=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 06-05-2015 18:00 − Donnerstag 07-05-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Cisco UCS Central Software Arbitrary Command Execution Vulnerability ***
---------------------------------------------
A vulnerability in the web framework of Cisco UCS Central Software could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** eShop 6.3.11 - Remote Code Execution ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7967
*** Multiple vulnerabilities in ManageEngine Applications Manager ***
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-170http://www.zerodayinitiative.com/advisories/ZDI-15-169http://www.zerodayinitiative.com/advisories/ZDI-15-168http://www.zerodayinitiative.com/advisories/ZDI-15-167http://www.zerodayinitiative.com/advisories/ZDI-15-166
*** Macro Malware: When Old Tricks Still Work, Part 2 ***
---------------------------------------------
In the first part of this series, we discussed about the macro malware we have recently seen in the threat landscape. This second entry will delve deeper into the techniques or routines of macro malware. Unintended consequences Let us put things into ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/macro-malware-wh…
*** APPLE-SA-2015-05-06-1 Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6 ***
---------------------------------------------
Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
---------------------------------------------
http://prod.lists.apple.com/archives/security-announce/2015/May/msg00000.ht…
*** Kritische Sicherheitslücke in WordPress ***
---------------------------------------------
Wie gestern (06. Mai) bekannt wurde, gibt es eine Sicherheitslücke im "Genericons icon font package" von WordPress, welches in vielen populären Themes und Erweiterungen, darunter das ..
---------------------------------------------
http://cert.at/warnings/all/20150507.html
*** Protect your network with DNS Firewall ***
---------------------------------------------
If you run your own mail server, you will quickly find out that 90% of the e-mails you receive are spam. The solution ..
---------------------------------------------
http://securityblog.switch.ch/2015/05/07/protect-your-network-with-dns-fire…
*** Security Operations Center ***
---------------------------------------------
Ensuring the confidentiality, integrity, and availability of a modern information technology enterprise is a big job. Cyber security breaches are becoming common news. The role of ..
---------------------------------------------
http://resources.infosecinstitute.com/security-operations-center/
*** Analyzing Quantum Insert Attacks ***
---------------------------------------------
A Quantum Insert Attack is a classic example of man-in-the-middle attacks which resurfaced into news among the top 10 biggest ..
---------------------------------------------
http://resources.infosecinstitute.com/analyzing-quantum-insert-attacks/
*** Avast verdächtigt Windows-Bibliotheken als Trojaner ***
---------------------------------------------
Der Virenwächter Avast hat DLL-Dateien von Windows als gefährlich eingestuft und in Quarantäne verschoben. Danach liefen bei betroffenen Nutzern einige Programme nicht mehr.
---------------------------------------------
http://heise.de/-2638093
*** Falscher PC-Experte überwies während Fernwartung Geld nach Bangkok ***
---------------------------------------------
Mehrere Hundert Euro Schaden - Bank konnte Transaktion nicht mehr rückgängig machen - Polizei warnt vor Betrugsmasche mit falschen Microsoft-Mitarbeitern
---------------------------------------------
http://derstandard.at/2000015448793
*** How to make two binaries with the same MD5 hash ***
---------------------------------------------
One question I was asked when I demod creating two PHP files with the same hash is; does it work on compiled binaries?
---------------------------------------------
http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 05-05-2015 18:00 − Mittwoch 06-05-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Root-Shell im Krankenhaus: Hospira-Infusionspumpe mit Telnet-Lücke ***
---------------------------------------------
Computer, die in Krankenhäusern die Abgabe von Medikamenten direkt ins Blut der Patienten steuern, sollten eigentlich einigermaßen abgesichert sein. Bei in US-Kliniken verbreiteten Infusionspumpen wurde jedoch eine "game-over vulnerability" entdeckt.
---------------------------------------------
http://heise.de/-2633529
*** Cisco Unity Connection CUCReports Page Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability in the CUCReports page of Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack against the CUCReports web interface.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38675
*** Cisco Unified Communications Manager SQL Injection Vulnerability ***
---------------------------------------------
A vulnerability in Cisco Unified Communications Manager could allow an authenticated, remote attacker to perform SQL injection attacks.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38674
*** Spearphishing: A New Weapon in Cyber Terrorism ***
---------------------------------------------
Introduction: Spear phishing attacks Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors in cyber space. According to the experts ..
---------------------------------------------
http://resources.infosecinstitute.com/spearphishing-a-new-weapon-in-cyber-t…
*** Hospira LifeCare PCA Infusion System Vulnerabilities ***
---------------------------------------------
This advisory provides compensating measures for an improper authorization vulnerability and an insufficient verification of data authenticity vulnerability in the Hospira LifeCare PCA Infusion System.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01
*** Studie: Die Smart City ist intelligent, aber angreifbar ***
---------------------------------------------
Smarte Städte könnten zum Ziel von Hackerangriffen werden. Durch die zunehmende Vernetzung potenzieren sich die Sicherheitslücken, wie eine Studie zeigt.
---------------------------------------------
http://www.golem.de/news/studie-die-smart-city-ist-intelligent-aber-angreif…
*** Tinba - Yet another anti-sandbox tricks ***
---------------------------------------------
Malware authors certainly do not take a breather when it comes to inventing new tricks for detecting sandbox, a very useful system to automatically analyze millions of samples nowadays. Recently, Seculert unveiled an unprecedented sandbox detection method that was employed by the Dyre/Dyreza malware. We had seen similar anti-sandbox tricks used by the ..
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002810.html
*** Erneut massive Sicherheitslücke bei Lenovo-Rechnern ***
---------------------------------------------
Hacker konnten durch Fehler im Update-System Schadprogramme als Lenovo-Software ausgeben
---------------------------------------------
http://derstandard.at/2000015349945
*** IT threat evolution in Q1 2015 ***
---------------------------------------------
In the first quarter of 2015 Kaspersky Lab products detected a total of 2,2 bln malicious attacks and more than 93 mln unique malicious URLs. The story of the powerful Equation cyberespionage group was perhaps the most talked-about news story of Q1.
---------------------------------------------
http://securelist.com/analysis/quarterly-malware-reports/69872/it-threat-ev…
*** Nmap Cheat Sheet 5: The Final View of a Ninja Pentester ***
---------------------------------------------
As we discussed in the last topic of our Nmap Series, this will be our final touch for the cheat sheet. Here we will try to cover most of the topic as required for Vulnerability Assessment and Penetration Testing. As a Ninja Pentester, ..
---------------------------------------------
http://resources.infosecinstitute.com/nmap-cheat-sheet-5-the-final-view-of-…
*** Explaining Security Lingo ***
---------------------------------------------
This post is aimed to clarify certain terms often used in the security community. Let's start with the easiest one: vulnerability. A vulnerability is a flaw in a selected system ..
---------------------------------------------
https://securityblog.redhat.com/2015/05/06/explaining-security-lingo/
*** Multiple Fortiguard products cross-site scripting vulnerabilities ***
---------------------------------------------
The Web User Interface of FortiGate, FortiManager, FortiAnalyzer, FortiMail and FortiADC D models are vulnerable to reflected cross-site scripting vulnerabilities.
---------------------------------------------
http://www.fortiguard.com/advisory/FG-IR-15-005/
*** JetPack and TwentyFifteen Vulnerable to DOM-based XSS - Millions of WordPress Websites Affected ***
---------------------------------------------
Any WordPress Plugin or theme that leverages the genericons package is vulnerable to a DOM-based Cross-Site Scripting (XSS) vulnerability due to an insecure file included with ..
---------------------------------------------
https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom…
*** Google-Studie: Millionen Computer mit Adware infiziert ***
---------------------------------------------
Fast 5,4 Millionen Google-Besucher haben Adware auf ihren Computern installiert. Ein Grossteil davon geht auf Googles eigene Kappe, denn viele der Werbe-Einblender stammen aus dem Chrome Web Store.
---------------------------------------------
http://heise.de/-2636130
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 04-05-2015 18:00 − Dienstag 05-05-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** In-Console-Able ***
---------------------------------------------
Posted by James Forshaw, giving the security community a shoulder to cry on.TL;DR; this blog post describes an unfixed bug in Windows 8.1 which allows you to escape restrictive job objects in order to help to develop a sandbox escape chain in Chrome or similar sandboxes. If you're trying to develop a secure application sandbox in user-mode you're at the mercies of the underlying operating system. While you can try and use every available security feature, sometimes the OS developer...
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/05/in-console-able.html
*** Upatre/Dyre - the daily grind of botnet-based malspam, (Tue, May 5th) ***
---------------------------------------------
Malicious spam (malspam) delivering Upatre/Dyre has been an ongoing issue for quite some time. Many organizations have posted articles about this malware. Ive read good information on Dyre last year [1, 2] and this year [3]. Upatre is the malware downloader that retrieves Dyre (Dyreza), an information stealer described as a Zeus-like banking Trojan [4]. Earlier this year, EmergingThreats reported Upatre and Dyre are under constant development [5], while SecureWorks told us banking botnets...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19657&rss
*** Analogue modems allow UNSTOPPABLE Android attack ... at 13bps ***
---------------------------------------------
Yes its slow, but its enough to leak data to another Android The better your Android smartphones audio, the worse its security - the audio channel is the latest path for "low and slow" data leak attacks.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/05/05/boffins_rev…
*** Rombertik malware kills host computers if you attempt a cure ***
---------------------------------------------
Say goodbye to your master boot record and home directory if you try to stop it Cisco researchers Ben Baker and Alex Chiu have found new malware that destroys a machines Master Boot Record and home directories if it detects meddling white hats.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/05/05/rombertik_m…
*** Macro Malware: When Old Tricks Still Work, Part 1 ***
---------------------------------------------
Now comes a time when we are reminded of why this security warning prompt in Microsoft Word matters: Figure 1. Microsoft Word security warning for macros I went around my peers this afternoon and asked, "On the top of your head, can you give me a name of an effective macro malware? Better if its...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/LjTF4yhzWt8/
*** Introducing FIDO: Automated Security Incident Response ***
---------------------------------------------
Were excited to announce the open source release of FIDO (Fully Integrated Defense Operation - apologies to the FIDO Alliance for acronym collision), our system for automatically analyzing security events and responding to security incidents.
---------------------------------------------
http://techblog.netflix.com/2015/05/introducing-fido-automated-security.html
*** Revealing the Secrets: Advances in Android and iOS Attacks ***
---------------------------------------------
In recent months, Unit 42, the cyber threat intelligence team at Palo Alto Networks, has encountered several game-changing advances in mobile malware for both iOS and Android. For example, WireLurker employed a multistage infection that...
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/05/revealing-secrets-advanc…
*** Steganography and Malware: Why and How ***
---------------------------------------------
Threats that can evade detection are among the most dangerous kind we're facing today. We see these characteristics in the most challenging security issues like targeted attacks and zero-day exploits. Being able to stay hidden can determine the success of an attack, making it something that attackers continuously want to achieve. In this series of blog posts, we...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/G-eR3GU5L3Y/
*** ICU Project Overflow Vulnerabilities Patched ***
---------------------------------------------
Buffer and integer overflow vulnerabilities have been patched in the ICU Project ICU4C library, used in hundreds of open source and enterprise software packages.
---------------------------------------------
http://threatpost.com/icu-project-overflow-vulnerabilities-patched/112623
*** Usbkill Script Can Render Computers Useless ***
---------------------------------------------
The idea of needing to disable a computer quickly as the police - or another potential adversary - comes through the door typically has been the concern of criminals. But in today's climate activists, journalists, and others may find themselves wanting to make their laptops unusable in short order, and that's where usbkill comes in. The new tool is a...
---------------------------------------------
http://threatpost.com/usbkill-script-can-render-computers-useless/112622
*** VU#978652: Bomgar Remote Support Portal deserializes untrusted data ***
---------------------------------------------
Vulnerability Note VU#978652 Bomgar Remote Support Portal deserializes untrusted data Original Release date: 05 May 2015 | Last revised: 05 May 2015 Overview Bomgar Remote Support version 14.3.1 and possibly earlier versions deserialize untrusted data without sufficient validation, allowing an attacker to potentially execute arbitrary PHP code. Description CWE-502: Deserialization of Untrusted DataBomgar Remote Support version 14.3.1 and possibly earlier versions deserialize untrusted data...
---------------------------------------------
http://www.kb.cert.org/vuls/id/978652
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM OS Images for Red Hat Linux Systems and AIX. (CVE-2015-2808) ***
http://www.ibm.com/support/docview.wss?uid=swg21883879
*** IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM FlashSystem 840 and IBM FlashSystem V840, -AE1 models. (CVE-2015-2808) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005217
*** IBM Security Bulletin: IBM FlashSystem 840 and IBM FlashSystem V840, -AE1 models nodes are affected by vulnerabilities in Apache's Struts library (CVE-2014-7809) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005078
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM FileNet System Monitor/IBM Enterprise Content Management System Monitor (CVE-2014-6585, CVE-2014-6591, CVE-2014-6593, CVE-2015-0383, CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=swg21883285
*** DSA-3250 wordpress - security update ***
---------------------------------------------
Multiple security issues have been discovered in Wordpress, a weblogmanager, that could allow remote attackers to upload files with invalidor unsafe names, mount social engineering attacks or compromise a sitevia cross-site scripting, and inject SQL commands.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3250
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 30-04-2015 18:00 − Montag 04-05-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** eBay ignoriert XSS-Lücke ein Jahr lang ***
---------------------------------------------
Eine Schwachstelle in eBay erlaubt es Angreifern eine Session mitzuschneiden und im schlimmsten Fall einen Account zu übernehmen. Die Lücke ist ein Jahr alt und wurde immer noch nicht geschlossen.
---------------------------------------------
http://heise.de/-2630964
*** Threatpost News Wrap, May 1, 2015 ***
---------------------------------------------
Dennis Fisher and Mike Mimoso discuss the post-RSA news, including the MySQL bug, the progress of the OpenSSL overhaul and the wildly entertaining House hearing on crypto backdoors.
---------------------------------------------
http://threatpost.com/threatpost-news-wrap-may-1-2015/112538
*** 3062591 - Local Administrator Password Solution (LAPS) Now Available - Version: 1.0 ***
---------------------------------------------
Microsoft is offering the Local Administrator Password Solution (LAPS) that provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, random password for the common local administrator account on every computer in the domain. Domain administrators using the solution can determine which users, such as helpdesk administrators, are authorized to read passwords.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/3062591
*** New Google Password Alert extension already hacked ***
---------------------------------------------
A few hours after the presentation of the Google Password Alert extension a researcher already have developed two methods to bypass it. A few hours ago, Google released the Password Alert extension that was designed to warn users when they are submitting their Google credentials to fraudulent websites. Here's how it works for consumer accounts. Once you've...
---------------------------------------------
http://securityaffairs.co/wordpress/36483/hacking/password-alert-extension-…
*** VolDiff, for memory image differential analysis, (Sun, May 3rd) ***
---------------------------------------------
VolDiff is a bash script that runs Volatility plugins against memory images captured before and after malware execution providing a differential analysis, helping identify IOCs and understand advanced malware behaviour. I had intended to include it in my latest toolsmith article, Attack Detection: Hunting in-memory adversaries with Rekall and WinPmem, but quite literally ran out of space and time. Using WinPmem, as part of Rekall and GRR offerings, you can acquire two memory images, one clean
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19651&rss
*** Traffic pattern change noted in Fiesta exploit kit, (Mon, May 4th) ***
---------------------------------------------
A few hours ago, Jerome Segura, the Senior Security Researcher at Malwarebytes, tweeted about a change in traffic patterns from Fiesta exploit kit (EK) [1]. What had been semi-colons in the URLs from Fiesta EK are now commas. Here" /> Here" /> Any signatures for detecting Fiesta EK that depend on those semi-colons will need to be updated. A pcap of the traffic is available at http://malware-traffic-analysis.net/2015/05/04/2015-05-04-Fiesta-EK-traffic…, and a zip file of the
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19655&rss
*** Securing the smart grid: European Network of Cyber Security ***
---------------------------------------------
Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical infrastructure security. In this int...
---------------------------------------------
http://www.net-security.org/article.php?id=2270
*** Nasty Dyre malware bests white hat sandboxes ***
---------------------------------------------
Core checker a defensive wrecker Seculert CTO Aviv Raff says a nasty piece of malware linked to widespread destruction and bank account plundering has become more dangerous with the ability to evade popular sandboxes.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/05/04/dyre_malwar…
*** Anti-Phishing-Erweiterung für Chrome mehrfach unterwandert ***
---------------------------------------------
Eigentlich soll das Chrome-Plug-in Passwort-Warnung Alarm schlagen, wenn Nutzer ihre Log-in-Daten auf Phishing-Webseiten eingeben. Mittlerweile wurde die Funktion aber schon zum wiederholten Male ausgehebelt.
---------------------------------------------
http://heise.de/-2632031
*** Linuxwochen von 7. bis 9. Mai in Wien ***
---------------------------------------------
Am FH Technikum Wien finden von Donnerstag bis Sonntag Workshops und Vorträge zu Verschlüsselung, 3D-Druck und Open Hardware statt.
---------------------------------------------
http://futurezone.at/produkte/linuxwochen-von-7-bis-9-mai-in-wien/128.621.4…
*** AlphaCrypt ***
---------------------------------------------
We've encountered yet another encrypting ransomware variant and at this point it's expected since the scam has exploaded in popularity since it's inception in late 2013. This one has a GUI that is almost...
---------------------------------------------
http://www.webroot.com/blog/2015/05/04/alphacrypt/
*** Microsoft Security Bulletin MS15-032 - Critical ***
---------------------------------------------
V2.0 (April 30, 2015): Updated bulletin to inform customers running Internet Explorer on Windows Server 2003 Service Pack 2 that the 3038314 update on the Microsoft Download Center was updated on April 22, 2015. Microsoft recommends that customers who installed the 3038314 update prior to April 22 should reinstall the update to be fully protected from the vulnerabilities discussed in this bulletin.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS15-032
*** DSA-3249 jqueryui - security update ***
---------------------------------------------
Shadowman131 discovered that jqueryui, a JavaScript UI library fordynamic web applications, failed to properly sanitize its titleoption. This would allow a remote attacker to inject arbitrary codethrough cross-site scripting.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3249
*** DSA-3244 owncloud - security update ***
---------------------------------------------
Multiple vulnerabilities were discovered in ownCloud, a cloud storageweb service for files, music, contacts, calendars and many more.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3244
*** IBM Security Bulletins ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/?lang=en_us
*** Cisco Finesse Server Cross-Site Scripting Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38607
*** Squid SSL-Bump Certificate Validation Flaw Lets Remote Servers Bypass Client-side Certificate Validation ***
---------------------------------------------
http://www.securitytracker.com/id/1032221
*** VMSA-2015-0003.6 ***
---------------------------------------------
VMware product updates address critical information disclosure issue in JRE
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
*** VU#581276: EMC AutoStart is vulnerable to remote code execution via specially crafted packets ***
---------------------------------------------
Vulnerability Note VU#581276 EMC AutoStart is vulnerable to remote code execution via specially crafted packets Original Release date: 30 Apr 2015 | Last revised: 30 Apr 2015 Overview EMC AutoStart, version 5.5.0 and earlier, is vulnerable to remote command execution via specially crafted packets. Description EMC AutoStart is an enterprise software application developed to help networks and service maintain a high level of availability. AutoStart can manage clusters of applications or nodes
---------------------------------------------
http://www.kb.cert.org/vuls/id/581276
*** Splunk Enterprise 6.2.3 and Splunk Light 6.2.3 address five vulnerabilities ***
---------------------------------------------
Description Splunk Enterprise 6.2.3 and Splunk Light 6.2.3 address five vulnerabilities. Multiple vulnerabilities in OpenSSL prior to 1.0.1m (SPL-98351) Disable SSLv3 in KV Store Replication (SPL-96280) Secure flag inconsistently set for session cookies when appServerPorts!=0 (SPL-95798) Cross-site scripting in Search (SPL-95594) Cross-site scripting in management and configuration (SPL-93516) At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have
---------------------------------------------
http://www.splunk.com/view/SP-CAAANZ7
*** RSA Identity Management and Governance Password Reset Weakness Lets Remote Users Gain Privileged Access ***
---------------------------------------------
http://www.securitytracker.com/id/1032218
*** Security Advisory: TLS/DTLS 'Lucky 13' vulnerability CVE-2013-0169 ***
---------------------------------------------
(SOL14190)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/14000/100/sol14190.htm…
*** OPTO 22 Multiple Product Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities that are present in the OPTO 22 PAC Project Professional, PAC Project Basic, OptoOPCServer, OptoDataLink, PAC Display Basic, and PAC Display Professional products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01
*** Clam AntiVirus Multiple File Processing Flaws Let Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1032223
*** Dell SonicWALL Secure Remote Access Access Control Flaw in cgi-bin/editBookmark Lets Remote Users Conduct Cross-Site Request Forgery Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1032227
*** SSA-311412 (Last Update 2015-05-04): Incorrect Certificate Verification in Android App HomeControl for Room Automation ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 29-04-2015 18:00 − Donnerstag 30-04-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** MailChimp - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-101 ***
---------------------------------------------
The MailChimp Signup submodule does not properly sanitize some user input, allowing a malicious user to embed scripts within a page, resulting in a Cross-site Scripting (XSS) vulnerability.
---------------------------------------------
https://www.drupal.org/node/2480253
*** My Website Was Blacklisted By Google and Distributing Email Spam ***
---------------------------------------------
Being blacklisted is one of the worst things that can happen to a website. The public shame coming from every visitor being stopped by the Big Red Warning page can literally destroy ..
---------------------------------------------
https://blog.sucuri.net/2015/04/my-website-was-blacklisted-by-google-and-di…
*** Cisco StarOS for Cisco ASR 5000 Series HTTP Packet Processing Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38580
*** Bedep trojan malware spread by the Angler exploit kit gets political ***
---------------------------------------------
We recently observed what seems to be a group of cybercriminals helping spread pro-Russia messaging by artificially inflating video views and ratings on a popular video website. The ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Bedep-trojan-malware-sp…
*** Cyber threat intelligence group links Russia to cyber espionage and attacks ***
---------------------------------------------
"Operation Armageddon," active since at least mid-2013, exposes a cyber espionage campaign devised to provide a military advantage to Russian leadership by targeting Ukrainian government, law enforcement, and military ..
---------------------------------------------
http://www.liveleak.com/view?i=b39_1430249732
*** WhatsApp durchleuchtet: Vorbildliche Verschlüsselung weitgehend nutzlos ***
---------------------------------------------
Um die Frage zu beantworten wie vertrauenswürdig die von WhatsApp seit einigen Monaten eingesetzte Ende-zu-Ende-Verschlüsselung ist, hat c't sie unter die Lupe genommen: Zwar setzt WhatsApp die richtige Technik ein, viel nützt das aber trotzdem nicht.
---------------------------------------------
http://heise.de/-2629081
*** Voiceprint: Stimmenerkennung ist die neue Gesichtserkennung ***
---------------------------------------------
Statt mit einem Passwort können sich Bankkunden mittlerweile mit ihrer Stimme am Telefon identifizieren. Akustische Biometriesysteme werden in immer mehr Firmen eingesetzt. Die Gefahr: Auch Geheimdienste und Staaten können auf die Technik zugreifen.
---------------------------------------------
http://www.golem.de/news/voiceprint-stimmenerkennung-ist-die-neue-gesichtse…
*** Analysis of a MICROSOFT WORD INTRUDER sample: execution, check-in and payload delivery ***
---------------------------------------------
On April 1st FireEye released a report on 'MWI; and 'MWISTAT' which is a sort of exploit kit for Word Documents if you will: A New Word Document Exploit Kit In the article FireEye goes over MWI which is the short for 'Microsoft Word Intruder' coded ..
---------------------------------------------
http://blog.0x3a.com/post/117760824504/analysis-of-a-microsoft-word-intrude…
*** A Brief Look at DNS Zone Transfer for Alexia's Top 1M Domains ***
---------------------------------------------
The folks at Rapid7 have released another scan. This one is looking at Alexa's top 1 million domains for DNS servers which have allowed unauthenticated requests for Zone Transfer.
---------------------------------------------
http://atechdad.com/a-brief-look-at-dns-zone-transfer-for-alexias-top-1m-do…
*** TA15-120A: Securing End-to-End Communications ***
---------------------------------------------
Securing end-to-end communications plays an important role in protecting privacy and preventing some forms of man-in-the-middle (MITM) attacks. Recently, researchers described a MITM attack used to inject code, ..
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA15-119A-0
*** The BACKRONYM MySQL Vulnerability ***
---------------------------------------------
Earlier this year, I - along with some members of our DevOps team - noticed some interesting behavior in libmysqlclient and the MySQL CLI: no matter how hard we tried (no matter how many MYSQL_OPT_SSL_* options we set) we could not make the client enforce the use of SSL. If the server claimed not to support it, the ..
---------------------------------------------
https://www.duosecurity.com/blog/backronym-mysql-vulnerability
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-04-2015 18:00 − Mittwoch 29-04-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** VU#534407: Barracuda Web Filter insecurely performs SSL inspection ***
---------------------------------------------
Barracuda Web Filter prior to version 8.1.0.005 does not properly check upstream certificate validity when performing SSL inspection, and delivers one of three default root CA certificates across multiple machines for SSL inspection.
---------------------------------------------
http://www.kb.cert.org/vuls/id/534407
*** Cisco IOS XE Software OTV Processing Code Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Overlay Transport Virtualization (OTV) processing code of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38549
*** Cisco StarOS for Cisco ASR 5000 Series HAMGR Service Proxy Mobile IPv6 Processing Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in proxy mobile (PM) IPv6 processing of Cisco StarOS for Cisco ASR 5000 Series devices could allow an unauthenticated, remote attacker to cause a reload of the hamgr service on the affected device.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38557
*** Android: Tausende Apps akzeptieren gefälschte Zertifikate ***
---------------------------------------------
Die Schwachstelle ist seit einem halben Jahr bekannt, doch noch immer können Tausende Android-Apps mit gefälschten Zertifikaten überlistet werden, verschlüsselte Verbindungen aufzubauen. Über diese können Zugangsdaten abgegriffen werden
---------------------------------------------
http://www.golem.de/news/android-tausende-apps-akzeptieren-gefaelschte-zert…
*** Example setup of WordPress with static export ***
---------------------------------------------
'the only winning move is not to play' - Joshua, Wargames 2 So another advice from CIRCL is: whenever it is possible, the Content Management System component should be removed from the attack surface. This article gives an example about how to set up a system that exposes only static websites without dynamically generated content to the user and attacker.
---------------------------------------------
https://www.circl.lu/pub/tr-36/
*** Malware Analysis-Basics: Static Analysis ***
---------------------------------------------
Hi all, I have started learning malware analysis sometime back, and will share my learning through a series of articles on malware analysis. I will start from very basic and go to advanced level of analysis. So in this this document we ..
---------------------------------------------
http://resources.infosecinstitute.com/malware-analysis-basics-static-analys…
*** Und täglich grüsst die D-Link-Lücke ***
---------------------------------------------
Seit mindestens August klafft eine kritische Lücke in Routern der Firmen D-Link und Trendnet. Diese geht auf ein Toolkit der Firma Realtek zurück, die Anfragen von Sicherheitsforschern für Monate beharrlich ignorierte. Nun ist die Lücke öffentlich.
---------------------------------------------
http://heise.de/-2628562
*** Unboxing Linux/Mumblehard: Muttering spam from your servers ***
---------------------------------------------
Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.
---------------------------------------------
http://www.welivesecurity.com/2015/04/29/unboxing-linuxmumblehard-muttering…
*** Magento updaten! ASAP! ***
---------------------------------------------
Für die Onlineshop-Software Magento ist bereits im Februar ein Patch (SUPEE-5344) erschienen, der eine schwerwiegende Sicherheitslücke schliesst. Die Firma Check Point, die die Schwachstelle entdeckt hat, ..
---------------------------------------------
http://www.cert.at/services/blog/20150429154511-1469.html
*** TA15-119A: Top 30 Targeted High Risk Vulnerabilities ***
---------------------------------------------
Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of targeted attacks are ..
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA15-119A
*** Container Security: Just The Good Parts ***
---------------------------------------------
Security is usually a matter of trade-offs. Questions like: 'Is X Secure?', don't often have direct yes or no answers. A technology can mitigate certain classes of risk even ..
---------------------------------------------
https://securityblog.redhat.com/2015/04/29/container-security-just-the-good…
*** Report: SSDP reflection attacks spike, and other Q1 2015 DDoS trends ***
---------------------------------------------
The largest distributed denial-of-service attack ever detected by Arbor Networks systems was observed in the first quarter of this year.
---------------------------------------------
http://www.scmagazine.com/largest-ddos-detected-in-q1-report-says/article/4…
*** ZDI-15-157: Samsung Security Manager ActiveMQ Broker Service MOVE Method Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Security Manager. Authentication is not required to exploit this vulnerability. Successful exploitation allows an attacker to gain complete control of the system on which the product is installed.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-157/
*** ZDI-15-156: Samsung Security Manager ActiveMQ Broker Service PUT Method Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Security Manager. Authentication is not required to exploit this vulnerability. Successful exploitation allows an attacker to gain complete control of the system on which the product is installed.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-156/
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-04-2015 18:00 − Dienstag 28-04-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Fake Security Scams - 2015 Edition ***
---------------------------------------------
New Year, Similar Scams In 2013, I wrote an article talking about the popular Fake Microsoft Security Scams that were doing the rounds. As expected, these type of scams have continued to grow ..
---------------------------------------------
http:////www.webroot.com/blog/2015/04/27/fake-security-scams-2015-edition/
*** 10 Ways to Ensure Your Privileged Password Management Strategy Will Succeed ***
---------------------------------------------
Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organisation. But if passwords are such a no-brainer, why do so many data breaches tie back to poor password management?
---------------------------------------------
http://blog.beyondtrust.com/10-reasons-your-privileged-password-management-…
*** When Prevention Fails, Incident Response Begins, (Mon, Apr 27th) ***
---------------------------------------------
Ive been asked a few times this year ($dayjob) to discuss and review incident handling practices with some of our clients. This topic seems to have come up to the surface again, and with some breaches getting main-stream coverage, it only ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19629
*** WordPress 4.2.1 Security Release ***
---------------------------------------------
https://wordpress.org/news/2015/04/wordpress-4-2-1/
*** SendGrid: Employee Account Hacked, Used to Steal Customer Credentials ***
---------------------------------------------
Sendgrid, an email service used by tens of thousands of companies -- including Silicon Valley giants as well as Bitcoin exchange Coinbase -- said attackers compromised a Sendgrid employees account, which was then used to steal the usernames, email ..
---------------------------------------------
http://krebsonsecurity.com/2015/04/sendgrid-employee-account-hacked-used-to…
*** Booby trapped! Malvertising campaign hit Adult Site xHamster ***
---------------------------------------------
A New malvertising campaign hit adult website xHamster by abusing ad provider TrafficHaus and exploiting the Google's URL shortener service. Malversting campaigns are becoming a serious problem for web users, cyber criminals are exploiting ..
---------------------------------------------
http://securityaffairs.co/wordpress/36367/cyber-crime/malvertising-campaign…
*** Best Free and Open Source SQL Injection Tools ***
---------------------------------------------
SQL injection is one of the most common attacks against web applications. This is used against websites which use SQL to query data from the database server. A successful ..
---------------------------------------------
http://resources.infosecinstitute.com/best-free-and-open-source-sql-injecti…
*** Hacker tarnen sich als Rüstungsfirma und tricksen Antiviren-Programme aus ***
---------------------------------------------
Angreifer nutzten die Gunst der Stunde und verschickten im Zuge einer Firmenübernahme als Willkommensnachricht getarnte Phishing-Mails, um mit einer raffinierten Methode Schadcode auf die Computer von Angestellten zu schmuggeln.
---------------------------------------------
http://heise.de/-2625892
*** Kritische Sicherheitslücke in WordPress ***
---------------------------------------------
Angesichts der potentiellen Auswirkung der Lücke und der hohen Anzahl an installierten WordPress Content Management Systemen bittet CERT.at um Beachtung der folgenden ..
---------------------------------------------
https://cert.at/warnings/all/20150428.html
*** Inside the Zeroaccess Trojan ***
---------------------------------------------
The Zeroaccess trojan (Maxx++, Sierief, Crimeware) has affected millions of computers worldwide, and it is the number one cause of cyber click fraud and Bitcoin mining on the Internet.
---------------------------------------------
http://blog.norsecorp.com/2015/04/27/inside-the-zeroaccess-trojan/
*** Cisco IOS Software and Cisco IOS XE Software Crafted RADIUS Packet Denial of Service Vulnerability ***
---------------------------------------------
The vulnerability is due to improper processing of crafted RADIUS packets by a device running the affected software. An authenticated, remote attacker could exploit this vulnerability by sending crafted RADIUS packets to an affected device. If successful, the attacker could cause the device to crash, resulting in a DoS condition.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38544
*** Cisco IOS Software and Cisco IOS XE Software Crafted DHCPv6 Sequence Denial of Service Vulnerability ***
---------------------------------------------
The vulnerability is due to improper handling of DHCPv6 packets for a SOLICIT message for an Identity Association for Non-Temporary Addresses (IA-NA) by a device running the affected software. An unauthenticated, adjacent attacker could exploit this vulnerability by sending a crafted sequence exchange of DHCPv6 packets for a SOLICIT message for an IA-NA to an affected device. If successful, the attacker could cause the device to crash, resulting in a DoS condition.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38543
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-04-2015 18:00 − Montag 27-04-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Sicherheitslücke im Yubikey Neo ***
---------------------------------------------
Der USB-Stick Yubikey Neo lässt sich auch als Smartcard nutzen. Durch einen Bug kann man die eigentlich erforderliche Eingabe der PIN umgehen. Ein Angreifer kann die Krypto-Funktionen dadurch sogar über Funk missbrauchen.
---------------------------------------------
http://heise.de/-2621122
*** CVE-2015-0359 (Flash up to 17.0.0.134) and Exploit Kits ***
---------------------------------------------
http://malware.dontneedcoffee.com/2015/04/cve-2015-0359-flash-up-to-1700134…
*** Security Advisory: NTP vulnerability CVE-2015-1799 ***
---------------------------------------------
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/500/sol16506.htm…
*** What's Your Security Maturity Level? ***
---------------------------------------------
Not long ago, I was working on a speech and found myself trying to come up with a phrase that encapsulates the difference between organizations that really make cybersecurity a part of their culture and those that merely pay it lip service and do the bare minimum (think 15 pieces of flair). When ..
---------------------------------------------
http://krebsonsecurity.com/2015/04/whats-your-security-maturity-level/
*** Sunday, April 26. 2015 How Kaspersky makes you vulnerable to the FREAK attack and other ways Antivirus software lowers your HTTPS security ***
---------------------------------------------
Lately a lot of attention has been payed to software like Superfish and Privdog that intercepts TLS connections to be able to manipulate HTTPS traffic. These programs had severe (technically different) vulnerabilities that allowed attacks on HTTPS connections.
---------------------------------------------
https://blog.hboeck.de/archives/869-How-Kaspersky-makes-you-vulnerable-to-t…
*** Pwning a thin client in less than two minutes ***
---------------------------------------------
The point of this blog post is to demonstrate that a malicious actor can compromise such thin clients in a trivial and quick way provided physical access, a standard prerequisite in an attack against a kiosk.
---------------------------------------------
http://blog.malerisch.net/2015/04/pwning-hp-thin-client.html
*** Clickjacking, Cursorjacking & Filejacking ***
---------------------------------------------
Same origin bypasses using clickjacking Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information ..
---------------------------------------------
http://resources.infosecinstitute.com/bypassing-same-origin-policy-part-3-c…
*** Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win. ***
---------------------------------------------
A lot of network defense goes wrong before any contact with an adversary, starting with how defenders conceive of the battlefield. Most defenders focus on protecting their assets, prioritizing them, and sorting them by workload and ..
---------------------------------------------
http://blogs.technet.com/b/johnla/archive/2015/04/26/defenders-think-in-lis…
*** IBM Security Bulletin: SPSS Statistics ActiveX Control Code Execution Vulnerability Notification ***
---------------------------------------------
SPSS Statistics ActiveX control on Windows 32 bit installations could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to visit a specially-crafted Web page with Internet Explorer, a local attacker could exploit this vulnerability to execute arbitrary code on the system or cause the application to crash.
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21697746
*** A Javascript-based DDoS Attack as seen by Safe Browsing ***
---------------------------------------------
To protect users from malicious content, Safe Browsing's infrastructure analyzes web pages with web browsers running in virtual machines. This allows us to determine if a page contains malicious content, such as Javascript ..
---------------------------------------------
http://googleonlinesecurity.blogspot.co.at/2015/04/a-javascript-based-ddos-…
*** Node.js Server-Side JavaScript Injection Detection & Exploitation ***
---------------------------------------------
Late last year, Burp scanner started testing for Server-Side JavaScript (SSJS) code injection. As you'd expect, this is where an attacker injects JavaScript into a server side parser and results in arbitrary code execution.
---------------------------------------------
http://blog.gdssecurity.com/labs/2015/4/15/nodejs-server-side-javascript-in…
*** Critical Persistent XSS 0day in WordPress ***
---------------------------------------------
Yes, you've read it right: a critical, unpatched 0-day vulnerability affecting WordPress' comment mechanisms was disclosed earlier today by Klikki Oy. Who's affected If your ..
---------------------------------------------
https://blog.sucuri.net/2015/04/critical-persistent-xss-0day-in-wordpress.h…
*** TeslaCrypt - Decrypt It Yourself ***
---------------------------------------------
After the takedown of Cryptolocker, we have seen the rise of Cryptowall. Cryptowall 2 introduced 'features' such as advanced anti-debugging techniques, only to have many of those features removed in Cryptowall 3. Ransomware is ..
---------------------------------------------
http://blogs.cisco.com/security/talos/teslacrypt
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-04-2015 18:00 − Freitag 24-04-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** When automation does not help, (Thu, Apr 23rd) ***
---------------------------------------------
In a lot of web application penetration tests that Ive done in last couple of years I noticed that the amount of technical vulnerabilities (i.e. XSS or SQL injection) is slowly declining.Of course, this depends on developers awareness but also on frameworks that are used for development of such applications. One of the best (or worst, depending on the point of view) is definitely .NET (yeah, I know, it feels weird to say that Microsoft is best in something security related). With .NET...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19615&rss
*** Security Advisory: NTP vulnerability CVE-2015-1798 ***
---------------------------------------------
(SOL16505)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/500/sol16505.htm…
*** CVE-2014-6284 - Probe login access vulnerability in SAP ASE ***
---------------------------------------------
The SpiderLabs team at Trustwave published a new advisory today which details issues discovered in the SAP ASE (Adaptive Server Enterprise) by Martin Rakhmanov, a SpiderLabs Senior Researcher. SAP ASE is a relational database management system for UNIX, Linux, and...
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2014-6284----Probe-…
*** VMSA-2015-0003.5 ***
---------------------------------------------
VMware product updates address critical information disclosure issue in JRE
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
*** The Rise of Counterintelligence in Malware Investigations ***
---------------------------------------------
The key to operationalizing cybersecurity threat intelligence rests in the critical thinking that establishes that a given indicator is, in fact, malicious. There has been a great deal of talk about the emerging field of cybersecurity threat intelligence in recent years. CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that's not frequently discussed is the use of counterintelligence...
---------------------------------------------
http://www.darkreading.com/partner-perspectives/general-dynamics-fidelis/th…
*** Objectifying Cyber Intel Indicators ***
---------------------------------------------
I've had the fortune of visiting a good number of SOCs (including building some) and meeting with a number of leaders in the SOC/IR space over the years- and the better teams will tell you that you simply cannot look at every single alert that fires. Expanding upon this even more, in regards to an Intel-driven IR program, this means that you cannot simply dump all indicators into production; I've seen this fail for both immature programs (overwhelmed with alerts) as well as mature...
---------------------------------------------
http://seanmason.com/2014/08/25/objectifying-cyber-intel-indicators/
*** Honeywell XLWEB SCADA Path Traversal ***
---------------------------------------------
Topic: Honeywell XLWEB SCADA Path Traversal Risk: Medium Text:SCADA - EXPLOITING CVE-2015-0984 FOR SHELL ACCESS This post is a follow up detailing how to achieve control of the actual X...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015040161
*** Magento-Lücke wird aktiv ausgenutzt ***
---------------------------------------------
Wer einen Magento-Shop betreibt und noch nicht das jüngste Sicherheits-Update installiert hat, muss mit unerwünschten Besuchern rechnen. Hacker nutzen die Lücke aus, um SQL-Befehle in den Datenbankserver einzuschleusen.
---------------------------------------------
http://heise.de/-2620110
*** IBM Products affected by Vulnerability in RC4 stream cipher ("Bar Mitzvah Attack") and other Vulnerabilities ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/?lang=en_us
*** Dyreza's anticrypt ***
---------------------------------------------
In the previous post, we have described how to set up a loft to monitor Dyreza with the help of virtual machines configured with breakpoints at addresses where communications appear in clear text. Configuration file updates can thus be obtained in real-time easily. Another way to monitor this kind of malware using a decentralised architecture is to implement parts of the malicious binary in a thin client, which requires to fully understand its decryption routine details.
---------------------------------------------
http://www.lexsi-leblog.com/cert-en/dyrezas-anticrypt.html
*** Antiviren-Software und Apples Schutzmechanismen für Mac OS X nutzlos ***
---------------------------------------------
Einem Sicherheitsforscher zufolge sei es trivial, einen Mac nachhaltig mit Malware zu verseuchen. Weder würde gängige Antivirensoftware helfen, noch Apples eigene Mechanismen wie XProtect oder das Signieren von Apps.
---------------------------------------------
http://heise.de/-2620049
*** HTML5 Security: Local Storage ***
---------------------------------------------
In a previous article of mine, I discussed Cross Domain Messaging in HTML5. This article walks you through another feature, called local storage, and its security. Local Storage Local storage is one of the new features added in HTML5. It was first introduced in Mozilla 1.5 and eventually embraced by the HTML5 specification. We can...
---------------------------------------------
http://resources.infosecinstitute.com/html5-security-local-storage/
*** Yubikey NEO (JavaCard OpenPGP) private key operations can be accessed without PIN ***
---------------------------------------------
The source code contains a logical flaw related to user PIN (aka PW1) verification that allows an attacker with local host privileges and/or physical proximity (NFC) to perform security operations without knowledge of the user's PIN code.
---------------------------------------------
https://developers.yubico.com/ykneo-openpgp/SecurityAdvisory%202015-04-14.h…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-04-2015 18:00 − Donnerstag 23-04-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Deep dive into QUANTUM INSERT ***
---------------------------------------------
Summary and recommendations QUANTUMINSERT (QI) is actually a relatively old technique. In order to exploit it, you will need a monitoring capabilities to leak information of observed TCP sessions and a host that can send spoofed packets. Your spoofed packet also needs to arrive faster than the original packet to be able to be successful. Any...
---------------------------------------------
http://blog.fox-it.com/2015/04/20/deep-dive-into-quantum-insert/
*** Sicherheitsfirma warnt vor iOS-Killer-Funktion ***
---------------------------------------------
Ein bösartiger Hotspot könnte iOS-Geräte in einen endlosen Reboot-Cycle schicken, warnt eine Sicherheitsfirma. Ursache ist anscheinend ein Fehler in Apples Verschlüsselungsimplementierung.
---------------------------------------------
http://heise.de/-2617385
*** New Threat Report ***
---------------------------------------------
Our latest comprehensive threat report, based on our analysis of H2 2014 data, is now available.
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002805.html
*** Mobile Threats Incident Handling: Updated ENISA material ***
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/mobile-threats-incident-handlin…
*** Schadcode durch WLAN-Pakete ***
---------------------------------------------
Durch eine Lücke in dem Standard-Tool wpa_supplicant können Angreifer anfällige Systeme über WLAN kompromittieren. Es kommt unter anderem bei Android und Linux zum Einsatz. Abhilfe schafft ein Patch, eine abgesicherte Version soll folgen.
---------------------------------------------
http://heise.de/-2618115
*** wpa_supplicant P2P SSID processing vulnerability ***
---------------------------------------------
A vulnerability was found in how wpa_supplicant uses SSID information parsed from management frames that create or update P2P peer entries (e.g., Probe Response frame or number of P2P Public Action frames). SSID field has valid length range of 0-32 octets. However, it is transmitted in an element that has a 8-bit length field and potential maximum payload length of 255 octets. wpa_supplicant was not sufficiently verifying the payload length on one of the code paths using the SSID received from
---------------------------------------------
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
*** SSA-237894 (Last Update 2015-04-23): Vulnerability in SIMATIC PCS 7 ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** PowerDNS decompression bug can cause crashes ***
---------------------------------------------
Topic: PowerDNS decompression bug can cause crashes Risk: Medium Text:Hi everybody, Please be aware of PowerDNS Security Advisory 2015-01 (http://doc.powerdns.com/md/security/powerdns-advisory-...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015040155
*** Security patch 02 for ZEN 11 Appliance - Freak - See TID 7016312 ***
---------------------------------------------
Abstract: Patch for CVE-2015-0204 (FREAK) - OpenSSL RSA Temporary Key Cryptographic Downgrade Vulnerability for ZCM ApplianceDocument ID: 5207650Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:ZCM_11_Security_Patch_2.zip (12.65 MB)Products:ZENworks Configuration Management 11ZENworks Configuration Management 11.1ZENworks Configuration Management 11 SP3ZENworks Configuration Management 11.2ZENworks Configuration Management 11.2.1ZENworks Configuration Management
---------------------------------------------
https://download.novell.com/Download?buildid=Ddi7yDlFrqA~
*** ZDI-15-149: Novell Zenworks Rtrlet.class Session ID Disclosure Vulnerability ***
---------------------------------------------
This vulnerability allows attackers to disclose Session IDs of logged in users on vulnerable installations of Novell Zenworks. User interaction is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/ly4m30xpA5I/
*** ZDI-15-148: Novell Zenworks schedule.ScheduleQuery SQL Injection Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/04USkHANe4s/
*** ZDI-15-147: Novell Zenworks GetStoredResult.class SQL Injection Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/vaCwk090UHI/
*** ZDI-15-153: Novell ZENworks Preboot Policy Service Stack Buffer Overflow Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/sPdD0Sy4sxQ/
*** ZDI-15-152: Novell Zenworks com.novell.zenworks.inventory.rtr.actionclasses.wcreports Information Disclosure Vulnerability ***
---------------------------------------------
This vulnerability allows attackers to obtain sensitive information on vulnerable installations of Novell Zenworks. User interaction is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/GTCY2AUbObw/
*** ZDI-15-151: Novell Zenworks Rtrlet doPost Directory Traversal Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks. By default, authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/Wi0h3ROfwWc/
*** ZDI-15-150: Novell Zenworks FileViewer Information Disclosure Vulnerability ***
---------------------------------------------
This vulnerability allows attackers to obtain sensitive information on vulnerable installations of Novell Zenworks. User interaction is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/-6nZPEvRTF0/
*** Security Advisory: Linux kernel vulnerabilities CVE-2014-8159 and CVE-2014-8369 ***
---------------------------------------------
(SOL16478)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/400/sol16478.htm…
*** Security Advisory: Rsync vulnerability CVE-2007-6199 ***
---------------------------------------------
(SOL15549)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/15000/500/sol15549.htm…
*** Security Advisory: Linux kernel vulnerability CVE-2009-4537 ***
---------------------------------------------
(SOL16479)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/400/sol16479.htm…
*** DSA-3232 curl - security update ***
---------------------------------------------
Several vulnerabilities were discovered in cURL, an URL transfer library:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3232
*** iPassword Manager 2.6 Script Insertion ***
---------------------------------------------
Topic: iPassword Manager 2.6 Script Insertion Risk: Low Text:Document Title: iPassword Manager v2.6 iOS - Persistent Vulnerabilities References (Source): == http://www...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015040147
*** Docker Privilege Escalation ***
---------------------------------------------
Topic: Docker Privilege Escalation Risk: Medium Text:TLDR; Don’t use the ‘docker’ group Docker, if you aren’t already familiar with it, is a lightweight runtime and pack...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015040151
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in SSLv3 affects IBM/Cisco switches and directors (CVE-2014-3566) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005132
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affecting Sametime Unified Telephony (OpenSSL: CVE-2014-3569, CVE-2014-3570, CVE-2014-3572, CVE-2014-8725, CVE-2015-0204, CVE-2015-0205) ***
http://www.ibm.com/support/docview.wss?uid=swg21882876
*** IBM Security Bulletin: RPM vulnerability issue on IBM SONAS (CVE-2013-6435) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005166
*** IBM Security Bulletin: RPM vulnerability issue on IBM Storwize V7000 Unified (CVE-2013-6435) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005160
*** IBM Security Bulletin: Vulnerabilities in Network Time Protocol (NTP) affect IBM Storwize V7000 Unified (CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, and CVE-2014-9296) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005147
*** IBM Security Bulletin: Open Source GNU glibc vulnerabilities on IBM Storwize V7000 Unified (CVE-2014-7817, CVE-2014-9087) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005075
*** IBM Security Bulletin: Open Source GNU glibc vulnerabilities on IBM SONAS (CVE-2014-7817, CVE-2014-9087) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005152
*** IBM Security Bulletin: NSS vulnerability issue on IBM Storwize V7000 Unified (CVE-2014-3566) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005148
*** IBM Security Bulletin: Vulnerability in NSS affects SAN Volume Controller and Storwize Family (CVE-2014-3566) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005209
*** IBM Security Bulletin: Security Bulletin: IBM i is affected by several OpenSSL vulnerabilities. ***
http://www.ibm.com/support/docview.wss?uid=nas8N1020693
*** IBM Security Bulletin: Vulnerabilities in OpenSSL including ClientHello DoS affect IBM Sterling B2B Integrator (CVE-2015-0209, CVE-2015-0287, CVE-2015-0292, and others) ***
http://www.ibm.com/support/docview.wss?uid=swg21883249
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affects Rational Software Architect for Websphere Software ***
http://www.ibm.com/support/docview.wss?uid=swg21882955
*** IBM Security Bulletin: Vulnerability in IBM WebSphere Application Server affects IBM Security Access Manager for Mobile (CVE-2015-0138) ***
http://www.ibm.com/support/docview.wss?uid=swg21701358
*** IBM Security Bulletin: Vulnerability in IBM WebSphere Application Server affects IBM Security Access Manager for Web (CVE-2015-0138) ***
http://www.ibm.com/support/docview.wss?uid=swg21701548
*** IBM Security Bulletin: Samba vulnerability issue on IBM Storwize V7000 Unified (CVE-2015-0240) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005125
*** IBM Security Bulletin: Samba vulnerability issue on IBM SONAS (CVE-2015-0240) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005157
*** IBM Security Bulletin: Vulnerability in RC4 stream cipher affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2015-2808) ***
http://www.ibm.com/support/docview.wss?uid=swg21883226
*** IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM Tivoli Composite Application Manager for Transactions (CVE-2015-2808) ***
http://www.ibm.com/support/docview.wss?uid=swg21701114