=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 11-07-2013 18:00 − Freitag 12-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** SQUID 3.3.6 buffer overflow in HTTP request handling ***
---------------------------------------------
This problem allows any trusted client or client script who can
generate HTTP requests to trigger a buffer overflow in Squid,
resulting in a termination of the Squid service.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070089
*** php 5.3.26 heap corruption in the XML parser ***
---------------------------------------------
Badly formed XML might corrupt the heap.
Warning: xml_parse_into_struct(): Maximum depth exceeded - Results truncated
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070090
*** Of TrueType Font Vulnerabilities and the Windows Kernel ***
---------------------------------------------
This months Patch Tuesday security bulletins called attention to vulnerabilities in the Windows kernels font-processing engine, which had been exploited previously in Duqu and other targeted attacks.
---------------------------------------------
http://threatpost.com/of-truetype-font-vulnerabilities-and-the-windows-kern…
*** Critical Patch Update - July 2013 - Pre-Release Announcement ***
---------------------------------------------
This Critical Patch Update Pre-Release Announcement provides advance information about the Oracle Critical Patch Update for July 2013, which will be released on Tuesday, July 16, 2013.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
*** OpenSSH User Enumeration Time-Based Attack ***
---------------------------------------------
Topic: OpenSSH User Enumeration Time-Based Attack Risk: Low Text:Hi List, today, we will show a bug concerning OpenSSH. OpenSSH is the most used remote control software nowadays on *nix li...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070092
*** HP: Neue Hintertüren in Server-Produkten ***
---------------------------------------------
HP hat zugegeben, dass auch die StoreVirtual-Server des Herstellers undokumentierte Hintertüren besitzen. Ein in Kürze erscheinender Patch soll Abhilfe schaffen.
---------------------------------------------
http://www.heise.de/security/meldung/HP-Neue-Hintertueren-in-Server-Produkt…
*** Juniper Junos PIM Packet Handling Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Juniper Junos, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error when handling Protocol-Independent Multicast (PIM) packets and can be exploited to crash the Flow Daemon (flowd) via specially crafted PIM packets that transit the device.
---------------------------------------------
https://secunia.com/advisories/54157
*** How Microsoft handed the NSA access to encrypted messages ***
---------------------------------------------
Secret files show scale of Silicon Valley co-operation on Prism Outlook.com encryption unlocked even before official launch Skype worked to enable Prism collection of video calls Company says it is legally compelled to comply
---------------------------------------------
http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-use…
*** Bugtraq: CVE-2013-3568 - Linksys CSRF + Root Command Injection ***
---------------------------------------------
Hi list, I would like to inform you that the latest available Linksys WRT110 firmware is prone to root shell command injection via cross-site request forgery. This vulnerability is the result of the web interface's failure to sanitize ping targets as well as a lack of csrf tokens.
---------------------------------------------
http://www.securityfocus.com/archive/1/527226
*** Amazons Einkaufshilfe spioniert Nutzer aus ***
---------------------------------------------
Eine von Amazon angebotene Browser-Erweiterung meldet dem Elektronikhändler alle Webseiten, die man ansurft. Die Daten werden zudem an einen Statistikdienst geschickt, der sich besonders für die Google-Nutzung interessiert.
---------------------------------------------
http://www.heise.de/security/meldung/Amazons-Einkaufshilfe-spioniert-Nutzer…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 10-07-2013 18:00 − Donnerstag 11-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Christian Wojner
*** Strange ransomware title pushes surveys, knows Close Encounters tune ***
---------------------------------------------
If your PC's CD tray opens and you hear the iconic, five-note tune from the movie Close Encounters of the Third Kind, it's probably not a visit from aliens. Chances are it's a newly discovered piece of malware with some highly unusual characteristics.
---------------------------------------------
http://arstechnica.com/security/2013/07/strange-ransomware-title-pushes-sur…
*** Google Fixes 17 Flaws in Chrome 28 ***
---------------------------------------------
Google has fixed more than 15 vulnerabilities in Chrome and paid out nearly $35,000 in rewards to security researchers for reporting the bugs. One researcher earned an unusually large reward of $21,500 for a series of vulnerabilities he reported in Chrome.
---------------------------------------------
http://threatpost.com/google-fixes-17-flaws-in-chrome-28/101240
*** How elite security ninjas choose and safeguard their passwords ***
---------------------------------------------
If you felt a twinge of angst after reading Ars' May feature that showed how password crackers ransack even long passwords such as "qeadzcwrsfxv1331", you weren't alone. The upshot was clear: If long passwords containing numbers, symbols, and upper- and lower-case letters are this easy to break, what are users to do?
---------------------------------------------
http://arstechnica.com/security/2013/07/how-elite-security-ninjas-choose-an…
*** Is it Time to Add Vulnerability Wednesday? ***
---------------------------------------------
By now, you've likely seen Google's announcement that they now support a seven-day timeline for disclosure of critical vulnerabilities. Our CTO Raimund Genes believes that seven days is pretty aggressive and that rushing patches often leads to painful collateral damage.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/Kakh3BWekwY/
*** Drupal TinyBox 7.x Cross Site Scripting ***
---------------------------------------------
Topic: Drupal TinyBox 7.x Cross Site Scripting
Risk: Low
Text: View online: https://drupal.org/node/2038807
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070081
*** nginx 1.3.9 / 1.4.0 x86 Brute Force Proof Of Concept ***
---------------------------------------------
Topic: nginx 1.3.9 / 1.4.0 x86 Brute Force Proof Of Concept
Risk: Medium
Text: nginx 1.3.9/1.4.0 x86 brute force remote exploit
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070087
*** Adobe Reader 11.0.03 Insecure Third Party Components ***
---------------------------------------------
Topic: Adobe Reader 11.0.03 Insecure Third Party Components
Risk: High
Text: Hi @ll, the current Adobe Reader 11.0.03 installs the following VULNERABLE (3rd party)
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070086
*** Avira-Update blockiert Browser und E-Mail-Clients ***
---------------------------------------------
Ein Avira-Update der Avira Internet Security verursacht Probleme. Der Internet-Zugang wird blockiert; das Versions-Upgrade scheint mit den Problemen aber nichts zu tun zu haben.
---------------------------------------------
http://www.heise.de/security/meldung/Avira-Update-blockiert-Browser-und-E-M…
*** Debian Security Advisory DSA-2719 poppler ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2719
*** D-Link muss auch Netzwerkkameras absichern ***
---------------------------------------------
Auch D-Links IP-Cams sind über UPnP angreifbar. Ein ganzer Schwung Firmware-Updates soll nun dafür sorgen, dass sich das ändert.
---------------------------------------------
http://www.heise.de/security/meldung/D-Link-muss-auch-Netzwerkkameras-absic…
*** Attackers Targeting MS13-055 IE Vulnerability ***
---------------------------------------------
Attackers are using an Internet Explorer vulnerability, which Microsoft patched yesterday, in targeted attacks that also employ a malicious Flash file installed through a drive-by download launched by compromised Web pages. The exploit that's being used is capable of bypassing both ASLR and DEP.
---------------------------------------------
http://threatpost.com/attackers-targeting-ms13-055-ie-vulnerability/101253
*** New commercially available mass FTP-based proxy-supporting doorway/malicious script uploading application spotted in the wild ***
---------------------------------------------
For many years now, cybercriminals have been efficiency abusing both legitimate compromised and automatically registered FTP accounts (using CAPTCHA outsourcing) in an attempt to monetize the process by uploading cybercrime-friendly 'doorways' or plain simple malicious scripts to be used later on in their campaigns.
---------------------------------------------
http://blog.webroot.com/2013/07/11/new-commercially-available-mass-ftp-base…
*** Bugtraq: Facebook Url Redirection Vuln. ***
---------------------------------------------
By obtaining user-specific hash value, an attacker redirect the user
to a malicious website without asking for verification. The hash value
can be found from the link that the user send to his/her wall. After
clicking on user's link, by setting BurpSuite Proxy, the attacker
intercept the parameters in the methods.
---------------------------------------------
http://www.securityfocus.com/archive/1/527194
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 09-07-2013 18:00 − Mittwoch 10-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Google patches critical Android threat as working exploit is unleashed ***
---------------------------------------------
Bug allows hackers to surreptitiously turn some legit apps into malicious ones.
---------------------------------------------
http://arstechnica.com/security/2013/07/google-patches-critical-android-thr…
*** Summary for July 2013 - Version: 1.1 ***
---------------------------------------------
This bulletin summary lists security bulletins released for July 2013.
With the release of the security bulletins for July 2013, this bulletin summary replaces the bulletin advance notification originally issued July 4, 2013. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-jul
*** Adobe Security Bulletins Posted ***
---------------------------------------------
APSB13-17 Security updates available for Adobe Flash Player
APSB13-18 Security update available for Adobe Shockwave
APSB13-19 Security update: Security Hotfixes available for ColdFusion
---------------------------------------------
http://blogs.adobe.com/psirt/2013/07/adobe-security-bulletins-posted-8.html
*** Who's Behind The Styx-Crypt Exploit Pack? ***
---------------------------------------------
Earlier this week I wrote about the Styx Pack, an extremely sophisticated and increasingly popular crimeware kit that is being sold to help miscreants booby-trap compromised Web sites with malware. Today, Ill be following a trail of breadcrumbs that leads back to central Ukraine and to a trio of friends who appear to be responsible for marketing (if not also making) this crimeware-as-a-service.
---------------------------------------------
https://krebsonsecurity.com/2013/07/whos-behind-the-styx-crypt-exploit-pack
*** Joomla Attachments Shell Upload ***
---------------------------------------------
Topic: Joomla Attachments Shell Upload Risk: High Text: # Exploit Title: Joomla Com_Attachments Component Arbitrary File Upload Vulnerability # Google Dork: inurl:...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070068
*** Cybercriminals spamvertise tens of thousands of fake 'Your Booking Reservation at Westminster Hotel' themed emails, serve malware ***
---------------------------------------------
By Dancho Danchev Cybercriminals are currently mass mailing tens of thousands of fake emails impersonating the Westminster Hotel, in an attempt to trick users into thinking that they've received a legitimate booking confirmation. In reality through, once the socially engineered users execute the malicious attachments, their PCs automatically join the botnet operated by the cybercriminals behind the ..
---------------------------------------------
http://blog.webroot.com/2013/07/10/cybercriminals-spamvertise-tens-of-thous…
*** Priyanka yanks your WhatsApp contact chain on Android mobes ***
---------------------------------------------
If that really is your name, nobody wants to know you right now A worm spreading through the popular WhatsApp messenging platform across Android devices is likely to cause plenty of confusion, even though it doesnt cause much harm.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/07/10/priyanka_wh…
*** Study: Bug bounty programs provide strong value for vendors ***
---------------------------------------------
A study of Googles and Mozillas browser bug programs shows it is money well spent
---------------------------------------------
http://www.csoonline.com/article/736127/study-bug-bounty-programs-provide-s…
*** Datenklau am Automaten: Millionenschaden trotz Milliardeninvestition ***
---------------------------------------------
Im Kampf gegen Datendiebe investieren Banken in bessere Technik. Ganz abhalten lassen sich Kriminelle dadurch nicht: Noch immer k�nnen sie in vielen Staaten mit Daten deutscher Bankkunden an Geld kommen.
---------------------------------------------
http://www.heise.de/security/meldung/Datenklau-am-Automaten-Millionenschade…
*** Scanner warnt vor Android-Lücke ***
---------------------------------------------
Eine kostenlose App soll zeigen, ob ein Android-Gerät von der kürzlich entdeckten Lücke in der Code-Signierungstechnik des Betriebssystems betroffen ist. Die Software stammt von der Firma, die auch den Fehler entdeckt hat.
---------------------------------------------
http://www.heise.de/security/meldung/Scanner-warnt-vor-Android-Luecke-19146…
*** Blog: Security policies: misuse of resources ***
---------------------------------------------
According to surveys conducted in Europe and the United States, company employees spend up to 30% of their working hours on private affairs. By multiplying the hours spent on non-business-related things by the average cost of the working hour, the analysts estimate the costs to companies amounting to millions of dollars a year.
---------------------------------------------
http://www.securelist.com/en/blog/8109/Security_policies_misuse_of_resources
*** Vuln: VLC Media Player CVE-2013-3245 Remote Integer Overflow Vulnerability ***
---------------------------------------------
VLC Media Player CVE-2013-3245 Remote Integer Overflow Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/61032
*** Advanced User Tagging vBulletin Stored XSS Vulnerability ***
---------------------------------------------
Topic: Advanced User Tagging vBulletin Stored XSS Vulnerability Risk: Low Text: # # Exploit Title: Advanced User Tagging vBulletin - Stored XSS Vulnerability # Google Dork: ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070077
*** Preparing For Possible Future Crypto Attacks ***
---------------------------------------------
Security experts warn that current advances in solving a complex problem could make a broad class of public-key crypto systems less secure Security researchers and hackers have always been good at borrowing ideas, refining them, and applying them to create practical attacks out of theoretical results.
---------------------------------------------
http://www.darkreading.com/vulnerability/preparing-for-possible-crypto-atta…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 08-07-2013 18:00 − Dienstag 09-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Root SSH Key Shipping with Emergency Alert System Devices Exposed ***
---------------------------------------------
Firmware images for devices at the core of the Emergency Alert System are shipping with a compromised root SSH key, researchers at IOActive said.
---------------------------------------------
http://threatpost.com/root-ssh-key-shipping-with-emergency-alert-system-dev…
*** Novel ransomware tactic locks users PCs, demands that they participate in a survey to get the unlock code ***
---------------------------------------------
>From managed ransomware as a service 'solutions' to DIY ransomware generating tools, this malicious market segment is as hot as ever with cybercriminals continuing to push new variants, and sometimes, literally introducing novel approaches to monetize locked PCs.
-------------------
http://blog.webroot.com/2013/07/08/novel-ransomware-tactic-locks-users-pcs-…
*** RSA Authentication Manager Lets Local Users View the Administrative Account Password ***
---------------------------------------------
When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace log file.
---------------------------------------------
http://www.securitytracker.com/id/1028742
*** WordPress Search N Save XSS & Path Disclosure ***
---------------------------------------------
These are Cross-Site Scripting and Full path disclosure vulnerabilities. These XSS holes are in ZeroClipboard.swf, which is used in the plugin.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070060
*** Oracle Java Applet Preloader Click-2-Play Warning Bypass ***
---------------------------------------------
The vulnerability is caused by a design error in the Java click-2-play
security warning when the preloader is used, which can be exploited by
remote attackers to load a malicious applet (e.g. taking advantage of
a Java memory corruption vulnerability) without any user interaction
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070067
*** Doctor Web: June virus activity review ***
---------------------------------------------
Despite summer being a holiday season, threats to IT security persisted in June. At the very beginning of the month, Doctor Webs virus analysts discovered a new version of a dangerous Trojan targeting Linux servers, while in the middle of June, another wave of Trojan encoders swept across desktops. Also found was a host of new threats to mobile devices.
---------------------------------------------
http://news.drweb.com/show/?i=3708&lng=en&c=9
*** Spamvertised 'Export License/Invoice Copy' themed emails lead to malware ***
---------------------------------------------
We've just intercepted a currently circulating malicious spam campaign consisting of tens of thousands of fake 'Export License/Invoice Copy' themed emails, enticing users into executing the malicious attachment. Once the socially engineered users do so, their PCs automatically become part of the botnet operated by the cybercriminals behind the campaign.
---------------------------------------------
http://blog.webroot.com/2013/07/09/spamvertised-export-licenseinvoice-copy-…
*** Exploit Code Released For Android Security Hole ***
---------------------------------------------
Pau Oliva Fora, a security researcher for the firm Via Forensics, published a small, proof of concept module that exploits the flaw in the way Android verifies the authenticity of signed mobile applications. The flaw was first disclosed last week by Jeff Forristal, the Chief Technology Officer at Bluebox Security, ahead of a presentation at the Black Hat Briefings in August.
---------------------------------------------
https://securityledger.com/2013/07/exploit-code-released-for-android-securi…
*** [2013-07-09] Denial of service vulnerability in Apache CXF ***
---------------------------------------------
It is possible to execute Denial of Service attacks on Apache CXF, exploiting the fact that the streaming XML parser does not put limits on things like the number of elements, number of attributes, the nested structure of the document received, etc. The effects of these attacks can vary from causing high CPU usage, to causing the JVM to run out of memory.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** HP storage: more possible backdoors ***
---------------------------------------------
LeftHand, StoreVirtual remote reset suggests factory account Technion, the blogger who recently turned up an undocumented back door in HPs StoreOnce, has turned up similar issues in other HP products - publicised on support forums by the company, but unnoticed at the time.
---------------------------------------------
http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/
*** Hard drive-wiping malware that hit South Korea tied to military espionage ***
---------------------------------------------
The hackers responsible for a malware attack in March that simultaneously wiped data from tens of thousands of South Korean computers belong to the same espionage group that has targeted South Korean and US military secrets for four years, researchers said.
---------------------------------------------
http://arstechnica.com/security/2013/07/hard-drive-wiping-malware-that-hit-…
*** Vuln: MongoDB Remote Privilege Escalation Vulnerability ***
---------------------------------------------
MongoDB is prone to a remote privilege-escalation vulnerability.
An attacker can exploit this issue to gain elevated privileges within the application and obtain unauthorized access to the sensitive information.
MongoDB 2.4.0 through 2.4.4 and 2.5.0 are vulnerable; other versions may also be affected.
---------------------------------------------
http://www.securityfocus.com/bid/61007
*** US-Behörde zerstört eigene Hardware aus Angst vor Viren ***
---------------------------------------------
PCs, Bildschirme, Kameras, Mäuse und Tastaturen - eine US-Behörde wollte ihre gesamte IT-Ausstattung verschrotten, weil sie einen massiven Virenbefall befürchtete. Dabei waren wohl nur sechs Rechner betroffen.
---------------------------------------------
http://www.heise.de/security/meldung/US-Behoerde-zerstoert-eigene-Hardware-…
*** Mail-Adressen bei T-Online lassen sich kapern ***
---------------------------------------------
Gelingt es einem Angreifer, sein Opfer in spe auf eine speziell präparierte Internetseite zu locken, kann er dessen Mailadresse bei T-Online dauerhaft übernehmen.
---------------------------------------------
http://www.heise.de/security/meldung/Mail-Adressen-bei-T-Online-lassen-sich…
*** OTRS / OTRS ITSM Unspecified Script Insertion and SQL Injection Vulnerabilities ***
---------------------------------------------
Some vulnerabilities have been reported in OTRS and OTRS ITSM, which can be exploited by malicious users to conduct script insertion and SQL injection attacks.
---------------------------------------------
https://secunia.com/advisories/52623
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 05-07-2013 18:00 − Montag 08-07-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host ***
---------------------------------------------
A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server.
Systems running only HVM guests are not affected.
---------------------------------------------
http://www.securitytracker.com/id/1028740
*** WordPress post.php cross-site scripting ***
---------------------------------------------
WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the post.php script. A remote attacker could exploit this vulnerability using the excerpt and content fields to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85439
*** Debian Security Advisory DSA-2720 icedove ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2720
*** Multiple D-Link Devices - OS-Command Injection via UPnP Interface ***
---------------------------------------------
The vulnerability is caused by missing input validation in different XML parameters. This vulnerability could be exploited to inject and execute arbitrary shell commands.
WARNING: You do not need to be authenticated to the device to insert and execute malicious commands.
---------------------------------------------
http://www.exploit-db.com/exploits/26664
*** OpenNetAdmin Remote Code Execution ***
---------------------------------------------
This exploit works because adding modules can be done without any sort
of authentication.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070055
*** Styx Exploit Pack: Domo Arigato, PC Roboto ***
---------------------------------------------
Not long ago, miscreants who wanted to buy an exploit kit -- automated software that helps booby-trap hacked sites to deploy malicious code -- had to be fairly well-connected, or at least have access to semi-private underground forums. These days, some exploit kit makers are brazenly advertising and offering their services out in the open, marketing their wares as browser vulnerability "stress-test platforms."
---------------------------------------------
https://krebsonsecurity.com/2013/07/styx-exploit-pack-domo-arigato-pc-robot…
*** Debian Security Advisory DSA-2721 nginx ***
---------------------------------------------
buffer overflow
---------------------------------------------
http://www.debian.org/security/2013/dsa-2721
*** What Does Facebook Know About You - An Analysis ***
---------------------------------------------
If you've read a news website, turned on the TV or not been under a rock over the past few weeks, then there is a good chance you've heard of a guy named Edward Snowden. He's the US analyst who is currently stuck in a Russian airport looking for asylum because he exposed that - surprise, surprise - the US government/NSA had been spying on pretty much everyone.
---------------------------------------------
http://daylandoes.com/facebook-and-your-data/
*** 15 MILLION dodgy login attempts spaffed all over Nintendo loyalists ***
---------------------------------------------
Thousands of players plundered for their hard-earned booty Hackers broke into 24,000 Club Nintendo accounts after pummelling the loyalty-reward website in a month-long assault.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/07/08/nintendo_br…
*** Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability ***
---------------------------------------------
Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/50218
*** DropBox account hacking bypassing two-factor authentication ***
---------------------------------------------
Zouheir Abdallah revealed that a hacker already knows the victim's credentials for Dropbox account that has 2FA authentication enabled, is able to hack it.
---------------------------------------------
http://securityaffairs.co/wordpress/15944/hacking/dropbox-account-hacking.h…
*** Spam blizzards sometimes seed malware, AppRiver study warns ***
---------------------------------------------
Digital desperadoes have begun hiding their larcenous activities behind blizzards of spam aimed at their victims inboxes, according to a report released last week by a cloud security provider. The technique, called Distributed Spam Distraction (DSD), began appearing early this year, AppRiver revealed in its Global Threat & Spamscape Report for the first half of 2013.
---------------------------------------------
http://www.techhive.com/article/2043764/spam-blizzards-sometimes-seed-malwa…
*** cPanel cpanellogd Two Privilege Escalation Vulnerabilities ***
---------------------------------------------
cPanel cpanellogd Two Privilege Escalation Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53921
*** FFmpeg Multiple Vulnerabilities ***
---------------------------------------------
FFmpeg Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/54044
*** Several vulnerabilities in third party extensions ***
---------------------------------------------
Several vulnerabilities have been found in the following third-party TYPO3 extensions: accessible_is_browse_results, maag_formcaptcha, meta_feedit, rzautocomplete, sb_folderdownload, sg_zfelib, sg_zlib, tq_seo
---------------------------------------------
http://typo3.org/news/article/several-vulnerabilities-in-third-party-extens…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 04-07-2013 18:00 − Freitag 05-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Bugtraq: Paypal Bug Bounty #102 QR Dev Labs - Auth Bypass Vulnerability ***
---------------------------------------------
An independent vulnerability laboratory researcher discovered an auth bypass web session vulnerability in the PayPal QR Labs Service Web Application.
---------------------------------------------
http://www.securityfocus.com/archive/1/527069
*** phpMyAdmin 4.0.2 Cross Site Scripting ***
---------------------------------------------
Topic: phpMyAdmin 4.0.2 Cross Site Scripting Risk: Low Text:PMASA-2013-6 Announcement-ID: PMASA-2013-6 Date: 2013-06-05 Summary XSS due to unescaped HTML output in Create View p...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070047
*** phpMyAdmin 4.0.4 change the configuration vulnerability ***
---------------------------------------------
Topic: phpMyAdmin 4.0.4 change the configuration vulnerability Risk: Medium Text:PMASA-2013-7 Announcement-ID: PMASA-2013-7 Date: 2013-06-30 Updated: 2013-07-01 Summary Global variable scope inje...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070048
*** EU-Parlament beschließt härtere Strafen für Cyber-Angriffe ***
---------------------------------------------
Mit großer Mehrheit hat das Parlament den Richtlinienentwurf der EU-Kommission über Angriffe auf Informationssysteme verabschiedet.
---------------------------------------------
http://www.heise.de/security/meldung/EU-Parlament-beschliesst-haertere-Stra…
*** Advance Notification Service for July 2013 Security Bulletin Release ***
---------------------------------------------
Today we're providing advance notification for the release of seven bulletins, six Critical and one Important, for July 2013. The Critical bulletins address vulnerabilities in Microsoft Windows, .NET Framework, Silverlight, Internet Explorer and GDI+. Also scheduled for inclusion among these Critical bulletins is an update to address CVE-2013-3660, which is a publicly known issue in the Kernel-Mode Drivers component of Windows. The Important-rated bulletin will address an issue in...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/07/04/advance-notification-ser…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 03-07-2013 18:00 − Donnerstag 04-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Alstom Grid S1 Agile Improper Authorization ***
---------------------------------------------
This advisory provides mitigation details for a vulnerability affecting the Alstom Grid MiCOM S1 Agile and S1 Studio Software.Note: Alstom Grid MiCOM S1 Studio Software is its own software suite. A user could have MiCOM S1 Studio Software from a different vendor. This advisory only addresses the Alstom software product.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-184-01
*** Security Bulletin: IBM Business Process Manager (BPM) Vulnerable URLs (CVE-2013-0581) ***
---------------------------------------------
When a dashboard is opened or a service is executed, a malicious attacker can intercept network requests from the client. Then, the attacker can modify the URL parameters of the request so that malicious code can be executed within the client browser. CVE(s): CVE-2013-0581 Affected product(s) and affected version(s): IBM Business Process Manager Standard Versions 7.5.1.x, 8.0.0.x, 8.0.1.x IBM Business Process Manager Express Versions 7.5.1.x,8.0.0.x, 8.0.1.x IBM Business Process Manager
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Deceptive ads targeting German users lead to the W32/SomotoBetterInstaller Potentially Unwanted Application (PUA) ***
---------------------------------------------
By Dancho Danchev We've just intercepted yet another campaign serving deceptive ads, this time targeting German-speaking users into downloading and installing the privacy-invading "FLV Player" Potentially Unwanted Application (PUA), part of Somoto's pay-per-install network. More details: ...
---------------------------------------------
http://blog.webroot.com/2013/07/03/deceptive-ads-targeting-german-users-lea…
*** IBM AIX TFTP RBAC Bug Lets Remote Authenticated Users Read and Overwrite Root-Owned Files ***
---------------------------------------------
A vulnerability was reported in IBM AIX. A remote authenticated user can read and overwrite files on the target system with root privileges.
---------------------------------------------
http://www.securitytracker.com/id/1028728
*** Androids Code-Signatur lässt sich umgehen ***
---------------------------------------------
Ein junges US-Sicherheitsunternehmen will einen Android-Fehler entdeckt haben, der das Einschleusen beliebigen Codes in signierte App-Pakete erlaubt, ohne die Signatur zu brechen.
---------------------------------------------
http://www.heise.de/security/meldung/Androids-Code-Signatur-laesst-sich-umg…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 02-07-2013 18:00 − Mittwoch 03-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cybercriminals experiment with Tor-based C&C, ring-3-rootkit empowered, SPDY form grabbing malware bot ***
---------------------------------------------
By Dancho Danchev Keeping in pace with the latest and most widely integrated technologies, with the idea to abuse them in a fraudulent/malicious way, is an everyday reality in today’s cybercrime ecosystem that continues to be over-supplied with modified and commoditized malicious software. This is achieved primarily through either leaked source code or a slightly different set of 'common'...
---------------------------------------------
blog.webroot.com/2013/07/02/cybercriminals-experiment-with-tor-based-cc-rin…
*** DSA-2718 wordpress ***
---------------------------------------------
Several vulnerabilities were identified in WordPress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the wordpress package to the latest upstream version instead of backporting the patches.
This means extra care should be taken when upgrading, especially when using third-party plugins or themes, since compatibility may have been impacted along the way. We recommend that users check their install before doing the upgrade.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2718
*** Apple Mac OS X Multiple Vulnerabilities ***
---------------------------------------------
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.
The vulnerabilities are caused due to a bundled version of QuickTime.
---------------------------------------------
https://secunia.com/advisories/54049
*** Vulnerabilities in multiple WordPress Plugins ***
---------------------------------------------
https://secunia.com/advisories/52958https://secunia.com/advisories/54018https://secunia.com/advisories/54035https://secunia.com/advisories/54048
*** Vuln: Multiple Vendors Multiple EAS Devices Private SSH Key Information Disclosure Vulnerability ***
---------------------------------------------
Multiple Vendors Multiple EAS Devices are prone to an information-disclosure vulnerability.
Remote attackers can exploit this issue to gain access to the root SSH private key.
---------------------------------------------
http://www.securityfocus.com/bid/60810
*** Vuln: ansible paramiko_ssh.py Security Bypass Vulnerability ***
---------------------------------------------
ansible is prone to a security-bypass vulnerability.
An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions.
---------------------------------------------
http://www.securityfocus.com/bid/60869
*** Rampant Apache website attack hits visitors with highly malicious software ***
---------------------------------------------
Darkleech is back. Or maybe it never left. Either way, its a growing problem.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/e7uQIRcAY78/
*** Bugtraq: Multiple Vulnerabilities in OpenX ***
---------------------------------------------
High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in OpenX, which can be exploited to execute arbitrary PHP code, perform Cross-Site Scripting (XSS) attacks and compromise vulnerable system.
---------------------------------------------
http://www.securityfocus.com/archive/1/527051
*** Sony Multiple Network Cameras Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in multiple Sony Network Cameras, which can be exploited by malicious people to conduct cross-site forgery attacks.
The device allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. create a user with administrative privileges when a logged-in administrative user visits a specially crafted web page.
---------------------------------------------
https://secunia.com/advisories/53758
*** MachForm Form Maker 2 view.php file upload ***
---------------------------------------------
MachForm Form Maker2 could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions by the view.php script. By sending a specially-crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious PHP script, which could allow the attacker to execute arbitrary PHP code on the vulnerable system.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85386
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 01-07-2013 18:00 − Dienstag 02-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Bugtraq: [SECURITY] CVE-2013-1777: Apache Geronimo 3 RMI classloader exposure ***
---------------------------------------------
A misconfigured RMI classloader in Apache Geronimo 3.0 may enable an attacker to send a serialized object via JMX that could compromise the system.
---------------------------------------------
http://www.securityfocus.com/archive/1/527022
*** Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities ***
---------------------------------------------
Topic: Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities Risk: Low Text:Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities Vendor: Barracuda Networks, Inc. Product web ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070014
*** Hackers Aggressively Scanning ICS, SCADA Default Credentials, Vulnerabilities ***
---------------------------------------------
Attacks against industrial control systems and SCADA equipment are progressing beyond automated scans for vulnerabilities or default credentials hitting honeypots, and are leading to service disruptions.
---------------------------------------------
http://threatpost.com/hackers-aggressively-scanning-ics-scada-default-crede…
*** Bugtraq: Linksys EA - 2700, 3500, 4200, 4500 w/ Lighttpd 1.4.28 Unauthenticated Remote Administration Access ***
---------------------------------------------
- Unauthenticated remote access to all pages of the router
administration GUI, bypassing any credential prompts under certain
common configurations (see below)
- Direct access to several other critical files, unauthenticated as well
---------------------------------------------
http://www.securityfocus.com/archive/1/527027
*** Symantec Security Information Manager Console Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Symantec Security Information Manager, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to disclose sensitive information and conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53990
*** IBM Rational Automation Framework Java JSSE Denial of Service Vulnerability ***
---------------------------------------------
IBM has acknowledged a vulnerability in IBM Rational Automation Framework, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54034
*** IBM Sterling B2B Integrator / IBM Sterling File Gateway Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in IBM Sterling B2B Integrator and IBM Sterling File, where one has an unknown impact and others can be exploited by malicious users to conduct SQL injection attacks, disclose certain sensitive information, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53850
*** HPSBHF02888 rev.1 - HP ProCurve, H3C, 3COM Routers and Switches, Remote Information Disclosure and Code Execution ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP, 3COM, and H3C routers and switches. The vulnerabilities could be remotely exploited resulting in disclosure of information and execution of code.
---------------------------------------------
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Cisco TC Software SIP Implementation Error May Affect Communications Integrity ***
---------------------------------------------
A vulnerability in the Session Initiation Protocol (SIP) implementation used in TC Software could allow an unauthenticated, remoteattacker to cause an endpoint to process unintended SIP NOTIFY messages.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** TRENDnet Multiple Products Security Bypass Security Issue ***
---------------------------------------------
A security issue has been reported in multiple TRENDnet products, which can be exploited by malicious users to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/53926
*** HTTPS Side-Channel Attack A Tool For Encrypted Secret Theft ***
---------------------------------------------
Researchers to release details on how SSL vulnerability gives attackers ability to steal everything from OAuth tokens to PII through an enterprise app in just 30 seconds.
---------------------------------------------
http://www.darkreading.com/vulnerability/https-side-channel-attack-a-tool-f…
*** IBM Storwize V7000 Unified Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Storwize V7000 Unified, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54036
*** HP-UX update for Java ***
---------------------------------------------
HP has issued an update for Java in HP-UX. This fixes multiple vulnerabilities which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53999https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Fortinet FortiOS (FortiGate) Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Fortinet FortiOS (FortiGate), which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53996
*** Hacker Holes in Server Management System Allows ‘Almost-Physical’ Access ***
---------------------------------------------
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out. The vulnerabilities exist in more than 100,000 servers connected ...
---------------------------------------------
http://www.wired.com/threatlevel/2013/07/ipmi/
*** HP-UX update for Apache with Tomcat Servlet Engine ***
---------------------------------------------
HP has issued an update for Apache with Tomcat Servlet Engine. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53989
*** Alcatel-Lucent OmniTouch Multiple Products Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been reported in multiple Alcatel-Lucent OmniTouch products, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/54000
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-06-2013 18:00 − Montag 01-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** How cybercriminals create and operate Android-based botnets ***
---------------------------------------------
By Dancho Danchev On their way to acquire the latest and coolest Android game or application, end users with outdated situational awareness on the latest threats facing them often not only undermine the confidentiality and integrity of their devices, but also, can unknowingly expose critical business data to the cybercriminals who managed to infect their...
---------------------------------------------
http://blog.webroot.com/2013/06/28/how-cybercriminals-create-and-operate-an…
*** Fortigate Firewall Cross Site Request Forgery ***
---------------------------------------------
Topic: Fortigate Firewall Cross Site Request Forgery Risk: Low Text:Vulnerability ID: CVE-2013-1414 Vulnerability Type: CSRF (Cross-Site Request Forgery) Product: All Fortigate Firewalls Vendo...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060241
*** Several Flaws Discovered in ZRTPCPP Library Used in Secure Phone Apps ***
---------------------------------------------
A security researcher has uncovered a number of serious vulnerabilities in one of the core security components of several secure telephony applications, including the Silent Circle system developed by PGP creator Phil Zimmermann.
---------------------------------------------
http://threatpost.com/several-flaws-discovered-in-zrtpcpp-library-used-in-s…
*** NIST Cybersecurity Framework, (Sun, Jun 30th) ***
---------------------------------------------
The NIST has published a voluntary framework to reduce cyber risk to critical infrastructure as a result of a directive inside the Presidents execute order for improving critical infrastructure cybersecurity. The core of this framework is composed of a function matrix and a framework implementation level matrix. The function matrix contains the five top-level cybersecurity functions, which are: Know: Gaining the institutional understanding to identify what systems need to be protected,...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16093
*** Backdoor Discovered In Atlassian Crowd ***
---------------------------------------------
An anonymous reader writes "Recently published on the Command Five website is a technically detailed threat advisory (PDF) in relation to a recurring vulnerability in Atlassian Crowd. Tucked away inconspicuously at the end of this document in a section entitled Unpatched Vulnerabilities is the real security bombshell: Atlassians turnkey solution for enterprise single sign-on and secure user authentication contains an unpatched backdoor. The backdoor allows anyone to remotely take full...
---------------------------------------------
http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlass…
*** Xorbin Multiple Products "widgetUrl" Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in multiple Xorbin products, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53979
*** IBM Tivoli Composite Application Manager for Transactions OpenSSL Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Tivoli Composite Application Manager for Transactions, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/54029
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-06-2013 18:00 − Freitag 28-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Apache XML Security, which can be exploited by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53959
*** April-June 2013 ***
---------------------------------------------
The “ICS-CERT Monitor” newsletter offers a means of promoting preparedness, information sharing, and collaboration with the 16 critical infrastructure sectors. ICS‑CERT accomplishes this on a day-to-day basis through sector briefings, meetings, conferences, and information product releases.
---------------------------------------------
http://ics-cert.us-cert.gov/monitors/ICS-MM201306
*** Citadel Trojan Variant Delivers Localized Content, Targets Amazon Customers ***
---------------------------------------------
A new variant of the Citadel banking malware was discovered, this one delivering localized content for European targets that include not only banks but major ecommerce sites such as Amazon.
---------------------------------------------
http://threatpost.com/citadel-trojan-variant-delivers-localized-content-tar…
*** One-click/key attack forces IE and Chrome to execute malicious code ***
---------------------------------------------
Minimal user interaction increases chances that social engineering will succeed.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/siZrFBsO_0E/
*** Ruby Certificate Hostname Validation Flaw Lets Remote Users Spoof SSL Servers ***
---------------------------------------------
A vulnerability was reported in Ruby. A remote user can spoof SSL servers.
---------------------------------------------
http://www.securitytracker.com/id/1028714
*** Bugtraq: Mobile USB Drive HD 1.2 - Arbitrary File Upload Vulnerability ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the Mobile USB Drive HD v1.2 apple iOS application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526997
*** Bugtraq: eFile Wifi Transfer Manager 1.0 iOS - Multiple Vulnerabilities ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the eFile Wifi Manager v1.0 iOS mobile application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526995
*** Bugtraq: Re: Re: EMC Avamar: World writable cache files ***
---------------------------------------------
Due to a vulnerability, described in detail below, the Avamar client leaves certain directories and files as world writable. The presence of world writable directories and files may inadvertently result in elevation of privileges by a user who has access to the local file system.
---------------------------------------------
http://www.securityfocus.com/archive/1/526996
*** Bugtraq: Barracuda CudaTel 2.6.02.04 - Multiple Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526999http://www.securityfocus.com/archive/1/527000
*** Xerox WorkCube / Xerox ColorQube Unspecified Vulnerabilities ***
---------------------------------------------
Some vulnerabilities with an unknown impact have been reported in Xerox WorkCube and Xerox ColorQube.
---------------------------------------------
https://secunia.com/advisories/54005
*** Criminals sell access to rooted servers via online shop ***
---------------------------------------------
Researchers have discovered an online store where criminals sell access to hacked servers, another cautionary example of miscreants commercialization of stolen data.
---------------------------------------------
http://www.scmagazine.com//criminals-sell-access-to-rooted-servers-via-onli…
*** Cisco ASA Next-Generation Firewall Services Fragmented Traffic Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Cisco ASA Next-Generation Firewall Services, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53971
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 26-06-2013 18:00 − Donnerstag 27-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Windows 8.1: Defender mit Verhaltenserkennung ***
---------------------------------------------
Mit dem kommenden Windows-Upgrade rüstet Microsoft zahlreiche Security-Features nach. Einige sind längst überfällig, andere innovativ. Auf der TechEd Europe ging das Unternehmen ins Detail.
---------------------------------------------
http://www.heise.de/security/meldung/Windows-8-1-Defender-mit-Verhaltenserk…
*** Styx Exploit Kit Takes Advantage of Vulnerabilities ***
---------------------------------------------
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits target vulnerabilities in popular applications and provide an effective way for cybercriminals to distribute malware. We have already discussed Red Kit, a common exploit kit. Recently McAfee Labs has observed an increase in the prevalence Read more...
---------------------------------------------
http://blogs.mcafee.com/mcafee-labs/styx-exploit-kit-takes-advantage-of-vul…
*** Attackers sign malware using crypto certificate stolen from Opera Software ***
---------------------------------------------
A "few thousand" users may have automatically installed malware signed by expired cert.
---------------------------------------------
http://arstechnica.com/security/2013/06/attackers-sign-malware-using-crypto…
*** Gezielter Phishing-Angriff auf Eset-Kunden ***
---------------------------------------------
Kunden des Antiviren-Software-Herstellers Eset erhalten momentan sehr gut gemachte Phishing-Mails, mit denen Kreditkartendaten geklaut werden sollen.
---------------------------------------------
http://www.heise.de/security/meldung/Gezielter-Phishing-Angriff-auf-Eset-Ku…
*** Analysis: Redirects in Spam ***
---------------------------------------------
We will look at the most popular spammer tricks that use redirects and the most widely used types of redirect.
---------------------------------------------
http://www.securelist.com/en/analysis/204792295/Redirects_in_Spam
*** Top 5 Fake Security Rogues of 2013 ***
---------------------------------------------
By Tyler Moffitt We see users on the internet getting infected with Rogue Security Malware all the time. In fact, it's one of the most common and obvious type of infections we see. The Rogues lock-down your computer and prevent you from opening any applications so you're forced to read their scam.
---------------------------------------------
http://blog.webroot.com/2013/06/27/top-5-fake-security-rogues-of-2013/
*** Magnolia CMS multiple security bypass ***
---------------------------------------------
Magnolia CMS could allow a remote attacker to bypass security restrictions, caused by improper verification of access permissions. An attacker could exploit this vulnerability by accessing and executing multiple administrative functionalities to bypass security and gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85252
*** Drupal 7.x Fast Permissions Administration Access bypass ***
---------------------------------------------
The Fast Permissions Administration module enables you to use inline filters on the permissions page, as well as loading the permissions form through a modal dialog. The module doesn't sufficiently check user access for the modal content callback, allowing unauthorized access to the permissions edit form.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060226
*** Bugtraq: HP-UX Running HP Secure Shell, Remote Denial of Service (DoS) ***
---------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
---------------------------------------------
http://www.securityfocus.com/archive/1/526986
*** Multiple Vulnerabilities in Cisco Web Security Appliance ***
---------------------------------------------
Cisco IronPort AsyncOS Software for Cisco Web Security Appliance is affected by the following vulnerabilities:
- Two authenticated command injection vulnerabilities
- Management GUI Denial of Service Vulnerability
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 25-06-2013 18:00 − Mittwoch 26-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cisco Linksys X3000 Router apply.cgi cross-site scripting ***
---------------------------------------------
Cisco Linksys X3000 Router is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the apply.cgi script. A remote attacker could exploit this vulnerability using the...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85186
*** Vast majority of malware attacks spawned from legit sites ***
---------------------------------------------
Drive-by attacks not just from porn and warez sites, new Google data shows.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/_ndPPR-K7Z4/
*** Google adds malware, phishing to transparency report to make the Web safer ***
---------------------------------------------
The data come from the companys Safe Browsing technology, which flags up to 10,000 sites daily
---------------------------------------------
http://www.csoonline.com/article/735463/google-adds-malware-phishing-to-tra…
*** Forticlient VPN client credential interception vulnerability ***
---------------------------------------------
Topic: Forticlient VPN client credential interception vulnerability Risk: Medium Text:FORTICLIENT VPN CLIENT CREDENTIAL INTERCEPTION VULNERABILITY == Description -- The Fortinet FortiClient ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060220
*** aSc TimeTables Add Subject buffer overflow ***
---------------------------------------------
aSc TimeTables is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Add Subject functionality. A remote authenticated attacker could exploit this vulnerability using a...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85199
*** IBM OpenPages GRC Platform Multiple Java Vulnerabilities ***
---------------------------------------------
Where: From remote
Impact: Spoofing, Manipulation of data, Exposure of sensitive information, DoS, System access
Solution Status: Unpatched
---------------------------------------------
https://secunia.com/advisories/53962
*** Bugtraq: [SECURITY] [DSA 2716-1] iceweasel security update ***
---------------------------------------------
Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser: Multiple memory safety errors,...
The iceweasel version in the oldstable distribution (squeeze) is no
longer supported with security updates.
---------------------------------------------
http://www.securityfocus.com/archive/1/526973
*** Apache Qpid Python Client SSL Certificate Verification Security Issue ***
---------------------------------------------
A security issue has been reported in Apache Qpid, which can be exploited by malicious people to conduct spoofing attacks.
---------------------------------------------
https://secunia.com/advisories/53968
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 24-06-2013 18:00 − Dienstag 25-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Latest Pushdo Variants Challenge Antimalware Solution ***
---------------------------------------------
Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other tricks. However, hiding the network traffic specifically from monitoring outside an infected computer is not an easy task, but is something that the botnet creators have improved through the years.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/latest-pushdo-va…
*** Backdoor in Backup-Servern von HP ***
---------------------------------------------
Einem Hacker zufolge besitzt die Software auf den Backup-Systemen der Serie "StoreOnce" von HP eine Hintertür. Zur Ausnutzung der Lücke soll ein SSH-Zugang ausreichen.
---------------------------------------------
http://www.heise.de/security/meldung/Backdoor-in-Backup-Servern-von-HP-1895…
*** Raspberry Pi bot tracks hacker posts to vacuum up passwords and more ***
---------------------------------------------
Dumpmon scours Twitter for sensitive data hiding in plain site.
---------------------------------------------
http://arstechnica.com/security/2013/06/raspberry-pi-bot-tracks-hacker-post…
*** Trend Micro turns RAT catcher as Taiwan cops cuff hacker ***
---------------------------------------------
Ghost RAT attacks hit thousands on the island... Security vendor Trend Micro has embiggened its industry collaboration credentials this week after helping Taiwanese police arrest one man in connection with a widespread targeted attack, and teaming up with Interpol on a new cyber crime prevention centre.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/25/trend_micro…
*** SIP-based API-supporting fake caller ID/SMS number supporting DIY Russian service spotted in the wild ***
---------------------------------------------
By Dancho Danchev One of the most common myths regarding the emerging TDoS (Telephony Denial of Service) market segment, portrays a RBN (Russian Business Network) type of bulletproof infrastructure used to launch these attacks. The infrastructure's speculated resilience is supposed to be acting as a foundation for the increase of TDoS services and products.
---------------------------------------------
http://blog.webroot.com/2013/06/25/sip-based-api-supporting-fake-caller-ids…
*** Scam Sites Now Selling Instagram Followers ***
---------------------------------------------
Another scam site is offering to increase a user's Instagram followers. Unlike previous attacks, however, these sites require payment with the amount depending on the number of followers you prefer. Figure 1. Pricelist for Instagram followers Despite the sitess liberal use of the Instagram logo, it has nothing to do with the service.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/scam-sites-now-s…
*** Download me - Saying "yes" to the Web's most dangerous search terms ***
---------------------------------------------
Seeking "free games" and getting burned by illicit downloads is so 2008, right?
---------------------------------------------
http://arstechnica.com/information-technology/2013/06/download-me-saying-ye…
*** LG-Smartphones: Root-Zugriff durch Backup-Programm ***
---------------------------------------------
Android-Smartphones der Firma LG können durch Sicherheitslücken in ihrer vorinstallierten Backup-Software manipuliert werden.
---------------------------------------------
http://www.heise.de/security/meldung/LG-Smartphones-Root-Zugriff-durch-Back…
*** Carberp Source Code Leaked ***
---------------------------------------------
The source code for the Carberp Trojan, which typically sells for $40,000 on the underground, has been leaked and is now available to anyone who wants it. The leak has echoes of the release of the Zeus crimeware source code a couple of years ago and has security researchers concerned that it may lead to [...]
---------------------------------------------
http://threatpost.com/carberp-source-code-leaked/
*** Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ***
---------------------------------------------
A security issue and a vulnerability have been reported in the Login Security module for Drupal, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53717
*** cURL/libcURL curl_easy_unescape() function buffer overflow ***
---------------------------------------------
cURL/libcURL is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the curl_easy_unescape() function in lib/escape.c. While decoding URL encoded strings to raw binary data, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85180
*** MoinMoin twikidraw Action Traversal File Upload ***
---------------------------------------------
This module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files.
---------------------------------------------
http://www.exploit-db.com/exploits/26422
*** [2013-06-25] Multiple vulnerabilities in IceWarp Mail Server ***
---------------------------------------------
IceWarp Mail Server is vulnerable to reflected Cross-Site Scripting and XXE Injection attacks. By exploiting the XXE vulnerability, an unauthenticated attacker can get read access to the filesystem of the IceWarp Mail Server host and thus obtain sensitive information such as the configuration files.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** Stream Video Player plugin for WordPress cross site request forgery ***
---------------------------------------------
Stream Video Player plugin for WordPress is vulnerable to an unspecified cross-site request forgery. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify plugin settings and perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85155
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 21-06-2013 18:00 − Montag 24-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Tausende Domains ***
---------------------------------------------
Die Adressen verschiedener Dienste wie LinkedIn, Yelp oder Fidelity wurden durch einen menschlichen Fehler für mehrere Stunden auf andere Webseiten umgeleitet. Cisco geht von 5000 betroffenen Domains aus.
---------------------------------------------
http://www.heise.de/security/meldung/Tausende-Domains-1894195.html
*** Dirt Jumper DDoS Variant Drive 'Much More Powerful' Than Predecessors ***
---------------------------------------------
A variant of the Dirt Jumper DDoS engine called Drive has been detected. Drive includes new capabilities and has already targeted a number popular destinations on the Internet.
---------------------------------------------
http://threatpost.com/dirt-jumper-ddos-variant-drive-much-more-powerful-tha…
*** Security Bulletin: WebSphere Commerce Java API Documentation Frame Injection Vulnerability (CVE-2013-1571) ***
---------------------------------------------
Java API Documentation contains a frame injection vulnerability.
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_web…
*** WordPress Maintenance Mode Plugin Cross-site request forgery vulnerability ***
---------------------------------------------
WordPress Maintenance Mode Plugin Cross-site request forgery vulnerability
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85146
*** Adobe Flash spoof leads to infectious audio ads ***
---------------------------------------------
We've seen quite a few audio ads infecting users recently. We think it's a good idea to go over an in-depth look at how they infect your computer and how to remediation them. As you can see in this first picture, this is another Adobe Flash spoof that launches its signature update window.
---------------------------------------------
http://blog.webroot.com/2013/06/21/adobe-flash-spoof-leads-to-infectious-au…
*** Device-disabling Fake AV migrates to Android phones, demands ransom ***
---------------------------------------------
Long the bane of computer users, Fake antivirus may extort Android owners, too.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/esDZHzGloyI/
*** Google Translate Cross Site Request Forgery ***
---------------------------------------------
1)Vulnerability Description
I discovered a new CSRF vulnerability on translate.google.com web site which could allow an attacker to insert items (Words/Phrases/Urls and related translations) into the user's Phrasebook. Furthermore an attacker could also inserta potentially malicious Urls - into the
above mentioned Phrasebook - towards which the victim could be redirected simply clicking on the "Go to <website>" right-click option on translate.google.com.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060181
*** McAfee ePolicy Orchestrator 4.6.5 SQL injection & directory traversal ***
---------------------------------------------
Main Features:
Remote command execution on the ePo server.
Remote command execution on the Managed stations (one ring to rule them all).
File upload on the ePo server.
Active Directory credentials stealing.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060183
*** Datenpanne bei Facebook ***
---------------------------------------------
Nicht-öffentliche Telefonnummern und E-Mai-Adressen von ungefähr sechs Millionen Facebook-Usern wurden fälschlich an andere Facebook-Nutzer weitergegeben.
---------------------------------------------
http://www.heise.de/security/meldung/Datenpanne-bei-Facebook-1894855.html
*** Vuln: HAProxy CVE-2013-2175 Multiple Denial of Service Vulnerabilities ***
---------------------------------------------
HAProxy is prone to multiple denial-of-service vulnerabilities.
Exploiting these issues allow remote attackers to trigger denial-of-service conditions.
---------------------------------------------
http://www.securityfocus.com/bid/60588
*** Is SSH no more secure than telnet?, (Sun, Jun 23rd) ***
---------------------------------------------
In SSHs default (and most common) deployment: Yes. It is no more secure than telnet, but it can be better. Apologies to Ian Betteridge If you ask any sysadmin, they say that SSH is more secure than telnet, and theyll likely comment that opening telnet up to the Internet is reckless. One can simulate asking general opinion with a little googling: "ssh is more secure than telnet": 11,500 "telnet is more secure than ssh": 81 So, the Conventional Wisdom is that
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16049&rss
*** ZPanel 10.0.0.2 htpasswd Module Username Command Execution ***
---------------------------------------------
This module exploits a vulnerability found in ZPanel's htpasswd module. When creating .htaccess using the htpasswd module, the username field can be used to inject system commands, which is passed on to a system() function for executing the system's htpasswd's command.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060193
*** Bugtraq: Linksys X3000 - Multiple Vulnerabilities ***
---------------------------------------------
The vulnerability is caused by missing input validation in the ping_ip parameter and can be exploited to inject and execute arbitrary shell commands.
You need to be authenticated to the device or you have to find other methods for inserting the malicious commands.
---------------------------------------------
http://www.securityfocus.com/archive/1/526945
*** Wordpress: Update schließt zwölf Sicherheitslücken ***
---------------------------------------------
Mit dem Update auf Version 5.3.2 schließt Wordpress Schwachstellen, die mit Cross-Site-Scripting, Server-Side-Request-Forgery- und Denial-of-Service-Attacken ausgenutzt werden können.
---------------------------------------------
http://www.heise.de/security/meldung/Wordpress-Update-schliesst-zwoelf-Sich…
*** Beware Of HTML5 Development Risks ***
---------------------------------------------
Local storage is a big change from HTML of the past, where browsers could only use cookies to store small bits of information, such as session tokens, for managing identity. HTML5 changes this with sessionStorage, localStorage, and client-side databases to allow developers to store vast amounts of data in the browser that is all accessible from JavaScript.
---------------------------------------------
http://www.darkreading.com/applications/beware-of-html5-development-risks/2…
*** Apple Phishing Scams on the Rise ***
---------------------------------------------
Apple has one of the more gilded consumer brands and the company spends a lot of time and money to keep it that way. Consumers love Apple. Scammers and attackers do too, though, and security researchers in recent months have seen a major spike in the volume of phishing emails abusing Apple's brand, most of which are focused on stealing users' Apple IDs and payment information.
---------------------------------------------
https://threatpost.com/apple-phishing-scams-on-the-rise/
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 20-06-2013 18:00 − Freitag 21-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Common Web Vulnerabilities Plague Top WordPress Plug-Ins ***
---------------------------------------------
Top WordPress plug-ins and themes remain vulnerable to common Web-based attacks such as cross-site scripting and SQL injection.
---------------------------------------------
http://threatpost.com/common-web-vulnerabilities-plague-top-wordpress-plug-…
*** New E-Shop sells access to thousands of malware-infected hosts, accepts Bitcoin ***
---------------------------------------------
By Dancho Danchev Thanks to the buzz generated over the widespread adoption of the decentralized P2P based E-currency, Bitcoin, we continue to observe an overall increase in international underground market propositions that accept it as means for fellow cybercriminals to pay for the goods/services that they want to acquire.
---------------------------------------------
http://blog.webroot.com/2013/06/20/new-e-shop-sells-access-to-thousands-of-…
*** Trojan.APT.Seinup Hitting ASEAN ***
---------------------------------------------
The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.
---------------------------------------------
http://www.fireeye.com/blog/technical/malware-research/2013/06/trojan-apt-s…
*** PoisonIvy Uses Legitimate Application as Loader ***
---------------------------------------------
I recently obtained a PoisonIvy sample which uses a legitimate application in an effort to stay under the radar. In this case, the PoisonIvy variant detected as BKDR_POISON.BTA (named as newdev.dll) took advantage of a technique known as a DLL preloading attack (aka binary planting) instead of exploiting previously known techniques. The malware was located [...]
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/C9_ZJyLJ1YA/
*** WordPress Slash WP theme XSS and Content Spoofing vulnerabilities ***
---------------------------------------------
Topic: WordPress Slash WP theme XSS and Content Spoofing vulnerabilities Risk: Low Text:I want to warn you about multiple vulnerabilities in Slash WP theme for WordPress. This is commercial theme for WP. These ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060173
*** BSI nimmt WordPress, Typo3 & Co. unter die Security-Lupe ***
---------------------------------------------
Das Bundesamt für Sicherheit in der Informationstechnologie hat im Rahmen einer Studie das Sicherheitsniveau der gängigen Content Management Systeme analysiert. Die Gefahr geht demnach zu bis zu 95 Prozent von Add-Ons aus.
---------------------------------------------
http://www.heise.de/security/meldung/BSI-nimmt-WordPress-Typo3-Co-unter-die…
*** Login Security module for Drupal soft blocking security bypass ***
---------------------------------------------
Login Security module for Drupal could allow a remote attacker to bypass security restrictions, caused by incorrect use of string filtering. When the soft blocking option is disabled, an attacker could exploit this vulnerability to gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85135
*** OpenStack python-keystoneclient memcache signing/encryption security bypass ***
---------------------------------------------
OpenStack python-keystoneclient could allow a remote attacker to bypass security restrictions, caused by an error in the memcache signing/encryption feature. An attacker could exploit this vulnerability by inserting malicious data to the memcache backend to bypass security and gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85139
*** Is Hotel WiFi Secure? ***
---------------------------------------------
When you check in to a hotel, you assume that the company will keep you and your valuables safe by not sharing your room keys and providing a safe for your belongings. But a much greater threat could be lurking in your rented room - the free WiFi connection that most lodging providers offer.
---------------------------------------------
http://blog.hotspotshield.com/2013/06/17/hotel-wifi-security/
*** Avaya Aura Session Manager ISC BIND Record Handling Lockup Vulnerability ***
---------------------------------------------
Avaya has acknowledged a vulnerability in Avaya Aura Session Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53906
*** Hitachi Cosminexus Products Oracle Java Multiple Vulnerabilities ***
---------------------------------------------
Hitachi has acknowledged multiple vulnerabilities in multiple Cosminexus products, which can be exploited by malicious, local users to disclose certain sensitive information, manipulate certain data, and gain escalated privileges and by malicious people to conduct spoofing attacks, disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53759
*** How to backdoor an encryption app ***
---------------------------------------------
Over the past week or so theres been a huge burst of interest in encryption software. Applications like Silent Circle and RedPhone have seen a major uptick in new installs. CryptoCat alone has seen a zillion new installs, prompting several infosec researchers to nearly die of irritation.
---------------------------------------------
http://blog.cryptographyengineering.com/2013/06/how-to-backdoor-encryption-…
*** Hackers and viruses now stalking smart phones ***
---------------------------------------------
Computer viruses have plagued consumers for many years now, causing companies to spend heavily on installing every kind of firewall known to mankind to keep their security software updated.
---------------------------------------------
http://www.nation.co.ke/oped/Opinion/Hackers-and-viruses-now-stalking-smart…
*** Buffalo WZR-HP-G300NH2 Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Buffalo WZR-HP-G300NH2, which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53750
*** Oracle Solaris Multiple Vulnerabilities ***
---------------------------------------------
Oracle has acknowledged multiple vulnerabilities in multiple packages included in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53843
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 19-06-2013 18:00 − Donnerstag 20-06-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Multiple Vulnerabilities in Cisco TelePresence TC and TE Software ***
---------------------------------------------
Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition.
Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Vuln: OTRS CVE-2013-4088 Remote Security Bypass Vulnerability ***
---------------------------------------------
OTRS is prone to a remote security-bypass vulnerability.
Attackers can exploit this issue to bypass security restrictions and obtain sensitive information; other attacks may also be possible.
---------------------------------------------
http://www.securityfocus.com/bid/60688
*** Anonymous' #OpPetrol: What is it, What to Expect, Why Care? ***
---------------------------------------------
Last month, the hacker collective Anonymous announced their intention to launch cyber attacks against the petroleum industry (under the code name #OpPetrol) that is expected to last up to June 20. Their claimed reason for this attack is primarily due to petroleum being sold with the US dollar instead of currency of the country where...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/wIkmxr0Tz_A/
*** LinkedIn auf indische Webseite umgeleitet ***
---------------------------------------------
Das Karriereportal LinkedIn war in den letzten Stunden nur hin und wieder zu erreichen. Das Karriereportal wurde auf fremde Seiten umgeleitet. Die Einen sprechen von "menschlichen Fehlern", die anderen von einem Angriff.
---------------------------------------------
http://www.heise.de/security/meldung/LinkedIn-auf-indische-Webseite-umgelei…
*** VLC Media Player Unspecified Vulnerabilities ***
---------------------------------------------
Some vulnerabilities with an unknown impact have been reported in VLC Media Player.
The vulnerabilities are caused due to unspecified errors. No further information is currently available.
---------------------------------------------
https://secunia.com/advisories/53656
*** Blog: Apple of discord ***
---------------------------------------------
As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. The cybercriminals are aiming to steal Apple ID data which provides access to users' personal information stored in iCloud (e.g., photographs, contacts, documents, email, etc.) as well as to the purchases made in the company's iTunes Store. Many malicious users go further and try to the steal bank card details used to pay for those purchases.
---------------------------------------------
http://www.securelist.com/en/blog/8108/Apple_of_discord
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 18-06-2013 18:00 − Mittwoch 19-06-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Sybase EAServer Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Sybase EAServer, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53733
*** Java SE Critical Patch Update - June 2013 ***
---------------------------------------------
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 40 new security fixes across Java SE products of which 4 are applicable to server deployments of Java.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…
*** Java 7 update 25 released (Tue, Jun 18th) ***
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16025
*** Critical Update Plugs 40 Security Holes in Java ***
---------------------------------------------
Oracle today released a critical patch update for its Java software that fixes at least 40 security vulnerabilities in this widely deployed program and browser plugin. Updates are available for Java 7 on both Mac and Windows.
---------------------------------------------
https://krebsonsecurity.com/2013/06/critical-update-plugs-40-security-holes…
*** Siemens WinCC 7.2 Multiple Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities that impact the Siemens WinCC Web Navigator 7.2.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-169-02
*** Remote code execution vuln appears in Puppet ***
---------------------------------------------
Big trouble in automated clouds - Puppet Labs has blasted out a security advisory about a vulnerability in the popular infrastructure management tool Puppet.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/18/puppet_secu…
*** Solaris 10 patch cluster File clobbering vulnerability ***
---------------------------------------------
Topic: Solaris 10 patch cluster File clobbering vulnerability Risk: Medium Text:File clobbering vulnerability in Solaris 10 patch cluster 3/27/2013 Larry W. Cashdollar @_larry0 Hello, The 147147-2...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060154
*** Joomla 1.5.26, 2.5.11, 3.1.1 crypto vulnerability ***
---------------------------------------------
Topic: Joomla 1.5.26, 2.5.11, 3.1.1 crypto vulnerability Risk: Medium Text:# Vulnerable Application All current and past versions of Joomla (http://www.joomla.org) up to 1.5.26, 2.5.11, 3.1.1. Also th...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060146
*** Symantec Endpoint Protection Manager Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Symantec Endpoint Protection Manager, which can be exploited by malicious people to compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53864
*** Angestellte wollen Hilfe bei IT-Sicherheit ***
---------------------------------------------
Der Umgang mit Informationstechnik gehört auch für Angestellte in kleinen und mittelständischen Unternehmen zum täglichen Alltag. Einer Studie zufolge fühlten sie sich bei dieser Aufgabe jedoch vielfach alleingelassen.
---------------------------------------------
http://futurezone.at/b2b/16584-angestellte-wollen-hilfe-bei-it-sicherheit.p…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 17-06-2013 18:00 − Dienstag 18-06-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Siemens SIMATIC WinCC Web Navigator Bugs Let Remote Users Inject SQL Commands and Login to the System ***
---------------------------------------------
Siemens SIMATIC WinCC Web Navigator Bugs Let Remote Users Inject SQL Commands and Login to the System
---------------------------------------------
http://www.securitytracker.com/id/1028672
*** New Regulation for EU cybersecurity agency ENISA, with new duties ***
---------------------------------------------
European Union (EU) cybersecurity agency, ENISA has today (18th June) received a new Regulation, granting it a seven year mandate with an expanded set of duties.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/new-regulation-for-eu-cyber…
*** Tools - ProcDOT 1.0 released ***
---------------------------------------------
I am happy to announce that the first release (1.0) of my visual malware analysis tool ProcDOT (I already mentioned the beta in a recent blog post) is now available. This tool processes Sysinternals Process Monitor (Procmon) logfiles and PCAP-logs (Windump, Tcpdump) to generate a graph via the GraphViz suite. This graph visualizes any relevant activities (customizable) and can be interactively analyzed.
---------------------------------------------
https://www.cert.at/services/blog/20130618112047-852_en.html
*** Wall Street sets example for testing security defenses ***
---------------------------------------------
Quantum Dawn 2 will test institutions playbooks while also finding more efficient ways to share real-time information
---------------------------------------------
http://www.csoonline.com/article/735068/wall-street-sets-example-for-testin…
*** iOS: Sicherheitsmängel im "Persönlichen Hotspot" ***
---------------------------------------------
iOS wählt die Passwörter für mobiles Tethering nicht wirklich zufällig. Mobile Hotspots können in wenigen Sekunden geknackt werden.
---------------------------------------------
http://www.heise.de/security/meldung/iOS-Sicherheitsmaengel-im-Persoenliche…
*** Windows-Härter überführt SSL-Spione ***
---------------------------------------------
Microsofts Gratis-Schutzprogramm EMET soll in Version 4.0 nicht nur besser vor Cyber-Angriffen schützen, es ist auch deutlich benutzerfreundlicher geworden. Die empfohlenen Schutzeinstellungen aktiviert man mit wenigen Klicks.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Windows-Haerter-ueberfuehrt-SSL-Spio…
*** Apache XML Security Multiple Vulnerabilities ***
---------------------------------------------
Apache XML Security Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53590
*** Graphical Tools Help Security Experts Track Cyber-Attacks in Real Time ***
---------------------------------------------
"... it looks like a fantastic image from something in the world of science fiction. Streams of data flow from the globe representing the Internet. Attack vectors are highlighted in red. You can watch the changes as the attacks progress."
---------------------------------------------
http://www.eweek.com/security/graphical-tools-help-security-experts-track-c…
*** Security Vulnerability in Siemens COMOS 9.2/10.0 ***
---------------------------------------------
Siemens has discovered a vulnerability in the client library of the database system COMOS which might allow attackers to escalate their privileges for database access. The attacker would need local access as authenticated user to exploit the vulnerability.
---------------------------------------------
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemen…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 14-06-2013 18:00 − Montag 17-06-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** [webapps] - LibrettoCMS 2.2.2 - Arbitrary File Upload ***
---------------------------------------------
LibrettoCMS is provided a file upload function to unauthenticated users. Allows for write/read/edit/delete download arbitrary file uploaded , which results attacker might arbitrary write/read/edit/delete files and folders.
---------------------------------------------
http://www.exploit-db.com/exploits/26213
*** Adobe Flash exploit grabs video and audio, long after “fix” ***
---------------------------------------------
Demonstration code shows a new trick defeats Flash privacy fix.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/72PWd3AAReE/
*** Microsoft Sharepoint (Cloud) Persistent Script Insertion ***
---------------------------------------------
Topic: Microsoft Sharepoint (Cloud) Persistent Script Insertion Risk: Low Text:Title: Microsoft SharePoint (Cloud) - Persistent Exception-Handling Web Vulnerability Date: == 2013-06-14 Re...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060124
*** Avira AntiVir Engine Denial Of Service / Filter Evasion ***
---------------------------------------------
Topic: Avira AntiVir Engine Denial Of Service / Filter Evasion Risk: Medium Text: LSE Leading Security Experts GmbH - Security Advisory 2013-06-13 Avira AntiVir Engine -- Denial of Service / Filtering E...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060123
*** Siemens OpenScape Branch / Session Border Controller XSS / Disclosure / Injection ***
---------------------------------------------
Topic: Siemens OpenScape Branch / Session Border Controller XSS / Disclosure / Injection Risk: Medium Text:SEC Consult Vulnerability Lab Security Advisory == title: Multiple vulner...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060121
*** Firefox und Twitter schützen vor eingeschleusten Skripten ***
---------------------------------------------
"Du kommst hier nicht rein" heißt es für Schadcode, wenn man als Webseiten-Betreiber den HTTP-Header "Content Security Policy" benutzt. Google, Mozilla und Twitter gehen mit gutem Beispiel voran.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Firefox-und-Twitter-schuetzen-vor-ei…
*** Security Bulletin: WebSphere Commerce vulnerability could allow disclosure of user personal data (CVE-2013-0523) ***
---------------------------------------------
Some WebSphere Commerce data may be encrypted using an encryption algorithm that is susceptible to a padding oracle attack which may allow for the disclosure of user personal data. CVE(s): ...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_web…
*** Joomla com_extplorer Components shell upload Vulnerability ***
---------------------------------------------
Topic: Joomla com_extplorer Components shell upload Vulnerability Risk: Medium Text: # ISlamic Republic Of Iran Security Team # Www.IrIsT.Ir ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060127
*** Microsoft Outlook Vulnerability S/MIME Loss of Integrity ***
---------------------------------------------
Topic: Microsoft Outlook Vulnerability S/MIME Loss of Integrity Risk: Medium Text:** Attention script bunnies: This is not an RCE, XSS, etc. Please move along :) ** Microsoft Outlook (all versions) suffers ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060129
*** Mozilla Firefox and Microsoft Internet Explorer DoS vulnerability ***
---------------------------------------------
Topic: Mozilla Firefox and Microsoft Internet Explorer DoS vulnerability Risk: Medium Text:I want to warn you about Denial of Service vulnerability in Mozilla Firefox and Microsoft Internet Explorer. Earlier Jean ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060128
*** Vulnerability Disclosure – Open or Private? ***
---------------------------------------------
At the end of May, two Google security engineers announced Mountain View’s new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, [...]Post from: Trendlabs Security Intelligence Blog - by Trend MicroVulnerability Disclosure – Open or Private?
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/1qT_zYH1FxU/
*** Oracle Java pre-announcement: Upcoming JRE patch will plug 37 remotely exploitable holes.
---------------------------------------------
See http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…, (Mon, Jun 17th)
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16013&rss
*** Fortinet FortiOS (FortiGate) Guest User Permission Security Bypass Security Issue ***
---------------------------------------------
Fortinet FortiOS (FortiGate) Guest User Permission Security Bypass Security Issue
---------------------------------------------
https://secunia.com/advisories/53875
*** Debian Security Advisory for fail2ban ***
---------------------------------------------
When using Fail2ban to monitor Apache logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, thus causing a denial of service.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2708
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 13-06-2013 18:00 − Freitag 14-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Java SE Critical Patch Update - June 2013 - Pre-Release Announcement ***
---------------------------------------------
This Critical Patch Update Pre-Release Announcement provides advance information about the Oracle Java SE Critical Patch Update for June 2013, which will be released on Tuesday, June 18, 2013. While this Pre-Release Announcement is as accurate as possible at the time of publication, the information it contains may change before publication of the Critical Patch Update Advisory.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.ht…
*** MtGox Phishing Campaign Hits Bing, Yahoo! ***
---------------------------------------------
An active phishing campaign targeting account holders at popular Bitcoin exchange MtGox.com has hijacked the top search results at Bing and Yahoo.com, redirecting unwary clickers to mtpox.com, a look-alike domain and Web site that was registered on June 12, 2013, less than 24 hours ago.
---------------------------------------------
https://krebsonsecurity.com/2013/06/mtgox-phishing-campaign-hits-bing-yahoo
*** How cybercriminals apply Quality Assurance (QA) to their malware campaigns before launching them ***
---------------------------------------------
By Dancho Danchev In 2013, the use of basic Quality Assurance (QA) practices has become standard practice for cybercrininals when launching a new campaign. In an attempt to increase the probability of a successful outcome for their campaigns � think malware infection, increased visitor-to-malware infected conversion, improved conversion of blackhat SEO acquired traffic leading to the purchase of counterfeit pharmaceutical items etc.
---------------------------------------------
http://blog.webroot.com/2013/06/14/how-cybercriminals-apply-quality-assuran…
*** Critical vulnerabilities in Siemens OpenScape Branch & SBC ***
---------------------------------------------
Siemens OpenScape Branch & SBC are vulnerable to critical vulnerabilities such as unauthenticated execution of OS commands or file disclosure. Attackers are able to take over the operating system and potentially intercept VoIP traffic or phone calls.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** AirLive IP cameras plain text information disclosure ***
---------------------------------------------
AirLive IP cameras could allow a remote attacker to obtain sensitive information, caused by retrieving users details and passwords stored as plain text in a backup file. An attacker could exploit this vulnerability to obtain sensitive information.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84933
*** OWASP Top 10 2013 released ***
---------------------------------------------
The Open Web Application Security Project's top 10 most critical web application security risks, has been updated and a new list has been published. Last updated back in 2010, the organization has published the new list wherein the importance of cross-site scripting (XSS) and cross-site request forgery (CRSF) has been diluted a little while risks related to broken session management and authentication has moved up a notch.
---------------------------------------------
https://www.owasp.org/index.php/Top10
*** Linux-Kernel-Exploit wurde auf Android portiert ***
---------------------------------------------
Eine gefährliche Sicherheitslücke, die unter Linux längst gepatcht wurde, wird nun unter Android ausgenutzt. Laut Symantec ist es Entwicklern von Schadsoftware gelungen, den Exploit zu portieren. Abhilfe durch eine neue Android-Version gibt es zunächst nicht.
---------------------------------------------
http://www.golem.de/news/privilege-escalation-linux-kernel-exploit-wurde-au…
*** Big browser builders scramble to fix cross-platform zero-day flaw ***
---------------------------------------------
Browser manufacturers will release an update in the next few weeks to block a new type of malware that exploits a cross-platform flaw that allows attackers access to Mac, PC, mobile, and even games console internet users.
---------------------------------------------
http://www.theregister.co.uk/2013/06/13/cross_platform_browser_flaw_in_wild/
*** Hintergrund: XSS-Bremse Content Security Policy ***
---------------------------------------------
Cross-Site-Scripting (XSS) ist eine der größten Plagen, mit denen Webmaster zu kämpfen haben. Selbst Banken und Bezahldienstleistern wie PayPal gelingt es nicht, das gefährliche Einschleusen von Fremdcode zu verhindern. Der neue Standard "Content Security Policy" soll endlich Abhilfe schaffen.
---------------------------------------------
http://www.heise.de/security/artikel/XSS-Bremse-Content-Security-Policy-188…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 12-06-2013 18:00 − Donnerstag 13-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** BlackBerry Issues Z10, PlayBook Security Advisories ***
---------------------------------------------
BlackBerry has issued security advisories warning of vulnerabilities in the Z10 smartphone and PlayBook tablet.
---------------------------------------------
http://threatpost.com/blackberry-issues-z10-playbook-security-advisories/
*** NanoBB 0.7 - Multiple Vulnerabilities ***
---------------------------------------------
An attacker might execute arbitrary SQL commands on the database server with this vulnerability. User tainted data is used when creating the database query that will be executed on the database management system (DBMS).
---------------------------------------------
http://www.exploit-db.com/exploits/26126
*** Vuln: WordPress crypt_private() Method Remote Denial of Service Vulnerability ***
---------------------------------------------
WordPress is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to consume CPU and memory resources, denying service to legitimate users.
WordPress 3.5.1 is vulnerable; other versions may also be affected.
---------------------------------------------
http://www.securityfocus.com/bid/60477
*** Rogue ads lead to SafeMonitorApp Potentially Unwanted Application (PUA) ***
---------------------------------------------
By Dancho Danchev Our sensors just picked up yet another rogue ad enticing users into installing the SafeMonitorApp, a potentially unwanted application (PUA) that socially engineers users into giving away their privacy through deceptive advertising of the rogue application's 'features'.
---------------------------------------------
http://blog.webroot.com/2013/06/13/rogue-ads-lead-to-safemonitorapp-potenti…
*** Swedens data protection Authority bans Google cloud services over privacy concerns ***
---------------------------------------------
In a landmark ruling, Swedens data protection authority (the Swedish Data Inspection Board) this week issued a decision that prohibits the nations public sector bodies from using the cloud service Google Apps......
---------------------------------------------
http://www.privacysurgeon.org/blog/incision/swedens-data-protection-authori…
*** Enterprises spend too much time on attack prevention, not enough on mitigating a breach ***
---------------------------------------------
The biggest security mistake enterprises make is focusing too much time and too many resources on preventing cyberattacks and not enough time and money on mitigation once a breach occurs, said Dave Monnier, security evangelist and fellow at non-profit Internet security research firm Team Cymru."
---------------------------------------------
http://www.fierceenterprisecommunications.com/story/enterprises-spend-too-m…
*** Blog: AutoRun. Reloaded ***
---------------------------------------------
Recent months have produced little of interest among worms written in Java and script languages such as JavaScript and VBScript. The main reason behind this was the limited proficiency of the virus writers, whose creations were anything but remarkable. However, a couple of malware samples grabbed our attention; their complexity is testimony to the fact that professionals sometimes get involved as well.
---------------------------------------------
http://www.securelist.com/en/blog/8107/AutoRun_Reloaded
*** Microsoft botnet smackdown caused collateral damage, failed to kill target ***
---------------------------------------------
Zombies just wont stay underground Microsoft is attracting fresh criticism for its handling of the Citadel botnet takedown, with some security researchers pointing to signs that the zombie network is already rising from the grave again.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/13/ms_citadel_…
*** Medical Devices Hard-Coded Passwords ***
---------------------------------------------
ALERTSUMMARYResearchers Billy Rios and Terry McCorkle of Cylance have reported a hard-coded password vulnerability affecting a wide variety of medical devices. According to the report, the vulnerability could be exploited to potentially change critical settings and/or modify device firmware. ICS-CERT has been working closely with the Food and Drug Administration (FDA) on these issues. ICS-CERT and the FDA have notified the affected vendors of the report and have asked the vendors to confirm the
---------------------------------------------
http://ics-cert.us-cert.gov/alerts/ICS-ALERT-13-164-01
*** Researchers Claim Wi-Fi Threat Is A Serious Danger To iPhone Users ***
---------------------------------------------
The way certain iOS devices, like iPhones or iPads, automatically connect to Wi-Fi networks could place users at serious risk. Security firm SkyCure said it had discovered a feature in iPhone devices running on certain networks, including Vodafone, that would connect automatically to a Wi-Fi network with a specified SSID, such as 'BTWiFi'.
---------------------------------------------
http://www.techweekeurope.co.uk/news/researchers-claim-wi-fi-threat-is-a-se…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 11-06-2013 18:00 − Mittwoch 12-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** Microsoft Security Bulletin Summary for June 2013
---------------------------------------------
- Cumulative Security Update for Internet Explorer
- Vulnerability in Windows Kernel Could Allow Information Disclosure
- Vulnerability in Kernel-Mode Driver Could Allow Denial of Service
- Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege
- Vulnerability in Microsoft Office Could Allow Remote Code Execution
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-jun
*** Microsoft schließt sie nicht alle ***
---------------------------------------------
Am Juni-Patchday hat Microsoft zahlreihe Lücken in Windows, Internet Explorer und Office geschlossen. Eine Rechteausweitungslücke, für die bereits ein Exploit im Netz kursiert, hat die Redmonder Softwareschmiede dabei jedoch offenbar ausgelassen.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-schliesst-sie-nicht-alle-188…
*** Juni-Updates für Flash-Player und Co. ***
---------------------------------------------
Eine Lücke, viele Updates: Adobe hat ein kritisches Sicherheitsloch gestopft und neue Flash- und Air-Versionen für sämtliche Plattformen veröffentlicht.
---------------------------------------------
http://www.heise.de/security/meldung/Juni-Updates-fuer-Flash-Player-und-Co-…
*** HP integrated Lights Out (iLO) Unspecified Bug Lets Remote Users Gain Access ***
---------------------------------------------
HP integrated Lights Out (iLO) Unspecified Bug Lets Remote Users Gain Access
---------------------------------------------
http://www.securitytracker.com/id/1028661
*** glibc 2.17+ XDM crypto() NULL pointer deref ***
---------------------------------------------
Topic: glibc 2.17+ XDM crypto() NULL pointer deref Risk: Medium Text:Its been suggested we get a CVE id assigned for this recent fix to the xdm display/login manager from X.Org: http://cgit.f...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060101
*** Weitere XSS-Lücke bei ClickandBuy geschlossen ***
---------------------------------------------
Nachdem heise Security über eine XSS-Lücke beim Zahlungsabwickler berichtete, erreichte uns vor kurzem schon der nächste Hinweis auf eine weitere Lücke.
---------------------------------------------
http://www.heise.de/security/meldung/Weitere-XSS-Luecke-bei-ClickandBuy-ges…
*** Vuln: HP Data Protector CVE-2013-2333 Remote Code Execution Vulnerability ***
---------------------------------------------
HP Data Protector CVE-2013-2333 Remote Code Execution Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/60309
*** WordPress Mail Subscribe List Plugin Script Insertion Vulnerability ***
---------------------------------------------
WordPress Mail Subscribe List Plugin Script Insertion Vulnerability
---------------------------------------------
https://secunia.com/advisories/53732
*** Hewlett Packards Weboberfläche "System Management Homepage" angreifbar ***
---------------------------------------------
Die Weboberfläche zur Verwaltung von ProLiant- und Integrity-Servern enthält eine kritische Sicherheitslücke.
---------------------------------------------
http://www.heise.de/security/meldung/Hewlett-Packards-Weboberflaeche-System…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 10-06-2013 18:00 − Dienstag 11-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** CERT Warns of Vulnerabilities in HP Insight Diagnostics ***
---------------------------------------------
CERT warns of an unpatched vulnerability in HPs Insight Diagnostics server management software that could lead to remote code execution attacks.
---------------------------------------------
http://threatpost.com/cert-warns-of-vulnerabilities-in-hp-insight-diagnosti…
*** Apple iOS and Mac OS X security bypass ***
---------------------------------------------
Apple iOS and Mac OS X security bypass
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84809
*** The Value of a Hacked Email Account ***
---------------------------------------------
One of the most-viewed stories on this site is a blog post+graphic that I put together last year to illustrate the ways that bad guys can monetize hacked computers. But just as folks who dont bank online or store sensitive data on their PCs often have trouble understanding why someone would want to hack into their systems, many people do not fully realize how much they have invested in their email accounts until those accounts are in the hands of cyber thieves.
---------------------------------------------
https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account
*** NSA Whistleblower Article Redirects to Malware ***
---------------------------------------------
The Washington Free Beacons website has been attacked and malware is redirecting visitors to a site hosting the ZeroAccess rootkit and scareware.
---------------------------------------------
http://threatpost.com/nsa-whistleblower-article-redirects-to-malware/
*** Debian Security Advisory DSA-2706 chromium-browser ***
---------------------------------------------
Several vulnerabilities have been discovered in the Chromium web browser.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2706
*** Cisco ASA Ethernet Information Leak ***
---------------------------------------------
Exploit for hosts which use a network device driver that pads ethernet frames with data which vary from one packet to another, likely taken from kernel memory, system memory allocated to the device driver, or a hardware buffer on its network interface card.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060088
*** MobileIron Virtual Smartphone Platform Privilege Escalation Exploit 0day ***
---------------------------------------------
The MobileIron VSP appliance provides a restricted "clish" java application that can be used for performing a minimal amount of configuration and requires an "enable" password for elevated privileges.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060085
*** Going Solo: Self-Propagating ZBOT Malware Spotted ***
---------------------------------------------
Who says you can't teach old malware new tricks? Recently, we reported on how ZBOT had made a comeback of sorts in 2013; this was followed by media reports that it was now spreading via Facebook. Now, we have spotted a new ZBOT variant that can spread on its own.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/9Agp1TYzr9c/
*** Microsoft FixIt Tool Blocks Java Attacks in IE ***
---------------------------------------------
Java is a security headache, not just for users and Oracle, its provider, but also for other software companies that have to deal with it, as well. Microsoft has taken steps to address this problem by releasing a FixIt tool that is designed to block all of the Web-based Java attack vectors in Internet Explorer, ...
---------------------------------------------
http://threatpost.com/microsoft-fixit-tool-blocks-java-attacks-in-ie/
*** Store passwords the right way in your application ***
---------------------------------------------
I suspect most of our readers know this, but it cant hurt to repeat this every so often as there is a lot of confusion on the issue. One thing that gets to me is seeing reports of website compromises that claim "the passwords were hashed with SHA-256". Well at face value that means 90% of the passwords were decoded before the news hit.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15974
*** [remote] - Java Web Start Double Quote Injection Remote Code Execution ***
---------------------------------------------
Java Web Start Double Quote Injection Remote Code Execution
---------------------------------------------
http://www.exploit-db.com/exploits/26123
*** WordPress 3.5.1 Denial of Service ***
---------------------------------------------
Version 3.5.1 (latest) of popular blogging engine WordPress suffers from remote denial of service vulnerability. The bug exists in encryption module (class-phpass.php).
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060091
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 07-06-2013 18:00 − Montag 10-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Zpanel 10.0.0.2 Remote Execution Exploit ***
---------------------------------------------
Topic: Zpanel 10.0.0.2 Remote Execution Exploit Risk: High Text:One of our expert team members (shachibista () gmail com) who is assigned to do the security audit of ZPanel code has found th...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060057
*** Asus RT56U 3.0.0.4.360 Remote Command Injection ***
---------------------------------------------
Topic: Asus RT56U 3.0.0.4.360 Remote Command Injection Risk: High Text:Insufficient (or rather, a complete lack thereof) input sanitization leads to the injection of shell commands. Its possible t...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060058
*** Sneaky new Android Trojan is WORST yet discovered ***
---------------------------------------------
Sophisticated code stays hidden but can wreak havoc Security researchers at Kaspersky Lab report that a recently discovered Android Trojan is the most sophisticated such mobile malware yet to be identified.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/07/android_oba…
*** Abhilfe für Zero-Day-Lücke in Plesk ***
---------------------------------------------
Parallels bezieht Stellung zu einem angeblichen Exploit in seiner Server-Verwaltungssoftware und stellt einen Workaround für nicht mehr offiziell unterstützte Versionen bereit.
---------------------------------------------
http://www.heise.de/security/meldung/Abhilfe-fuer-Zero-Day-Luecke-in-Plesk-…
*** May 2013 virus activity review from Doctor Web ***
---------------------------------------------
June 3, 2013 In early May, a dangerous Trojan was discovered that can replace pages loaded in the browser. Another malicious program, also added to the virus database in May, attacked users on Facebook, Google Plus and Twitter. At the end of the month, Doctor Web analysts hijacked another command-and-control (C&C) server of the botnet Rmnet and discovered that two mew malicious components of the file infector were being distributed in the zombie network. Also found were new malicious...
---------------------------------------------
http://news.drweb.com/show/?i=3576&lng=en&c=9
*** Qnap patcht häppchenweise ***
---------------------------------------------
Mittlerweile stehen Updates des Herstellers für die verwundbaren NAS- und Videoüberwachungssysteme bereit.
---------------------------------------------
http://www.heise.de/security/meldung/Qnap-patcht-haeppchenweise-1885664.html
*** Twitter Spammers abuses Google search ***
---------------------------------------------
We reported few days ago about a new spam campaign that abuses open-redirect vulnerability in popular websites including CNN, Yahoo and Ask.com. Today, Security researcher Janne Ahlberg discovered another spam campaign that abuses the google search to spread the scam websites.
---------------------------------------------
http://www.ehackingnews.com/2013/06/twitter-spammers-abuses-google-search.h…
*** Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac ***
---------------------------------------------
Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of whats coming.
---------------------------------------------
http://nakedsecurity.sophos.com/2013/06/09/microsoft-announces-five-bulleti…
*** ZeuS-P2P internals - understanding the mechanics: a technical report ***
---------------------------------------------
At the beginning of 2012, we wrote about the emergence of a new version of ZeuS called ZeuS-P2P or Gameover. It utilizes a P2P (Peer-to-Peer) network topology to communicate with a hidden C&C center. This malware is still active and it has been monitored and investigated by CERT Polska for more than a year.
---------------------------------------------
https://www.cert.pl/news/7386/langswitch_lang/en
*** Comparing Antivirus Threat Detection to Online Sandboxes ***
---------------------------------------------
Metascan uses multiple virus and malware detection engines and aggregates their findings to identify potential threats. There are other ways to detect potential threats, and one approach is to create a virtual environment, or 'sandbox', for the file where it can be observed to see if it exhibits any threatening behavior.
---------------------------------------------
http://www.opswat.com/blog/comparing-antivirus-threat-detection-online-sand…
*** Microsoft borks botnet takedown in Citadel snafu ***
---------------------------------------------
Stupid Redmond kicked over our honeypots, wail white hats Security researchers are complaining about collateral damage from the latest botnet take-down efforts by Microsoft and its partners.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/citadel_bot…
*** Apple Store Vulnerable to XSS ***
---------------------------------------------
There is a cross-site scripting vulnerability in the Apple Store Web site that is exposing visitors to potential attack. The vulnerability was discovered by a German security researcher who says he informed Apple about the problem in mid-May, but the vulnerability still exists.
---------------------------------------------
http://threatpost.com/apple-store-vulnerable-to-xss/
*** RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files ***
---------------------------------------------
RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files
---------------------------------------------
http://www.securitytracker.com/id/1028638
*** Cisco IOS XR SNMP Memory Leak Lets Remote Users Deny Service ***
---------------------------------------------
Cisco IOS XR SNMP Memory Leak Lets Remote Users Deny Service
---------------------------------------------
http://www.securitytracker.com/id/1028636
*** DSA-2703 subversion ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2703
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 06-06-2013 18:00 − Freitag 07-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Advanced Notification Service for the June 2013 Security Bulletin Release ***
---------------------------------------------
Today we're providing Advance Notification of five bulletins for release on Tuesday, June 11, 2013. This release brings one Critical- and four Important-class bulletins. The Critical-rated bulletin addresses issues in Internet Explorer, and the Important-rated bulletins address issues in Microsoft Windows and Office. We will publish the bulletins on the second Tuesday of the month, at approximately 10 a.m. PT. Please revisit this blog at that time for our official risk and impact...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/06/06/advanced-notification-se…
*** Plesk 0-day: Real or not?, (Fri, Jun 7th) ***
---------------------------------------------
Yesterday, a poster to the full disclosure mailing list described a possible new 0-day vulnerability against Plesk. Contributing to the vulnerability is a very odd configuration choice to expose "/usr/bin" via a ScriptAlias, making executables inside the directory reachable via URLs. The big question that hasnt been answered so far is how common this configuration choice is. Appaerently, some versions of Plesk on CentOS 5 are configured this way, but not necessarily exploitable. The...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15950&rss
*** 100% Compliant (for 65% of the systems), (Fri, Jun 7th) ***
---------------------------------------------
At a community college where Im helping out whenever they panic on security issues, I recently was confronted with the odd reality of a lingering malware infection on their network, even though they had deployed a custom anti-virus (AV) pattern ("extra.dat") to eradicate the problem. Of course, these days, reliance on anti-virus is somewhat moot to begin with, our recent tally of fresh samples submitted to VirusTotal had AV lagging behind about 8 days or so. If you caught a keylogger...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15959&rss
*** PHP "php_quot_print_encode()" Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53736
*** Vuln: Drupal Services Module Cross Site Request Forgery Vulnerability ***
---------------------------------------------
The Services module for Drupal is prone to a cross-site request-forgery vulnerability.
---------------------------------------------
http://www.securityfocus.com/bid/60356
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 05-06-2013 18:00 − Donnerstag 06-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Security Bulletin: Vulnerability in IBM InfoSphere Information Server due to issues in IBM Java SDK (CVE-2013-0440, CVE-2013-0443, CVE-2013-0169, CVE-2012-1717, CVE-2012-1718, CVE-2012-5081) ***
---------------------------------------------
Multiple IBM Java SDK security vulnerabilities exist in the IBM InfoSphere Information Server. Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21639487
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_vul…
*** Frei zugängliche Schwachstellen-Datenbank ***
---------------------------------------------
Das Potsdamer Hasso-Plattner-Institut hat für jedermann den Zugang für eine Schwachstellendatenbank freigegeben. Darin kann der Nutzer unter anderem nach Produkten, CVE-Kennungen und Gefährdungsstufen suchen.
---------------------------------------------
http://www.heise.de/security/meldung/Frei-zugaengliche-Schwachstellen-Daten…
*** Cisco WebEx Meetings Server Information Disclosure Vulnerability ***
---------------------------------------------
Cisco WebEx Meetings Server Information Disclosure Vulnerability
---------------------------------------------
https://secunia.com/advisories/53731
*** QNAP VioStor NVR Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
QNAP VioStor NVR Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/53583
*** QNAP VioStor NVR and QNAP NAS Products Security Bypass Security Issue and Arbitrary Command Injection Vulnerability ***
---------------------------------------------
QNAP VioStor NVR and QNAP NAS Products Security Bypass Security Issue and Arbitrary Command Injection Vulnerability
---------------------------------------------
https://secunia.com/advisories/53721
*** Operation b54: Microsoft, FBI und Finanzunternehmen schalten 1462 Botnetze ab ***
---------------------------------------------
Microsoft ist in seinen siebten Feldzug gegen Botnetze gezogen. Fünf Millionen infizierte Rechner und ein Schaden von einer halben Milliarde US-Dollar sollen die Citadel-Botnetze verursacht haben. FBI und Finanzsektor standen dem Unternehmen zur Seite.
---------------------------------------------
http://www.heise.de/security/meldung/Operation-b54-Microsoft-FBI-und-Finanz…
*** Parallels Plesk Panel Arbitrary PHP Code Execution Vulnerability ***
---------------------------------------------
Parallels Plesk Panel Arbitrary PHP Code Execution Vulnerability
---------------------------------------------
https://secunia.com/advisories/53596
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 04-06-2013 18:00 − Mittwoch 05-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Get Set Null Java Security ***
---------------------------------------------
Java, being widely used by the applications, has also been actively targeted by malware authors. One of the most common techniques to exploit Java applications, is to disable the security manager. This blog provides widely used logic used by malware authors...
---------------------------------------------
http://www.fireeye.com/blog/technical/2013/06/get-set-null-java-security.ht…
*** Schneider Electric Quantum Ethernet Module Hard-Coded Credentials ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-12-018-01 Schneider Electric Quantum Ethernet Module Hard-Coded Credentials that was published on January 17, 2012, on the ICS-CERT Web page
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-12-018-01A
*** Schneider Electric PLCs Multiple Vulnerabilities ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-13-077-01A Schneider Electric PLCS Multiple Vulnerabilities (Update A) that was published March 20, 2013, on the ICS-CERT Web page.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-077-01B
*** Windows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx, (Wed, Jun 5th) ***
---------------------------------------------
Richard Porter --- ISC Handler on Duty (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15932&rss
*** IBM AIX inet IPv6 Bug Lets Remote Users Deny Service ***
---------------------------------------------
On systems configured with IPv6, a remote user can send a specially crafted IPv6 packet to cause the target system to hang.
---------------------------------------------
http://www.securitytracker.com/id/1028626
*** Mac OSX Server DirectoryService Buffer Overflow ***
---------------------------------------------
Topic: Mac OSX Server DirectoryService Buffer Overflow Risk: High Text:Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Mac OSX Server DirectoryService buffer overflow 1....
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060040
*** NetGear DGN1000 and NetGear DGN2200 security bypass ***
---------------------------------------------
NetGear DGN1000 and NetGear DGN2200 could allow a remote attacker to bypass security restrictions, caused by an error in the interface when handling requests containing the currentsetting.htm substring. An attacker could exploit this vulnerability to gain unauthorized access to restricted functionality.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84662
*** [2013-06-05] Critical vulnerabilities in CTERA portal ***
---------------------------------------------
CTERA portal contains multiple and partly critical security issues such as XML External Entity injection that allows unauthenticated attackers to fully take over the affected server.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** Apple Mac OS X Multiple Vulnerabilities ***
---------------------------------------------
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.
---------------------------------------------
https://secunia.com/advisories/53684
*** PRTG Network Monitor login.htm cross-site scripting ***
---------------------------------------------
PRTG Network Monitor is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the login.htm script. A remote attacker could exploit this vulnerability using the errormsg...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84686
*** Apache Struts OGNL Expression Injection Vulnerabilities ***
---------------------------------------------
Security Research Laboratory has reported some vulnerabilities in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/53693
*** Monkey HTTP Daemon "mk_request_header_process()" Signedness Error Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in Monkey HTTP Daemon, which can be exploited by malicious people to compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53697
*** CVE-2013-3919: A recursive resolver can be crashed by a query for a malformed zone ***
---------------------------------------------
A bug has been discovered in the most recent releases of BIND 9 which has the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.c
---------------------------------------------
https://kb.isc.org/article/AA-00967
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 03-06-2013 18:00 − Dienstag 04-06-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Microsoft VC++ 2005 RTM runtime libraries installed with MSE ***
---------------------------------------------
Topic: Microsoft VC++ 2005 RTM runtime libraries installed with MSE Risk: High Text:this is part 2 of "Defense in depth -- the Microsoft way", see On Windo...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060020
*** Bugtraq: Open-Xchange Security Advisory 2013-06-03 ***
---------------------------------------------
Multiple security issues for Open-Xchange Server 6 and OX AppSuite have been discovered and fixed.
---------------------------------------------
http://www.securityfocus.com/archive/1/526785
*** Imperva SecureSphere Operations Manager Command Execution ***
---------------------------------------------
Topic: Imperva SecureSphere Operations Manager Command Execution Risk: High Text:Original: http://www.digitalsec.net/stuff/explt+advs/Imperva-SecureSphere.OptMgr.txt = ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060023
*** DS3 Authentication Server Command Execution ***
---------------------------------------------
Topic: DS3 Authentication Server Command Execution Risk: High Text:Original: http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt = - Advi...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060022
*** Vuln: MongoDB CVE-2013-2132 NULL Pointer Dereference Remote Denial of Service Vulnerability ***
---------------------------------------------
MongoDB is prone to a denial-of-service vulnerability.
Successfully exploiting this issue will allow an attacker to crash the affected application, denying service to legitimate users.
---------------------------------------------
http://www.securityfocus.com/bid/60252
*** Google-Forscher ver�ffentlicht Zero-Day-Exploit f�r Windows ***
---------------------------------------------
Durch eine Schwachstelle in s�mtlichen Windows-Versionen kommt ein gew�hnlicher Nutzer an Systemrechte. Entdeckt hat die L�cke Tavis Ormandy von Google, der seinen Fund ohne Microsoft zu informieren ins Netz stellte.
---------------------------------------------
http://www.heise.de/security/meldung/Google-Forscher-veroeffentlicht-Zero-D…
*** HPSBMU02883 SSRT101227 rev.1 - HP Data Protector, Remote Increase of Privilege, Denial of Service (DoS), Execution of Arbitrary Code ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP Data Protector. These vulnerabilities could be remotely exploited to allow an increase of privilege, create a Denial of Service (DoS), or execute arbitrary code.
---------------------------------------------
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c037…
*** Blog: "NetTraveler is Running!" � Red Star APT Attacks Compromise High-Profile Victims ***
---------------------------------------------
Over the last few years, we have been monitoring a cyber-espionage campaign that has successfully compromised more than 350 high profile victims in 40 countries. The main tool used by the threat actors during these attacks is NetTraveler, a malicious program used for covert computer surveillance...
---------------------------------------------
http://www.securelist.com/en/blog/8105/NetTraveler_is_Running_Red_Star_APT_…
*** Novell ZENworks Configuration Management Control Center Multiple Vulnerabilities ***
---------------------------------------------
A weakness and some vulnerabilities have been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53648
*** 3COM NBX V3000 Networked Telephony Solution Information Disclosure ***
---------------------------------------------
Topic: 3COM NBX V3000 Networked Telephony Solution Information Disclosure Risk: Medium Text:*Known Affected Versions: *R5_0_31 (Created March 1st, 2007) *Date Discovered: *November 13, 2012 Obviously not anything ne...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060027
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 31-05-2013 18:00 − Montag 03-06-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** WordPress Plugin Feedweb 1.8.8 Cross-site Scripting vulnerability ***
---------------------------------------------
Topic: WordPress Plugin Feedweb 1.8.8 Cross-site Scripting vulnerability Risk: Low Text:Advisory: WordPress Plugin Feedweb 1.8.8 Cross-site Scripting vulnerability Advisory ID: SSCHADV2013-004 Author: Stefan...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060001
*** ModSecurity 2.7.3 NULL pointer dereference PoC ***
---------------------------------------------
Topic: ModSecurity 2.7.3 NULL pointer dereference PoC Risk: High Text:#!/usr/bin/env python3 #-*- coding: utf-8 -*- # # Created on Mar 29, 2013 # # @author: Younes JAAIDI <yjaaidi(a)shookalabs.c...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060006
*** Security Bulletin: Multiple security vulnerabilities in IBM Sales Center for WebSphere Commerce (CVE-2008-7271, CVE-2010-4647, CVE-2012-0186, CVE-2012-0191, CVE-2012-2159, CVE-2012-2161) ***
---------------------------------------------
Multiple security vulnerabilities have been identified in IBM Sales Center for WebSphere Commerce V6.0 and V7.0 CVEID: CVE-2008-7271 CVE-2010-4647 CVE-2012-0186 CVE-2012-0191 CVE-2012-2159 CVE-2012-2161 Affected product(s) and affected version(s): IBM Sales Center for WebSphere Commerce V6.0 (CVE-2008-7271, CVE-2010-4647, CVE-2012-0186, CVE-2012-2159, CVE-2012-2161) IBM Sales Center for WebSphere Commerce V7.0 (CVE-2008-7271, CVE-2010-4647, CVE-2012-0186, CVE-2012-2159,
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_mul…
*** Besonders tückisches PayPal-Phishing ***
---------------------------------------------
Aufgepasst: Mit persönlicher Anrede und einer eigens registrierten .de-Domain greifen Cyber-Kriminelle derzeit nach den Kreditkartendaten von PayPal-Kunden. Der Schwindel fällt bestenfalls auf den zweiten Blick auf.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Besonders-tueckisches-PayPal-Phishin…
*** Security Bulletin: Potential Security Exposure in IBM HTTP Server CVE-2013-0169 ***
---------------------------------------------
Potential Security Exposure with IBM HTTP Server for WebSphere Application Server. CVEID: CVE-2013-0169 AFFECTED VERSIONS: This problem affects the IBM HTTP Server component in all editions of WebSphere Application Server and bundling products: · Version 8.5 · Version 8 · Version 7 · Version 6.1 Refer to the following reference URLs for remediation and additional vulnerability details. Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21635988
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_pot…
*** WordPress AntiVirus FPD and Security bypass vulnerabilities ***
---------------------------------------------
Topic: WordPress AntiVirus FPD and Security bypass vulnerabilities Risk: Low Text:These are Full path disclosure and Security bypass vulnerabilities in AntiVirus for WordPress. This is security plugin for dete...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060010
*** Compromised FTP/SSH account privilege-escalating mass iFrame embedding platform released on the underground marketplace ***
---------------------------------------------
By Dancho Danchev Utilizing the very best in ‘malicious economies of scale’ concepts, cybercriminals have recently released a privilege-escalating Web-controlled mass iFrame embedding platform that’s not just relying on compromised FTP/SSH accounts, but also automatically gains root access on the affected servers in an attempt to target each and every site hosted there. Similar to […]
---------------------------------------------
http://blog.webroot.com/2013/06/03/compromised-ftpssh-account-privilege-esc…
*** IBM Tivoli Netcool/System Service Monitor Multiple OpenSSL Vulnerabilities ***
---------------------------------------------
IBM Tivoli Netcool/System Service Monitor Multiple OpenSSL Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53720
*** Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability ***
---------------------------------------------
Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability
---------------------------------------------
https://secunia.com/advisories/53727
*** Apache Subversion svnserve and FSFS Repositories Denial of Service Vulnerabilities ***
---------------------------------------------
Apache Subversion svnserve and FSFS Repositories Denial of Service Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53692
*** Researchers Infect iOS Devices With Malware Via Malicious Charger ***
---------------------------------------------
Sparrowvsrevolution writes "At the upcoming Black Hat security conference in late July, three researchers at the Georgia Institute of Technology plan to show off a proof-of-concept charger that they say can be used to invisibly install malware on a device running the latest version of Apples iOS. A description of their talk posted to the conference website describes how they were able to install whatever malware they wished on an Apple device within a minute of the user plugging it into...
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/3xY6_Bverd0/story01.htm
*** Multiple vulnerabilities in Typo3 extensions ***
---------------------------------------------
SQL Injection vulnerability in extension Multishop: http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e… Several vulnerabilities in third party extensions: http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e… Security Bypass Vulnerability in extension powermail: http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e…
---------------------------------------------
http://typo3.org/teams/security/security-bulletins/
*** Erneut Sicherheitslücke bei ClickandBuy ***
---------------------------------------------
Die neue Schwachstelle lauerte auf der Hilfe-Seite für Kunden. Schon einmal hatte der Online-Bezahldienstleister ClickandBuy mit einer XSS-Lücke zu kämpfen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Erneut-Sicherheitsluecke-bei-Clickan…
*** IBM DB2 / DB2 Connect Global Security Toolkit SSL Information Disclosure Weakness ***
---------------------------------------------
IBM DB2 / DB2 Connect Global Security Toolkit SSL Information Disclosure Weakness
---------------------------------------------
https://secunia.com/advisories/53696
*** IBM DB2 / DB2 Connect db2aud Privilege Escalation Vulnerability ***
---------------------------------------------
IBM DB2 / DB2 Connect db2aud Privilege Escalation Vulnerability
---------------------------------------------
https://secunia.com/advisories/52663
*** TYPO3 jQuery Autocomplete for indexed_search Extension SQL Injection Vulnerability ***
---------------------------------------------
TYPO3 jQuery Autocomplete for indexed_search Extension SQL Injection Vulnerability
---------------------------------------------
https://secunia.com/advisories/53633
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 29-05-2013 18:00 − Freitag 31-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices ***
---------------------------------------------
An analysis of the data rendered by the Carna botnet reveals a shocking number of vulnerable devices reachable online with default credentials.
---------------------------------------------
http://threatpost.com/carna-botnet-analysis-renders-scary-numbers-on-vulner…
*** PayPal-Schwachstelle endlich geschlossen ***
---------------------------------------------
Fast zwei Wochen hat sich der Zahungsabwickler mit dem Schließen einer kritischen Lücke Zeit gelassen. Fünf Tage davon waren die PayPal-Nutzer einem hohen Angriffsrisiko ausgesetzt.
---------------------------------------------
http://www.heise.de/newsticker/meldung/PayPal-Schwachstelle-endlich-geschlo…
*** Zavio IP Cameras multiple vulnerabilities ***
---------------------------------------------
Zavio IP Cameras default account
Zavio IP Cameras command execution
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84568http://xforce.iss.net/xforce/xfdb/84569
*** Debian Security Advisory DSA-2697 gnutls26 ***
---------------------------------------------
out-of-bounds array read
---------------------------------------------
http://www.debian.org/security/2013/dsa-2697
*** Apache-Server durch Log-Files angreifbar ***
---------------------------------------------
In Apache klafft ein Sicherheitsloch, durch das Angreifer Befehle im Log platzieren können, die ausgeführt werden, sobald der Admin die Datei öffnet.
---------------------------------------------
http://www.heise.de/security/meldung/Apache-Server-durch-Log-Files-angreifb…
*** RSA Authentication Manager Information Disclosure and PostgreSQL Vulnerabilities ***
---------------------------------------------
RSA Authentication Manager Information Disclosure and PostgreSQL Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53641
*** Siemens SCALANCE Privilege Escalation Vulnerabilities ***
---------------------------------------------
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-149-01
*** P2P-Botnetze viel größer als vermutet ***
---------------------------------------------
Mit eingeschleusten Sensoren hat ein internationales Forscherteam große Botnetze mit Peer-to-Peer-Infrastruktur vermessen. Sie fanden zum Teil über vierzig Mal mehr infizierte Systeme als mit herkömmlicher Zählweise.
---------------------------------------------
http://www.heise.de/newsticker/meldung/P2P-Botnetze-viel-groesser-als-vermu…
*** Monkey HTTPD 1.1.1 Denial of Service Vulnerability ***
---------------------------------------------
Topic: Monkey HTTPD 1.1.1 Denial of Service Vulnerability Risk: Low Text:Title: Monkey HTTPD 1.1.1 - Denial of Service Vulnerability Date: == 2013-05-28 References: == http://bugs...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050217
*** Mobile Device Security: The Problems of Remotely Disabling Stolen Phones ***
---------------------------------------------
The problem of mobile device theft has become sufficiently severe that legislators have decided to file bills discussing it. Last week, US Senator Charles Schumer re-filed Mobile Device Theft Deterrence Act of 2013, which makes modifying a device's International Mobile Equipment Identity (IMEI) number a crime punishable by up to five years in federal prison. ---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/FxukunuZ9f0/
*** iCloud users take note: Apple two-step protection won't protect your data ***
---------------------------------------------
Limitations could leave users open to the type of hack that hit Wireds Matt Honan.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/VFgQ6tJje98/
*** Weekly Update: The Nginx Exploit and Continuous Testing ***
---------------------------------------------
Weekly Update: The Nginx Exploit and Continuous Testing
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/05/30/weekly-up…
*** Ruckus SSH Server Tunneling Issue ***
---------------------------------------------
Topic: Ruckus SSH Server Tunneling Issue
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050219
*** Vuln: Cisco Nexus 1000 Series Switches NX-OS CVE-2013-1209 Remote Authentication Bypass Vulnerability ***
---------------------------------------------
Cisco Nexus 1000 Series Switches NX-OS CVE-2013-1209 Remote Authentication Bypass Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/60224
*** VMware Security Advirsory VMSA-2013-0007 ***
---------------------------------------------
VMware ESX third party update for Service Console package sudo
---------------------------------------------
https://www.vmware.com/support/support-resources/advisories/VMSA-2013-0007.…
*** Phishing und verseuchter Spam - Betrug fast ohne Makel ***
---------------------------------------------
Neue Woche, neue Kuriositäten. Diese Woche haben wir zwei interessante E-Mailbetrugversuche aus dem Zauberhut Internet gezogen. Dabei sind eine perfekt gestaltete Mastercard-Phishing-Seite und Trojaner-Mails im Namen der Firmen Otto und Görtz.
---------------------------------------------
http://www.heise.de/security/meldung/Phishing-und-verseuchter-Spam-Betrug-f…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-05-2013 18:00 − Mittwoch 29-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** How Targeted Attacks And Cybercrime Go Together ***
---------------------------------------------
For cybercriminals everywhere, it's still business as usual. The recent global ATM heist that stole a total of $45M showed that orchestrated targeted attacks continues to plague organizations globally. Legacy approaches to identifying threats are not keeping up with the tactics being used to exfiltrate precious assets and corporate secrets.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/J7IrBLritF0/
*** Microsoft loads botnet-crushing data into Azure ***
---------------------------------------------
C-TIP gives ISPs near-realtime access to MARS data Microsoft is plugging its security intelligence systems into Azure so that service providers and local authorities can get near-realtime information on botnets and malware detected by Redmond.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/05/28/microsoft_a…
*** Critical Ruby on Rails bug exploited in wild, hacked servers join botnet ***
---------------------------------------------
Attackers success shows many servers still arent patched. Is yours?
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/gjidr1iHpyo/
*** Child-Porn Suspect Ordered to Decrypt His Own Data ***
---------------------------------------------
federal magistrate is reversing course and ordering a Wisconsin man suspected of possessing child pornography to decrypt hard drives the authorities seized from his residence. Decryption orders are rare, but are likely to become more commonplace as the public ...
---------------------------------------------
http://www.wired.com/threatlevel/2013/05/decryption-order/
*** Raspberry Pi puts holes in Chinas Great Firewall ***
---------------------------------------------
RPi plus WiFi hotspot plus VPN equals portable censorship destroyer A tech-savvy China-based Redditor has spotted a hassle-free way of ensuring he or she is always able to bypass the Great Firewall, even when out and about, using the Raspberry Pi to connect to a virtual private network (VPN).
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/05/29/raspberry_p…
*** Secunia Broadcasts Zero-day Vulnerability via Email ***
---------------------------------------------
SecurityWeek has learned that Secunia, a Danish vulnerability management firm, disclosed an unpatched vulnerability within an image viewing application used by organizations in both the private and the defense sectors to a public mailing list.
---------------------------------------------
https://www.securityweek.com/secunia-broadcasts-zero-day-vulnerability-email
*** Release me from a botnet ***
---------------------------------------------
At the beginning of August 2012, an outbreak of the Dorifel virus was observed. This outbreak primarily infected systems in the Netherlands. The virus is being spread through the Citadel botnet. This factsheet will take a closer look at the relationship between Dorifel and Citadel, describe the impact of an infection and recommend steps to take if you are infected. We conclude with providing a number of tips to avoid infection.
---------------------------------------------
http://www.ncsc.nl/english/services/expertise-advice/knowledge-sharing/fact…
*** IBM WebSphere Portal HTTP Response Splitting Vulnerability ***
---------------------------------------------
IBM WebSphere Portal HTTP Response Splitting Vulnerability
---------------------------------------------
https://secunia.com/advisories/53627
*** Vuln: socat CVE-2013-3571 Remote Denial of Service Vulnerability ***
---------------------------------------------
socat CVE-2013-3571 Remote Denial of Service Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/60170
*** Yahoo! Browser for Android spoofing ***
---------------------------------------------
Yahoo! Browser for Android spoofing
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84541
*** Siemens Solid Edge ST5 ActiveX control code execution ***
---------------------------------------------
Siemens Solid Edge ST5 ActiveX control code execution
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84530
*** TP-Link IP Cameras multiple vulnerabilities ***
---------------------------------------------
Core Security - Corelabs Advisory http://corelabs.coresecurity.com TP-Link IP Cameras Multiple Vulnerabilities
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050202
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-05-2013 18:00 − Dienstag 28-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Christian Wojner
*** Anatomy of a hack: How crackers ransack passwords like 'qeadzcwrsfxv1331' ***
---------------------------------------------
For Ars, three crackers have at 16,000+ hashed passcodes with 90 percent success.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/yG2GKDkgLMo/
*** Security boffins say music could trigger mobile malware ***
---------------------------------------------
Justin Bieber really evil virus theory just got more credible Security researchers have discovered that specific music, lighting, vibrations or magnetic fields could all be used as infection channels to trigger the activation of mobile malware on a massive scale.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/05/28/light_sound…
*** HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users ***
---------------------------------------------
HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users
---------------------------------------------
http://www.securitytracker.com/id/1028593
*** Sicherheitslücke in Telekom-Router Speedport LTE II ***
---------------------------------------------
Der DSL-Router Speedport LTE II der Telekom soll von außen manipulierbar sein. Stellt ein Angreifer Anfragen an den Router, wird die zur Verfügung stehende Bandbreite gedrosselt. Ein Update soll die Lücke schließen.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-in-Telekom-Router-Sp…
*** How to hash windows files against known good set ***
---------------------------------------------
Required Tools: md5deep, nsrlquery
You'll also need a server to query against. Luckily Kyrus has provided a nsrlserver (beta), known as the Kyrus NSRL Lookup Service!
---------------------------------------------
http://brakertech.com/hash-windows-files-against-known-good-set/
*** Serious Privacy Flaw In Facebook Pages Manager For Android Exposes Private Pictures For Everyone To See ***
---------------------------------------------
Facebook has a privacy hole that exposes private information to the public. And its a serious one, this time in Facebook Pages Manager for Android, which has been installed over 5 million times since January of this year.
---------------------------------------------
http://www.androidpolice.com/2013/05/26/serious-privacy-flaw-in-facebook-pa…
*** BANKER Malware Hosted In Compromised Brazilian Government Sites ***
---------------------------------------------
Two Brazilian government websites have been compromised and used to serve malware since April 24. We spotted a total of 11 unique malware files being distributed from these sites, with filenames that usually include 'update', 'upgrade', 'Adobe', 'FlashPlayer' or combinations thereof. Besides the different filenames, these samples also have different domains where they can connect to
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/PCxIa2XQtdo/
*** ATM and Point-of-Sale Terminals Malware: The Bad Guys Just Never Stop! ***
---------------------------------------------
If you use your debit or credit card to buy groceries or get cash out of an ATM you might want to know that the bad guys could have a piece of it.
---------------------------------------------
http://blog.malwarebytes.org/intelligence/2013/05/atm-and-point-of-sale-ter…
*** How to keep your Apple computer free from malicious programs and viruses ***
---------------------------------------------
- Apple computers are not safe from viruses
- Fewer than half of Mac users run anti-virus software
- Mac users "will be targeted more and more easily"
---------------------------------------------
http://www.news.com.au/technology/techknow/how-to-keep-your-apple-computer-…
*** The Team Cymru Malware Hash Registry (MHR) project ***
---------------------------------------------
The Malware Hash Registry (MHR) project is a look-up service similar to the Team Cymru IP address to ASN mapping project. This project differs however, in that you can query our service for a computed MD5 or SHA-1 hash of a file and, if it is malware and we know about it, we return the last time weve seen it along with an approximate anti-virus detection percentage.
---------------------------------------------
https://www.team-cymru.org/Services/MHR/
*** DoS-Lücke in ModSecurity gestopft ***
---------------------------------------------
Angreifer können die Web Application Firewall über speziell präparierte HTTP-Request aus der Ferne lahm legen.
---------------------------------------------
http://www.heise.de/security/meldung/DoS-Luecke-in-ModSecurity-gestopft-187…
*** Wordpress Export To Text Plugin "download" Remote File Inclusion Vulnerability ***
---------------------------------------------
Wordpress Export To Text Plugin "download" Remote File Inclusion Vulnerability
---------------------------------------------
https://secunia.com/advisories/51348
*** Nitro Pro / Reader PDF Parsing Vulnerability ***
---------------------------------------------
Nitro Pro / Reader PDF Parsing Vulnerability
---------------------------------------------
https://secunia.com/advisories/53473
*** SRWare Iron Multiple Vulnerabilities ***
---------------------------------------------
SRWare Iron Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53586
*** Vuln: SPIP Security Bypass Vulnerability ***
---------------------------------------------
SPIP Security Bypass Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/60163
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-05-2013 18:00 − Montag 27-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Christian Wojner
*** Worm Creates Copies in Password-Protected Archived Files ***
---------------------------------------------
Typically users archive file to lump several files together into a single file for convenience or to simply save storage space. However, we uncovered a worm that creates copies of itself even on password-protected archived files. We acquired a sample of a worm (detected as WORM_PIZZER.A) that propagates using a particular WINRAR command line
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/PRaGXwQeGIY/
*** WordPress ProPlayer Plugin 4.7.9.1 - SQL Injection ***
---------------------------------------------
WordPress ProPlayer Plugin 4.7.9.1 - SQL Injection
---------------------------------------------
http://www.exploit-db.com/exploits/25605
*** Compromised Indian government Web site leads to Black Hole Exploit Kit ***
---------------------------------------------
By Dancho Danchev Our sensors recently picked up a Web site infection, affecting the Web site of the Ministry of Micro And Medium Enterprises (MSME DI Jaipur). And although the Black Hole Exploit Kit serving URL is currently not accepting any connections, it's known to have been used in previous client-side exploit serving campaigns.
---------------------------------------------
http://blog.webroot.com/2013/05/24/compromised-indian-government-web-site-l…
*** Skype Beta Plugs IP Resolver Privacy Leak ***
---------------------------------------------
A few months ago, I warned readers that a glaring privacy weakness in voice-over-IP telephony service Skype allows anyone using the network to quickly learn the Internet address of any other Skype user. A new beta version of the popular Microsoft program appears to have nixed that privacy leak with a setting that restricts this capability to connections in your Skype contacts only.
---------------------------------------------
http://krebsonsecurity.com/2013/05/skype-beta-plugs-ip-resolver-privacy-leak
*** PandaLabs Quarterly Report Q1 2013 ***
---------------------------------------------
We have just published our Quarterly Report for Q1 2013, analyzing the IT security events and incidents from January through March 2013. If you want to be aware of the latest security trends, the latest cyber-war cases don't wait any longer, you can download our latest report from our Press Center
---------------------------------------------
http://pandalabs.pandasecurity.com/pandalabs-quarterly-report-q1-2013/
*** WordPress milano Theme Cross Site Scripting ***
---------------------------------------------
Topic: WordPress milano Theme Cross Site Scripting Risk: Low Text: ## # Exploit Title : Wordpress milano Theme Cross Site Scripting # # Exploit Author : Ashiyane Digital Security Team ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050184
*** LG Optimus G command injection (as system user) vulnerability ***
---------------------------------------------
Topic: LG Optimus G command injection (as system user) vulnerability *youtube Risk: High Text:Device: LG Optimus G E973 (Others affected) Firmware: Android 4.1.2 JZO54k (Others affected) Evidence: http://youtu.be/ZfbDIp...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050188
*** AVE.CMS <= 2.09 (index.php, module param) - Blind SQL Injection Exploit ***
---------------------------------------------
AVE.CMS <= 2.09 (index.php, module param) - Blind SQL Injection Exploit
---------------------------------------------
http://www.exploit-db.com/exploits/25716
*** PayPal wieder durch Cross-Site-Scripting angreifbar ***
---------------------------------------------
Der eBay gehörende Internetbezahldienst prüft Sucheingaben nicht und erlaubt Angreifern so beliebigen JavaScript-Codes in den Browser des Benutzers einzuschleusen. Dadurch lassen sich Zugangsdaten entwenden.
---------------------------------------------
http://www.heise.de/security/meldung/PayPal-wieder-durch-Cross-Site-Scripti…
*** Finding Malware by DNS Cache Snooping or by Comparing BRO and PassiveDNS logs ***
---------------------------------------------
We can actively look for the presence of malware on a network by examining its nameserver's cache. Since known pieces of malware make requests to specific domains, we're able to check a DNS server's cache for their existence.
---------------------------------------------
https://sickbits.net/finding-malware-by-dns-cache-snooping/
*** New Trojan targets Facebook, Twitter and Google Plus ***
---------------------------------------------
May 16, 2013 Russian anti-virus company Doctor Web has discovered previously unknown features in the new malware for Facebook that has been widely discussed in the mediadoesnt simply change a user's status, join groups and leave comments on the users behalf, but it can also send spam on Twitter and Google Plus.
---------------------------------------------
http://news.drweb.com/show/?i=3527&lng=en&c=9
*** WordPress WP CleanFix Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
WordPress WP CleanFix Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/53395
*** Barracuda SSL VPN 680 2.2.2.203 Redirect Web Vulnerability ***
---------------------------------------------
Topic: Barracuda SSL VPN 680 2.2.2.203 Redirect Web Vulnerability Risk: Low Text:Title: Barracuda SSL VPN 680 2.2.2.203 - Redirect Web Vulnerability Date: == 2013-05-25 References: == h...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050193
*** Twitters Zwei-Faktor-Authentifizierung schon ausgehebelt ***
---------------------------------------------
Es hätte ja so schön sein können: Doch die Zwei-Faktor-Authentifizierung, die Twitter erst vor wenigen Tagen eingeführt hat, lässt sich mittels SMS-Spoofing relativ leicht aushebeln.
---------------------------------------------
http://www.heise.de/security/meldung/Twitters-Zwei-Faktor-Authentifizierung…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-05-2013 18:00 − Freitag 24-05-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** HPSBUX02881 SSRT101189 rev.1 - HP-UX Directory Server, Remote Disclosure of Information ***
---------------------------------------------
A potential security vulnerability has been identified in HP-UX
Directory Server. The vulnerability could be exploited remotely
resulting in information disclosure.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Cisco NX-OS igmp_snoop_orib_fill_source_update() Function Remote Denial of Service Vulnerability ***
---------------------------------------------
Cisco NX-OS contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition on a targeted device. Updates are available.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=26613
*** X.Org Security Advisory: May 23, 2013 - Protocol handling issues in X Window System client libraries ***
---------------------------------------------
Ilja van Sprundel, a security researcher with IOActive, has discovered a large number of issues in the way various X client libraries handle the responses they receive from servers, and has worked with X.Orgs security team to analyze, confirm, and fix these issues.
---------------------------------------------
http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
*** Cisco WebEx for iOS Certificate Verification Security Issue ***
---------------------------------------------
Charlie Eriksen has discovered a security issue in Cisco WebEx for iOS, which can be exploited by malicious people to conduct spoofing attacks.
---------------------------------------------
https://secunia.com/advisories/51412
*** New Rmnet malware disables anti-virus programs ***
---------------------------------------------
May 23, 2013 Russian anti-virus company Doctor Web is warning users about new malicious modules found in the malware that is used to create and maintain the Rmnet bot network. One of them allows attackers to disable the anti-virus software installed on the infected computers. Doctor Webs analysts also managed to hijack a Rmnet subnetwork whose bots contain these harmful components. Doctor Web already warned users about the wide distribution of Win32.Rmnet.12 andWin32.Rmnet.16 programs that...
---------------------------------------------
http://news.drweb.com/show/?i=3551&lng=en&c=9
*** Google erneuert SSL-Zertifikate ***
---------------------------------------------
Ab August spendiert Google seinen Diensten neue Zertifikate. Vor allem sollen die mit alten 1024-Bit-RSA-Keys ausrangiert und gegen solche mit 2048 Bit ersetzt werden.
---------------------------------------------
http://www.heise.de/security/meldung/Google-erneuert-SSL-Zertifikate-186915…
*** Malware dont need Coffee ***
---------------------------------------------
On the 10th of may was advertised on underground forum by bomba_service a new Ransomware in Affiliate mode.
---------------------------------------------
http://malware.dontneedcoffee.com/2013/05/unveiling-locker-bomba-aka-lucky-…
*** 0-Days in Novell Client für Windows ***
---------------------------------------------
Wer noch Novell Client für Windows einsetzt, sollte sich nach Alternativen umsehen.
---------------------------------------------
http://www.heise.de/security/meldung/0-Days-in-Novell-Client-fuer-Windows-1…
*** Vuln: MediaWiki Arbitrary File Upload Vulnerability ***
---------------------------------------------
MediaWiki is prone to a vulnerability that lets attackers upload arbitrary files. An attacker may leverage this issue to upload arbitrary files to the affected computer. Note that this issue could be exploited to execute arbitrary code, however, this has not been confirmed.
---------------------------------------------
http://www.securityfocus.com/bid/60077
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-05-2013 18:00 − Donnerstag 23-05-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** New Trojan steals short messages ***
---------------------------------------------
May 22, 2013 Russian anti-virus company Doctor Web is warning users about a new Trojan for Android that can intercept inbound short messages and forward them to criminals. Android.Pincer.2.origin poses a serious threat because stolen messages can contain sensitive information such as mTAN codes which are used to confirm online banking transactions. The Trojan, discovered by Doctor Webs analysts several days ago, is a second representative of the Android.Pincer malware family. Like its...
---------------------------------------------
http://news.drweb.com/show/?i=3549&lng=en&c=9
*** CODESYS–Gateway Use After Free ***
---------------------------------------------
This advisory provides mitigation details for a vulnerability that impacts the 3S CODESYS Gateway application
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-142-01
*** IBM Tivoli Monitoring cross-site scripting ***
---------------------------------------------
IBM Tivoli Monitoring is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using Tivoli Enterprise Portal browser client to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83328
*** Antwortbegrenzung ***
---------------------------------------------
Angesichts zunehmender DNS-Attacken denkt das Denic an eine Begrenzung Antworten auf Domainanfragen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/DNS-Attacken-Denic-schliesst-das-Kap…
*** Apple QuickTime Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Appe QuickTime, which can be exploited by malicious people to compromise a user's system.
---------------------------------------------
https://secunia.com/advisories/53520
*** Flagallery-Skins plugin for WordPress gallery.php SQL injection ***
---------------------------------------------
Flagallery-Skins plugin for WordPress is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the gallery.php script using the playlist parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84445
*** Oracle Java ist verbreitetste Sicherheitslücke ***
---------------------------------------------
Laut einer aktuellen Quartalsanalyse des Virenschutzherstellers Kaspersky stieg die Zahl der Bedrohungen über das Internet gegenüber dem Vorquartal um 1,5 Prozentpunkte. Den Spitzenplatz unter den Ländern, von denen Schadprogramme ausgehen, gab Russland wieder an die USA ab. Bei den Sicherheitslücken ist Oracle Java weiter führend.
---------------------------------------------
http://futurezone.at/digitallife/16038-oracle-java-ist-verbreitetste-sicher…
*** IT security vendors seen as clueless on industrial control systems ***
---------------------------------------------
Even the most innocuous security processes used for traditional IT systems could spell disaster in an ICS
---------------------------------------------
http://www.csoonline.com/article/733873/it-security-vendors-seen-as-clueles…
*** Mac Spyware Bait: Lebenslauf für Praktitkum ***
---------------------------------------------
As a follow up to yesterdays Kumar in the Mac post… have you received e-mail attachments such as this?Attachments: • Christmas_Card.app.zip • Content_for_Article.app.zip • Content_of_article_for_[NAME REMOVED].app.zip • Interview_Venue_and_Questions.zip • Lebenslauf_für_Praktitkum.zipIf so, you may be the target of a spear phishing campaign designed to install a spyware on your Mac.Heres a list of binaries signed by Apple Developer "Rajinder...
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002559.html
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 21-05-2013 18:00 − Mittwoch 22-05-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Researchers find critical vulnerabilities in popular game engines ***
---------------------------------------------
Attackers could exploit the flaws to compromise game clients and servers, researchers from ReVuln said
---------------------------------------------
http://www.csoonline.com/article/733773/researchers-find-critical-vulnerabi…
*** WordPress Events Manager Plugin Multiple Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been discovered in the Events Manager plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53478
*** Bugtraq: Multiple Vulnerabilities in Wordpress Plugins ***
---------------------------------------------
[waraxe-2013-SA#104] - Multiple Vulnerabilities in Spider Event Calendar Wordpress Plugin
[waraxe-2013-SA#105] - Multiple Vulnerabilities in Spider Catalog Wordpress Plugin
---------------------------------------------
http://www.securityfocus.com/archive/1/526660http://www.securityfocus.com/archive/1/526661
*** The Top 10 Internet Resources to Use After Suffering a Cyber Breach ***
---------------------------------------------
Most cyber breaches into your online presence will be directed at your website server and its accompanying databases or accounts. And, if you’ve been the victim of a server hack, it probably occurred through one of two different means. The first would be an attack at some sort of weakness in third party web applications, or...
---------------------------------------------
http://resources.infosecinstitute.com/the-top-10-internet-resources-to-use-…
*** Oracle Solaris Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/53462https://secunia.com/advisories/53468
*** Bugtraq: Trend Micro DirectPass 1.5.0.1060 - Multiple Vulnerabilities ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple software vulnerabilities in the official Trend Micro DirectPass v1.5.0.1060 Software.
---------------------------------------------
http://www.securityfocus.com/archive/1/526658
*** Apache Struts "ParameterInterceptor" Security Bypass Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/53495
*** IBM Eclipse Help System information disclosure ***
---------------------------------------------
Multiple IBM products could allow a remote attacker to obtain sensitive information, caused by an error in the IBM Eclipse Help System. A specially-crafted URL could cause an error message to be returned in the browser that may contain sensitive information.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83613
*** DHS to Share Zero-Day Intelligence ***
---------------------------------------------
The U.S. Department of Homeland Security (DHS) is developing a system that will enable classified vulnerability data to be shared with the private sector. The information, primarily Zero-Day vulnerability data, will be sold via a select group of service providers.
Siehe auch: http://www.dhs.gov/enhanced-cybersecurity-services
Siehe auch: http://www.csoonline.com/article/733557/experts-ding-dhs-vulnerability-shar…
---------------------------------------------
http://www.securityweek.com/dhs-share-zero-day-intelligence
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 17-05-2013 18:00 − Dienstag 21-05-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Suchmaschine für Internet Census 2012 ***
---------------------------------------------
Die gewaltigen Datenmengen, die bei einem Portscan des gesamten Internets aufgelaufen sind, kann man jetzt auch komfortabel online durchsuchen.
---------------------------------------------
http://www.heise.de/security/meldung/Suchmaschine-fuer-Internet-Census-2012…
*** SSL: Another reason not to ignore IPv6, (Fri, May 17th) ***
---------------------------------------------
Currently, many public web sites that allow access via IPv6 do so via proxies. This is seen as the "quick fix", as it requires minimum changes to the site itself. As far as the web application is concerned, all incoming traffic is IPv4. The most obvious issue here is logging, in that the application only "sees" the proxies IP address, unless it inspects headers added by the proxy, which will no point to (unreadable?) IPv6 addresses. But there is another issue: SSL
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15833&rss
*** CKEditor comment or content post cross-site scripting ***
---------------------------------------------
CKEditor is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using the comment or content post field to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site,...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84356
*** Vuln: WordPress Mail On Update Plugin Cross Site Request Forgery Vulnerability ***
---------------------------------------------
The Mail On Update plugin for WordPress is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected application. Other attacks are also possible.
---------------------------------------------
http://www.securityfocus.com/bid/59932
*** Hitachi JP1/Automatic Operation unspecified cross-site scripting ***
---------------------------------------------
Hitachi JP1/Automatic Operation is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site,...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84365
*** Remote Code Injection Vulnerabilities Discovered in iOS Apps ***
---------------------------------------------
Multiple vulnerabilities have been discovered in both File Lite and File Pro, two file management applications created by Perception Systems for iOS, currently available on Apple’s App Store.
---------------------------------------------
http://threatpost.com/remote-code-injection-vulnerabilities-discovered-in-i…
*** Security Update: URL Manipulation Vulnerability in IBM WebSphere Portal versions ***
---------------------------------------------
URL manipulation security vulnerabilities for IBM WebSphere Portal may allow a remote attacker to traverse directories on the system and view information contained in files. These vulnerabilities are susceptible to an exploit in the wild. Please review the updated security bulletins (see links below). CVE(s): CVE-2012-2181 and CVE-2012-4834 Affected product(s): IBM WebSphere Portal Affected version(s): 7.0.0.x and 8.0 Refer to the following reference URLs for remediation and additional...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_update_url_m…
*** IBM WebSphere DataPower Appliance echo web service cross-site scripting ***
---------------------------------------------
IBM WebSphere DataPower Appliance is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site,...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/82221
*** Mitsubishi MX Component V3 ActiveX Vulnerability ***
---------------------------------------------
This advisory recommends upgrading to MX Component 4.03 that is not affected by this vulnerability.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-140-01
*** Moodle Multiple Vulns ***
---------------------------------------------
Topic: Moodle Multiple Vulns Risk: Medium Text:The following security notifications are now public. Thanks to OSS members for their cooperation. =...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013050156
*** [remote] - Linksys WRT160nv2 apply.cgi Remote Command Injection ***
---------------------------------------------
Some Linksys Routers are vulnerable to an authenticated OS command injection on their web interface where default credentials are admin/admin or admin/password. Since it is a blind OS command injection vulnerability, there is no output for the executed command when using the cmd generic payload.
---------------------------------------------
http://www.exploit-db.com/exploits/25608
*** Safeguarding ISPs from DDoS Attacks ***
---------------------------------------------
A distributed-denial-of-service attack in Europe highlights the need for Internet service providers to implement security best practices to prevent future incidents, ENISAs Thomas Haeberlen says.
---------------------------------------------
http://www.databreachtoday.asia/safeguarding-isps-from-ddos-attacks-a-5773
*** National Cyber Security Strategies in the World ***
---------------------------------------------
A free and open Internet is at the heart of the new Cyber Security Strategy by the European Union High Representative Catherine Ashton and the European Commission. The new Communication is the first comprehensive policy document that the European Union has produced in this area. It comprises internal market, justice and home affairs and the foreign policy aspects of cyberspace issues. ENISA has listed all the documents of National Cyber Security Strategies in the EU but also in the world.
---------------------------------------------
https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-s…
*** Dovecot IMAP "APPEND" Parameters Processing Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Dovecot, which can be exploited by malicious users to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within IMAP functionality when processing the "APPEND" parameters and can be exploited to cause a hang.
---------------------------------------------
https://secunia.com/advisories/53492
*** IBM Maximo Asset Management Products Java Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Maximo Asset Management products, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53451
*** SAProuter NI Route Message Handling Vulnerability ***
---------------------------------------------
ERPScan has reported a vulnerability in SAProuter, which can be exploited by malicious people to potentially compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53436
*** Bugtraq: Revision of "IPv6 Stable Privacy Addresses" (Fwd: I-D Action: draft-ietf-6man-stable-privacy-addresses-07.txt) ***
---------------------------------------------
We have published a revision of our IETF I-D "A method for Generating
Stable Privacy-Enhanced Addresses with IPv6 Stateless Address
Autoconfiguration (SLAAC)".
---------------------------------------------
http://www.securityfocus.com/archive/1/526646
*** Security Bulletin: IBM TS3310 Tape Library update for security vulnerabilities in OpenSSL (CVE-2013-0169) ***
---------------------------------------------
Download an update to the TS3310 Tape Library, which contains a newer version of OpenSSL that fixes certain security vulnerabilities that were present in older versions of OpenSSL. CVEID: CVE-2013-0169 Affected product(s) and affected version(s): All TS3310 tape libraries with firmware versions lower than 636G Refer to the following reference URLs for remediation and additional vulnerability details. Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004345 X-Force
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 16-05-2013 18:00 − Freitag 17-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** Android.RoidSec: This app is an info stealing 'sync-hole'! ***
---------------------------------------------
By Nathan Collier Android.RoidSec has the package name 'cn.phoneSync', but an application name of 'wifi signal Fix'. From a Malware 101′ standpoint, you would think the creators would have a descriptive package name that matches the application name. Not so, in this case.
---------------------------------------------
http://blog.webroot.com/2013/05/16/android-roidsec-this-app-is-a-info-steal…
*** vBulletin Input Validation Flaw Lets Remote Users Inject SQL Commands ***
---------------------------------------------
The 'index.php/ajax/api/reputation/vote' script does not properly validate user-supplied input in the 'nodeid' parameter. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.
---------------------------------------------
http://www.securitytracker.com/id/1028543
*** Bank Account Logins for Sale, Courtesy of Citadel Botnet ***
---------------------------------------------
Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques to unlock online bank accounts. Attackers design and develop botnets to perform financial fraud, targeting banks and other institutions for profit.
---------------------------------------------
http://blogs.mcafee.com/mcafee-labs/bank-account-logins-for-sale-courtesy-o…
*** Apple iTunes Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious people to conduct spoofing attacks and compromise a user's system.
---------------------------------------------
https://secunia.com/advisories/53471
*** In a sea of malware, viruses make a small comeback ***
---------------------------------------------
Microsoft has noticed a small uptick in viruses that infect files
---------------------------------------------
http://www.csoonline.com/article/733558/in-a-sea-of-malware-viruses-make-a-…
*** Trying to kill undead Pushdo zombies? Hard luck, Trojan is EVOLVING ***
---------------------------------------------
Malware remains undead, adds double-sneaky stealth mode The crooks behind the Pushdo botnet agent have developed variants of the malware that are more resistant to take-down attempts or hijacking by rival hackers.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/05/17/pushdo_extr…
*** Hintergrund: Mehr Fakten und Spekulationen zu Skypes ominösen Link-Checks ***
---------------------------------------------
Zu Beginn der Woche berichtete heise Security, dass Links, die in privaten Skype-Chat-Sitzungen verschickt werden, kurze Zeit später von einem System von Microsoft besucht werden. Wir beobachteten ausschließlich Zugriffe auf https-URLs.
---------------------------------------------
http://www.heise.de/security/artikel/Mehr-Fakten-und-Spekulationen-zu-Skype…
*** Targeted information stealing attacks in South Asia use email, signed binaries ***
---------------------------------------------
In the past few months, we have analyzed a targeted campaign that tries to steal sensitive information from different organizations throughout the world, but particularly in Pakistan. During the course of our investigations we uncovered several leads that indicate this threat has its origin in India and has been going on for at least two years.
---------------------------------------------
http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/
*** Fake YouTube page targets Chrome users ***
---------------------------------------------
Fake YouTube pages are one of the favored ways attackers leverage to get users to click on malicious content.
---------------------------------------------
http://research.zscaler.com/2013/05/fake-youtube-page-targets-chrome-users.…
*** CSRF vulnerability in LinkedIn 2013 ***
---------------------------------------------
A security company has found an CSRF vulnerability in LinkedIn and they have uploaded an POC on Youtube to show the impact. The Cross Site Request Forgery attack allows the attacker to access information from an contact without the consent/knowledge of the affected user.
---------------------------------------------
http://cyberwarzone.com/csrf-vulnerability-linkedin-2013?
*** Blog: Malicious PACs and Bitcoins ***
---------------------------------------------
Malicious PACs used by Brazilian bad guys aiming to steal bitcoins
---------------------------------------------
http://www.securelist.com/en/blog/208195033/Malicious_PACs_and_Bitcoins
*** April 2013 virus activity review from Doctor Web ***
---------------------------------------------
May 13, 2013 IT security experts will remember April 2013 for several remarkable events. At the beginning of the month, Doctor Webs analysts hijacked a rapidly growing botnet comprised of computers infected with BackDoor.Bulknet.739. The middle of April saw the discovery of a new Trojan of the most common family 'Trojan.Mayachok' and an upsurge of spam containing subject matter related to the terrorist acts that occurred in Boston.
---------------------------------------------
http://news.drweb.com/show/?i=3516&lng=en&c=9
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 15-05-2013 18:00 − Donnerstag 16-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary Code ***
---------------------------------------------
[security bulletin] HPSBUX02859 SSRT101144 rev.3 - HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary Code
---------------------------------------------
http://www.securityfocus.com/archive/1/526607
*** python backports ssl_match_hostname Resource Exhaustion 0day ***
---------------------------------------------
Topic: python backports ssl_match_hostname Resource Exhaustion 0day Risk: Medium Text:A denial of service flaw was found in the way python-backports-ssl_match_hostname, an implementation that brings the ssl.match...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/P8TEFx3kOnQ/WLB-20…
*** Exploit für lokalen Linux-Kernel-Bug im Umlauf ***
---------------------------------------------
Ein bereits im April im Entwickler-Kernel-Zweig gefixter Fehler wurde nicht als sicherheitsrelevant erkannt und lässt sich deshalb auf vielen Systemen immer noch ausnutzen.
---------------------------------------------
http://www.heise.de/security/meldung/Exploit-fuer-lokalen-Linux-Kernel-Bug-…
*** New versatile and remote-controlled 'Android.MouaBot' malware found in the wild ***
---------------------------------------------
By Cameron Palan and Nathan Collier Recently, we discovered a new malicious Android application called Android.MouaBot. This malicious software is a bot contained within another basic app; in this case, a Chinese calculator application. Behind the scenes, it automatically sends an SMS message to an auto-reply number which replies back to the phone ...
---------------------------------------------
http://blog.webroot.com/2013/05/15/new-versatile-and-remote-controlled-andr…
*** Download: Mobile Threat Report Q1 2013 ***
---------------------------------------------
Our Mobile Threat Report Q1 2013 is now publicly available.All of our past reports are also available in the "Labs" section of f-secure.com. On 15/05/13 At 12:45 PM
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002553.html
*** PushDo Malware Resurfaces with DGA Capabilities ***
---------------------------------------------
The PushDo malware family is back, this time with a domain generation algorithm that helps it avoid detection and add resiliency to its capabilities.
---------------------------------------------
http://threatpost.com/pushdo-malware-resurfaces-with-dga-capabilities/
*** zPanel themes remote command execution as root ***
---------------------------------------------
Topic: zPanel themes remote command execution as root
Risk: High
Text:So I saw this earlier today: http://www.reddit.com/r/netsec/comments/1ee0eg/zpanel_support_team_calls_fo… ...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050133
*** Drupal 6.x/7.x Google Authenticator login Access Bypass ***
---------------------------------------------
Topic: Drupal 6.x/7.x Google Authenticator login Access Bypass Risk: High Text:View online: http://drupal.org/node/1995706 * Advisory ID: DRUPAL-SA-CONTRIB-2013-047 * Project: Google Authenticator l...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050134
*** Analysis of Malicious Document Files Spammed by Cutwail ***
---------------------------------------------
Over the past week, the Cutwail botnet has been sending out spam containing malicious documents of the aforementioned vulnerability, CVE-2012-0158. The use of a loaded RTF attachment is a departure from normal for Cutwail, usually it distributes executable attachments or links to exploit kits.
---------------------------------------------
http://blog.spiderlabs.com/2013/05/malicious-document-files-spammed-by-cutw…
*** RIPE: Angriffe auf das Domain Name System nehmen zu ***
---------------------------------------------
Auf dem Treffen der IP-Adressverwaltung RIPE wurde darüber debattiert, die schwarze Scharfe dazu gebracht werden können, überfällige Sicherungen vorzunehmen.
---------------------------------------------
http://www.heise.de/security/meldung/RIPE-Angriffe-auf-das-Domain-Name-Syst…
*** Mac Spyware Found at Oslo Freedom Forum ***
---------------------------------------------
The Oslo Freedom Forum is an annual event "exploring how best to challenge authoritarianism and promote free and open societies." This years conference (which took place May 13-15) had a workshop for freedom of speech activists on how to secure their devices against government monitoring. During the workshop, Jacob Appelbaum actually discovered a new and previously unknown backdoor on an African activists Mac.Our Mac analyst (Brod) is currently investigating the sample.Its signed with
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002554.html
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 14-05-2013 18:00 − Mittwoch 15-05-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Microsoft Customer Protections for May 2013 ***
---------------------------------------------
Today, we are releasing 10 bulletins, addressing 33 vulnerabilities in Microsoft products. Before we get into the details, we wanted to first let our enterprise customers know about a change in how we’re communicating technical details within our security advisories. Starting today, customers will be able to clearly identify key security updates within advisories. For further details, please visit Knowledge Base article 2849195. Let’s talk about the updates that we released today.
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/05/14/microsoft-customer-prote…
*** Apache mod_rewrite Input Validation Flaw Lets Remote Users Execute Arbitrary Commands ***
---------------------------------------------
A vulnerability was reported in Apache mod_rewrite. A remote user can cause arbitrary commands to be executed on the target user's system.
---------------------------------------------
http://www.securitytracker.com/id/1028540
*** Cisco Unified Communications Manager Authentication Denial of Service ***
---------------------------------------------
A vulnerability in device authentication of Cisco Unified Communications Manager (CUCM) could allow an unauthenticated, remote attacker to impact application response.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** Security Bulletin: IBM Security Virtual Server Protection for VMware System can be affected by vulnerabilities in OpenSSL ***
---------------------------------------------
IBM Security Virtual Server Protection for VMware System can be affected by several vulnerabilities in OpenSSL. These vulnerabilities include obtaining sensitive information and denial of service vulnerabilities that could be exploited remotely by an attacker.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21636105
*** ownCloud Multiple Vulnerabilities ***
---------------------------------------------
A weakness and multiple vulnerabilities have been reported in ownCloud, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, conduct SQL injection attacks, and compromise a vulnerable system and by malicious people to conduct spoofing and cross-site scripting and request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53392
*** Adobe Security Bulletins Posted ***
---------------------------------------------
Adobe published the following Security Bulletins today: APSB13-13 – Security update: Hotfix available for ColdFusion APSB13-14 – Security updates available for Adobe Flash Player APSB13-15 – Security updates available for Adobe Reader and Acrobat Customers of the affected products should...
---------------------------------------------
http://blogs.adobe.com/psirt/2013/05/adobe-security-bulletins-posted-7.html
*** New 1day Exploits: Mutiny Vulnerabilities ***
---------------------------------------------
The Mutiny Appliance provides a Web Frontend, where the users can configure the system and monitor the data collected by the appliance. The Frontend provides four access roles: “Super Admin”, “Administrator”, “Engineer” and “View only”. All the roles allow the user to access to the “Documents” section, where multiple weaknesses have been detected...
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-…
*** WordPress 1player Plugin VideoJS Cross-Site Scripting Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/53445
*** WordPress S3 Video Plugin VideoJS Cross-Site Scripting Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/53437
*** WordPress Video Embed & Thumbnail Generator Plugin VideoJS Cross-Site Scripting Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/53426
*** WordPress External "Video for Everybody" Plugin VideoJS Cross-Site Scripting Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/53396
*** Ruby DL and Fiddle Tained Object Handling Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Ruby, which can be exploited by malicious people to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/53432
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 13-05-2013 18:00 − Dienstag 14-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** It's official: Password strength meters aren't security theater ***
---------------------------------------------
Does your password go up to 11? Probably not. But one day it could.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/fbIJ27hOPLI/
*** Kerberos kpasswd UDP ping-pong vulnerability ***
---------------------------------------------
Topic: Kerberos kpasswd UDP ping-pong vulnerability Risk: High
Text:This flaw has commonly been referred to as CVE-1999-0103 because that CVE also describes a UDP ping-pong attack. The same typ...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050118
*** Vuln: Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability ***
---------------------------------------------
Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/59826
*** Telekom lanciert Cloud-Service zum Aufspüren von Sicherheitslücken ***
---------------------------------------------
Mit dem Developer Garden Code Analyzer bietet die Deutsche Telekom eine Cloud-basierte statische Code-Analyse zum Finden von Sicherheitslücken in Web-Anwendungen und mobilen Apps.
---------------------------------------------
http://www.heise.de/security/meldung/Telekom-lanciert-Cloud-Service-zum-Auf…
*** Travnet Botnet Controls Victims With Remote Admin Tool ***
---------------------------------------------
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more...
---------------------------------------------
http://blogs.mcafee.com/mcafee-labs/travnet-botnet-controls-victims-with-re…
*** Vorsicht beim Skypen - Microsoft liest mit ***
---------------------------------------------
Wer glaubt, ein Skype-Chat wäre privat, unterliegt einem unter Umständen folgenschweren Irrtum. Wie heise Security feststellten musste, wertet Skype beziehungsweise Microsoft alle verschickten Daten aus.
---------------------------------------------
http://www.heise.de/security/meldung/Vorsicht-beim-Skypen-Microsoft-liest-m…
*** WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
Charlie Eriksen has discovered a vulnerability in the Related Posts plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53122
*** AV-Software beseitigt Unrat des BKA-Trojaners ***
---------------------------------------------
Nach einem Stupser durch heise Security und das BSI erkennen und entfernen Antiviren-Programme nun auch die nachgeladenen kinderpornographischen Bilder des BKA-Trojaners.
---------------------------------------------
http://www.heise.de/security/meldung/AV-Software-beseitigt-Unrat-des-BKA-Tr…
*** Back to skule: One Pad, Two Pad, Me Pad, You Pad - Cryptanalysis for beginners ***
---------------------------------------------
A couple of weeks ago, Kev Sheldrake from Head Hacking gave a fascinating talk on NLP and Social Engineering at Londons DEFCON group, DC4420 (called "Social Engineering Lies!"). Afterwards, over drinks, he told me about a free cryptography course that Stanford was running, and how much fun he and his workmates were having competing with each other to solve the homework problems that were set each week...
---------------------------------------------
http://adamsblog.aperturelabs.com/2013/05/back-to-skule-one-pad-two-pad-me-…
*** Beta-Bot ergaunert sich Admin-Rechte und killt Virenscanner ***
---------------------------------------------
Mit einem perfiden Trick versucht der Bot, sein Opfer dazu zu bringen, einen UAC-Dialog abzunicken. Die Admin-Rechte benötigt er, um anschließend den Virenscanner abzuschießen.
---------------------------------------------
http://www.heise.de/security/meldung/Beta-Bot-ergaunert-sich-Admin-Rechte-u…
*** WiFi Album application for iPad and iPhone command execution ***
---------------------------------------------
WiFi Album application for iPad and iPhone could allow a local attacker to execute arbitrary commands on the system, caused by an error in the index module when processing to load the unique ipad or iphone photo album folder names.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84162
*** Debian Security Advisory DSA-2667 mysql-5.5 ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2667
*** Debian Security Advisory DSA-2666 xen ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2666
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 10-05-2013 18:00 − Montag 13-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: L. Aaron Kaplan
*** Android.TechnoReaper Downloader Found on Google Play ***
---------------------------------------------
By Nathan Collier We have found a new threat we are calling Android.TechnoReaper. This malware has two parts: a downloader available on the Google Play Market and the spyware app it downloads. The downloaders are disguised as font installing apps, as seen below: Once you install the app, it looks like a nice app used
---------------------------------------------
http://blog.webroot.com/2013/05/10/android-technoreaper-downloader-found-on…
*** Google Has Aggressive Plans for Strong Authentication ***
---------------------------------------------
Google has a long-term plan for strong authentication that ties log-ins to the operating system and hardware, and puts up barriers against man in the middle attacks and weak passwords.
---------------------------------------------
http://threatpost.com/google-has-aggressive-plans-for-strong-authentication/
*** Samsung Officeserv Read the users/passwords ***
---------------------------------------------
Topic: Samsung Officeserv Read the users/passwords Risk: Medium
Text:# Title:samsung officeserv Read the users/passwords
# Author: MaDo Mokhtar
# Contact: codezeroooo[at]yahoo[dot]com # Vendo...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050087
*** RSA Authentication Agent cross-site scripting ***
---------------------------------------------
RSA Authentication Agent cross-site scripting
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84155
*** Cybercriminals offer HTTP-based keylogger for sale, accept Bitcoin ***
---------------------------------------------
By Dancho Danchev In 2013, Liberty Reserve and Web Money remain the payment method of choice for the majority of Russian/Eastern European cybercriminals. Cybercrime-as-a-Service underground market propositions, malware crypters, R.A.Ts (Remote Access Trojans), brute-forcing tools etc. virtually every underground market product/service is available for purchase through the use of these ubiquitous virtual currencies. What's the situation on the international underground
---------------------------------------------
http://blog.webroot.com/2013/05/10/cybercriminals-offer-http-based-keylogge…
*** WordPress Securimage-WP Plugin v3.2.4 URI-based XSS Vulnerability ***
---------------------------------------------
Topic: WordPress Securimage-WP Plugin v3.2.4 URI-based XSS Vulnerability Risk: Low Text:Wordpress Securimage-WP Plugin v3.2.4 URI-based XSS Vulnerability Vendor: Securimage PHP CAPTCHA Product web page: https:...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050098
*** WordPress Search and Share plugin vulnerabilities ***
---------------------------------------------
Topic: WordPress Search and Share plugin vulnerabilities Risk: Low Text:I want to inform you about vulnerabilities in Search and Share plugin for WordPress. These are Cross-Site Scripting and Ful...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050103
*** DDoS Services Advertise Openly, Take PayPal ***
---------------------------------------------
The past few years have brought a proliferation of online services that can be hired to knock Web sites and individual Internet users offline. Once only found advertised in shadowy underground forums, many of todays so-called "booter" or "stresser" services are operated by U.S. citizens who openly advertise their services while hiding behind legally dubious disclaimers. Oh, and they nearly all rely on Paypal to receive payments.Related Posts:Privacy 101: Skype Leaks Your
---------------------------------------------
https://krebsonsecurity.com/2013/05/ddos-services-advertise-openly-take-pay…
*** Dangerous Trojan substitutes web pages ***
---------------------------------------------
May 7, 2013 Specialists from the Russian anti-virus company Doctor Web have studied one of the most widespread threats in April 2013, the Trojan Trojan.Mods.1, formerly known as Trojan.Redirect.140. According to statistics compiled by the curing utility Dr.Web CureIt!, the number of infections with this Trojan represent 3.07% of the total number of detected threats. A summary of the study can be found below. The Trojan has two components: the dropper and the dynamic link library which stores
---------------------------------------------
http://news.drweb.com/show/?i=3511&lng=en&c=9
*** Newly launched E-shop for hacked PCs charges based on malware 'executions' ***
---------------------------------------------
By Dancho Danchev On the majority of occasions, Cybercrime-as-a-Service vendors will sell access to malware-infected hosts to virtually anyone who pays for them, without bothering to know what happens once the transaction takes place. A newly launched E-shop for malware-infected hosts, however, has introduced a novel approach for calculating the going rate for the hacked PCs.
---------------------------------------------
http://blog.webroot.com/2013/05/13/newly-launched-e-shop-for-hacked-pcs-cha…
*** Blog: Telecom fraud - phishing and Trojans combined ***
---------------------------------------------
In China telecom fraud has become an increasingly common crime.
---------------------------------------------
http://www.securelist.com/en/blog/877/Telecom_fraud_phishing_and_Trojans_co…
*** Trojaner kapert Facebook-Accounts ***
---------------------------------------------
Eine bösartige Browsererweiterung befüllt Googles Chrome und Mozillas Firefox. Sie hat es auf Facebook-Konten abgesehen.
---------------------------------------------
http://www.heise.de/security/meldung/Trojaner-kapert-Facebook-Accounts-1861…
*** Researchers uncovered new malware used by Chinese cyber criminals ***
---------------------------------------------
Trend Micro researchers have uncovered a new backdoor pieces of malware from the Winnti family, which are mainly used by a Chinese cyber criminal group to target South East Asian organizations from the video gaming sector.
---------------------------------------------
http://thehackernews.com/2013/05/researchers-uncovered-new-malware-used.html
*** AWS EC2 Security Vulnerability and Pinterest Hacked ***
---------------------------------------------
Well, almost hacked. This is rather embarassing (for Pinterest, and maybe AWS?), in that I was able to access what seemed to be their admin page. Furthermore, I discovered through this interface that it seems they do not store passwords encrypted or salted.
---------------------------------------------
http://www.jontsai.com/2013/05/11/aws-ec2-security-vulnerability-and-pinter…
*** Introducing Conpot ***
---------------------------------------------
We proudly announce the first release of our Industrial Control System honeypot named Conpot. Until now setting up an ICS honeypot required substantial manual work, real systems which are usually either inaccessible or expensive and lecture of quite tedious protocol specifications.
---------------------------------------------
http://www.honeynet.org/node/1047
*** Attackers Target Older Java Bugs ***
---------------------------------------------
It's no secret that Java has moved to the top of the target list for many attackers. It has all the ingredients they love: ubiquity, cross-platform support and, best of all, lots of vulnerabilities. Malware targeting Java flaws has become a major problem, and new statistics show that this epidemic is following much the same [...]
---------------------------------------------
http://threatpost.com/attackers-target-older-java-bugs/
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 09-05-2013 18:00 − Freitag 10-05-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Microsoft Fix It Available for IE 8 Zero Day Used Against Labor Website ***
---------------------------------------------
Microsoft released a Fix It temporary mitigation for a zero-day vulnerability in Internet Explorer 8 that was used in a watering hole attack against the U.S. Department of Labors website.
---------------------------------------------
http://threatpost.com/microsoft-fix-it-available-for-ie-8-zero-day-used-aga…
*** Advance Notification Service for the May 2013 Security Bulletin Release ***
---------------------------------------------
Today we’re providing Advance Notification of 10 bulletins for release on Tuesday, May 14, 2013. This release brings two Critical and eight Important-class bulletins, which address 34 unique vulnerabilities. The Critical-rated bulletins address issues in Microsoft Windows and Internet Explorer. Of note, we are working to have the Internet Explorer Security Update address the issue described in Security Advisory 2847140, supplementing the currently available Fix it. The Important-rated...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/05/09/advance-notification-ser…
*** Name.com Breached, Users Asked to Reset Passwords ***
---------------------------------------------
Domain registrar Name.com is asking its customers to reset their passwords following a data breach.
---------------------------------------------
http://threatpost.com/name-com-breached-users-asked-to-reset-passwords/
*** Microsoft EMET 4.0 Enables Certificate Pinning to Defeat MITM Attacks ***
---------------------------------------------
Microsoft later this month will release a new version of its EMET protection tool, and this iteration will include a certificate pinning feature that will enable users to associate a specific certificate with a given certificate authority. The feature is designed a defense against man-in-the-middle attacks that use forged certificates to redirect users or intercept [...]
---------------------------------------------
http://threatpost.com/microsoft-emet-4-0-enables-certificate-pinning-to-def…
*** Bugtraq: [security bulletin] HPSBMU02786 SSRT100877 rev.2 - HP System Management Homepage (SMH) Running on Linux, Windows, and VMware ESX, Remote Unauthorized Access, Disclosure of Information, Data Modification, Denial of Service (DoS), Execution ***
---------------------------------------------
Potential Security Impact: Remote unauthorized access, disclosure of
information, data modification, Denial of Service (DoS), execution of
arbitrary code
---------------------------------------------
http://www.securityfocus.com/archive/1/526566
*** Bugtraq: ESA-2013-021: EMC Documentum Multiple Vulnerabilities ***
---------------------------------------------
Vulnerabilities exist in several EMC Documentum products that could potentially be exploited by a malicious user.
---------------------------------------------
http://www.securityfocus.com/archive/1/526570
*** Prenotification: Upcoming Security Updates for Adobe Reader and Acrobat (APSB13-15) ***
---------------------------------------------
A prenotification Security Advisory has been posted in regards to upcoming Adobe Reader and Acrobat updates scheduled for Tuesday, May 14, 2013. We will continue to provide updates on the upcoming release via the Security Advisory section of the Adobe...
---------------------------------------------
http://blogs.adobe.com/psirt/2013/05/prenotification-upcoming-security-upda…
*** Security Advisory for ColdFusion (APSA13-03) ***
---------------------------------------------
A Security Advisory (APSA13-03) has been posted in regards to a critical issue in ColdFusion 10, 9.0.2, 9.0.1 and 9.0 and earlier versions for Windows, Macintosh and UNIX. Adobe is aware of reports that exploit code for the vulnerability is...
---------------------------------------------
http://blogs.adobe.com/psirt/2013/05/security-advisory-for-coldfusion-apsa1…
*** WordPress xili-language Plugin "lang" Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in the xili-language plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53364
*** CSRF-Lücke im OpenVPN Access Server geschlossen ***
---------------------------------------------
Durch eine Schwachstelle können sich Angreifer potenziell VPN-Zugänge erschleichen.
---------------------------------------------
http://www.heise.de/security/meldung/CSRF-Luecke-im-OpenVPN-Access-Server-g…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 07-05-2013 18:00 − Mittwoch 08-05-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** A short introduction to TPMs ***
---------------------------------------------
Ive been working on TPMs lately. It turns out that theyre moderately awful, but whats significantly more awful is basically all the existing documentation. So heres some of what Ive learned, presented in the hope that it saves someone else some amount of misery.What is a TPM?TPMs are devices that adhere to the Trusted Computing Groups Trusted Platform Module specification. Theyre typically microcontrollers[1] with a small amount of flash, and attached via either i2c (on embedded devices) or...
---------------------------------------------
http://mjg59.dreamwidth.org/24818.html
*** IBM WebSphere DataPower XC10 security bypass ***
---------------------------------------------
Description: IBM WebSphere DataPower XC10 could allow a remote attacker to send administrative operations without providing authentication credentials.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83617
*** Brother MFC-9970CDW Firmware 0D Cross Site Scripting ***
---------------------------------------------
Topic: Brother MFC-9970CDW Firmware 0D Cross Site Scripting Risk: Low Text: == Brother MFC-9970CDW Firmware 0D Date: Jan. 13, 2013 URL: http://www.cloudscan.me/2013/05/xss-javascri...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/daraqfRQFuQ/WLB-20…
*** Inside RDPxTerm (panel 5.1 - bot 4.4.2) aka Neshta C&C - Botnet control panel ***
---------------------------------------------
http://malware.dontneedcoffee.com/2013/05/inside-rdpxterm-bot-442-panel-51-…
*** mTAN-Trojaner via SMS und Google Play ***
---------------------------------------------
Mehrere Leser berichten von SMS-Nachrichten, die zur Installation einer angeblichen Zertifikats-App auffordern. Der AV-Hersteller Lookout hat einen dieser mTAN-Trojaner unterdessen auch in Googles Play Store entdeckt.
---------------------------------------------
http://www.heise.de/security/meldung/mTAN-Trojaner-via-SMS-und-Google-Play-…
*** [webapps] - ColdFusion 9-10 - Remote Root Exploit ***
---------------------------------------------
http://www.exploit-db.com/exploits/25305
*** [webapps] - MoinMoin - Arbitrary Command Execution ***
---------------------------------------------
http://www.exploit-db.com/exploits/25304
*** WordPress WP-PostViews Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/53127
*** IBM OpenPages GRC Platform Multiple Java Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/53357
*** WordPress GRAND FlAGallery Plugin "gid" SQL Injection Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/53356
*** Webserver-Rootkit befällt auch lighttpd und nginx ***
---------------------------------------------
Die Virenforscher von Eset haben Linux/Cdorked.A auf weiteren Servertypen entdeckt. Der Schädling leitet Webseitenbesucher auf gefährliche Seiten um, die versuchen, das System durch Sicherheitslücken mit Schadcode zu infizieren.
---------------------------------------------
http://www.heise.de/security/meldung/Webserver-Rootkit-befaellt-auch-lightt…
*** Hacked DNS Servers Used in Linux/Cdorked Malware Campaign ***
---------------------------------------------
The attack that employed compromised Apache Web server binaries is turning out to be more complex than originally thought, as researchers now have found that the attackers also are using Trojaned Nginx and Lighttpd binaries as part of the campaign. More concerning, though, is the possibility that the attacks also have compromised a number of [...]
---------------------------------------------
http://threatpost.com/hacked-dns-servers-used-in-linuxcdorked-malware-campa…
*** Basic Use of Maltego for Network Intelligence Gathering ***
---------------------------------------------
https://www.youtube.com/watch?&v=e33NSUkyEg0
---------------------------------------------
http://www.frontlinesentinel.com/2013/05/basic-use-of-maltego-for-network.h…
Next End-of-Shift report on 2013-05-10
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 06-05-2013 18:00 − Dienstag 07-05-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Bugtraq: ESA-2013-015: RSA Archer® GRC Multiple Vulnerabilities ***
---------------------------------------------
ESA-2013-015: RSA Archer® GRC Multiple Vulnerabilities
---------------------------------------------
http://www.securityfocus.com/archive/1/526542
*** Is there an epidemic of typo squatting?, (Tue, May 7th) ***
---------------------------------------------
One of our readers, Jim, wrote in earlier today to say he has noticed an increase in "working" typo squatting over the last 2 months or so. That is, hes seen users accidently surfing to them or being redirected there by some sort of malicious javascript trickery. His question for us (and the rest of you) is, is this a local phenomenon or are the bad guys making more use of this tactic? Im not currently setup to monitor this type of activity, so I figured Id ask our loyal readers. Do...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15740&rss
*** Security Bulletin: IBM Content Collector affected by vulnerabilities in IBM Java SDK ***
---------------------------------------------
Multiple security vulnerabilities exist in the IBM Java SDK that is shipped with IBM Content Collector.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21634236
*** Security Bulletin: IBM Notes PNG integer overflow (CVE-2013-2977) ***
---------------------------------------------
IBM Notes has an integer overflow vulnerability which may be triggered by viewing a malformed PNG image.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21635878
*** Security Bulletin: Multiple security vulnerabilities addressed in IBM Sterling Secure Proxy ***
---------------------------------------------
IBM Sterling Secure Proxy is vulnerable to spoofing and information disclosure attacks.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21636369
*** MyBB Game Section Plugin "des" and "s" Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/53296
*** Hacker verschafften sich Zugriff auf alle .edu-Domains ***
---------------------------------------------
Die Hackergruppe "Hack The Planet" veröffentlicht Informationen zu Lücken in MoinMoin und ColdFusion, über die sie sich unter anderem Zugriff auf alle .edu-Domains, die Website des Sicherheitstools Nmap sowie andere prominente Websites verschaffte.
---------------------------------------------
http://www.heise.de/security/meldung/Hacker-verschafften-sich-Zugriff-auf-a…
*** Wonderware Information Server Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for multiple vulnerabilities that impact the Invensys Wonderware Information Server (WIS) software.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-113-01
*** Bugtraq: SEC Consult SA-20130507-0 :: Multiple vulnerabilities in NetApp OnCommand System Manager ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526552
*** Honeywords sollen Passwortdiebe in die Falle locken ***
---------------------------------------------
Zwei Krypto-Forscher schlagen vor, Datendiebe mit Köder-Passwörten zu überführen. Loggt sich jemand mit einem der sogenannten Honeywords ein, ist ziemlich sicher etwas faul.
---------------------------------------------
http://www.heise.de/security/meldung/Honeywords-sollen-Passwortdiebe-in-die…
*** nginx "ngx_http_parse_chunked()" Buffer Overflow Vulnerability ***
---------------------------------------------
nginx "ngx_http_parse_chunked()" Buffer Overflow Vulnerability
---------------------------------------------
https://secunia.com/advisories/53248
*** XSS, LFI in Cisco, Linksys E4200 Firmware ***
---------------------------------------------
Reflected XSS + LFI Bugs in the Cisco, Linksys E4200 Wireless Router Firmware Version: 1.0.05 build 7 were discovered by our Researchers in January 2013 and finally acknowledged by Linksys in April 2013. The Vendor is unable to Patch the Vulnerability in a reasonable timeframe.
---------------------------------------------
http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 03-05-2013 18:00 − Montag 06-05-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** What’s a known source of malware doing in an iOS app? Ars investigates ***
---------------------------------------------
Trojans, false positives, and the case of accidental cross contamination.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/suyRCkbyIFE/
*** gpsd AIS driver packet parser denial of service ***
---------------------------------------------
gpsd AIS driver packet parser denial of service
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83982
*** EMC Avamar Client Certificate Validation Flaw Lets Remote Users Spoof the System ***
---------------------------------------------
http://www.securitytracker.com/id/1028511
*** EMC Avamar Authorization Flaw Lets Remote Authenticated Users Access Files ***
---------------------------------------------
http://www.securitytracker.com/id/1028510
*** Microsoft Releases Security Advisory 2847140 ***
---------------------------------------------
Today, we released Security Advisory 2847140 regarding an issue that impacts Internet Explorer 8. Internet Explorer 6, 7, 9 and 10 are not affected by the vulnerability. This issue allows remote code execution if users browse to a malicious website with an affected browser. This would typically occur by an attacker convincing someone to click a link in an email or instant message. Internet Explorer 9 and 10 are not affected by this issue, so upgrading to these versions will help protect you...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/05/03/microsoft-releases-secur…
*** Department of Labor IE 0-day Exploit (CVE-2013-1347) Now Available at Metasploit ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/05/05/departmen…
*** New version of DIY Google Dorks based mass website hacking tool spotted in the wild ***
---------------------------------------------
By Dancho Danchev Need a compelling reason to perform search engine reconnaissance on your website, for the purpose of securing it against eventual compromise? We’re about to give you a good one. A new version of a well known mass website hacking tool has been recently released, empowering virtually anyone who buys it with the capability to [...]
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/8hoG6XIwk8s/
*** Vuln: WordPress Advanced XML Reader Plugin XML External Entity Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/59618
*** Cisco WebEx Cache Directory Read Vulnerability ***
---------------------------------------------
A vulnerability in HTTP processing in multiple Cisco WebEx products could allow an unauthenticated, remote attacker to read files from the cache directory.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** Cisco WebEx Uninitialized Memory Read Vulnerability ***
---------------------------------------------
A vulnerability in HTTP processing in multiple Cisco WebEx products could allow an unauthenticated, remote attacker to read uninitialized memory.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** Bugtraq: VULNERABLE and COMPLETELY outdated 3rd-party libraries/components used in 3CX Phone 6 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526541
*** Bugtraq: [SE-2012-01] New security vulnerabilities and broken fixes in IBM Java ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526540
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 02-05-2013 18:00 − Freitag 03-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Weekly Update: WordPress Total Cache and Mimikatz ***
---------------------------------------------
Someone once described PHP as a "web API for remote code execution," and it's true that PHP is definitely web programming without guardrails. This week's security news was dominated by a RCE vulnerability in a pair of wildly popular WordPress plugins, W3 Total Cache and WP Super Cache, which are written in (wait for it) PHP.
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/05/02/weekly-up…
*** A peek inside a CVE-2013-0422 exploiting DIY malicious Java applet generating tool ***
---------------------------------------------
On a regular basis we profile various DIY (do it yourself) releases offered for sale on the underground marketplace with the idea to highlight the re-emergence of this concept which allows virtually anyone obtaining the leaked tools, or purchasing them, to launch targeted malware attacks. Can DIY exploit generating tools be considered [...]
---------------------------------------------
http://blog.webroot.com/2013/05/02/a-peek-inside-a-cve-2013-0422-exploiting…
*** Android-Virenscanner sind leicht auszutricksen ***
---------------------------------------------
Forscher haben versucht, bekannte Android-Schädlinge an zehn Virenschutzprogramme vorbei zu schleusen und hatten damit zehn Mal Erfolg. Oft genügten minimale Veränderungen an der Malware.
---------------------------------------------
http://www.heise.de/security/meldung/Android-Virenscanner-sind-leicht-auszu…
*** Oracle 11g TNS listener remote Null Pointer Dereference (pre-auth) ***
---------------------------------------------
Topic: Oracle 11g TNS listener remote Null Pointer Dereference (pre-auth) Risk: High Text:High Risk Vulnerability in Oracle Database 11g 1 May 2013 Andy Davis of NCC Group has discovered a High risk vulnerability...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050020
*** New IRC/HTTP based DDoS bot wipes out competing malware ***
---------------------------------------------
Everyday, new vendors offering malicious software enter the underground marketplace. And although many will fail to differentiate their underground market proposition in market crowded with reputable, trusted and verified sellers, others will quickly build their reputation on the basis of their 'innovative' work, potentially stealing some market share and becoming rich by offering the [...]
---------------------------------------------
http://blog.webroot.com/2013/05/03/new-irchttp-based-ddos-bot-wipes-out-com…
*** Multi-Stage Exploit Attacks for More Effective Malware Delivery ***
---------------------------------------------
Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (InterContinental Ballistic Missile) where the first stage, the exploit, puts the rocket in its trajectory and the second stage, the payload, inflicts the damage.
---------------------------------------------
http://www.trusteer.com/blog/multi-stage-exploit-attacks-for-more-effective…
*** Fast digital forensics sniff out accomplices ***
---------------------------------------------
Software that rapidly analyses digital devices and builds a list of a suspects known associates could be a powerful tool for solving crimes.
---------------------------------------------
http://www.newscientist.com/article/mg21829156.200-fast-digital-forensics-s…
*** Adobe to Patch Reader Information Leak Bug ***
---------------------------------------------
Adobe is planning to patch a fairly low severity security vulnerability in all of the current versions of Reader and Acrobat that could enable an attacker to track which users have opened a certain PDF document. The vulnerability can't be used for code execution, but researchers say it could be used as part of a [...]
---------------------------------------------
http://threatpost.com/adobe-to-patch-reader-information-leak-bug/
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 30-04-2013 18:00 − Donnerstag 02-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** Shamoon/DistTrack Malware (Update A) ***
---------------------------------------------
OverviewW32.DistTrack, also known as "Shamoon," is an information-stealing malware that also includes a destructive module. Shamoon renders infected systems useless by overwriting the Master Boot Record (MBR), the partition tables, and most of the files with random data. Once overwritten, the data are not recoverable. Based on initial reporting and analysis of the malware, no evidence exists that Shamoon specifically targets industrial control systems (ICSs) components or U.S.
---------------------------------------------
http://ics-cert.us-cert.gov/jsar/JSAR-12-241-01A
*** More Malware Showing Up on Fake SourceForge Web Sites ***
---------------------------------------------
Malware developers continue to clone SourceForge Web sites that appear to offer the source code for popular gaming software but are actually peddling malicious code tied to the ZeroAccess Trojan. Julien Sobrier, a security researcher for San Jose-based cloud security provider Zscaler, on Tuesday outlined several more malicious versions of the popular file-sharing sites, some [...]
---------------------------------------------
http://threatpost.com/more-malware-showing-up-on-fake-sourceforge-web-sites/
*** [webapps] - D-Link IP Cameras Multiple Vulnerabilities ***
---------------------------------------------
D-Link IP Cameras Multiple Vulnerabilities
---------------------------------------------
http://www.exploit-db.com/exploits/25138
*** DSA-2665 strongswan ***
---------------------------------------------
authentication bypass
---------------------------------------------
http://www.debian.org/security/2013/dsa-2665
*** MediaWiki 1.20.5 and 1.19.6 Multiple Vulns ***
---------------------------------------------
Topic: MediaWiki 1.20.5 and 1.19.6 Multiple Vulns Risk: Medium Text:I would like to announce the release of MediaWiki 1.20.5 and 1.19.6. These releases fix 2 security related issues that could a...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/-pvFzkoA-H4/WLB-20…
*** FortiClient VPN Client Discloses Password to Remote Users in Certain Cases ***
---------------------------------------------
FortiClient VPN Client Discloses Password to Remote Users in Certain Cases
---------------------------------------------
http://www.securitytracker.com/id/1028501
*** Java applets run wild inside Notes ***
---------------------------------------------
Full compromise possible Attackers with a desire to rummage around inside the PCs of Notes users can do so merely by sending HTML emails containing a Java applet or JavaScript, IBM has admitted in a security advisory.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/05/02/java_runs_i…
*** Kritische Schwachstelle in hunderten Industrieanlagen ***
---------------------------------------------
heise Security hat etliche deutsche Industrieanlagen entdeckt, die leichtsinnig mit dem Internet verbunden sind. Doch damit nicht genug: Durch eine Schwachstelle kann quasi jeder die Kontrolle über Heizkraftwerke, Rechenzentren oder Brauereien übernehmen.
---------------------------------------------
http://www.heise.de/security/meldung/Kritische-Schwachstelle-in-hunderten-I…
*** Niederlande: Gesetzentwurf über Entschlüsselungsbefehl ***
---------------------------------------------
Verdächtige sollen gezwungen werden können, das Passwort für verschlüsselte Datenträger herauszugeben. Begründung: Die Festplattenverschlüsselung Truecrypt werde regelmäßig zur Verschleierung von Kinderporno-Besitz genutzt.
---------------------------------------------
http://www.heise.de/security/meldung/Niederlande-Gesetzentwurf-ueber-Entsch…
*** Red Hat update for JBoss Enterprise Application Platform and JBoss Enterprise Web Platform ***
---------------------------------------------
Red Hat update for JBoss Enterprise Application Platform and JBoss Enterprise Web Platform
---------------------------------------------
https://secunia.com/advisories/53208
*** Malicious PDFs On The Rise ***
---------------------------------------------
Throughout 2012, we saw a wide variety of APT campaigns leverage an exploit in Microsoft Word (CVE-2012-0158). This represented a shift, as previously CVE-2010-3333 was the most commonly used Word vulnerability. While we continue to see CVE-2012-0158 in heavy use, we have noticed increasing use of an exploit for Adobe Reader (CVE-2013-0640) that was made infamous by the “MiniDuke” campaign. The malware dropped by these malicious PDFs is not associated with MiniDuke, but it is
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/malicious-pdfs-o…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 29-04-2013 18:00 − Dienstag 30-04-2013 18:00
Handler: Stephan Richter
*** Yahoo! Browser for Android Address Bar Spoofing Weakness ***
---------------------------------------------
https://secunia.com/advisories/53214
*** Ruggedcom ROS Hard-Coded RSA SSL Private Key Update ***
---------------------------------------------
OverviewThis Updated Advisory is a follow-up to the original advisory titled ICSA-12-354-01 RuggedCom ROS Hard-Coded RSA SSL Private Key that was published December 18, 2012, on the ICS-CERT Web page.Independent researcher Justin W. Clarke of Cylance Inc., has identified the use of hard-coded RSA SSL private key in RuggedCom's Rugged Operating System (ROS). RuggedCom, an independent subsidiary of Siemens, has produced a new version of the ROS that mitigates this vulnerability.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-12-354-01A
*** Admin beware: Attack hitting Apache websites is invisible to the naked eye ***
---------------------------------------------
Newly discovered Linux/Cdorked evades detection by running in shared memory.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/MpO11h_pn5M/
*** Apache attack drives traffic to malware ***
---------------------------------------------
Blackhole redirect served by modified daemon binary A security researcher is warning that an attack on the Apache Web server is increasingly showing up in the wild, and has published a free Python tool to check their configurations.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/04/30/apache_dcor…
*** TinyMCE Ajax File Manager Remote Code Execution *youtube ***
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013040207
*** phpMyAdmin 3.5.8 Authenticated Remote Code Execution Exploit ***
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013040203
*** WordPress Easy AdSense Lite Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/52953
*** FreeBSD NFS Server Input Validation Bug May Let Remote Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1028491
*** HP Service Manager Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/53260
*** [TYPO3-announce] [TYPO3-dev] Announcing TYPO3 CMS 6.1.0 Final Release ***
---------------------------------------------
http://typo3.org/download/release-notes/typo3-61-release-notes/
Next End-of-Shift report on 2013-05-02