=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 22-02-2018 18:00 − Freitag 23-02-2018 18:00
Handler: Nina Bieringer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Botched npm Update Crashes Linux Systems, Forces Users to Reinstall ∗∗∗
---------------------------------------------
A bug in npm (Node Package Manager), the most widely used JavaScript package manager, will change ownership of crucial Linux system folders, such as /etc, /usr, /boot.
---------------------------------------------
https://www.bleepingcomputer.com/news/linux/botched-npm-update-crashes-linu…
∗∗∗ Android P Will Block Background Apps from Accessing Phones Camera & Microphone ∗∗∗
---------------------------------------------
Android P, the next major version of the Android operating system, will block idle (background) applications from accessing a smartphones camera or microphone.
---------------------------------------------
https://www.bleepingcomputer.com/news/mobile/android-p-will-block-backgroun…
∗∗∗ Pwned Passwords: Troy Hunt veröffentlicht eine halbe Milliarde Passworthashes ∗∗∗
---------------------------------------------
Bei HaveIBeenPwned können Nutzer aktuell rund eine halbe Milliarde Passwort-Hashes herunterladen. Damit könnten sie Dienste in die Lage versetzen, geleakte Passwörter abzulehnen.
---------------------------------------------
https://www.golem.de/news/pwned-passwords-troy-hunt-veroeffentlicht-eine-ha…
∗∗∗ Mitm6 - Pwning IPv4 Via IPv6 ∗∗∗
---------------------------------------------
Mitm6 is a pentesting tool that exploits the default configuration of Windows to take over the default DNS server. It does this by replying to DHCPv6 messages, providing victims with a link-local IPv6 address and setting the attackers host as default DNS server [...]
---------------------------------------------
https://www.kitploit.com/2018/02/mitm6-pwning-ipv4-via-ipv6.html
∗∗∗ Versionsverwaltung: GitLab 10.5 integriert Verschlüsselung mit Lets Encrypt ∗∗∗
---------------------------------------------
Insgesamt 26 Neuerungen bringt die neue Version von GitLab mit. Spannend sind vor allem die Verschlüsselung mit Lets Encrypt, externe Daten in CI/CD-Pipelines, und der Einzug von Gemnasium in die Versionsverwaltung.
---------------------------------------------
https://www.heise.de/developer/meldung/Versionsverwaltung-GitLab-10-5-integ…
∗∗∗ Name, Adresse, Geburtsdatum: ÖBB-App zeigte fremde Nutzerdaten an ∗∗∗
---------------------------------------------
Betroffene sahen sensible Daten anderer Nutzer. Ob auch Kreditkarteninformationen im Detail eingesehen werden konnten, ist noch nicht klar
---------------------------------------------
http://derstandard.at/2000074884009
∗∗∗ Report Highlights Challenges of Incident Response ∗∗∗
---------------------------------------------
False Positives Lead to a Surprising Number of Incident Response Investigations read more
---------------------------------------------
https://www.securityweek.com/report-highlights-challenges-incident-response
=====================
= Vulnerabilities =
=====================
∗∗∗ MFSBGN03798 rev.1 - Micro Focus UCMDB-Browser, Apache Struts Instance ∗∗∗
---------------------------------------------
A potential security vulnerability has been identified in Micro Focus Universal CMDB. The vulnerability could be remotely exploited to allow Arbitrary Code Execution.
---------------------------------------------
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM0…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (cups, gcc-6, irssi, kernel, and squid3), Fedora (mupdf), Mageia (irssi, mpv, qpdf, and quagga), openSUSE (libmad and postgresql95), SUSE (kernel and php5), and Ubuntu (kernel, linux-lts-trusty, linux-raspi2, and wavpack).
---------------------------------------------
https://lwn.net/Articles/747911/
∗∗∗ DFN-CERT-2018-0378: Apache Tomcat: Zwei Schwachstellen ermöglichen das Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0378/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 21-02-2018 18:00 − Donnerstag 22-02-2018 18:00
Handler: Nina Bieringer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Gefälschte BAWAG P.S.K.-Kundeninformation im Umlauf ∗∗∗
---------------------------------------------
Kriminelle versenden eine gefälschte BAWAG P.S.K.-Kundeninformation. Darin fordern sie die Empfänger/innen dazu auf, dass sie ihre Nutzerinformationen bei der Bank bestätigen. Das soll auf einer fremden Website geschehen. Konsument/innen, die der Aufforderung nachkommen, übermitteln Betrüger/innen ihre Daten. Die Kriminellen nützen diese, um Geld zu stehlen und Verbrechen unter fremden Namen zu begehen.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-bawag-psk-kundeninformat…
=====================
= Vulnerabilities =
=====================
∗∗∗ DFN-CERT-2018-0364/">Digium Asterisk, Digium Certified Asterisk: Mehrere Schwachstellen ermöglichen Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
Der Hersteller informiert über die Schwachstellen und stellt Asterisk Open Source 13.19.2, 14.7.6 und 15.2.2 sowie Certified Asterisk 13.18-cert3 als Sicherheitsupdates bereit.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0364/
∗∗∗ DFN-CERT-2018-0356/">Red Hat Satellite: Mehrere Schwachstellen ermöglichen u.a. die komplette Kompromittierung von Systemen ∗∗∗
---------------------------------------------
Eine Vielzahl von Schwachstellen in von Red Hat Satellite verwendeten Komponenten, insbesondere Foreman, ermöglichen auch einem entfernten und nicht authentisierten Angreifer das Ausspähen sensibler Informationen wie Passwörtern, einen Cross-Site-Scripting (XSS)-Angriff, Denial-of-Service (DoS)-Angriffe und möglicherweise die Ausführung beliebigen Programmcodes ...
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0356/
∗∗∗ Sicherheitsupdates: Drupal-Webseiten können Inhalte leaken ∗∗∗
---------------------------------------------
Im CMS Drupal klaffen mehrere Sicherheitslücken. Davon gelten zwei als kritisch. Sicherheitsupdates für verschiene Versionsstränge stehen bereit.
---------------------------------------------
https://www.heise.de/meldung/Sicherheitsupdates-Drupal-Webseiten-koennen-In…
∗∗∗ Trend Micro fixes serious vulnerabilities in Email Encryption Gateway ∗∗∗
---------------------------------------------
Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a remote unauthenticated attacker.
---------------------------------------------
https://www.helpnetsecurity.com/2018/02/22/email-encryption-gateway-vulnera…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (strongswan), Fedora (torbrowser-launcher), openSUSE (libdb-4_5, libdb-4_8, postgresql96, python3-openpyxl, and xv), Red Hat (rh-maven35-jackson-databind), and Ubuntu (kernel, libreoffice, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-hwe, linux-azure, linux-gcp, linux-oem, and linux-lts-xenial, linux-aws).
---------------------------------------------
https://lwn.net/Articles/747805/
∗∗∗ IBM Security Bulletin: IBM b-type SAN Network/Storage switches is affected by a denial of service vulnerability, caused by a CPU consumption in the IPv6 stack (CVE-2017-6227). ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012115
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM API Connect (CVE-2017-3738, CVE-2017-3737) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013801
∗∗∗ IBM Security Bulletin: API Connect is affected by weaker than expected cryptographic algorithm usage vulnerability (CVE-2018-1385) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013051
∗∗∗ IBM Security Bulletin: IBM Security Guardium Big Data Intelligence (SonarG) is affected by Information Exposure vulnerability (CVE-2017-1774 ) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013595
∗∗∗ IBM Security Bulletin: IBM Security Guardium Big Data Intelligence (SonarG) is affected by a Password in Clear Text vulnerability (CVE-2018-1377 ) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013596
∗∗∗ IBM Security Bulletin: Security vulnerability in Apache Commons FileUpload used by Liberty for Java for IBM Cloud (CVE-2016-1000031) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013713
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in Apache HTTP Server affect IBM API Connect (CVE-2017-7668, CVE-2017-7679) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22012455
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 20-02-2018 18:00 − Mittwoch 21-02-2018 18:00
Handler: Nina Bieringer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ New Spectre/Meltdown Variants ∗∗∗
---------------------------------------------
Researchers have discovered new variants of Spectre and Meltdown. The software mitigations for Spectre and Meltdown seem to block these variants, although the eventual CPU fixes will have to be expanded to account for these new attacks.
---------------------------------------------
https://www.schneier.com/blog/archives/2018/02/new_spectremelt.html
=====================
= Vulnerabilities =
=====================
∗∗∗ ABB netCADOPS Web Application ∗∗∗
---------------------------------------------
This advisory contains mitigation details for an information exposure vulnerability in the ABB netCADOPS Web Application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-051-01
∗∗∗ DFN-CERT-2018-0347/">phpMyAdmin: Eine Schwachstelle ermöglicht einen Cross-Site-Scripting-Angriff ∗∗∗
---------------------------------------------
Ein entfernter, einfach authentifizierter Angreifer kann eine Schwachstelle in phpMyAdmin ausnutzen, um einen Cross-Site-Scripting (XSS)-Angriff gegen sich selbst durchzuführen.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0347/
∗∗∗ Mozillas executable installers: FUBAR ∗∗∗
---------------------------------------------
#1) "Firefox Installer.exe" (digitally signed 2018-01-28) 58.0.1
is vulnerable to DLL hijacking
#2) "setup-stub.exe" extracted and executed by "Firefox Installer.exe"
is vulnerable to DLL hijacking
#3) "Firefox Setup 52.6.0esr.exe" (digitally signed 2018-01-19)
is vulnerable to DLL hijacking
#4) "setup.exe" extracted and executed by "Firefox Setup 52.6.0esr.exe"
is vulnerable to DLL hijacking
---------------------------------------------
http://seclists.org/fulldisclosure/2018/Feb/58
∗∗∗ Sicherheitsforscher empfiehlt, BitTorrent-Client uTorrent Web vorerst nicht zu nutzen ∗∗∗
---------------------------------------------
Zwei uTorrent-Clients sind verwundbar. Es gibt zwar Sicherheitspatches, doch offenbar wirken diese nur teilweise.
---------------------------------------------
https://www.heise.de/meldung/Sicherheitsforscher-empfiehlt-BitTorrent-Clien…
∗∗∗ Coldroot: macOS-Trojaner offenbar seit zwei Jahren unentdeckt ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat eine Remote-Access-Malware für Apple-Rechner entdeckt, die seit mindestens 2016 kursieren soll.
---------------------------------------------
https://www.heise.de/meldung/Coldroot-macOS-Trojaner-offenbar-seit-zwei-Jah…
∗∗∗ Internet of Babies – When baby monitors fail to be smart ∗∗∗
---------------------------------------------
Baby monitors serve an important purpose in securing and monitoring our loved ones. An estimated 52k user accounts and video baby monitors are affected by a number of critical security vulnerabilities in "miSafes" video monitor products.
---------------------------------------------
https://www.sec-consult.com/en/blog/2018/02/internet-of-babies-when-baby-mo…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (libmspack), Debian (zziplib), Fedora (ca-certificates, firefox, freetype, golang, krb5, libreoffice, monit, patch, plasma-workspace, ruby, sox, tomcat, and zziplib), openSUSE (dovecot22, glibc, GraphicsMagick, libXcursor, mbedtls, p7zip, SDL_image, SDL2_image, sox, and transfig), Red Hat (chromium-browser), and Ubuntu (cups, libvirt, and qemu).
---------------------------------------------
https://lwn.net/Articles/747711/
∗∗∗ Cisco Unity Connection Mail Relay Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco UCS Director and Cisco Integrated Management Controller Supervisor Cross-Site Request Forgery Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Unified Communications Manager Reflected Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Unified Communications Domain Manager Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Prime Service Catalog Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Prime Collaboration Provisioning Tool User Provisioning Tab Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Prime Collaboration Provisioning Tool Web Portal Repeated Bad Login Attempts Denial of Service Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Elastic Services Controller Service Portal Unauthorized Access Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Elastic Services Controller Service Portal Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Data Center Analytics Framework Cross-Site Request Forgery Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Data Center Analytics Framework Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Unified Customer Voice Portal Interactive Voice Response Connection Denial of Service Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities may affect IBM® SDK, Java™ Technology Edition ∗∗∗
---------------------------------------------
https://www.ibm.com/support/docview.wss?uid=swg22012965
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to cross-site scripting (CVE-2018-1415) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013796
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to SQL injection (CVE-2018-1414) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013797
∗∗∗ IBM Security Bulletin: IBM b-type SAN switches and directors affected by XSS vulnerabilities CVE-2017-6225. ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ssg1S1012113
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for ACH Services has a potential input validation vulnerability (CVE-2018-1392) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22013249
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for ACH Services has a potential Denial of Service (DOS) vulnerability (CVE-2018-1391) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22013247
∗∗∗ IBM Security Bulletin: Financial Transaction Manager for ACH Services and Corporate Payment Services has a potential XML External Entity vulnerability (CVE-2017-1758) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22012828
∗∗∗ IBM Security Bulletin: IBM Transformation Extender Advanced is Potentially Vulnerable to an XML External Entity (XXE) Injection in its REST API. ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013432
∗∗∗ IBM Security Bulletin: IBM API Connect is affected by Node.js tough-cookie module vulnerability to a denial of service (CVE-2016-1000232) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22013088
∗∗∗ IBM Security Bulletin: IBM Systems Director (ISD) Storage Control is affected by vulnerabilities in IBM Websphere Application Server (WAS), OpenSSL and IBM Java Runtime ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=isg3T1027035
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 19-02-2018 18:00 − Dienstag 20-02-2018 18:00
Handler: Nina Bieringer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Coldroot RAT Still Undetectable Despite Being Uploaded on GitHub Two Years Ago ∗∗∗
---------------------------------------------
Coldroot, a remote access trojan (RAT), is still undetectable by most antivirus engines, despite being uploaded and freely available on GitHub for almost two years.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/coldroot-rat-still-undetecta…
∗∗∗ Pirated Wordpress Add-On makes Websites Distribute Malware ∗∗∗
---------------------------------------------
Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/02/30506-wordpress-add-on-malware
∗∗∗ Biggest Crypto Hacking Operation Ever Uncovered ∗∗∗
---------------------------------------------
Hackers are targeting Jenkins CI servers to exploit a vulnerability and secretly mine millions of dollars worth of cryptocurrency.
---------------------------------------------
https://www.htbridge.com/blog/biggest-crypto-hacking-operation-ever-uncover…
∗∗∗ Wikipedia Page Review Reveals Minr Malware ∗∗∗
---------------------------------------------
Since December, we’ve seen a number of websites with this funny looking obfuscated script injected at the very top of the HTML code (before the tag). This code is generated by the well-known JJEncode obfuscator, which was once quite popular for encrypting malicious code. Since its popularity dwindled a few years ago, we’ve hardly seen any new malware using it. It was definitely a surprise for us when approximately 3 months ago we noticed the JJEncode obfuscator was once again in [...]
---------------------------------------------
https://blog.sucuri.net/2018/02/wikipedia-page-review-revealed-minr-malware…
∗∗∗ Textbombe: Apple räumt verheerenden Fehler mit Update aus ∗∗∗
---------------------------------------------
Neue Versionen von iOS und macOS verfügbar – Zeichenfolge konnte zahlreiche Apps zum Absturz bringen
---------------------------------------------
http://derstandard.at/2000074619775
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libav), Gentoo (chromium, firefox, libreoffice, mysql, and ruby), SUSE (kernel), and Ubuntu (bind9).
---------------------------------------------
https://lwn.net/Articles/747630/
∗∗∗ DFN-CERT-2018-0340: Jenkins: Mehrere Schwachstellen ermöglichen u.a. das Ausspähen von Informationen ∗∗∗
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0340/
∗∗∗ IBM Security Bulletin: IBM Sterling Connect:Express for UNIX is Affected by the Following OpenSSL Vulnerabilities (CVE-2017-3637, CVE-2017-3737, CVE-2017-3738) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22013705
∗∗∗ JSA10843 - 2018-02 Security Bulletin: AppFormix: Debug Shell Command Execution in AppFormix Agent (CVE-2018-0015) ∗∗∗
---------------------------------------------
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10843&actp=RSS
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 16-02-2018 18:00 − Montag 19-02-2018 18:00
Handler: Nina Bieringer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Hackers pilfered $6M from Russian central bank via SWIFT system ∗∗∗
---------------------------------------------
Hackers nicked $6 million from the Russian central bank last year via the SWIFT messaging system, according to report from the bank.
---------------------------------------------
https://www.scmagazine.com/hackers-pilfered-6m-from-russian-central-bank-vi…
∗∗∗ WWW: Tracking-Methoden werden brutaler, Browser-Hersteller schauen weg ∗∗∗
---------------------------------------------
Die Überwachungsmethoden der Tracker werden immer ausgefeilter. Selbst bei Online-Apotheken bedienen sich die Datendealer. Datenschutz-Forscher Arvind Narayanan ärgert sich über die Untätigkeit der großen Browser-Hersteller.
---------------------------------------------
https://heise.de/-3718112
∗∗∗ FSX: Add-On-Entwickler FSLabs liest heimlich Passwörter von Raubkopierern aus ∗∗∗
---------------------------------------------
FlightSimLabs verkauft Zusatzflugzeuge für den beliebten Microsoft Flight Simulator. Die Firma gibt zu, mutmaßlichen Raubkopierern eine Software auf den Rechner installiert zu haben, die deren Chrome-Passwörter an die Entwickler übermittelt.
---------------------------------------------
https://heise.de/-3973485
∗∗∗ Security bugs in Dell storage platform allowed hackers to gain root access ∗∗∗
---------------------------------------------
Security researchers recently unearthed as many as nine security vulnerabilities in Dell EMC's Isilon OneFS platform allowing remote attackers to launch social engineering attacks and subsequently access the Isilon systems at root.
---------------------------------------------
https://www.scmagazineuk.com/news/security-bugs-in-dell-storage-platform-al…
∗∗∗ Record-Breaking Number of Vulnerabilities Disclosed in 2017: Report ∗∗∗
---------------------------------------------
A record-breaking number of vulnerabilities were disclosed in 2017, with a total of 20,832 such security flaws, a new report from Risk Based Security shows. read more
---------------------------------------------
https://www.securityweek.com/record-breaking-number-vulnerabilities-disclos…
=====================
= Vulnerabilities =
=====================
∗∗∗ Microsoft-Browser Edge: Google veröffentlicht Zero-Day-Lücke, kein Patch in Sicht ∗∗∗
---------------------------------------------
Der JIT-Compiler, der Microsofts Edge-Browser von Angriffscode aus dem Web isolieren soll, lässt sich selbst zum Einschleusen von Angriffscode missbrauchen. Google hat die dazugehörige Lücke nun veröffentlicht, ohne dass Microsoft Zeit zum Patchen hatte.
---------------------------------------------
https://heise.de/-3973380
∗∗∗ DSA-4118 tomcat-native - security update ∗∗∗
---------------------------------------------
Jonas Klempel reported that tomcat-native, a library giving Tomcataccess to the Apache Portable Runtime (APR) librarys network connection(socket) implementation and random-number generator, does not properlyhandle fields longer than 127 bytes when parsing the AIA-Extension fieldof a client certificate. If OCSP checks are used, this could result inclient certificates that should have been rejected to be accepted.
---------------------------------------------
https://www.debian.org/security/2018/dsa-4118
∗∗∗ DFN-CERT-2016-0125: Red Hat JBoss Web Server: Mehrere Schwachstellen ermöglichen Denial-of-Service-Angriffe und das Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
Red Hat aktualisiert seinen Sicherheitshinweis vom 21.01.2016 und gibt bekannt, dass die Schwachstelle CVE-2012-1148 auch in der aktualisierten Version des Red Hat JBoss Webserver enthalten ist. Bislang gibt es keine Information darüber, wann ein Sicherheitsupdate zur Behebung dieser Schwachstelle zur Verfügung stehen wird.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-0125/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (irssi), Debian (bind9, gcc-4.9, plasma-workspace, quagga, and tomcat-native), Fedora (p7zip), Mageia (nasm), openSUSE (exim, ffmpeg, irssi, mpv, qpdf, quagga, rrdtool, and rubygem-puppet), and SUSE (p7zip and xen).
---------------------------------------------
https://lwn.net/Articles/747548/rss
∗∗∗ Tenda AC15 Remote Code Execution ∗∗∗
---------------------------------------------
https://cxsecurity.com/issue/WLB-2018020216
∗∗∗ IBM Security Bulletin: IBM Maximo Anywhere is vulnerable to cross-site scripting (CVE-2017-1604) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22011883
∗∗∗ IBM Security Bulletin: Cross-site scripting vulnerability affects Rational Rhapsody Design Manager ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22013739
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 15-02-2018 18:00 − Freitag 16-02-2018 18:00
Handler: n/a
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ New Saturn Ransomware Actively Infecting Victims ∗∗∗
---------------------------------------------
A new ransomware was discovered this week by MalwareHunterTeam called Saturn. This ransomware will encrypt the files on a computer and then append the .saturn extension to the files name. At this time it is not known how Saturn Ransomware is being distributed.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-saturn-ransomware-active…
∗∗∗ Using the Chrome Task Manager to Find In-Browser Miners ∗∗∗
---------------------------------------------
The use of browsers to mine for digital currency is becoming a major problem. With more and more sites incorporating in-browser mining scripts such as CoinHive and web extensions injecting them into web pages, people will continue to be affected by this attack. Thankfully, we can easily detect miners using the Chrome Task Manager.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/using-the-chrome-task-manage…
∗∗∗ Behörden ignorieren Sicherheitsbedenken gegenüber Windows 10 ∗∗∗
---------------------------------------------
Deutsche Behörden kaufen fleißig Software bei Microsoft. Dabei gibt es erhebliche Sicherheitsbedenken, die das US-Unternehmen wohl immer noch nicht ausräumen konnte. Unklar ist etwa, welche Daten an den Konzern fließen.
---------------------------------------------
https://www.heise.de/newsticker/meldung/Behoerden-ignorieren-Sicherheitsbed…
∗∗∗ Infizierte Heimrouter: Satori-Botnetz legt stark zu ∗∗∗
---------------------------------------------
Der Mirai-Nachfolger Satori infiziert immer mehr Heimrouter und IoT-Geräte. Die zugrundeliegenden Sicherheitslücken werden von den Herstellern oft ignoriert. In der Zwischenzeit schürfen die Angreifer munter Kryptogeld.
---------------------------------------------
https://www.heise.de/meldung/Infizierte-Heimrouter-Satori-Botnetz-legt-star…
∗∗∗ Oracle WebLogic Server Flaw Exploited to Deliver Crypto-Miners ∗∗∗
---------------------------------------------
Threat actors are exploiting a recently patched vulnerability in Oracle WebLogic Server to infect systems with crypto-currency mining malware, FireEye reports.
---------------------------------------------
https://www.securityweek.com/oracle-weblogic-server-flaw-exploited-deliver-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Nortek Linear eMerge E3 Series ∗∗∗
---------------------------------------------
This advisory contains mitigation details for a command injection vulnerability in the Nortek Linear eMerge E3 Series.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-046-01
∗∗∗ GE D60 Line Distance Relay ∗∗∗
---------------------------------------------
This advisory contains mitigation details for stack-based buffer overflow and improper restriction of operations within the bounds of a memory buffer vulnerabilities in GE’s D60 Line Distance Relay.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02
∗∗∗ Schneider Electric IGSS Mobile ∗∗∗
---------------------------------------------
This advisory contains mitigation details for Improper certificate validation and plaintext storage of a password vulnerabilities in the Schneider Electric IGSS Mobile products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-046-03
∗∗∗ Schneider Electric StruxureOn Gateway ∗∗∗
---------------------------------------------
This advisory contains mitigation details for an unrestricted upload of file with dangerous type vulnerability in Schneider Electrics StruxureOn Gateway software management platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-046-04
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (quagga), Mageia (freetype2, kernel-linus, and kernel-tmb), openSUSE (chromium, GraphicsMagick, mupdf, openssl-steam, and xen), Slackware (irssi), SUSE (glibc and quagga), and Ubuntu (quagga).
---------------------------------------------
https://lwn.net/Articles/747439/rss
∗∗∗ 2018-01-06 (updated 2018-02-16): Cyber Security Notification - Meltdown & Spectre ∗∗∗
---------------------------------------------
http://search-ext.abb.com/library/Download.aspx?DocumentID=9AKK107045A8219&…
∗∗∗ DFN-CERT-2018-0320: Quagga: Mehrere Schwachstellen ermöglichen u.a. einen Distributed-Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0320/
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK 7 affect IBM Systems Director. ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=isg3T1027118
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in the IBM SDK, Java Technology Edition affect IBM Performance Management products ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013416
∗∗∗ IBM Security Bulletin: Vulnerability in IBM Java Runtime affect IBM Host On-Demand ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22012447
∗∗∗ IBM Security Bulletin: Vulnerability in Apache Batik affects IBM Maximo Asset Management (CVE-2017-5662) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22008816
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 14-02-2018 18:00 − Donnerstag 15-02-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Spam and phishing in 2017 ∗∗∗
---------------------------------------------
The share of spam in email traffic in 2017 fell by 1.68% to 56.63%. The lowest share (52.67%) was recorded in December 2017. The highest (59.56%) belonged to September. In 2017, the Anti-Phishing system was triggered 246,231,645 times on computers of Kaspersky Lab users as a result of phishing redirection attempts.
---------------------------------------------
http://securelist.com/spam-and-phishing-in-2017/83833/
∗∗∗ Inside the MSRC– The Monthly Security Update Releases ∗∗∗
---------------------------------------------
For the second in this series of blog entries we want to look into which vulnerability reports make it into the monthly release cadence. It may help to start with some history. In September 2003 we made a change from a release anytime approach to a mostly predictable, monthly release cadence. October 2003 ushered in ..
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2018/02/14/inside-the-msrc-the-mon…
∗∗∗ Multi-Stage Email Word Attack without Macros ∗∗∗
---------------------------------------------
Malware authors often distribute malware through code macros in Microsoft Office documents such as Word, Excel, or PowerPoint. Regardless of the particular Office version, macros can be executed whenever the user opens the file. By default users get warnings from ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Multi-Stage-Email-Word-…
∗∗∗ Besser vernetzt - besser geschützt ∗∗∗
---------------------------------------------
Zweitägiger Workshop im BRZ ermöglicht raschere Reaktion auf Malware und andere Bedrohungen. 70 Teilnehmer/innen von österreichischen und internationalen CERTs waren dabei.
---------------------------------------------
https://www.brz.gv.at/BRZ_News/besser_vernetzt_besser_geschuetzt.html
∗∗∗ MeltdownPrime & SpectrePrime: Neue Software automatisiert CPU-Angriffe ∗∗∗
---------------------------------------------
Nach Meltdown und Spectre hatten Experten prognostiziert, dass das Zuschneiden auf spezifische Chips eine Weile dauern würde. Dieser Prozess lässt sich nun durch Automatisierung beschleunigen. Dabei wurden auch neue Variationen der Angriffe gefunden.
---------------------------------------------
https://www.heise.de/meldung/MeltdownPrime-SpectrePrime-Neue-Software-autom…
∗∗∗ Cryptojacking: Hacker infiltrieren 5.000 Websites, verdienen nur 23 Euro ∗∗∗
---------------------------------------------
Laut Angaben von Skript-Entwickler Coinhive – Angreifer schleusten Code in Vorlese-Plugin ..
---------------------------------------------
http://derstandard.at/2000074318850
∗∗∗ COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style ∗∗∗
---------------------------------------------
This post is authored by Jeremiah OConnor and Dave Maynor with contributions from Artsiom Holub and Austin McBride. Executive SummaryCisco has been tracking a bitcoin theft campaign for over 6 months. The campaign was discovered internally and researched with the aid of an intelligence sharing partnership with Ukraine Cyberpolice. The campaign ..
---------------------------------------------
http://blog.talosintelligence.com/2018/02/coinhoarder.html
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4112 xen - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4112
∗∗∗ Entity API - Moderately critical - Information Disclosure - SA-CONTRIB-2018-013 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-013
∗∗∗ Entity Backup - Critical - Module Unsupported - SA-CONTRIB-2018-012 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-012
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 13-02-2018 18:00 − Mittwoch 14-02-2018 18:00
Handler: Alexander Riepl
Co-Handler: Nina Bieringer
=====================
= News =
=====================
∗∗∗ Hackers Keep it Simple: Malware Evades Detection by Simply Copying
a File ∗∗∗
---------------------------------------------
Returning to this particular flavor of malware, we see a rather simple
way to bypass the detection products: it simply copies kernel32.dll.
The copied version is identical and serves to relay requests from Word
in to the kernel in precisely the same way; however, the copy name is
subtly different. Therefore, some products fail to detect the malware
activity as it passes from Word to the kernel.
---------------------------------------------
https://blogs.bromium.com/malware-copies-file-evades-detection/
∗∗∗ DoubleDoor Botnet Chains Exploits to Bypass Firewalls ∗∗∗
---------------------------------------------
Anubhav says DoubleDoor attackers are using the first exploit to bypass
Juniper Netscreen firewalls and then scan internal networks for ZyXEL
routers to exploit with the second exploit.
...
But the botnet is not a major danger just yet. Anubhav says DoubleDoor
looks like a work in progress and still under heavy development.
---------------------------------------------
https://www.bleepingcomputer.com/news/security
/doubledoor-botnet-chains-exploits-to-bypass-firewalls/
=====================
= Vulnerabilities =
=====================
∗∗∗ Microsoft - February 2018 Security Updates ∗∗∗
---------------------------------------------
The February security release consists of security updates for the
following software:
Internet Explorer
Microsoft Edge
Microsoft Windows
Microsoft Office and Microsoft Office Services and Web Apps
ChakraCore
Adobe Flash
---------------------------------------------
https://portal.msrc.microsoft.com/en-us/security-guidance
/releasenotedetail/879af9c3-970b-e811-a961-000d3a33c573
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
Adobe has published security bulletins for Adobe Acrobat and Reader
(APSB18-02) and Adobe Experience Manager (APSB18-04).
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1530
∗∗∗ Zu aufwendig: Microsoft will schwere Skype-Lücke nicht beheben ∗∗∗
---------------------------------------------
Leck erlaubt Übernahme von Windows-System – Kein Patch geplant, Fehler
soll erst in neuer Version entfernt werden
---------------------------------------------
http://derstandard.at/2000074186504
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (exim and mpv), Debian
(advancecomp and graphicsmagick), Red Hat (collectd, erlang,
httpd24-apr, openstack-aodh, and openstack-nova), SUSE (kernel and
xen), and Ubuntu (libvorbis).
---------------------------------------------
https://lwn.net/Articles/747244/rss
∗∗∗ SAP Resolves High Risk Flaws with February 2018 Patches ∗∗∗
---------------------------------------------
SAP this week released its monthly set of security updates for its
products, addressing a total of 11 new vulnerabilities, including two
considered high severity.
---------------------------------------------
https://www.securityweek.com
/sap-resolves-high-risk-flaws-february-2018-patches
∗∗∗ WAGO PFC200 Series ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-044-01
∗∗∗ Schneider Electric IGSS SCADA Software ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-044-02
∗∗∗ IBM Security Bulletin: Vulnerability in Apache Struts affects SAN
Volume Controller, Storwize family and FlashSystem V9000 products
(CVE-2016-4461) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ssg1S1010883
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities affect IBM
WebSphere Application Server in IBM Cloud (CVE-2017-1681,
CVE-2016-1000031) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013359
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities have been
identified in Open SSL, which is shipped with IBM Tivoli Network
Manager IP Edition. ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22013041
∗∗∗ IBM Security Bulletin: Vulnerability in Apache Tomcat affects SAN
Volume Controller, Storwize family and FlashSystem V9000 products
(CVE-2017-5647) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ssg1S1010892
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 12-02-2018 18:00 − Dienstag 13-02-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ If You Thought Ransomware was Big, Illegal Crypto-Mining May be Bigger ∗∗∗
---------------------------------------------
There has been an interesting trend if you follow the daily barrage of security breaches, malware, and other ..
---------------------------------------------
https://www.beyondtrust.com/blog/thought-ransomware-big-illegal-crypto-mini…
∗∗∗ Cybersecurity-Experten warnen for Valentinstags-Angeboten ∗∗∗
---------------------------------------------
Der Valentinstag am 14. Februar wird von Cyber-Kriminellen zum Versand von E-Mails mit gefährlichen Sonderangeboten genutzt.
---------------------------------------------
https://futurezone.at/digital-life/cybersecurity-experten-warnen-for-valent…
∗∗∗ Security baseline for Office 2016 and Office 365 ProPlus apps – FINAL ∗∗∗
---------------------------------------------
Microsoft is pleased to announce the final release of the recommended security configuration baseline settings for Microsoft Office Professional Plus 2016 and Office 365 ProPlus 2016 apps. There are no changes from the draft ..
---------------------------------------------
https://blogs.technet.microsoft.com/secguide/2018/02/13/security-baseline-f…
∗∗∗ Unwanted Pop-ups Caused by Injectbody/Injectscr Plugins ∗∗∗
---------------------------------------------
On February 8th, 2018, we noticed a new wave of WordPress infections involving two malicious plugins: injectbody and injectscr. These plugins inject obfuscated scripts, creating unwanted pop-up/pop-unders. Whenever a visitor clicks ..
---------------------------------------------
https://blog.sucuri.net/2018/02/unwanted-popups-caused-injectbody-injectscr…
∗∗∗ Still not on Windows 10? Fine, sighs Microsoft, here are its antivirus tools for Windows 7, 8.1 ∗∗∗
---------------------------------------------
Redmond extends ATP to older builds, adds third-party links Microsoft has back-ported its Windows Defender Advanced Threat Protection (ATP) antivirus tool from Windows 10 to Windows 7 and 8.1.
---------------------------------------------
www.theregister.co.uk/2018/02/12/microsoft_windows_atp/
∗∗∗ Sicherheitsupdates: Gefährliche Lücken in IBM AIX und Notes ∗∗∗
---------------------------------------------
In AIX von IBM klafft eine kritische Sicherheitslücke. Darüber hinaus stopft ein Update eine Schwachstelle in Notes.
---------------------------------------------
https://www.heise.de/meldung/Sicherheitsupdates-Gefaehrliche-Luecken-in-IBM…
∗∗∗ Chrome-Security-Chefin: "Wenn Flash entfernt wird, feiern wir eine Party" ∗∗∗
---------------------------------------------
Parisa Tabriz leitet die Elite-Hacker Gruppe Project Zero – sie sagt, dass Phishing eine größere Gefahr für die breite Masse als die Lücken "Meltdown" und Spectre ist
---------------------------------------------
http://derstandard.at/2000073871421
∗∗∗ Olympic Destroyer Takes Aim At Winter Olympics ∗∗∗
---------------------------------------------
This blog post is authored by Warren Mercer and Paul Rascagneres.Update 2/13 08:30 We have updated the information regarding the use of stolen credentialsUpdate 2/12 12:00: We have updated the destructor section with action taken ..
---------------------------------------------
blog.talosintelligence.com/2018/02/olympic-destroyer.html
∗∗∗ Zero-Day in Telegrams Windows Client Exploited for Months ∗∗∗
---------------------------------------------
A zero-day vulnerability impacting Telegram Messenger’s Windows client had been exploited in malicious attacks for months before being discovered and addressed. read more
---------------------------------------------
https://www.securityweek.com/zero-day-telegrams-windows-client-exploited-mo…
=====================
= Vulnerabilities =
=====================
∗∗∗ [KDE] Plasma Desktop: Arbitrary command execution in the removable device notifier ∗∗∗
---------------------------------------------
When a vfat thumbdrive which contains `` or $() in its volume label is plugged and mounted trough the device notifier, its interpreted as a shell command, leaving a possibility of arbitrary commands execution.
---------------------------------------------
https://www.kde.org/info/security/advisory-20180208-2.txt
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1530
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 09-02-2018 18:00 − Montag 12-02-2018 18:00
Handler: Alexander Riepl
Co-Handler: Nina Bieringer
=====================
= News =
=====================
∗∗∗ Vor allem Porno-Seiten spannen Nutzer zum Krypto-Mining ein ∗∗∗
---------------------------------------------
Laut einer aktuellen Studie enthalten mehr als 240 der beliebtesten Websites Code, der die Rechner ihre Besucher zum "Schürfen" von Kryptowährungen nutzt.
---------------------------------------------
https://futurezone.at/digital-life/vor-allem-porno-seiten-spannen-nutzer-zu…
∗∗∗ Cisco Confirms Critical Firewall Software Bug Is Under Attack ∗∗∗
---------------------------------------------
Cisco has issued patches for the vulnerability, which could be up to seven years old.
---------------------------------------------
http://threatpost.com/cisco-confirms-critical-firewall-software-bug-is-unde…
∗∗∗ Cryakl ransomware keys made public ∗∗∗
---------------------------------------------
The Belgian Federal Police are releasing free decryption keys for Cryakl ransomware and have become a partner with the No More Ransom Project.
---------------------------------------------
https://www.scmagazine.com/cryakl-ransomware-keys-made-public/article/74332…
∗∗∗ GitHub-Account-Zombies erregen die Gemüter ∗∗∗
---------------------------------------------
Löscht ein Nutzer seinen Account bei GitHub, wird der Name sofort wieder für neue Nutzer frei. Das können Kriminelle missbrauchen, um über die Entwicklerseite Malware zu verteilen. Entwickler sollten Accounts daher lieber downgraden statt löschen.
---------------------------------------------
https://www.heise.de/security/meldung/GitHub-Account-Zombies-erregen-die-Ge…
∗∗∗ Equifax-Hack betrifft noch mehr Daten als bisher bekannt ∗∗∗
---------------------------------------------
In einem Papier an den Bankenausschuss des US-Senats räumt Equifax ein, dass bei dem spektakulären Hack im September 2017 noch mehr Daten abgegriffen wurden als bisher zugegeben. Zusätzlich betroffen waren Steuernummern und Angaben im Führerschein.
---------------------------------------------
https://www.heise.de/security/meldung/Equifax-Hack-betrifft-noch-mehr-Daten…
∗∗∗ Italienische Kryptobörse ausgeraubt: BitGrail fehlen 140 Millionen Euro ∗∗∗
---------------------------------------------
Diebe erbeuteten 17 Millionen sogenannte "Nano". BitGrail setzte den Handel vorerst aus. Die Polizei ermittelt.
---------------------------------------------
https://www.heise.de/security/meldung/Italienische-Kryptoboerse-ausgeraubt-…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (go, go-pie, and plasma-workspace), Debian (audacity, exim4, libreoffice, librsvg, ruby-omniauth, tomcat-native, and uwsgi), Fedora (tomcat-native), Gentoo (virtualbox), Mageia (kernel), openSUSE (freetype2, ghostscript, jhead, and libxml2), and SUSE (freetype2 and kernel).
---------------------------------------------
https://lwn.net/Articles/747120/rss
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco IOS XE Software Diagnostic Shell Path Traversal Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the diagnostic shell for Cisco IOS XE Software could allow an authenticated, local attacker to use certain diagnostic shell commands that can overwrite system files. These system files may be sensitive and should not be able to be overwritten by a user of the diagnostic shell.The vulnerability is due to lack of proper input validation for certain diagnostic shell commands. An attacker could exploit this vulnerability by authenticating to the device, entering the diagnostic
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ BlackBerry powered by Android Security Bulletin - February 2018 ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ DSA-4110 exim4 - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4110
∗∗∗ DSA-4111 libreoffice - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4111
∗∗∗ DFN-CERT-2018-0286: Oracle MySQL Community Server: Mehrere Schwachstellen ermöglichen u.a. Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0286/
∗∗∗ IBM Security Bulletin: Remote code execution vulnerability within Jackson JSON library affects IBM Business Process Manager (CVE-2017-7525) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22012395
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect WebSphere Cast Iron ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22013351
∗∗∗ VMSA-2018-0007 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily