------------------------------
http://www.securityfocus.com/archive/1/531602
*** OpenSSL 1.0.0l cache side-channel attack ***
---------------------------------------------
Topic: OpenSSL 1.0.0l cache side-channel attack Risk: Medium Text:The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-tim...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030197
*** Xen HVMOP_set_mem_access Input Validation Flaw Lets Local Guest Users Deny Service on the Host System ***
---------------------------------------------
A local user on the guest operating system can cause denial of service conditions on the host operating system.
The HVMOP_set_mem_access HVM control operations does not properly validate input size. A local administrative user on an HVM guest operating system can consume excessive CPU resources on the host operating system.
On version 4.2, only 64-bit versions of the hypervisor are affected.
Device model emulators (qemu-dm) are affected.
---------------------------------------------
http://www.securitytracker.com/id/1029956
*** Walkthrough of a Recent Zbot Infection and associated CnC Server ***
---------------------------------------------
During routine ThreatLabZ log analysis, we encountered the following malicious Zbot executable connecting back to its CnC and exfiltrating data via POST requests.
---------------------------------------------
http://feedproxy.google.com/~r/zscaler/research/~3/kygTD5dMmHo/walkthrough-…
*** MIT Researchers Create Platform To Build Secure Web Apps That Never Leak Data ***
---------------------------------------------
rjmarvin writes: "Researchers in the MIT Computer Science and Artificial Intelligence Laboratory have developed a platform for building secure web applications and services that never decrypt or leak data. MIT researcher Raluca Ada Popa, who previously worked on the Google and SAP-adopted CryptoDB, and her team, have put a longstanding philosophy into practice: to never store unencrypted data on servers. Theyve redesigned the entire approach to securing online data by creating Mylar, which
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/QIuCSrAxslY/story01.htm
*** PAM timestamp internals bypass authentication ***
---------------------------------------------
Topic: PAM timestamp internals bypass authentication
Risk: Low
Text:Hi When playing with some PAM modules for my own projects, I came across some implications of pam_timestamp (which is part ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030216
*** Nmap-Erfinder rebootet Full Disclosure ***
---------------------------------------------
Gordon 'Fyodor' Lyon hat die überraschend geschlossene Full-Disclosure-Mailingliste wiederbelebt. Er habe viel Erfahrung mit dem Administrieren von Mailinglisten und keine Angst vor rechtlichen Drohungen, sagt der Sicherheitsexperte.
---------------------------------------------
http://www.heise.de/security/meldung/Nmap-Erfinder-rebootet-Full-Disclosure…
*** TYPO3 CMS 6.2 LTS is now available ***
---------------------------------------------
... TYPO3 CMS 6.2 LTS, which was released today. As the second TYPO3 release with long-term support (LTS), TYPO3 CMS 6.2 LTS will receive at least three years of support from the development team behind the open-source software.
---------------------------------------------
http://typo3.org/news/article/typo3-presents-the-latest-version-of-its-free…
*** Jetzt VoIP-Passwort ändern: Kriminelle nutzen erbeutete Fritzbox-Daten aus ***
---------------------------------------------
Die Fritzbox-Angreifer haben anscheinend lange Zeit unbemerkt Zugangsdaten gesammelt, ohne sie zu benutzen. Für die Nutzer hat das jetzt ein übles Nachspiel, denn die meisten Passwörter funktionieren weiterhin. Der Schaden geht in die Hunderttausende.
---------------------------------------------
http://www.heise.de/security/meldung/Jetzt-VoIP-Passwort-aendern-Kriminelle…
*** Splunk Unspecified Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Splunk, which can be exploited by malicious people to conduct cross-site scripting attacks.
Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is reported in versions prior to 5.0.8.
---------------------------------------------
https://secunia.com/advisories/57554
*** libcURL Connection Re-use and Certificate Verification Security Issues ***
---------------------------------------------
Multiple security issues have been reported in libcURL, which can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/57434
*** 10 rules of thumb of internet safety ***
---------------------------------------------
Malicious parties on the internet try to gain access to your computer, tablet or mobile phone and to intercept personal data. Malware, phishing and spam are frequently occurring threats. These 10 rules of thumb provide a basis to protect yourself against these threats.
---------------------------------------------
http://www.ncsc.nl/english/services/expertise-advice/knowledge-sharing/fact…
*** New Metasploit 4.9 Helps Evade Anti-Virus Solutions, Test Network Segmentation, and Increase Productivity for Penetration Testers ***
---------------------------------------------
Metasploit 4.9 helps penetration testers evade anti-virus solutions, generate payloads, test network segmentation, and generally increase productivity through updated automation and reporting features. Since version 4.8, Metasploit has added 67 new exploits and 51 auxiliary and post-exploitation modules to both its commercial and open source editions, bringing our total module count up to 1,974. The new version is available immediately.
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/03/26/new-metas…
*** [Honeypot Alert] JCE Joomla Extension Attacks ***
---------------------------------------------
Our web honeypots picked up some increased exploit attempts for an old Joomla Content Editor (JCE) Extension vulnerability. Although this vulnerability is a few years old, botnet owners are heavily scanning for sites that are vulnerable and attempting to exploit them.
---------------------------------------------
http://feedproxy.google.com/~r/SpiderlabsAnterior/~3/v7CME1mpcfQ/honeypot-a…
*** Cisco IOS Software SSL VPN Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Secure Sockets Layer (SSL) VPN subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability is due to a failure to process certain types of HTTP requests. To exploit the vulnerability, an attacker could submit crafted requests designed to consume memory to an affected device. An exploit could allow the attacker to consume and fragment memory on the affected device. This may cause reduced performance, a failure of certain processes, or a restart of the affected device.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device. To exploit this vulnerability, affected devices must be configured to process SIP messages. Limited Cisco IOS Software and Cisco IOS XE Software releases are affected.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the implementation of the IP version 6 (IPv6) protocol stack in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause I/O memory depletion on an affected device that has IPv6 enabled. The vulnerability is triggered when an affected device processes a malformed IPv6 packet.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software Network Address Translation Vulnerabilities ***
---------------------------------------------
The Cisco IOS Software implementation of the Network Address Translation (NAT) feature contains two vulnerabilities when translating IP packets that could allow an unauthenticated, remote attacker to cause a denial of service condition.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected device that would lead to a denial of service (DoS) condition.
The vulnerability is due to how an affected device processes certain malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device to be processed. An exploit could allow the attacker to cause a reload of the affected device that would lead to a DoS condition.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Web Browser Security Revisited (Part 5) ***
---------------------------------------------
In Part 1 of this series, we discussed the importance of web browser security and some security-related issues that are common to all or many of the popular browsers today. In Part 2, we talked about some specific security mechanisms that are built into Internet Explorer and how they're implemented. In Part 3, we looked at how to configure IE for best security. In Part 4, we examined how to do the same with Google Chrome. This time, we'll look at ... Chrome for Business.
---------------------------------------------
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/w…
*** Vuln: Apple Mac OS X APPLE-SA-2014-02-25-1 Multiple Security Vulnerabilities ***
---------------------------------------------
Apple Mac OS X is prone to multiple vulnerabilities.
The update addresses new vulnerabilities that affect ATS, CFNetwork Cookies, CoreAnimation, CoreText, Date and Time, curl, QuickTime, QuickLook, Finder, and File Bookmark components.
Attackers can exploit these issues to execute arbitrary code, gain unauthorized access, bypass security restrictions, and perform other attacks. Failed attacks may cause denial-of-service conditions.
These issues affect OS X versions prior to 10.9.2.
---------------------------------------------
http://www.securityfocus.com/bid/65777
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 24-03-2014 18:00 − Dienstag 25-03-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Microsoft Security Advisory (2953095): Vulnerability in Microsoft Word Could Allow Remote Code Execution - Version: 1.0 ***
---------------------------------------------
Microsoft is aware of a vulnerability affecting supported versions of Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer.
---------------------------------------------
http://technet.microsoft.com/en-us/security/advisory/2953095
*** Security Advisory 2953095: recommendation to stay protected and for detections ***
---------------------------------------------
Today, Microsoft released Security Advisory 2953095 to notify customers of a vulnerability in Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010. This blog will discuss mitigations and temporary defensive strategies that will help customers to protect themselves while we are working on a security update. This blog also provides some preliminary details of the exploit code observed in the wild. Mitigations and Workaround The in the wild
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095…
*** [dos] - Windows Media Player 11.0.5721.5230 - Memory Corruption PoC ***
---------------------------------------------
#[+] Exploit Title: Windows Media Player 11.0.5721.5230 Memory Corruption PoC
#[+] Date: 22-03-2014
#[+] Category: DoS/PoC
#[+] Tested on: WinXp/Windows 7 Pro
---------------------------------------------
http://www.exploit-db.com/exploits/32477
*** Security Notice- Allegro RomPager Information Disclosure Vulnerability in Multiple Huawei Routers ***
---------------------------------------------
Huawei has noticed an information disclosure vulnerability on the RomPager embedded web server, which is developed by Allegro. The vulnerability affects Huawei HG520c, MT880, and MT886 access routers.
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-notices…
*** Bugtraq: Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti ***
---------------------------------------------
Summary:
Three vulnerabilities were found in cacti version 0.8.7g.
The vulnerabilities are:
1) Stored Cross-Site Scripting (XSS) (via URL)
2) Missing CSRF (Cross-Site Request Forgery) token allows execution of arbitrary commands
3) The use of exec-like function calls without safety checks allow arbitrary commands
---------------------------------------------
http://www.securityfocus.com/archive/1/531588
*** Bugtraq: Deutsche Telekom CERT Advisory [DTC-A-20140324-003] vulnerabilities in icinga ***
---------------------------------------------
Two vulnerabilities were found in icinga version 1.9.1.
These vulnerabilities are:
1) several buffer overflows
2) Off-by-one memory access
---------------------------------------------
http://www.securityfocus.com/archive/1/531593
*** Bugtraq: Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk ***
---------------------------------------------
Several vulnerabilities were found in check_mk version 1.2.2p2.
The vulnerabilities are:
1 - Reflected Cross-Site Scripting (XSS)
2 - Stored Cross-Site Scripting (XSS) (via URL)
3 - Stored Cross-Site Scripting (XSS) (via external data, no link necessary)
4 - Stored Cross-Site Scripting (XSS) (via external data on service port, no link necessary)
5 - Missing CSRF (Cross-Site Request Forgery) token allows execution of arbitrary commands
6 - Multiple use of exec-like function calls which allow arbitrary commands
7 - Deletion of arbitrary files
---------------------------------------------
http://www.securityfocus.com/archive/1/531594
*** Net-snmp snmptrapd Community String Processing Lets Remote Users Deny Service ***
---------------------------------------------
A remote user can send a specially crafted SNMP trap request with an empty community string to trigger a flaw in newSVpv() and cause the target snmptrapd service to crash.
Systems with the Perl handler enabled are affected.
---------------------------------------------
http://www.securitytracker.com/id/1029950
*** Trojan.PWS.OSMP.21 infects payment terminals ***
---------------------------------------------
March 25, 2014 Home users aren't the only ones being targeted by today's threats - various financial organisations are receiving their own share of attention from criminals who are crafting malicious applications for ATMs and payment terminals. Doctor Web has issued a warning regarding one such Trojan, namely, Trojan.PWS.OSMP.21. This malware is infecting the terminals of a major Russian payment system.
---------------------------------------------
http://news.drweb.com/show/?i=4259&lng=en&c=9
*** RSA BSAFE Micro Edition Suite (MES) 4.0.x Denial Of Service ***
---------------------------------------------
Summary:
RSA BSAFE MES 4.0.5 contains fix for a security vulnerability that could potentially be exploited by malicious users to
deny access to the affected system.
Details:
This vulnerability may cause unpredictable application behavior resulting in a server crash due to faulty certificate
chain processing logic.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030193
*** PHP Fileinfo libmagic AWK File Processing Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in PHP, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the libmagic library bundled in the Fileinfo extension when processing certain AWK scripts, which can be exploited to cause excessive CPU resources consumption via a specially crafted AWK script file.
---------------------------------------------
https://secunia.com/advisories/57564
*** OpenVZ update for kernel ***
---------------------------------------------
OpenVZ has issued an update for kernel. This fixes multiple vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/57573
*** Password Hashing Competition ***
---------------------------------------------
Theres a private competition to identify new password hashing schemes. Submissions are due at the end of the month.
---------------------------------------------
https://www.schneier.com/blog/archives/2014/03/password_hashin.html
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 21-03-2014 18:00 − Montag 24-03-2014 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** NSA Targets Sys Admins to Infiltrate Networks ***
---------------------------------------------
The latest Snowden documents show how the National Security Agency targets system administrators, in particular their personal email and social media accounts, in order to access target networks.
---------------------------------------------
http://threatpost.com/nsa-targets-sys-admins-to-infiltrate-networks/104953
*** IBM Security Bulletin: IBM Security Directory Server can be affected by a vulnerability in IBM WebSphere Application Server (CVE-2014-0411) ***
---------------------------------------------
The IBM WebSphere Application Server component provided with IBM Security Directory Server is vulnerable to a transport layer security (TLS) timing attack.
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** BlackOS software package automates website hacking, costs $3,800 a year ***
---------------------------------------------
An updated version of a malicious software package designed to automate the process of hacking websites is being offered up on underground markets for $3,800 a year, according to a blog by Trend Micro.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/yw9wyT8CoMQ/
*** WPA2 Wireless Security Crackable WIth "Relative Ease" ***
---------------------------------------------
An anonymous reader writes "Achilleas Tsitroulis of Brunel University, UK, Dimitris Lampoudis of the University of Macedonia, Greece and Emmanuel Tsekleves of Lancaster University, UK, have investigated the vulnerabilities in WPA2 and present its weakness. They say that this wireless security system might now be breached with relative ease [original, paywalled paper] by a malicious attack on a network.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/GNlVmrhVOM4/story01.htm
*** Android update process gives malware a leg-up to evil: Indiana U ***
---------------------------------------------
Old apps get access to privileges that didnt exist when they were written Researchers from Indiana University Bloomington have tagged a vulnerability in the way Android handles updates, which they say puts practically every Android device at risk of malicious software.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/03/23/android_upd…
*** AWS urges developers to scrub GitHub of secret keys ***
---------------------------------------------
Devs hit with unexpected bills after leaving secret keys exposed. Amazon Web Services (AWS) is urging developers using the code sharing site GitHub to check their posts to ensure they havent inadvertently exposed their log-in credentials.
---------------------------------------------
http://www.itnews.com.au/News/375785,aws-urges-developers-to-scrub-github-o…
*** D-Link DIR-600L Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in D-Link DIR-600L, which can be exploited by malicious people to conduct cross-site request forgery attacks.
The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. change administrative credentials when a logged-in user visits a specially crafted web page.
---------------------------------------------
https://secunia.com/advisories/57392
*** Array Networks vxAG / vAPV Undocumented Accounts Security Issues ***
---------------------------------------------
Some security issues have been reported in Array Networks vxAG and vAPV, which can be exploited by malicious people to bypass certain security restrictions.
The security issues are caused due to the device using certain undocumented user accounts with default credentials, which can be exploited to gain otherwise restricted access to the device.
---------------------------------------------
https://secunia.com/advisories/57442
*** PayPal for Android SSL Certificate Validation Security Issue ***
---------------------------------------------
MWR InfoSecurity has reported a security issue in PayPal for Android, which can be exploited by malicious people to conduct spoofing attacks.
The security issue is caused due to an error when verifying server SSL certificate within the WebHybridClient class and can be exploited to spoof a HTTPS connection and e.g. conduct Man-in-the-Middle (MitM) attacks.
---------------------------------------------
https://secunia.com/advisories/57351
*** php-font-lib "name" Cross-Site Scripting Vulnerability ***
---------------------------------------------
Daniel C. Marques has reported a vulnerability in php-font-lib, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the "name" GET parameter to www/make_subset.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
---------------------------------------------
https://secunia.com/advisories/57558
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 20-03-2014 18:00 − Freitag 21-03-2014 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Taken in phishing attack, Microsoft's unmentionables aired by hacktivists ***
---------------------------------------------
If Microsoft and eBay arent safe from social engineering attacks, who is?
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/B9IE0Uei57U/
*** Kaspersky Internet Security Regular Expression Patterns Processing Denial of Service Vulnerability ***
---------------------------------------------
CXsecurity has discovered a vulnerability in Kaspersky Internet Security, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error when processing regular expression patterns and can be exploited to exhaust CPU resources and render the system unusable.
---------------------------------------------
https://secunia.com/advisories/57316
*** DotNetNuke Unspecified Script Insertion Vulnerability ***
---------------------------------------------
A vulnerability has been reported in DotNetNuke, which can be exploited by malicious users to conduct script insertion attacks.
Certain unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
---------------------------------------------
https://secunia.com/advisories/57429
*** WordPress WP-Filebase Download Manager Plugin Arbitrary Code Execution Vulnerability ***
---------------------------------------------
A vulnerability has been reported in the WP-Filebase Download Manager plugin for WordPress, which can be exploited by malicious users to compromise a vulnerable system.
...
Successful exploitation of this vulnerability requires access rights to upload files (e.g. "Editor" access rights).
The vulnerability is reported in version 0.3.0.03. Prior versions may also be affected.
---------------------------------------------
https://secunia.com/advisories/57456
*** Zeus variant blocks user activity with full-screen pop-ups ***
---------------------------------------------
Infected users are forced to contend with open windows, which are actually legitimate sites being displayed on their desktops.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/KHHSZFOdcH0/
*** A peek inside a modular, Tor C&C enabled, Bitcoin mining malware bot ***
---------------------------------------------
Cybercriminals continue to maliciously 'innovate', further confirming the TTP (tactics, techniques and procedure) observations we made in our Cybercrime Trends 2013 assessment back in December, 2013, namely, that the diverse cybercrime ecosystem is poised for exponential growth. Standardizing the very basics of fraudulent and malicious operations, throughout the years, cybercriminals have successfully achieved a state of malicious economies of scale...
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/V6XSH_U-eoU/
*** Siemens SIMATIC S7-1200 Improper Input Validation Vulnerabilities ***
---------------------------------------------
OVERVIEWSiemens has reported two improper input validation vulnerabilities discovered separately by Prof. Dr. Hartmut Pohl of softScheck GmbH and Arne Vidström of Swedish Defence Research Agency (FOI) in Siemens' SIMATIC S7-1200 PLC. Siemens has produced a new version that mitigates these vulnerabilities.These vulnerabilities could be exploited remotely.AFFECTED PRODUCTSThe following SIMATIC S7-1200 PLC versions are affected:
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-079-01
*** Siemens SIMATIC S7-1200 Vulnerabilities ***
---------------------------------------------
OVERVIEWSiemens, Ralf Spenneberg of OpenSource Training, Lucian Cojocar of EURECOM, Sascha Zinke from the FU Berlin's work team SCADACS, and Positive Technologies' researchers (Alexey Osipov, and Alex Timorin) have identified six vulnerabilities in the Siemens SIMATIC S7-1200 CPU family. Siemens has produced a new product release that mitigates these vulnerabilities.These vulnerabilities could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02
*** Cisco AsyncOS Patch , (Fri, Mar 21st) ***
---------------------------------------------
Cisco released a patch for AsyncOS, the operating system used in its E-Mail Security Appliance (ESA) and Security Management Appliance (SMA). The vulnerability is exploited by an authenticated attacker uploading a crafted blocklist file. The file has to be uploaded via FTP, so this vulnerability is only exploitable if the FTP service is enabled. Once the blacklist is pared, arbitrary commands are executed. This sounds like an OS command injection vulnerability. The parameters (assumed to be
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17839&rss
*** Linux Kernel Netfilter DCCP Processing Flaw Lets Remote Users Execute Arbitrary Code ***
---------------------------------------------
Description: A vulnerability was reported in the Linux Kernel. A remote user can execute arbitrary code on the target system.
A remote user can send specially crafted DCCP data to trigger a memory corruption flaw in 'nf_conntrack_proto_dccp.c' and execute arbitrary code on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1029945
*** Horde Framework Unserialize PHP Code Execution ***
---------------------------------------------
Topic: Horde Framework Unserialize PHP Code Execution
Risk: High
Text:## # This module requires Metasploit
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030175
*** Monitoring for unusual network traffic key to banking botnet detection ***
---------------------------------------------
Malware authors have had great success targeting financial institutions in recent years, and in turn those organizations have a vested interest in improving their banking botnet detection capabilities. However, one expert says financial firms are failing because they ignore unusual network traffic.
---------------------------------------------
http://searchsecurity.techtarget.com/news/2240216637/Monitoring-for-unusual…
*** Nokia X Android smartphone security features detailed ***
---------------------------------------------
... the Nokia X comes with the required security features to protect the data stored on the device without downloading third-party security apps. The three main ways to protect the data on the Nokia X smartphone is the screen security, encryption, and SIM card lock.
---------------------------------------------
http://gadgets.ndtv.com/mobiles/news/nokia-x-android-smartphone-security-fe…
*** Linux Worm Darlloz Infects over 31,000 Devices in Four Months ***
---------------------------------------------
The worm is designed to infect computers running Intel x86 architectures, but it's also capable of infecting devices running MIPS, ARM, PowerPC architectures. Routers, set-top boxes and other devices usually have this kind of architecture. Based on its investigation, Symantec has determined that the main goal of Darlloz is to abuse infected devices for crypto-currency mining. Once it's installed on a computer, the worm installs open source mining software (cpuminer).
---------------------------------------------
http://news.softpedia.com/news/Linux-Worm-Darlloz-Infects-over-31-000-Devic…
*** Mass-Produced ATM Skimmers, Rogue PoS Terminals via 3D Printing? ***
---------------------------------------------
On several underground forums, a cybercriminal named gripper is selling ATM skimmers and fake POS terminals, and is making some very bold claims doing so: Figure 1. Underground advertisement. The cybercriminal claims that he can mass-produce VeriFone VerixV point-of-sale (PoS) devices. (Verifone is a US-based provider of POS terminals.) Some specific VeriFone products such as the Vx510...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/YmksHI4j1OM/
*** Spotlight on Java SE 8 Security ***
---------------------------------------------
March 18, 2014 was the long anticipated release of Java SE 8. I though I would spotlight some of the key security features of Java 8 for readers. First, many are not aware of security improvements made to Java 7. Let's begin with a quick review the Java SE 7 security features that were rolled into Java SE 8.
---------------------------------------------
http://www.securitycurmudgeon.com/2014/03/20/spotlight-on-java-se-8-securit…
*** IBM Security Bulletin: IBM WebSphere MQ Internet Pass-Thru - Potential denial of service on the command port listener (CVE-2013-5401) ***
---------------------------------------------
A denial of service vulnerability exists and could be exploited by a remotely connected user to stop the remote administration service. CVE(s): CVE-2013-5401 Affected product(s) and affected version(s): WebSphere MQIPT 2.1.0.0 WebSphere MQIPT 2.0.x Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21666863 X-Force Database: http://xforce.iss.net/xforce/xfdb/87297
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** OpenSSL ECDSA Nonces Recovery Weakness ***
---------------------------------------------
Yuval Yarom and Naomi Benger have reported a weakness in OpenSSL, which can be exploited by malicious, local users to disclose certain sensitive information.
---------------------------------------------
https://secunia.com/advisories/57091
*** OpenSSH "child_set_env()" Security Bypass Security Issue ***
---------------------------------------------
The security issue is caused due to an error within the "child_set_env()" function (usr.bin/ssh/session.c) and can be exploited to bypass intended environment restrictions by using a substring before a wildcard character.
---------------------------------------------
https://secunia.com/advisories/57488
*** Oracle VirtualBox 3D Acceleration Multiple Privilege Escalation Vulnerabilities ***
---------------------------------------------
Core Security has reported multiple vulnerabilities in Oracle VirtualBox, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges.
---------------------------------------------
https://secunia.com/advisories/57384
*** Cisco Hosted Collaboration Solution Packet Processing Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Cisco Hosted Collaboration Solution, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/57496
*** Video zeigt Jailbreak von iOS 7.1 ***
---------------------------------------------
Ein Entwickler hat seine Arbeit an einem Jailbreak von iOS 7.1 demonstriert. Apple hatte mit dem jüngsten iOS-Update die Schwachstellen geschlossen, die für den letzten Jailbreak zum Einsatz kamen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Video-zeigt-Jailbreak-von-iOS-7-1-21…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 19-03-2014 18:00 − Donnerstag 20-03-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** ZBOT Adds Clickbot Routine To Arsenal ***
---------------------------------------------
The ZeuS/ZBOT malware family is probably one of the most well-known malware families today . It is normally known for stealing credentials associated with online banking accounts. However, ZBOT is no one-trick pony. Some ZBOT variants perform other routines like downloading or dropping other threats like ransomware. We recently came across one variant detected as TROJ_ZCLICK.A,...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/rrelQiGbzao/
*** New BlackOS Software Package Sold In Underground Forums ***
---------------------------------------------
We recently came across this particular post in an underground forum: Figure 1. Underground forum post This particular post in Russian was advertising a new product, known as "BlackOS". Contrary to the name, it is not an operating system. However, it is definitely "black", or malicious: it is used to manage and redirect Internet traffic...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/mA8O58qz-TQ/
*** Phishing: Gehackter EA-Server hostet falsche Apple-Webseite ***
---------------------------------------------
Kriminelle Hacker haben auf Servern des Spieleherstellers Electronic Arts eine gefälschte Webseite untergebracht, die Apple-IDs samt Passwörtern und Kreditkarteninformationen verlangt. Wie viele Nutzer ihre Daten dort eingegeben haben, ist nicht bekannt.
---------------------------------------------
http://www.golem.de/news/phishing-gehackter-ea-server-hostet-falsche-apple-…
*** "goto fail": Apple drängt Nutzer zum Update ***
---------------------------------------------
Der Mac-Hersteller fordert inzwischen dazu auf, das Update auf OS X 10.9.2 alsbald möglich zu installieren - falls noch nicht geschehen. Ältere Versionen von OS X Mavericks und iOS weisen eine gravierende SSL-Schwachstelle auf.
---------------------------------------------
http://www.heise.de/security/meldung/goto-fail-Apple-draengt-Nutzer-zum-Upd…
*** Android: Sicherheitslücken wegen fehlender Updates bleiben Problem ***
---------------------------------------------
70 Prozent aller Android-Geräte weltweit besitzen eine Browser-Lücke, glaubt ein Forscher. Der simple Aufruf einer Website reicht, um sie auszunutzen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Android-Sicherheitsluecken-wegen-feh…
*** Analysis: Spam report: February 2014 ***
---------------------------------------------
The share of spam in global email traffic decreased by 7.6 percentage points and averaged 65.7% in January. As forecasted, the drop in the share of spam was due to a lull early in January when there is less business activity and a large number of botnets are turned off.
---------------------------------------------
http://www.securelist.com/en/analysis/204792328/Spam_report_February_2014
*** Protokollanalyse: Mogeln im Quizduell ***
---------------------------------------------
Entwickler verlassen sich zu sehr auf HTTPS und verzichten auf grundlegende Sicherheitsmaßnahmen. Über eine Man-in-the-Middle-Attacke konnten Security-Forscher in den Datenverkehr zwischen App-Server und Apps hineinsehen - und entdeckten Sonderbares.
---------------------------------------------
http://www.golem.de/news/protokollanalyse-mogeln-im-quizduell-1403-105276-r…
*** Cisco IronPort AsyncOS Software for ESA and SMA File Validation Flaw Lets Remote Authenticated Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1029937
*** SA-CONTRIB-2014-033 - Nivo Slider - Cross Site Scripting ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-033Project: Nivo Slider (third-party module)Version: 7.xDate: 2014-March-19Security risk: Moderately criticalExploitable from: RemoteVulnerability: Cross Site ScriptingDescriptionNivo Slider provides a way to showcase featured content. Nivo Slider gives administrators a simple method of adding slides to the slideshow, an administration interface to configure slideshow settings, and simple slider positioning using the Drupal block system.The module doesnt...
---------------------------------------------
https://drupal.org/node/2221481
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 18-03-2014 18:00 − Mittwoch 19-03-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Apache Update Resolves Security Vulnerabilities ***
---------------------------------------------
Apache has released version 2.4.9 of its ubiquitous HTTP web server (HTTPD), resolving two security vulnerabilities and a number of other bugs in the process.
---------------------------------------------
http://threatpost.com/apache-update-resolves-security-vulnerabilities/104849
*** Ebury-Rootkit: Zombie-Server greifen täglich eine halbe Million Rechner an ***
---------------------------------------------
Zu den Opfern der Malware-Kampagne "Operation Windigo" gehören unter anderem kernel.org und cPanel. Die mit dem Ebury-Rootkit infizierten Server versenden Spam und attackieren Besucher der kompromittierten Webseiten.
---------------------------------------------
http://www.heise.de/security/meldung/Ebury-Rootkit-Zombie-Server-greifen-ta…
*** Wide Gap Between Attackers, BIOS Forensics Research ***
---------------------------------------------
Advanced attackers are ahead of researchers when it comes to understanding firmware vulnerabilities and BIOS forensics, experts from MITRE and Intel said during last weeks CanSecWest.
---------------------------------------------
http://threatpost.com/wide-gap-between-attackers-bios-forensics-research/10…
*** Avast-Toolbar mit Shopping-Spion ***
---------------------------------------------
Die Browser-Toolbar, die unter anderem mit der Antivirensoftware auf den Rechner gelangt, schaut dem Nutzer beim Einkaufen über die Schulter und baut Konkurrenzangebot in die Shop-Seiten ein.
---------------------------------------------
http://www.heise.de/security/meldung/Avast-Toolbar-mit-Shopping-Spion-21496…
*** Data suggests Android malware threat greatly overhyped ***
---------------------------------------------
Its no secret that many in the security industry perceive Google Inc.s Android mobile platform to be plagued by malware, but Android security team lead Adrian Ludwig has made it his mission to eradicate the disingenuous meme of the burgeoning Android malware apocalypse.
---------------------------------------------
http://searchsecurity.techtarget.com/news/2240216335/Data-suggests-Android-…
*** Mailingliste Full Disclosure macht dicht ***
---------------------------------------------
Die bekannte Sicherheits-Mailingliste wurde von ihrem Betreiber bis auf weiteres geschlossen. Full Disclosure war in der Vergangenheit immer wieder Schauplatz der Enthüllung wichtiger Sicherheitslücken.
---------------------------------------------
http://www.heise.de/security/meldung/Mailingliste-Full-Disclosure-macht-dic…
*** 10 Years of Mobile Malware: How Secure Are You? ***
---------------------------------------------
Believe it or not, but it has been 10 years since the first mobile malware was created! On the infographic below, you can see a brief overview of the most important malware events in the past 10 years, with a short description of each of them.
---------------------------------------------
https://www.linkedin.com/today/post/article/20140316112657-67886711-10-year…
*** New Exploits Arrive for Old PHP Vulnerability ***
---------------------------------------------
New exploits for a two-year-old PHP vulnerability popped up in October that allow hackers to run code on websites running vulnerable versions of the web development framework.
---------------------------------------------
http://threatpost.com/new-exploits-arrive-for-old-php-vulnerability/104881
*** Fake Tor browser for iOS laced with adware, spyware, members warn ***
---------------------------------------------
Title available since November raises questions about App Store vetting process.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/qB_-ioinSh4/
*** WordPress Subscribe To Comments Reloaded Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/57015
*** Moodle Multiple Security Issues and Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57331
*** Samba smbcacls security bypass ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/91849
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 17-03-2014 18:00 − Dienstag 18-03-2014 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Google's Public DNS Hijacked for 22 Minutes ***
---------------------------------------------
The attackers hijacked the 8.8.8.8/32 DNS server for approximately 22 minutes. According to BGPmon, networks in Brazil and Venezuela were impacted. A screenshot published by the company shows that the traffic was redirected to BT Latin America's networks.
---------------------------------------------
http://news.softpedia.com/news/Google-s-Public-DNS-Hijacked-for-22-Minutes-…
*** Anonymisierung: Sniper-Angriff legt Tor-Nodes lahm ***
---------------------------------------------
Mit einer sogenannten Sniper-Attacke können Angreifer nicht nur gezielt einzelne Tor-Knoten außer Gefecht setzen, sondern innerhalb von wenige Minuten das gesamte Netzwerk lahmlegen. Ein Patch wurde bereits erarbeitet.
---------------------------------------------
http://www.golem.de/news/anonymisierung-sniper-angriff-legt-tor-nodes-lahm-…
*** Scans for FCKEditor File Manager, (Mon, Mar 17th) ***
---------------------------------------------
FCKEditor (now known as CKEditor [1]) is a popular full featured GUI editor many web sites use. For example, you frequently find it with blog systems like WordPress or as part of commenting/forum systems. As an additional feature, a filemanager can be added to allow users to upload images or other files. Sadly, while a very nice and functional plugin, this features if frequently not well secured and can be used to upload malicious files. We have seen some scans probing specifically...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17821&rss
*** Hintergründe des Typo3-Hacks weiter im Dunkeln ***
---------------------------------------------
Die Typo3 Association hat keine Informationen zu der Schwachstelle hinter dem Casino-Spam-Hack, der viele Typo3-Webseiten betrifft, und vermutet, dass der Hack andere Ursachen hat. Seiten ohne Typo-Installation sollen ebenfalls betroffen sein.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Hintergruende-des-Typo3-Hacks-weiter…
*** Hidden Windigo UNIX ZOMBIES are EVERYWHERE ***
---------------------------------------------
Check and wipe: The la-la-la-its-not-happening plan is no good Hackers using a Trojan seized control of over 25,000 Unix servers worldwide to create a potent spam and malware distribution platform.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/03/18/windigo_uni…
*** Threatglass Tool Gives Deep Look Inside Compromised Sites ***
---------------------------------------------
Trying to enumerate the compromised sites on the Internet is a Sisyphian task. Luckily, it's not a task that anyone really needs to perform any longer, especially now that Barracuda Labs has released its new Threatglass tool, a Web-based frontend that allows users to query a massive database of compromised sites to get detailed information...
---------------------------------------------
http://threatpost.com/threatglass-tool-gives-deep-look-inside-compromised-s…
*** March 2014 Security Bulletin Webcast and Q&A ***
---------------------------------------------
Today we published the March 2014 Security Bulletin Webcast Questions & Answers page. We answered eight questions in total, with the majority focusing on the updates for Windows (MS14-016) and Internet Explorer (MS14-012). One question that was not answered on air has been included on the Q&A page.
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/03/17/march-2014-security-bull…
*** When ASLR makes the difference ***
---------------------------------------------
We wrote several times in this blog about the importance of enabling Address Space Layout Randomization mitigation (ASLR) in modern software because it's a very important defense mechanism that can increase the cost of writing exploits for attackers and in some cases prevent reliable exploitation. In today's blog, we'll go through ASLR one more time to show in practice how it can be valuable to mitigate two real exploits seen in the wild and to suggest solutions for programs...
---------------------------------------------
https://blogs.technet.com/b/srd/archive/2014/03/12/when-aslr-makes-the-diff…
*** Red Hat plans unified security management for Fedora 21 ***
---------------------------------------------
One crypto policy to bind them Red Hat is planning a significant change to how its Fedora Linux distribution handles crypto policy, to ship with the due-in-late-2014 Fedora 21 release.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/03/18/red_hat_pla…
*** Open-Xchange AppSuite 7.4.1 / 7.4.2 Cross Site Scripting ***
---------------------------------------------
Topic: Open-Xchange AppSuite 7.4.1 / 7.4.2 Cross Site Scripting Risk: Low Text:Product: Open-Xchange AppSuite Vendor: Open-Xchange GmbH Internal reference: 31065 Vulnerability type: Cross Site Scriptin...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030134
*** Security Advisory-Y.1731 Vulnerability on Some Huawei Switches ***
---------------------------------------------
Y.1731 is an ITU-T recommendation for OAM features on Ethernet-based networks. Y.1731 provides connectivity detection, diagnosis, and performance monitoring for VLAN/VSI services on MANs.
Some Huawei switches support Y.1731 and therefore, has the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches (Vulnerability ID: HWPSIRT-2013-1165).
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** OpenSSH AcceptEnv Wildcard Processing Flaw May Let Remote Authenticated Users Bypass Environment Restrictions ***
---------------------------------------------
http://www.securitytracker.com/id/1029925
*** DSA-2880 python2.7 ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-2880
*** Bugtraq: 2014 World Conference on IST - Madeira Island, April 15-17 ***
---------------------------------------------
The 2014 World Conference on Information Systems and Technologies
---------------------------------------------
http://www.securityfocus.com/archive/1/531513