=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 16-12-2015 18:00 − Donnerstag 17-12-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Press Backspace 28 times to own unlucky Grub-by Linux boxes ***
---------------------------------------------
Integer underflow fault means you can get into rescue mode and rummage around A pair of researchers from the University of Valencias Cybersecurity research group have found that if you press backspace 28 times, its possible to bypass authentication during boot-up on some Linux machines.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/12/17/press_backs…
*** Checklist - How to Secure Your WordPress Website ***
---------------------------------------------
We know that you care about what you build and protecting it is incredibly important. Hacks happen, and it's your job to reduce their likelihood to the lowest probability possible. We built this checklist of best practices to help you harden your website and protect you and your users from hacks.
---------------------------------------------
https://www.wordfence.com/learn/checklist-how-to-secure-your-wordpress-webs…
*** Privileged Access Workstations ***
---------------------------------------------
Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and OS vulnerabilities, various impersonation attacks, and credential theft attacks such as keystroke logging, Pass-the-Hash, and Pass-The-Ticket.
---------------------------------------------
https://technet.microsoft.com/en-US/library/mt634654.aspx
*** F-Secure: Sandboxed Execution Environment ***
---------------------------------------------
Sandboxed Execution Environment (SEE) is a framework for building test automation in secured Environments. The Sandboxes, provided via libvirt, are customizable allowing high degree of flexibility. Different type of Hypervisors (Qemu, VirtualBox, LXC) can be employed to run the Test Environments. Plugins can be added to a Test Environment which provides an Event mechanism synchronisation for their interaction. Users can enable and configure the plugins through a JSON configuration file.
---------------------------------------------
https://github.com/F-Secure/see
*** How do you know if your smartphone has been compromised? ***
---------------------------------------------
Signs that may indicate a mobile infection: Has your phone been compromised? #1: You notice the system or apps behaving strangely #2: Your call or message history includes some unknown entries ...
---------------------------------------------
http://www.welivesecurity.com/2015/12/16/know-smartphone-compromised/
*** XSS, SQLi bugs found in several Network Management Systems ***
---------------------------------------------
Network Management System (NMS) offerings by Spiceworks, Ipswitch, Opsview and Castle Rock Computing have been found sporting several cross-site scripting and SQL injection flaws that could be exploit...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/hQ6oQHF5luA/secworld.php
*** POS Malware Families: An insight into the Behavior of POS Malware ***
---------------------------------------------
In a previous blog, we discussed why Point of Sale (POS) devices remain such an attractive target and described some different attack methods. As you can see from the infographic below, retail and POS have been (pardon the pun) "Targets" on an ongoing basis for the past few years, and the trend doesn't appear to be reversing, even with technologies such as EMV and P2PE. In this blog, we describe some of the different families of POS malware. POS Malware Common Features...
---------------------------------------------
https://feeds.feedblitz.com/~/128665939/0/alienvault-blogs~POS-Malware-Fami…
*** Xen Security Advisories ***
---------------------------------------------
XSA-155 - paravirtualized drivers incautious about shared memory contents
http://xenbits.xen.org/xsa/advisory-155.html
---------------------------------------------
XSA-157 - Linux pciback missing sanity checks leading to crash
http://xenbits.xen.org/xsa/advisory-157.html
---------------------------------------------
XSA-164 - qemu-dm buffer overrun in MSI-X handling
http://xenbits.xen.org/xsa/advisory-164.html
---------------------------------------------
XSA-165 - information leak in legacy x86 FPU/XMM initialization
http://xenbits.xen.org/xsa/advisory-165.html
---------------------------------------------
XSA-166 - ioreq handling possibly susceptible to multiple read issue
http://xenbits.xen.org/xsa/advisory-166.html
---------------------------------------------
*** DFN-CERT-2015-1948: Samba: Mehrere Schwachstellen ermöglichen u.a. das Umgehen von Sicherheitsvorkehrungen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-1948/
*** Cisco FireSIGHT Management Center SSL HTTP Attack Detection Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Security Advisory: BIND vulnerability CVE-2015-8000 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/34/sol34250741.html?…
*** Multiple SQL Injection Vulnerabilities in Citrix Command Center Web User Interface Java Servlets ***
---------------------------------------------
A number of SQL Injection vulnerabilities have been identified in the Administration Web UI servlets used by Citrix Command Center. These vulnerabilities, if exploited, could allow an authenticated user to insert malicious SQL queries into the application, potentially causing the alteration or deletion of system data.
---------------------------------------------
http://support.citrix.com/article/CTX203787
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM API Management (CVE-2015-1788) ***
http://www.ibm.com/support/docview.wss?uid=swg21965259
---------------------------------------------
*** IBM Security Bulletin: Fix available for Information Disclosure Vulnerability in IBM WebSphere Portal (CVE-2015-7447) ***
http://www.ibm.com/support/docview.wss?uid=swg21973152
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Commons affects IBM Content Manager Services for Lotus Quickr (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21973096
---------------------------------------------
*** IBM Security Bulletin: Tivoli Storage Manager for Virtual Environments: Data Protection for VMware and Tivoli Storage FlashCopy Manager for VMware affected by privilege escalation vulnerability (CVE-2015-7429) ***
http://www.ibm.com/support/docview.wss?uid=swg21973087
---------------------------------------------
*** IBM Security Bulletin: Tivoli Storage Manager for Virtual Environments: Data Protection for VMware and Tivoli Storage FlashCopy Manager for VMware affected by unauthorized access vulnerability (CVE-2015-7420) ***
http://www.ibm.com/support/docview.wss?uid=swg21973086
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Application Dependency Discovery Manager (TADDM) - IBM Java SDK updates October 2015 ***
http://www.ibm.com/support/docview.wss?uid=swg21973355
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM HTTP Server (IHS) affect IBM Security SiteProtector System (CVE-2015-1283, CVE-2015-3183 and CVE-2015-4947) ***
http://www.ibm.com/support/docview.wss?uid=swg21972470
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Content Collector for SAP Applications (CVE-2015-1788) ***
http://www.ibm.com/support/docview.wss?uid=swg21973147
---------------------------------------------
*** IBM Security Bulletin: IBM PowerVC is impacted by OpenStack Cinder information disclosure vulneraility (CVE-2015-1851) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1020980
---------------------------------------------
*** IBM Security Bulletin: Infosphere BigInsights is affected by a vulnerability in DB2 that allows users to truncate any table even though the owner of the table has not granted any privilege to any user/role/group (CVE-2015-5020) ***
http://www.ibm.com/support/docview.wss?uid=swg21967923
---------------------------------------------
*** IBM Security Bulletin: Infosphere BigInsights is affected by a vulnerability in DB2 (CVE-2015-1788) ***
http://www.ibm.com/support/docview.wss?uid=swg21970400
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Commons affects OpenPages GRC Platform with Application Server (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972345
---------------------------------------------
*** IBM Security Bulletin: IBM Curam Social Program Management is Vulnerable to Reflected Cross-Site Scripting (CVE-2015-7402) ***
http://www.ibm.com/support/docview.wss?uid=swg21970661
---------------------------------------------
*** ZDI-15-641: Foxit Reader Forms Out-Of-Bounds Read Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/LfsseiLCccs/
*** ZDI-15-643: Foxit Reader Will Print Action Use-After-Free Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/28dKwkM6_5M/
*** ZDI-15-642: Foxit Reader Will Save Document Action Use-After-Free Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/uY-c98zZjQI/
*** ZDI-15-644: Foxit Reader FlateDecode Heap Buffer Overflow Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/s3waojIPu0E/
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 15-12-2015 18:00 − Mittwoch 16-12-2015 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
*** IBM Security Bulletin ***
---------------------------------------------
*** Multiple vulnerabilities in IBM Java SDK affect IBM Rational Connector for SAP Solution Manager ***
http://www.ibm.com/support/docview.wss?uid=swg21967447
---------------------------------------------
*** IBM Security Bulletin: Security Vulnerability in IBM WebSphere Application Server shipped with IBM Tivoli Netcool Configuration Manager ***
http://www.ibm.com/support/docview.wss?uid=swg21972884
---------------------------------------------
*** IBM Security Bulletin: Openstack Cinder and Horizon vulnerabilities affect IBM Cloud Manager with OpenStack ***
http://www.ibm.com/support/docview.wss?uid=isg3T1023146
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to path traversal attack. ***
http://www.ibm.com/support/docview.wss?uid=swg21967647
---------------------------------------------
*** IBM Security Bulletin: A security vulnerability exist in the IBM SDK, Java Technology Edition provided with WebSphere DataPower XC10 Appliance ***
http://www.ibm.com/support/docview.wss?uid=swg21972660
---------------------------------------------
*** IBM Security Bulletin: IBM QRadar SIEM is vulnerable to Stored cross-site scripting. ***
http://www.ibm.com/support/docview.wss?uid=swg21973175
---------------------------------------------
*** FireEye Exploitation: Project Zero's Vulnerability of the Beast ***
---------------------------------------------
FireEye sell security appliances to enterprise and government customers. FireEye's flagship products are monitoring devices designed to be installed at egress points of large networks, i.e. where traffic flows from the intranet to the internet.To give a ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/12/fireeye-exploitation-project-…
*** Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos ***
---------------------------------------------
And now for something completely different.">Python">Subtitle: Captain Obvious Applies Chaos Theory Introduction This diary breaks a bit from our expected norms todiscussmanaging possible outcomes originating froma data breach ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20495
*** Security Advisory: Multiple MySQL vulnerabilities ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/59/sol59010802.html?…
*** VB2015 video: Making a dent in Russian mobile banking phishing ***
---------------------------------------------
Sebastian Porst explains what Google has done to protect users from phishing apps targeting Russian banks.In the last few years, mobile malware has evolved from a mostly theoretical threat to a very serious one that affects many users. Indeed, several talks at VB2015 dealt with various aspects of mobile ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/12_16.xml
*** Adcon Telemetry A840 Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation details for vulnerabilities in Adcon Telemetry's A840 Telemetry Gateway Base Station.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-349-01
*** Advantech EKI Vulnerabilities (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-15-344-01 Advantech EKI Vulnerabilities that was published December 10, 2015, on the NCCIC/ICS-CERT web site.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01
*** Sicherheitspaket UTM von Sophos löchrig ***
---------------------------------------------
Das Unified-Threat-Management-Paket von Sophos ist bedroht und einem Sicherheitsforscher zufolge können Angreifer etwa die Firewall deaktivieren. Die Lücken sollen bereits gefixt sein; Patches sind aber noch nicht verfügbar.
---------------------------------------------
http://heise.de/-3044717
*** DFN-CERT-2015-1937/">ISC BIND9: Zwei Schwachstellen ermöglichen einen Denial-of-Service-Angriff ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-1937/
*** Driving an industry towards secure code ***
---------------------------------------------
The German government made an unprecedented move this week by issuing requirements for all new vehicles' software to be made accessible to country regulators to ensure that emissions loopholes aren't ...
---------------------------------------------
http://www.net-security.org/article.php?id=2431
*** Playing With Sandboxes Like a Boss ***
---------------------------------------------
Last week, Guy wrote a nice diary to explain how to easily deploy IRMA to analyze suspicious files. Having a good tool to work on files locally is always interesting for multiple reasons. You are doing some independent research, you ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20501
*** Attacking WPA2 Enterprise ***
---------------------------------------------
The widespread use of mobile and portable devices in the enterprise environment requires a proper implementation of the wireless network infrastructure to provide them connectivity and ensure the business functionality. WPA-Enterprise is ..
---------------------------------------------
http://resources.infosecinstitute.com/attacking-wpa2-enterprise/
*** Open Source Network Security Tools for Newbies ***
---------------------------------------------
With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security. We all have to start somewhere. The question is, where? The sheer number of open source tools available can make ..
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/open-source-network-se…
*** [HTB23282]: RCE in Zen Cart via Arbitrary File Inclusion ***
---------------------------------------------
High-Tech Bridge Security Research Lab discovered critical vulnerability in a popular e-commerce software Zen Cart, which can be exploited by remote non-authenticated attackers to compromise vulnerable system. A remote ..
---------------------------------------------
https://www.htbridge.com/advisory/HTB23282
*** Crimeware / APT Malware Masquerade as Santa Claus and Christmas Apps ***
---------------------------------------------
CloudSek was monitoring an underground hacking team, that was selling a Desktop malware in various underground forums. The desktop malware is specifically designed for jumping air-gapped systems , and given the type of documents the attackers are seeking , it was collecting classified data from software companies and government organisations.
---------------------------------------------
https://www.cloudsek.com/announcements/blog/apt-malware-masquerade-as-chris…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 14-12-2015 18:00 − Dienstag 15-12-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** 13 million MacKeeper users exposed after MongoDB door was left open ***
---------------------------------------------
Expect more breaches in the future as 35,000 MongoDB installs are misconfigured.
---------------------------------------------
http://arstechnica.com/security/2015/12/13-million-mackeeper-users-exposed-…
*** Hack: Esa-Nutzer haben kurze Passwörter ***
---------------------------------------------
Zahlreiche interne Datensätze der Europäischen Raumfahrtagentur Esa sind gehackt worden und jetzt im Internet einsehbar. Offenbar benutzen viele der Esa-Nutzer kurze und unsichere Passwörter.
---------------------------------------------
http://www.golem.de/news/rocket-science-esa-nutzer-haben-kurze-passwoerter-…
*** Vulnerability Details: Joomla! Remote Code Execution ***
---------------------------------------------
The Joomla! team released a new version of Joomla! CMS yesterday to patch a serious and easy to exploit remote code execution vulnerability that affected pretty much all versions of the platform up to 3.4.5. As soon as the patch was released, we were able to start our investigation and found that it was alreadyRead More The post Vulnerability Details: Joomla! Remote Code Execution appeared first on Sucuri Blog.
---------------------------------------------
https://blog.sucuri.net/2015/12/joomla-remote-code-execution-the-details.ht…
*** 4 Things to Consider When Assessing Device Posture for Effective Network Access Control ***
---------------------------------------------
Guest blogger Benny Czarny explains one of the main reasons to have a NAC system in place is to keep risky devices from connecting to your organization's network. Unfortunately, simply purchasing a NAC solution is not going to guarantee your protection.Categories: Online SecurityTags: Anti-Malwareanti-virusencryptionendpointvulnerability(Read more...)
---------------------------------------------
https://blog.malwarebytes.org/online-security/2015/12/4-things-to-consider-…
*** Protecting Windows Networks - Kerberos Attacks ***
---------------------------------------------
MEDIA NOTE: This is not a new flaw, just a good write-up! I don't know why media reporting this as a new flaw. | Kerberos is an authentication protocol that is used by default in Windows networks and provide mutual authentication and authorization for clients and servers. It does not require you to send a password or a hash on the wire, it is instead rely on a trusted third party for handling all the details. | Although, it is considered a secure protocol, it has some flaws in Windows...
---------------------------------------------
http://dfir-blog.com/2015/12/13/protecting-windows-networks-kerberos-attack…
*** Kaspersky Security Bulletin 2015. Overall statistics for 2015 ***
---------------------------------------------
In 2015, virus writers demonstrated a particular interest in exploits for Adobe Flash Player. The proportion of relatively simple programs used in mass attacks was growing. Attackers have mastered non-Windows platforms - Android and Linux: almost all types of malicious programs are created and used for these platforms.
---------------------------------------------
http://securelist.com/analysis/kaspersky-security-bulletin/73038/kaspersky-…
*** Oil and Gas Cyber Security - Interview ***
---------------------------------------------
In the recent presentation at BlackHat, you mentioned that oil and gas is one of the industries most plagued by cyber-attacks. What makes oil and gas an attractive target? It's a juicy target for Cyberattacks as oil and gas companies are responsible for a great part of some countries' economies. Any interference in their work...
---------------------------------------------
http://resources.infosecinstitute.com/oil-and-gas-cyber-security-interview/
*** Android.ZBot banking Trojan uses "web injections" to steal confidential data ***
---------------------------------------------
December 15, 2015 The Trojans designed to steal money from bank accounts pose a serious threat to Android users. The Android.ZBot Trojan is one of these malicious programs. Its different modifications target mobile devices of Russian users from February 2015. This Trojan is interesting due to its ability to steal logins, passwords, and other confidential data by displaying fraudulent authentication forms on top of any applications. The appearance of such forms is generated on
---------------------------------------------
http://news.drweb.com/show/?i=9754&lng=en&c=9
*** Security Afterworks: Wie man TLS-Hipster wird & Best of CCC ***
---------------------------------------------
January 21, 2016 - 5:00 pm - 6:00 pm SBA Research Favoritenstraße 16 1040 Wien
---------------------------------------------
https://www.sba-research.org/events/security-afterworks-wie-man-tls-hipster…
*** ZDI-15-639: (0Day) Microsoft Office Excel Binary Worksheet Use-After-Free Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-639/
*** ZDI-15-638: (0Day) Apache TomEE Deserialization of Untrusted Data Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache TomEE. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-638/
*** Security Advisory: RSA-CRT key leak vulnerability CVE-2015-5738 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/91/sol91245485.html?…
*** Cisco Unified Communications Manager Web Management Interface Cross-Site Scripting Filter Bypass Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS XE Software IPv6 Neighbor Discovery Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco Unified Communications Manager Web Applications Identity Management Subsystem Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Security Notice - Statement on NTP.org and CERT/CC Revealing Security Vulnerabilities in NTPd ***
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-notices…
*** TYPO3 CMS 6.2.16 and 7.6.1 released ***
---------------------------------------------
The TYPO3 Community announces the versions 6.2.16 LTS and 7.6.1 LTS of the TYPO3 Enterprise Content Management System.
Both versions are maintenance releases and contain bug and security fixes.
In case the extension mediace is used, please make sure to upgrade to version 7.6.1.
---------------------------------------------
http://www.typo3.org/news/article/typo3-cms-6216-and-761-released/
---------------------------------------------
*** Cross-Site Scripting in TYPO3 component Indexed Search ***
http://www.typo3.org/news/article/cross-site-scripting-in-typo3-component-i…
---------------------------------------------
*** TYPO3 is susceptible to Cross-Site Flashing ***
http://www.typo3.org/news/article/typo3-is-susceptible-to-cross-site-flashi…
---------------------------------------------
*** Multiple Cross-Site Scripting vulnerabilities in frontend ***
http://www.typo3.org/news/article/multiple-cross-site-scripting-vulnerabili…
---------------------------------------------
*** Cross-Site Scripting vulnerability in typolinks ***
http://www.typo3.org/news/article/cross-site-scripting-vulnerability-in-typ…
---------------------------------------------
*** Multiple Cross-Site Scripting vulnerabilities in TYPO3 backend ***
http://www.typo3.org/news/article/multiple-cross-site-scripting-vulnerabili…
---------------------------------------------
*** Cross-Site Scripting in TYPO3 component Extension Manager ***
http://www.typo3.org/news/article/cross-site-scripting-in-typo3-component-e…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 11-12-2015 18:00 − Montag 14-12-2015 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
*** IBM Security Bulletin ***
---------------------------------------------
*** Vulnerability in Apache Commons affects WebSphere Message Broker and IBM Integration Bus (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972391
---------------------------------------------
***Vulnerability in Apache Commons affects Tivoli Network Manager Transmission Edition (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971891
---------------------------------------------
***Vulnerability in Apache Commons affects Rational Developer for System z (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971643
---------------------------------------------
***Vulnerability in the IBM Installation Manager script (CVE-2015-7442) ***
http://www.ibm.com/support/docview.wss?uid=swg21971295
---------------------------------------------
***Vulnerability in Apache Commons affects Rational Software Architect, Rational Software Architect for WebSphere Software and Rational Software Architect RealTime (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972753
---------------------------------------------
***Vulnerabilities in OpenSSL affect IBM Rational Application Developer for WebSphere Software (CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-1794) ***
http://www.ibm.com/support/docview.wss?uid=swg21972951
---------------------------------------------
***A security vulnerability has been identified in IBM Maximo Asset Management which could allow an attacker to obtain sensitive information via REST API (CVE-2015-7452) ***
http://www.ibm.com/support/docview.wss?uid=swg21972463
---------------------------------------------
***IBM Maximo Asset Management is vulnerable to cross-site scripting, caused by improper validation of user-supplied input (CVE-2015-7451) ***
http://www.ibm.com/support/docview.wss?uid=swg21972423
---------------------------------------------
***IBM Security Network Intrusion Prevention System is affected by krb5 vulnerabilities (CVE-2014-4341, CVE-2013-1418 ) ***
http://www.ibm.com/support/docview.wss?uid=swg21970321
---------------------------------------------
***A vulnerability in OpenSSH affects IBM Security Network Intrusion Prevention System (CVE-2015-5600) ***
http://www.ibm.com/support/docview.wss?uid=swg21969673
---------------------------------------------
***A vulnerability in net-snmp affects IBM Security Network Intrusion Prevention System (CVE-2014-3565) ***
http://www.ibm.com/support/docview.wss?uid=swg21972208
---------------------------------------------
***Vulnerabilities in curl affect IBM Security Network Intrusion Prevention System ***
http://www.ibm.com/support/docview.wss?uid=swg21968978
---------------------------------------------
***A security vulnerability has been identified in IBM Rational ClearQuest (CVE-2015-4996) ***
http://www.ibm.com/support/docview.wss?uid=swg21972331
---------------------------------------------
***Multiple vulnerabilities in IBM Java Runtime affect IBM Tivoli Provisioning Manager (CVE-2015-2601, CVE-2015-1931, CVE-2015-2625) ***
http://www.ibm.com/support/docview.wss?uid=swg21972941
---------------------------------------------
***Vulnerabilities in OpenSSL affect IBM Cognos Planning(CVE-2015-1789, CVE-2015-1790, CVE-2015-1792) ***
http://www.ibm.com/support/docview.wss?uid=swg21971729
---------------------------------------------
*** Website Malware - Evolution of Pseudo Darkleech ***
---------------------------------------------
Last March we described a WordPress attack that was responsible for hidden iframe injections that resembled Darkleech injections: declarations of styles with random names and coordinates, iframes with No-IP host names, and random dimensions where the ..
---------------------------------------------
https://blog.sucuri.net/2015/12/evolution-of-pseudo-darkleech.html
*** iTunes 12.3.2 ***
---------------------------------------------
https://support.apple.com/kb/HT205636
*** Security Advisory: Apache Groovy vulnerability CVE-2015-3253 ***
---------------------------------------------
The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object. (CVE-2015-3253)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/49/sol49233165.html
*** Security Update 2015-006 Yosemite ***
---------------------------------------------
https://support.apple.com/kb/HT205653
*** OS X El Capitan 10.11.2, Security Update 2015-005 Yosemite, and Security Update 2015-008 Mavericks ***
---------------------------------------------
https://support.apple.com/kb/HT205637
*** OS X El Capitan 10.11.1, Security Update 2015-004 Yosemite, and Security Update 2015-007 Mavericks ***
---------------------------------------------
https://support.apple.com/kb/HT205375
*** What Signs Are You Missing? ***
---------------------------------------------
While recently listening to a presentation, I found my attention drawn to a metal water container at the center of the conference room table. Condensation was all around it and without ever having to interact with the container, I found ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20481
*** Google Bans Symantec Root Certificates ***
---------------------------------------------
An anonymous reader writes: After in September Google discovered SSL certificates issued in its name by Symantec, and after in October the company discovered over 2,500 ..
---------------------------------------------
http://tech.slashdot.org/story/15/12/12/2255212/google-bans-symantec-root-c…
*** DSA-3416 libphp-phpmailer - security update ***
---------------------------------------------
Takeshi Terada discovered a vulnerability in PHPMailer, a PHP library foremail transfer, used by many CMSs. The library accepted email addressesand SMTP commands containing line breaks, which can be abused by anattacker to inject messages.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3416
*** Memory-resident modular malware menaces moneymen ***
---------------------------------------------
Latentbot avoids your HDD - and its been off the radar for two years A stealthy strain of malware resident only in memory has been quietly pwning victims around the world for two years.
---------------------------------------------
www.theregister.co.uk/2015/12/14/latentbot_memory_resident_malware/
*** Lenovo/CSR: Bluetooth-Treiber installiert Root-Zertifikat ***
---------------------------------------------
Ein Bluetooth-Treiber für Chips der Firma CSR installiert zwei Root-Zertifikate, mit denen der Besitzer des privaten Schlüssels HTTPS-Verbindungen angreifen könnte. Offenbar handelt es sich um Testzertifikate zur Treibersignierung während der Entwicklung.
---------------------------------------------
http://www.golem.de/news/lenovo-csr-bluetooth-treiber-installiert-root-zert…
*** Inside the German cybercriminal underground ***
---------------------------------------------
Trend Micro investigated on German crime forums and concluded that Germany possesses the most advanced cybercrime ecosystem in the European Union. We have reported several times the news related to various criminal cybercriminal ..
---------------------------------------------
http://securityaffairs.co/wordpress/42802/cyber-crime/german-cybercriminal-…
*** [20151214] - Core - Remote Code Execution Vulnerability ***
---------------------------------------------
Browser information are not filtered properly while saving the session values into the database what leads to a Remote Code Execution vulnerability.
---------------------------------------------
https://developer.joomla.org/security-centre/630-20151214-core-remote-code-…
*** [20151214] - Core - CSRF Hardening ***
---------------------------------------------
Add additional CSRF hardening in com_templates.
---------------------------------------------
https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardeni…
*** [20151214] - Core - Directory Traversal ***
---------------------------------------------
Fails to properly sanitise input data from the XML install file located within the package archive.
---------------------------------------------
https://developer.joomla.org/security-centre/634-20151214-core-directory-tr…
*** Bugtraq: ERPSCAN Research Advisory [ERPSCAN-15-022] SAP NetWeaver 7.4 - XSS ***
---------------------------------------------
http://www.securityfocus.com/archive/1/537111
*** Bugtraq: [ERPSCAN-15-021] SAP NetWeaver 7.4 - SQL Injection vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/537109
*** Sicherheitsforscher: Datenleck bei Mackeeper erlaubt freien Zugriff auf Nutzerdaten ***
---------------------------------------------
Die Datenbank der umstrittetenen Mac-Software Mackeeper sei frei zugänglich, erklärt ein Sicherheitsforscher. Er habe 13 Millionen Datensätze mit Nutzerinformationen ungehindert heruntergeladen.
---------------------------------------------
http://heise.de/-3043720
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 10-12-2015 18:00 − Freitag 11-12-2015 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** NIST will Feedback zur Absicherung von kritischer Infrastruktur ***
---------------------------------------------
Die US-Standardisierungsbehörde möchte ihr Richtlinienpapier zur IT-Sicherheit von Kraftwerken und Industrieanlagen verbessern und bittet um Mithilfe. Allerdings ist das NIST bei Sicherheitsexperten momentan nicht gerade unumstritten.
---------------------------------------------
http://heise.de/-3042666
*** New Spy Banker Trojan Telax abusing Google Cloud Servers ***
---------------------------------------------
Introduction Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. The malware authors are leveraging Google Cloud Servers to host the initial Spy Banker Downloader Trojan, which is responsible for downloading and installing Spy Banker Trojan Telax.
---------------------------------------------
http://research.zscaler.com/2015/12/new-spy-banker-trojan-telax-abusing.html
*** Open Automation Software OPC Systems NET DLL Hijacking Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a DLL Hijacking vulnerability in Open Automation Software's OPC Systems.NET application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-344-02
*** XZERES 442SR Wind Turbine Cross-site Scripting Vulnerability (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-15-342-01 XZERES 442SR Wind Turbine Cross-site Scripting Vulnerability that was published December 8, 2015, on the NCCIC/ICS-CERT web site. This advisory provides mitigations details for a cross-site scripting vulnerability in XZERES's 442SR turbine generator operating system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-342-01
*** Everything old is new again - Blackhole exploit kit since November 2015, (Fri, Dec 11th) ***
---------------------------------------------
Last month, the Malwarebytes blog posted an article about Blackhole exploit kit (EK) resurfacing in active drive-by campaigns from compromised websites. At the time, I hadnt noticed this trend, because the Windows hosts I was using to generate EK traffic were a bit too up-to-date.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20477&rss
*** New SWITCH Security Report available - Invitation to take part in a Reader Survey ***
---------------------------------------------
A new issue of our monthly SWITCH Security Report has just been released.
---------------------------------------------
http://securityblog.switch.ch/2015/12/09/new-switch-security-report-availab…
*** Zend Framework vulnerable to SQL injection ***
---------------------------------------------
Zend Framework contains an SQL injection vulnerability (CWE-89) due to the argument of the ORDER BY clause.
An attacker who can access the product may execute SQL commands.
---------------------------------------------
http://jvn.jp/en/jp/JVN71730320/
*** Totgesagte leben länger: Facebook und Cloudflare setzen weiter auf SHA-1 ***
---------------------------------------------
Mit SHA-1 signierte SSL/TLS-Zertifikate gelten schon lange als unsicher und es gibt seit einiger Zeit erste praktische Angriffe. Trotzdem wollen wichtige Dienstanbieter wie Facebook und Cloudflare auf unbestimmte Zeit an SHA-1 festhalten.
---------------------------------------------
http://heise.de/-3041665
*** Advantech EKI Vulnerabilities ***
---------------------------------------------
This advisory provides information regarding several vulnerabilities in Advantech's EKI devices.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco Unified Email Interaction Manager and Cisco Unified Web Interaction Manager XSS Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Small Business RV Series and SA500 Series Dual WAN VPN Router Generated Key Pair Information Disclosure Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Emergency Responder Web Framework Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** Tivoli Provisioning Manager for OS Deployment and Tivoli Provisioning Manager for Images - OpenSSL vulnerabilities (CVE-2015-1791, CVE-2015-1792, CVE-2015-1788, CVE-2015-1789,CVE-2015-1790) ***
http://www.ibm.com/support/docview.wss?uid=swg21971248
---------------------------------------------
*** Infosphere BigInsights is affected by a vulnerability in DB2 (CVE-2014-0919) ***
http://www.ibm.com/support/docview.wss?uid=swg21970398
---------------------------------------------
*** Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearQuest (CVE-2015-2613, CVE-2015-2601, CVE-2015-2625, CVE-2015-1931) ***
http://www.ibm.com/support/docview.wss?uid=swg21972650
---------------------------------------------
*** Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2015-2613, CVE-2015-2601, CVE-2015-2625, CVE-2015-1931) ***
http://www.ibm.com/support/docview.wss?uid=swg21963120
---------------------------------------------
*** Vulnerabilities in OpenSSL affect IBM MessageSight (CVE-2015-1788) ***
http://www.ibm.com/support/docview.wss?uid=swg21971177
---------------------------------------------
*** Multiple vulnerabilities in OpenSSH, GNU C Library (glibc), and OpenSSL, including Logjam, affect Integrated Management Module II (IMM2) ***
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5099032
---------------------------------------------
*** Vulnerabilities in openssh affect Power Hardware Management Console (CVE-2015-5600) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021006
---------------------------------------------
*** A vulnerability in Libxml affects IBM Security Network Protection (CVE-2015-1819) ***
http://www.ibm.com/support/docview.wss?uid=swg21969664
---------------------------------------------
*** A vulnerability in GNU glibc affects IBM Security Network Protection (CVE-2014-8121) ***
http://www.ibm.com/support/docview.wss?uid=swg21967169
---------------------------------------------
*** Multiple vulnerability fixes for Rational Lifecycle Integration Adapter for HP ALM (CVE-2015-2613, CVE-2015-2601, CVE-2015-2625, CVE-2015-1931) ***
http://www.ibm.com/support/docview.wss?uid=swg21972785
---------------------------------------------
*** Multiple vulnerabilities in IBM Java SDK affect the IBM Installation Manager and IBM Packaging Utility (CVE-2015-2625 and CVE-2015-1931 ) ***
http://www.ibm.com/support/docview.wss?uid=swg21972707
---------------------------------------------
*** Vulnerability in spice affects IBM SmartCloud Provisioning for IBM Software Virtual Appliance (CVE-2015-5261, CVE-2015-5260) ***
http://www.ibm.com/support/docview.wss?uid=swg2C1000009
---------------------------------------------
*** Vulnerability in IBM Java Runtime affects IBM Content Classification CVE-2015-4844 ***
http://www.ibm.com/support/docview.wss?uid=swg21971760
---------------------------------------------
*** Vulnerability in Apache Commons affects Rational Developer for i, Rational Developer for AIX and Linux and Rational Developer for Power Systems Software (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971814
---------------------------------------------
*** ´Vulnerability in Apache Commons affects IBM Rational Application Developer for WebSphere Software (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972565
---------------------------------------------
*** Multiple vulnerability in Product IBM Tivoli Common Reporting (CVE-2015-7436,CVE-2015-7435,CVE-2012-6153,CVE-2014-3577,CVE-2015-7450,CVE-2015-4872) ***
http://www.ibm.com/support/docview.wss?uid=swg21972799
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Web Interface for Content Management (WEBi) (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972903
---------------------------------------------
*** Vulnerability in Apache Commons affects FileNet Collaboration Services/IBM FileNet Services for Lotus Quickr (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972902
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Integration Designer (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971371
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 09-12-2015 18:00 − Donnerstag 10-12-2015 18:00
Handler: Taranis Admin
Co-Handler: n/a
*** Server Security: OSSEC Updated With GeoIP Support ***
---------------------------------------------
We leverage OSSEC extensively to help monitor and protect our servers. If you are not familiar with OSSEC, it is an open source Host-Based Intrusion Detection System (HIDS); it has a powerful correlation and analysis engine that integrates ..
---------------------------------------------
https://blog.sucuri.net/2015/12/ossec-with-geoip.html
*** Cisco Unity Connection Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco TelePresence Video Communication Server Expressway Web Framework Code Unauthorized Access Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cybercrime News Results In Cybercrime Blues ***
---------------------------------------------
FireEye Labs recently spotted a 2011 article on cybercrime from the news site theguardian[.]com that redirects users to the Angler Exploit Kit. Successful exploitation by Angler resulted in a malware infection for readers of the article. A spokesperson for the guardian[.]com responded that they "are aware of FireEye's claims and are working to rectify the issue in question as soon as possible."
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2015/12/cybercrime-news.html
*** Inside Chimera Ransomware - the first 'doxingware' in wild ***
---------------------------------------------
Ransomware have proven to be a good source of money for cybercriminals. The Chimera ransomware comes with several ideas that are novel and may slowly become a new trend.
---------------------------------------------
https://blog.malwarebytes.org/intelligence/2015/12/inside-chimera-ransomwar…
*** PuTTY ECH Integer Overflow Lets Remote Users Execute Arbitrary Code on the Target Users System ***
---------------------------------------------
http://www.securitytracker.com/id/1034308
*** MS15-DEC - Microsoft Security Bulletin Summary for December 2015 - Version: 1.1 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS15-DEC
*** American hacker duo throws pwns on IoT BBQs, grills open admin ***
---------------------------------------------
Half-baked code a feast for attackers because Thing-builders are hopeless Kiwicon American hardware hackers have ruined Christmas cooks ups across Australia, revealing gaping ..
---------------------------------------------
www.theregister.co.uk/2015/12/10/american_hacker_duo_throws_pwns_on_iot_bbq…
*** Valve Software: 77.000 Nutzerkonten pro Monat auf Steam ausgeplündert ***
---------------------------------------------
Um Nutzer vor dem Diebstahl virtueller Güter auf Steam zu schützen, führt Valve neue Regeln für den Verkauf ein. Das scheint nötig: Seitdem der Handel etwa mit Gegenständen aus Dota 2 möglich ist, sind immer mehr Nutzer ins Visier von Hackern geraten.
---------------------------------------------
http://www.golem.de/news/valve-software-77-000-nutzerkonten-pro-monat-auf-s…
*** Kaspersky Security Bulletin 2015. Evolution of cyber threats in the corporate sector ***
---------------------------------------------
The data collected from Kaspersky Lab products shows that the tools used to attack businesses differ from those used against home users. Let's have a look back at the major incidents of 2015 and at the new trends we have observed in information security within the business environment.
---------------------------------------------
http://securelist.com/analysis/kaspersky-security-bulletin/72969/kaspersky-…
*** Finale Version vom Passwortmanager KeePassX 2.0 erschienen ***
---------------------------------------------
KeePassX ist nach rund dreieinhalb Jahren Entwicklungszeit in der finalen Version 2.0 angekommen.
---------------------------------------------
http://heise.de/-3038771
*** HTTPS: Cloudflare und Facebook wollen SHA1 weiternutzen ***
---------------------------------------------
Eigentlich sollen mit SHA1 signierte TLS-Zertifikate bald der Vergangenheit angehören. Doch in Entwicklungsländern sind noch viele Geräte in Benutzung, die den besseren SHA256-Algorithmus nicht unterstützen. Facebook und Cloudflare wollen daher alten Browsern ein anderes Zertifikat ausliefern.
---------------------------------------------
http://www.golem.de/news/https-cloudflare-und-facebook-wollen-sha1-weiternu…
*** Cisco untersucht eigenes Portfolio auf gefährliche Java-Lücke ***
---------------------------------------------
Die weit verbreitete Java-Bibliothek Apache Common Collections ist verwundbar. Cisco untersucht nun, ob die Lücken in seinen Anwendungen und Geräten klafft. Außerdem wurden weitere potentiell angreifbare Java-Bibliotheken entdeckt.
---------------------------------------------
http://heise.de/-3039533
*** [2015-12-10] Skybox Platform Multiple Vulnerabilities ***
---------------------------------------------
The Skybox platform contains multiple security vulnerabilities which can be exploited by an attacker to execute arbitrary code and to read arbitrary files from the file system. Moreover a SQL injection and various Cross-Site scripting vulnerabilities have been identified. Attackers can exploit these issues to completely compromise affected Skybox appliances.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2015…
*** WordPress hosting biz confesses to breach, urgently contacts 30,000 users ***
---------------------------------------------
We're 'proactively taking security measures' - WP Engine WordPress hosting outfit WP Engine has confessed to a security breach, prompting it to reset 30,000 customers passwords.
---------------------------------------------
www.theregister.co.uk/2015/12/10/wordpress_hosting_biz_confesses_to_hack/
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 07-12-2015 18:00 − Mittwoch 09-12-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Email Tracking for Dummies ***
---------------------------------------------
Recently, I was involved in an incident handling mission to find how some confidential emails were being tracked. Let's imagine a first scenario: Alice sends a mail to Bob. Bob reads Alice's email and Alice gets notified. Nothing special, this is a standard feature offered by most commercial messaging ..
---------------------------------------------
https://blog.rootshell.be/2015/12/07/email-tracking-for-dummies/
*** Another Brick in the FrameworkPoS ***
---------------------------------------------
FrameworkPoS is a well-documented family of malware that targets Point of Sale (PoS) systems and has been attributed to at least one high profile retail breach. The malware author(s) have continued to improve upon the original malware, releasing ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Another-Brick-in-the-Fr…
*** EU verschärft Regeln zur Cybersicherheit ***
---------------------------------------------
Internetkonzerne müssen schwere Hackerangriffe künftig den Behörden melden - derstandard.at/2000027140552/EU-verschaerft-Regeln-zur-Cybersicherheit
---------------------------------------------
http://derstandard.at/2000027140552
*** Bitcoin Extortionist Copycats on the Rise, Experts Say ***
---------------------------------------------
Experts believe that the success tied to a recent spate of DDoS for hire groups may be because many are copycat collectives operating with a shorter lifespan.
---------------------------------------------
http://threatpost.com/bitcoin-extortionist-copycats-on-the-rise-experts-say…
*** Citrix NetScaler Service Delivery Appliance Multiple Security Updates ***
---------------------------------------------
http://support.citrix.com/article/CTX202482
*** Day 2: UK research network Janet still being slapped by DDoS attack ***
---------------------------------------------
DNS services appear to be targeted, switching may work Members of UKs academic community from freshers to senior academics are facing more connection issues today as a persistent and continuous DDoS attack against the academic computer network Janet continues to stretch resources.
---------------------------------------------
www.theregister.co.uk/2015/12/08/uk_research_network_janet_ddos/
*** The German Underground: Buying and Selling Goods via Droppers ***
---------------------------------------------
We have frequently talked about how the Deep Web is used as a venue for the illegal trade in weapons and drugs. This part of the cybercrime underground includes a German-speaking community. Our new research examines these sites in some detail.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/the-german-under…
*** Authentifikation von McAfees Enterprise Security Manager löchrig ***
---------------------------------------------
Angreifer können sich mit einem speziellen Nutzernamen und einem beliebigen Passwort beim Enterprise Security Manager von McAfee anmelden. Gefixte Versionen stehen bereit.
---------------------------------------------
http://heise.de/-3036068
*** Security Updates Available for Adobe Flash Player (APSB15-32) ***
---------------------------------------------
A security bulletin (APSB15-32) has been published regarding security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1302
*** MS15-DEC - Microsoft Security Bulletin Summary for December 2015 - Version: 1.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS15-DEC
*** Apple Patches Everything, (Tue, Dec 8th) ***
---------------------------------------------
And to not be outdone by Microsoft and Adobe, Apple just released patches for: iOS 9.2 A total of 50 vulnerabilities (CVE IDs) are addressed. About 10 of them affect WebKit and may lead to arbitrary code execution by visiting a malicious ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20465
*** Cisco Wireless Residential Gateway Stored Cross-Site Scripting Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** ZDI-15-624: Wireshark PCAPNG if_filter Arbitrary Free Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wireshark. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-624/
*** Adobe, Microsoft Each Plug 70+ Security Holes ***
---------------------------------------------
Adobe and Microsoft today independently issued software updates to plug critical security holes in their software. Adobe released a patch that fixes a whopping 78 security vulnerabilities in its Flash Player software. Microsoft pushed a dozen patch bundles to address at least 71 flaws in various versions of the Windows operating system and associated software.
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/RuUekEfVS0g/
*** XZERES 442SR Wind Turbine Cross-site Scripting Vulnerability ***
---------------------------------------------
This advisory provides mitigations details for a cross-site scripting vulnerability in XZERES's 442SR turbine generator operating system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-342-01
*** LOYTEC Router Information Exposure Vulnerability ***
---------------------------------------------
This advisory provides mitigations details for a password file vulnerability in LOYTEC's LIP-3ECTB routers.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-342-02
*** Pacom 1000 CCU GMS System Cryptographic Implementation Vulnerabilities ***
---------------------------------------------
This advisory was originally posted to the US-CERT secure Portal library on December 3, 2015, and is being released to the ICS-CERT web site. This advisory provides mitigation details for crypto implementation flaws in the Pacom GMS system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-337-03
*** Rockwell Automation Micrologix 1100 and 1400 PLC Systems Vulnerabilities (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-15-300-03 Rockwell Automation MicroLogix 1100 and 1400 PLC Systems Vulnerabilities that was published October 27, 2015, on the NCCIC/ICS-CERT web site. This advisory provides mitigation details for vulnerabilities in the Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 programmable logic controller (PLC) systems.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-300-03A
*** Analyzing Bartalex - A Prolific Malware Distributor ***
---------------------------------------------
Bartalex is a name that continues to appear in a cyberthief�s arsenal as one of the most popular mechanisms for distributing banking Trojans, ransomware, RATs, and other malware. The SANS ISC recently published a very interesting technical analysis of Bartalex. With this post, we hope to add a little more color and supplement what you already know about this prolific malware distributor.
---------------------------------------------
https://blog.phishlabs.com/bartalex
*** Blog of News Site 'The Independent' Hacked, Leads to TeslaCrypt Ransomware ***
---------------------------------------------
The blog page of one of the leading media sites in the United Kingdom, 'The Independent' has been compromised, which may put its millions of readers at risk of getting infected with ransomware. We have already informed The Independent about this security incident and are working with them to contain the ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/blog-of-news-sit…
*** Enforcing USB Storage Policy with PowerShell, (Wed, Dec 9th) ***
---------------------------------------------
In a previous diary, I presented the CIRCLean (USB sanitizer) developed by the Luxembourg CERT (circl.lu). This tool is very useful to sanitize suspicious USBsticks but it lacks of control and enforcement. Nevertheless, ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20469
*** Epic failure of Phone House & Dutch telecom providers to protect personal data: How I could access 12+ million records #phonehousegate ***
---------------------------------------------
On September 11, 2015 I visited Media Markt in Utrecht Hoog Catherijne, a well-known electronics shop in The Netherlands. Since summer 2014, the biggest independent Dutch phone retail company Phone House also operates (white labeled) from within Media Markt locations as a store-in-a-store ..
---------------------------------------------
http://sijmen.ruwhof.net/weblog/608-personal-data-of-dutch-telecom-provider…
*** Verschlüsselungstrojaner: Neue TeslaCrypt-Version grassiert ***
---------------------------------------------
Ransomware ist der absolute Renner in der Crimeware-Szene. Seit einigen Tagen gibt es vermehrt Hinweise auf Infektionen durch eine neue Version des Verschlüsselungstrojaners TeslaCrypt, der Dateien verschlüsselt und mit der Endung .vvv versieht.
---------------------------------------------
http://heise.de/-3037099
*** Audit und Web-Client: Kritik an SSL/TLS-Zertifizierungsstelle Lets Encrypt ***
---------------------------------------------
Die Tätigkeit von Let's Encrypt als Zertifizierungsstelle wurde noch nicht der vorgeschriebenen Sicherheitsprüfung unterzogen. Trotzdem stellt die CA schon Zertifikate aus.
---------------------------------------------
http://heise.de/-3031849
*** POS Security: What You Need To Know ***
---------------------------------------------
October 1, 2015 marked the deadline set by credit card issuers to shift liability for fraudulent activity from card issuers or payment processors to the party that is the least Europay-Mastercard-Visa (EMV) compliant during a fraudulent ..
---------------------------------------------
https://www.alienvault.com/open-threat-exchange/blog/pos-security-what-you-…
*** Cisco Prime Collaboration Assurance Default Account Credential Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 04-12-2015 18:00 − Montag 07-12-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** OpenSSL-Sicherheits-Update und Abschied von Altlasten ***
---------------------------------------------
Im Rahmen eines Sicherheits-Updates verkündet das OpenSSL-Team, dass die Versionen 0.9.8 und 1.0.0 keine weiteren Updates mehr erhalten werden. Deren Nutzer sollten dringend auf neuere Versionen umsteigen.
---------------------------------------------
http://heise.de/-3032678
*** Bundestags-Hacker greifen weitere Nato-Staaten an ***
---------------------------------------------
Die professionellen Cyberattacken wurden mit hohem personellen und finanziellen Aufwand durchgeführt
---------------------------------------------
http://derstandard.at/2000026983302
*** Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Botconf 2015 Wrap-Up Day #3 ***
---------------------------------------------
And here is my wrap-up for the third day of the conference. Again a bunch of interesting talks. The first to join the floor was Yonathan Klijnsma who presented a nice history of the famous ransomware: Cryptowall. This ransomware has already ..
---------------------------------------------
https://blog.rootshell.be/2015/12/04/botconf-2015-wrap-up-day-3/
*** Between a Rock and a Hard Link ***
---------------------------------------------
In a previous blog post I described some of the changes that Microsoft has made to the handling of symbolic links from a sandboxed process. This has an impact on the exploitation of privileged file ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/12/between-rock-and-hard-link.ht…
*** Microsoft assists law enforcement to help disrupt Dorkbot botnets ***
---------------------------------------------
Law enforcement agencies from around the globe, aided by Microsoft security researchers, have today announced the disruption of one of the most widely distributed malware families - Win32/Dorkbot. This malware family has infected more than ..
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/12/03/microsoft-assists-law-en…
*** Variety Jones, Alleged Silk Road Mentor, Arrested in Thailand ***
---------------------------------------------
Variety Jones, the alleged mentor and adviser to the Silk Roads creator, has finally been arrested in Thailand.
---------------------------------------------
http://www.wired.com/2015/12/variety-jones-alleged-silk-road-mentor-arreste…
*** A Micro-view of Macro Malware ***
---------------------------------------------
Dridex is a botnet with multiple features, it is most known for stealing people's credentials on finance-related web sites. Despite the arrest of the gang behind the ..
---------------------------------------------
http://labs.bromium.com/2015/12/03/a-micro-view-of-macro-malware/
*** Augen auf beim Weihnachts-Phish ***
---------------------------------------------
In der Hoffnung auf satte Gewinne haben Kriminelle kräftig in ein möglichst authentisches Erscheinungsbild ihrer Phishing-Kampagnen investiert. Es wird immer schwieriger, nicht auf die zum Teil fast perfekten Fälschungen hereinzufallen.
---------------------------------------------
http://heise.de/-3032829
*** Hello Barbie: Sicherheitsalbtraum im Kinderzimmer ***
---------------------------------------------
Interaktive Puppe für Kinder nun auch mit Lücken im Server und in der App
---------------------------------------------
http://derstandard.at/2000027045918
*** Netzwerk-Tools: Wireshark 2.0 und Nmap 7 veröffentlicht ***
---------------------------------------------
Passwort-Cracker hashcat nun Open-Source
---------------------------------------------
http://derstandard.at/2000027085336
*** GEOVAP Reliance 4 Control Server Unquoted Service Path Elevation Of Privilege ***
---------------------------------------------
The application suffers from an unquoted search path issue impacting the service RelianceOpcDaWrapper for Windows deployed as part of Reliance 4 SCADA/HMI system installer including Reliance OPC Server. This could potentially allow an authorized ..
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5285.php
*** Web Analytics Service vulnerable to cross-site scripting ***
---------------------------------------------
The JavaScript module for using Web Analytics Service which was provided by NTT DATA Smart Sourcing Corporation contains a cross-site scripting vulnerability.
---------------------------------------------
http://jvn.jp/en/jp/JVN70083512/
*** Thriving Beyond The Operating System: Financial Threat Group TargetsVolume Boot Record ***
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2015/12/fin1-targets-boot-reco…
*** Yahoo Mail: Webbrowser führten beliebigen Code in E-Mails aus ***
---------------------------------------------
Nutzer, die mobil E-Mails von ihrem Yahoo-Konto abrufen, waren bedroht und Angreifer hätten ihnen ohne viel Aufwand Schadcode unterschieben können.
---------------------------------------------
http://heise.de/-3033689
*** UK research network Janet under ongoing and persistent DDoS attack ***
---------------------------------------------
Attackers seem to be adjusting methods in response to Tweets Publicly-funded academic computer network Janet has come under a persistent DDoS attack today, which hobbled multiple ..
---------------------------------------------
www.theregister.co.uk/2015/12/07/janet_under_persistent_ddos_attack/
*** Security Advisory: AOL Desktop MiTM Remote File Write and Code Execution ***
---------------------------------------------
AOL Desktop is "the all-in-one experience with mail, instant messaging, browsing, search, content, and dial-up connectivity". It is the direct successor of the old Windows AOL clients from the 1990s. Issues in AOL Desktop, version ..
---------------------------------------------
http://lizardhq.org/2015/12/05/aol-desktop.html
Aufgrund des Feiertages am morgigen Dienstag, den 08.12.2015, erscheint der nächste End-of-Shift Report erst am 09.12.2015.
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 03-12-2015 18:00 − Freitag 04-12-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** No more security fixes for older OpenSSL branches ***
---------------------------------------------
The OpenSSL Software Foundation has released new patches for the popular open-source cryptographic library, but for two of its older branches they will likely be the last security updates.This could spell trouble for some enterprise applications that bundle the 0.9.8 or 1.0.0 versions of OpenSSL and for older systems -- embedded devices in particular -- where updates are rare.OpenSSL 1.0.0t and 0.9.8zh, which were released Thursday, are expected to be the last updates because support for these...
---------------------------------------------
http://www.cio.com/article/3011882/no-more-security-fixes-for-older-openssl…
*** Automatic MIME Attachments Triage ***
---------------------------------------------
[The post Automatic MIME Attachments Triage has been first published on /dev/random]A few weeks ago I posted a diary on the ISC SANS website about a script to automate the extraction and analyze of MIME attachments in emails. Being the happy owner of an old domain (15y), this domain is present in all spammer's mailing lists. I'm receiving a lot of spam and I like it. It helps me to collect interesting files and URLs. But...
---------------------------------------------
https://blog.rootshell.be/2015/12/04/automatic-mime-attachments-triage/
*** Automating Phishing Analysis using BRO, (Fri, Dec 4th) ***
---------------------------------------------
Determining the effectiveness of Phishing campaigns using metrics is great to be able to target awareness training for users and determining the effectiveness of your technical controls. The main questions you are trying to answer are : How many people were targeted by the phish? How many people replied? (If applicable) How many people visited the website in the email? How many people submitted credentials to the website?
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20441&rss
*** "Bau keine eigenen Protokolle": Vodafone verletzt mit Secure E-Mail die erste Kryptoregel ***
---------------------------------------------
Vodafones neuer E-Mail-Dienst Secure E-Mail soll den Austausch verschlüsselter E-Mails kinderleicht machen. Das Unternehmen macht jedoch in seiner Ankündigung kaum Angaben zur Sicherheit der verwendeten Verfahren. Deshalb haben wir nachgefragt - und sind verwirrt.
---------------------------------------------
http://www.golem.de/news/bau-keine-eigenen-protokolle-vodafone-verletzt-mit…
*** New edition of Windows 10 turns security nightmares into reality ***
---------------------------------------------
Windows 10 IoT Core Pro lets thing-makers opt-out of security updates Microsofts released a new edition of Windows 10.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/12/04/new_version…
*** An Introduction to Image File Execution Options ***
---------------------------------------------
Image File Execution Options are used to intercept calls to an executable. Its in use for debugging, replacing and stopping specific executables.Categories: All Things DevTags: IFEOImage File Execution OptionsPieter ArntzregistrySecurity.hijack(Read more...)
---------------------------------------------
https://blog.malwarebytes.org/development/2015/12/an-introduction-to-image-…
*** Can you keep Linux-based ransomware from attacking your servers? ***
---------------------------------------------
According to SophosLabs, Linux/Ransm-C ransomware is one example of the new Linux-based ransomware attacks, which in this case is built into a small command line program and designed to help crooks extort money through Linux servers. These Linux ransomware attacks are moving away from targeting end users and gravitating toward targeting Linux servers, web servers specifically, with a piece of software that encrypts data and is similar to what we've seen in previous years such as...
---------------------------------------------
http://www.csoonline.com/article/3010996/application-security/can-you-keep-…
*** Serverseitiges JavaScript: Node.js-Patch nun verfügbar ***
---------------------------------------------
Das Update adressiert die letzte Woche gemeldete DoS-Schwachstelle und den Zugriffsfehler bei der JavaScript-Engine V8. Gleichzeitig umfasst es die ebenfalls diese Woche aktualisierten OpenSSL-Bibliotheken.
---------------------------------------------
http://heise.de/-3031934
*** XML Secure Coding ***
---------------------------------------------
ABSTRACT The XML (Extensible markup language) is a buzzword over the internet, rapidly maturing technology with powerful real world application, especially for management, organization, and exhibition of data. XML technology is solely concerned with the structure and description of data that are typically transported across the network in a bid for easily sharing between diverse...
---------------------------------------------
http://resources.infosecinstitute.com/xml-secure-coding/
*** White hats, FBI and cops team up for Dorkbot botnet takedown ***
---------------------------------------------
Your four-year reign of terror is (temporarily) over Operations of the Dorkbot botnet have been disrupted following an operation that brought together law enforcement agencies led by the FBI, Interpol and Europol, and various infosec firms.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/12/04/dorkbot_bot…
*** Millions of smart TVs, phones and routers at risk from old vulnerability ***
---------------------------------------------
A three-year-old vulnerability in a software component used in millions of smart TVs, routers and phones still hasnt been patched by many vendors, thus posing a risk, according to Trend Micro.Although a patch was issued for the component in December 2012, Trend Micro found 547 apps that use an older unpatched version of it, wrote Veo Zhang, a mobile threats analyst."These are very popular apps that put millions of users in danger; aside from mobile devices, routers, and smart TVs are all...
---------------------------------------------
http://www.cio.com/article/3012073/security/millions-of-smart-tvs-phones-an…
*** hashcat and oclHashcat have gone open source ***
---------------------------------------------
https://hashcat.net/forum/thread-4880.htmlhttps://github.com/hashcat/
*** DSA-3413 openssl - security update ***
---------------------------------------------
Multiple vulnerabilities have been discovered in OpenSSL, a SecureSockets Layer toolkit. The Common Vulnerabilities and Exposures projectidentifies the following issues:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3413
*** DFN-CERT-2015-1868: Redis: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-1868/
*** Cisco Nexus 5000 Series USB Driver Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** IBM Security Bulletin: Vulnerability in Apache Commons affects IBM Standards Processing Engine (CVE-2015-7450) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21972329
*** IBM Security Bulletin: Vulnerability in Apache Commons affects Watson Explorer and Watson Content Analytics (CVE-2015-7450) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21971733
*** IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by multiple vulnerabilities in OpenSSL including Logjam ***
---------------------------------------------
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098960
*** IBM Security Bulletin: Vulnerability in Apache Commons affects IBM Tivoli Composite Application Manager for Application Diagnostics (CVE-2015-7450) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21972215
*** VU#294607: Lenovo Solution Center LSCTaskService privilege escalation, directory traversal, and CSRF ***
---------------------------------------------
Vulnerability Note VU#294607 Lenovo Solution Center LSCTaskService privilege escalation, directory traversal, and CSRF Original Release date: 04 Dec 2015 | Last revised: 04 Dec 2015 Overview The Lenovo Solution Center application contains multiple vulnerabilities that can allow an attacker to execute arbitrary code with SYSTEM privileges. Description CWE-732: Incorrect Permission Assignment for Critical ResourceLenovo Solution Center creates a service called LSCTaskService, which runs with...
---------------------------------------------
http://www.kb.cert.org/vuls/id/294607
*** SearchBlox File Exfiltration Vulnerability ***
---------------------------------------------
This advisory provides mitigations details for a file exfiltration vulnerability in SearchBlox's web-based proprietary search engine application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-337-01
*** Honeywell Midas Gas Detector Vulnerabilities ***
---------------------------------------------
This advisory was originally posted to the US-CERT secure Portal library on November 5, 2015, and is being released to the ICS-CERT web site. This advisory provides mitigation details for two vulnerabilities in Honeywell's Midas gas detector.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-309-02
*** WordPress Cool Video Gallery 1.9 Command Injection ***
---------------------------------------------
Topic: WordPress Cool Video Gallery 1.9 Command Injection Risk: Low Text:Title: Command Injection in cool-video-gallery v1.9 Wordpress plugin Author: Larry W. Cashdollar, @_larry0 Date: 2015-11-29 ...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015120031
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 02-12-2015 18:00 − Donnerstag 03-12-2015 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Botconf 2015 Wrap-Up Day #1 ***
---------------------------------------------
[The post Botconf 2015 Wrap-Up Day #1 has been first published on /dev/random]Here we go for a new edition of the Botconf edition. Already the third one. This conference is moving every year across France and, after Nantes and Nancy, the organizers chose Paris and more precisely the Google France venue!
---------------------------------------------
https://blog.rootshell.be/2015/12/02/botconf-2015-wrap-up-day-1/
*** ElasticZombie Botnet - Exploiting Elasticsearch Vulnerabilities ***
---------------------------------------------
With the rise of inexpensive Virtual Servers and popular services that install insecurely by default, coupled with some juicy vulnerabilities (read: RCE - Remote Code Execution), like CVE-2015-5377 and CVE-2015-1427, this year will be an interesting one for Elasticsearch.
---------------------------------------------
https://www.alienvault.com/open-threat-exchange/blog/elasticzombie-botnet-e…
*** Industrial control system gateway fix opens Heartbleed, Shellshock ***
---------------------------------------------
Metasploit module released to make 0day pwnage easy Rapid 7 security man Todd Beardsley says new firmware released to patch hardcoded SSH keys in Advantech EKI industrial control system gateways contains known brutal flaws including Shellshock, Heartbleed, and buffer overflows.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/12/03/industrial_…
*** DSA-3411 cups-filters - security update ***
---------------------------------------------
Michal Kowalczyk discovered that missing input sanitising in thefoomatic-rip print filter might result in the execution of arbitrarycommands.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3411
*** DFN-CERT-2015-1857/">Red Hat JBoss Enterprise Application Platform: Zwei Schwachstellen ermöglichen u.a. das Ausführen beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-1857/
*** 3G/4G cellural USB modems are full of critical security flaws, many 0-days ***
---------------------------------------------
An analysis of popular 3G and 4G cellural USB modems and routers used around the world revealed a myriad of serious vulnerabilities in each of them.
---------------------------------------------
http://www.net-security.org/secworld.php?id=19182
*** Kaspersky Security Bulletin 2015. Top security stories ***
---------------------------------------------
The end of the year is traditionally a time for reflection - for taking stock of our lives before considering what lies ahead. We'd like to offer our customary retrospective of the key events that have shaped the threat landscape in 2015.
---------------------------------------------
http://securelist.com/analysis/kaspersky-security-bulletin/72886/kaspersky-…
*** A Case Study of Information Stealers: Part I ***
---------------------------------------------
Introduction: A stealer is a type of malware that looks for passwords stored on the machine and sends them remotely (e.g. mail, HTTP) to an attacker. Most stealers use a web interface to facilitate browsing the data, especially if the targeted number of victims is important.
---------------------------------------------
http://resources.infosecinstitute.com/a-case-study-of-information-stealers-…
*** Report: Scripting languages most vulnerable, mobile apps need better crypto ***
---------------------------------------------
According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers are more likely to fix errors found with static instead of dynamic analysis.
---------------------------------------------
http://www.cio.com/article/3011668/encryption/report-scripting-languages-mo…
*** Botnetzbetreiber nutzen Dropbox als toten Briefkasten ***
---------------------------------------------
Die Malware Lowball soll Dropbox-Accounts missbrauchen, um infizierte Rechner in einem Botnetz anzusteuern. So wollen Online-Kriminelle Ermittlern die Spurensuche erschweren.
---------------------------------------------
http://heise.de/-3030993
*** Worldwide Cryptographic Products Survey: Edits and Additions Wanted ***
---------------------------------------------
Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption products that can be used to protect arbitrary data and messages.
---------------------------------------------
https://www.schneier.com/blog/archives/2015/12/worldwide_crypt.html
*** Week of Continuous Intrusion Tools - Day 4 - Common Abuse Set, Lateral Movement and Post Exploitation ***
---------------------------------------------
Welcome to Day 4 of Week of Continuous Intrusion tools. We are discussing security of Continuous Integration (CI) tools in this series of blog posts.
---------------------------------------------
http://www.labofapenetrationtester.com/2015/12/week-of-continuous-intrusion…
*** Bugtraq: ESA-2015-171 EMC NetWorker Denial-of-service Vulnerability ***
---------------------------------------------
EMC NetWorker contains a resolution for a Denial-of-service vulnerability. The vulnerability when exploited may allow malicious users to disrupt NetWorker services on affected systems.
---------------------------------------------
http://www.securityfocus.com/archive/1/537037
*** OpenSSL Security Advisory [3 Dec 2015] ***
---------------------------------------------
BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193) Certificate verify crash with missing PSS parameter (CVE-2015-3194) X509_ATTRIBUTE memory leak (CVE-2015-3195) Race condition handling PSK identify hint (CVE-2015-3196)
---------------------------------------------
https://openssl.org/news/secadv/20151203.txt
*** Security Advisory: Linux libuser vulnerability CVE-2015-3246 ***
---------------------------------------------
libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. NOTE: this issue can be combined with CVE-2015-3245 to gain privileges. (CVE-2015-3246)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/05/sol05770600.html?…
*** Cisco SIP Phone 3905 Resource Limitation Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Cisco Unified SIP Phone 3905 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco Unity Connection Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability in the HTTP web-based management interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected system.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS-XE 3S Platforms Series Root Shell License Bypass Vulnerability ***
---------------------------------------------
A vulnerability in the way software packages are loaded in the Cisco IOS-XE Operating System for the Cisco IOS-XE 3S platforms could allow an authenticated, local attacker to gain restricted root shell access.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** IBM Security Bulletin ***
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM InfoSphere Discovery (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971529
---------------------------------------------
*** Vulnerabilities in GSKit affect IBM MQ Appliance (CVE-2015-7421, CVE-2015-7420) ***
http://www.ibm.com/support/docview.wss?uid=swg21971500
---------------------------------------------
*** Vulnerabilities in GSKit 8 affect Tivoli Directory Server and IBM Security Directory Server (CVE-2015-7421, CVE-2015-7420) ***
http://www.ibm.com/support/docview.wss?uid=swg21972076
---------------------------------------------
*** IBM Spectrum Scale (GPFS) Hadoop connector is affected by a security vulnerability (CVE-2015-7430) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1022979
---------------------------------------------
*** IBM Spectrum Scale (GPFS) Hadoop connector is affected by a security vulnerability (CVE-2015-7430) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005461
---------------------------------------------
*** A vulnerability in IBM Java Runtime affects IBM Cognos Metrics Manager (CVE-2015-4872) ***
http://www.ibm.com/support/docview.wss?uid=swg21971753
---------------------------------------------
*** Multiple vulnerabilities in IBM Java Runtime affect IBM WebSphere Appliance Management Center (CVE-2015-4872) ***
http://www.ibm.com/support/docview.wss?uid=swg21971515
---------------------------------------------
*** Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime, affect IBM Endpoint Manager for Remote Control ***
http://www.ibm.com/support/docview.wss?uid=swg21971798
---------------------------------------------
*** Multiple vulnerabilities in IBM Java Runtime affect ITCAM for SOA (October 2015: CVE-2015-4872, CVE-2015-4911, CVE-2015-5006) ***
http://www.ibm.com/support/docview.wss?uid=swg21972112
---------------------------------------------
*** Multiple vulnerabilities in IBM Java SDK affect Rational Method Composer (CVE-2015-4872) ***
http://www.ibm.com/support/docview.wss?uid=swg21971419
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM i (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021018
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Lotus Mashups (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971925
---------------------------------------------
*** Infosphere BigInsights is affected by vulnerabilities in Apache HBase and Hive that could allow a remote attacker to gain unauthorized access to the system or authenticate with improper credentials (CVE-2015-1772, ***
http://www.ibm.com/support/docview.wss?uid=swg21969546
---------------------------------------------
*** Vulnerability in Apache Commons affects RIT and RTCP in Rational Test Workbench, RTCP and RIT Agent in Rational Test Virtualization Server, and RIT Agent in Rational Performance Test Server (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971818
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Emptoris Strategic Supply Management, and IBM Emptoris Services Procurement. (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971731
---------------------------------------------
*** Vulnerability in Apache Commons affects Enterprise Records ***
http://www.ibm.com/support/docview.wss?uid=swg21971268
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Sterling B2B Integrator (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971758
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM InfoSphere Information Server (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971410
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM WebSphere Service Registry and Repository (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971580
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Algo Credit Administrator (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971240
---------------------------------------------
*** Vulnerability in Apache Commons Collections affects IBM Forms Experience Builder (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971536
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Application Server on Cloud (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972179
---------------------------------------------
*** Multiple vulnerabilities in bundled components affects IBM SPSS Collaboration and Deployment Services (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971599
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM MQ Appliance (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971498
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM WebSphere Appliance Management Center (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971506
---------------------------------------------
*** IBM Vulnerability in Apache Commons affects IBM WebSphere Application Server Community Edition v3.0.0.4 (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972094
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM WebSphere Service Registry and Repository Studio (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971579
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Cognos Metrics Manager (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21971382
---------------------------------------------
*** Vulnerabilities in Apache Commons Collections and Apache Groovy affect IBM UrbanCode Deploy and IBM UrbanCode Deploy with Patterns (CVE-2015-4852, CVE-2015-3253) ***
http://www.ibm.com/support/docview.wss?uid=swg21971291
---------------------------------------------
*** Vulnerability in Apache Commons affects IBM Tivoli Composite Application Manager Agent for WebSphere Applications (CVE-2015-7450) ***
http://www.ibm.com/support/docview.wss?uid=swg21972216
---------------------------------------------
*** Fix Available for Security Vulnerabilities in IBM WebSphere Portal (CVE-2015-4993, CVE-2015-4998, CVE-2015-5001, CVE-2015-7413) ***
http://www.ibm.com/support/docview.wss?uid=swg21970176
---------------------------------------------