=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 04-02-2014 18:00 − Mittwoch 05-02-2014 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** WordPress Stop User Enumeration Plugin "author" User Enumeration Weakness ***
---------------------------------------------
Andrew Horton has discovered a weakness in the Stop User Enumeration plugin for WordPress, which can be exploited by malicious people to disclose certain sensitive information.
The weakness is caused due to an error when handling the "author" POST parameter, which can be exploited to enumerate valid usernames.
The weakness is confirmed in version 1.2.4. Other versions may also be affected.
---------------------------------------------
https://secunia.com/advisories/56643
*** Chrome Web Store Beset by Spammy Extensions ***
---------------------------------------------
Twelve seemingly legitimate Chrome browser extensions installed by more than 180,000 users are injecting advertisements on 44 popular websites.
---------------------------------------------
http://threatpost.com/chrome-web-store-beset-by-spammy-extensions/104031
*** Joomla! JomSocial Component Arbitrary Code Execution Vulnerability ***
---------------------------------------------
A vulnerability has been reported in the JomSocial component for Joomla!, which can be exploited by malicious people to compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/56692
*** New Zbot Variant Goes Above and Beyond to Hijack Victims ***
---------------------------------------------
Zbot is an extremely venomous threat, which has strong persistent tactics to ensure that the victim remains infected despite removal attempts. We will get to the overabundance of methods used to keep the victim infected later on.
---------------------------------------------
http://feedproxy.google.com/~r/zscaler/research/~3/ZKiYWwxWXJA/new-zbot-var…
*** Microsoft Security Advisory (2755801): Update for Vulnerabilities in Adobe Flash Player in Internet Explorer - Version: 19.0 ***
---------------------------------------------
The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10 and Internet Explorer 11.
---------------------------------------------
http://technet.microsoft.com/en-us/security/advisory/2755801
*** Cybercriminals release Socks4/Socks5 based Alexa PageRank boosting application ***
---------------------------------------------
A newly released, commercially available, DIY tool is pitching itself as being capable of boosting a given domain/list of domains on Alexa’s PageRank, relying on the syndication of Socks4/Socks5 malware-infected/compromised hosts through a popular Russian service.
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/VIunL9T8af4/
*** Peinliches Loch in BlackBerrys Geschäftsdaten-Tresor ***
---------------------------------------------
Beim BlackBerry 10 versagt eine Policy, die geschäftliche Kontakte vor Zugriffen durch persönliche Apps schützen soll. Die Schwachstelle macht persönlichen Android-Apps Namen und Telefonnummern zugänglich.
---------------------------------------------
http://www.heise.de/security/meldung/Peinliches-Loch-in-BlackBerrys-Geschae…
*** Standard Operational Procedures to manage multinational cyber-crises finalised by EU, EFTA Member States and ENISA ***
---------------------------------------------
Today, with the development of the EU-Standard Operational Procedures (EU-SOPs), a milestone has been reached for the management of multinational cyber crises. These procedures were developed by the EU and European Free Trade Association (EFTA) Member States in collaboration with the EU Agency ENISA.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/standard-operational-proced…
*** #Asusgate: Zehntausende Router geben private Dateien preis ***
---------------------------------------------
Im Netz sind IP-Adressen für zehntausende verwundbare Asus-Router aufgetaucht. Unter dem Titel "#ASUSGATE" veröffentlichten Unbekannte zudem Listen mit privaten Dateien auf angeschlossenen USB-Geräten.
---------------------------------------------
http://www.heise.de/security/meldung/Asusgate-Zehntausende-Router-geben-pri…
*** How to fail at Incident Response ***
---------------------------------------------
Im a firm believer in having a sound incident response plan (and policies to go with it). One big piece of this is having a plan with regards to how the IR team should communicate. How should you communicate? Well, thats going to depend on your situation. But let me first answer the easier question: how you should not communicate.
---------------------------------------------
http://malwarejake.blogspot.se/2014/02/how-to-fail-at-incident-response.html
*** Blog: CVE-2014-0497 – a 0-day vulnerability ***
---------------------------------------------
A short while ago, we came across a set of similar SWF exploits and were unable to determine which vulnerability they exploited.
---------------------------------------------
http://www.securelist.com/en/blog/8177/CVE_2014_0497_a_0_day_vulnerability
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 03-02-2014 18:00 − Dienstag 04-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** New iFrame Injections Leverage PNG Image Metadata ***
---------------------------------------------
We're always trying to stay ahead of the latest trends, and today we caught a very interesting one that we have either been missing, or it's new. We'll just say it's new.. We're all familiar with the idea of iFrame Injections, right? Understanding an iFrame Injection The iFrame HTML tag is very standard today, it's...
---------------------------------------------
http://blog.sucuri.net/2014/02/new-iframe-injections-leverage-png-image-met…
*** These Guys Battled BlackPOS at a Retailer ***
---------------------------------------------
Ever since news broke that thieves stole more than 40 million debit and credit card accounts from Target using a strain of Point-Of-Sale malware known as BlackPOS, much speculation has swirled around unanswered questions, such as how this malware was introduced into the network, and what mechanisms were used to infect thousands of Targets cash registers.
---------------------------------------------
http://krebsonsecurity.com/2014/02/these-guys-battled-blackpos-at-a-retaile…
*** Search Engines for OSINT and Recon ***
---------------------------------------------
Based on the title to this post, you're thinking, "Awesome, Dave! Welcome to 2006!" Well hang on there. There's an amazing number of awesome search facilities that can be useful when doing OSINT and recon work for pen testing. I'll list a lot of different sites that I have discovered and use regularly for both.
---------------------------------------------
http://daveshackleford.com/?p=999
*** Defending Against Tor-Using Malware, Part 2 ***
---------------------------------------------
Last week, we talked about what Tor is, how it works, and why system administrators need to be aware of it. Now the question is: should I block Tor, and if I do decide to do that, what can be done to block Tor? Tor, by itself, is not inherently malicious. If a user wants...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/njzW9v7v14w/
*** VU#228886: ZTE ZXV10 W300 router contains hardcoded credentials ***
---------------------------------------------
Vulnerability Note VU#228886 ZTE ZXV10 W300 router contains hardcoded credentials Original Release date: 03 Feb 2014 | Last revised: 03 Feb 2014 Overview ZTE ZXV10 W300 router version 2.1.0, and possibly earlier versions, contains hardcoded credentials. (CWE-798) Description ZTE ZXV10 W300 router contains hardcoded credentials that are useable for the telnet service on the device. The username is "admin" and the password is "XXXXairocon" where "XXXX" is the last...
---------------------------------------------
http://www.kb.cert.org/vuls/id/228886
*** VU#593118: Fortinet Fortiweb 5.0.3 contains a reflected cross-site scripting vulnerability ***
---------------------------------------------
Vulnerability Note VU#593118 Fortinet Fortiweb 5.0.3 contains a reflected cross-site scripting vulnerability Original Release date: 03 Feb 2014 | Last revised: 03 Feb 2014 Overview Fortinet Fortiweb 5.0.3, and possibly earlier versions, contains a cross-site scripting vulnerability. (CWE-79) Description CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)Fortinet Fortiweb 5.0.3, and possibly earlier versions, contains a cross-site scripting...
---------------------------------------------
http://www.kb.cert.org/vuls/id/593118
*** VU#728638: Fortinet FortiOS 5.0.5 contains a reflected cross-site scripting (XSS) vulnerability ***
---------------------------------------------
Vulnerability Note VU#728638 Fortinet FortiOS 5.0.5 contains a reflected cross-site scripting (XSS) vulnerability Original Release date: 03 Feb 2014 | Last revised: 03 Feb 2014 Overview Fortinet FortiOS 5.0.5, and possibly earlier versions, contains a cross-site scripting vulnerability. (CWE-79) Description CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)Fortinet FortiOS 5.0.5, and possibly earlier versions, contains a cross-site scripting...
---------------------------------------------
http://www.kb.cert.org/vuls/id/728638
*** VU#813382: Dell KACE K1000 management appliance contains a cross-site scripting vulnerability ***
---------------------------------------------
Vulnerability Note VU#813382 Dell KACE K1000 management appliance contains a cross-site scripting vulnerability Original Release date: 04 Feb 2014 | Last revised: 04 Feb 2014 Overview Dell KACE K1000 management appliance version 5.5.90545, and possibly earlier versions, contains a cross-site scripting (XSS) vulnerability. (CWE-79) Description Dell KACE K1000 management appliance version 5.5.90545, and possibly earlier versions, contains a cross-site scripting (XSS) vulnerability. The
---------------------------------------------
http://www.kb.cert.org/vuls/id/813382
*** Security Bulletins: Vulnerability in Citrix XenMobile Device Manager server, formerly known as Zenprise Device Manager server, could result in unauthenticated information disclosure ***
---------------------------------------------
A vulnerability in Citrix XenMobile Device Manager server, formerly known as Zenprise Device Manager server, that could allow a remote, unauthenticated attacker to gain access to stored data.
---------------------------------------------
http://support.citrix.com/article/CTX140044
*** MyBB 1.6.12 POST Cross Site Scripting ***
---------------------------------------------
Topic: MyBB 1.6.12 POST Cross Site Scripting Risk: Low Text: <!-- Exploit-Title: MyBB 1.6.12 POST XSS 0day Google-Dork: inurl:index.php intext:Powered By MyBB Date: Februrary 2n...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020018
*** Chrony chronyc Protocol Response Amplification Denial of Service Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/56727
*** mpg123 MP3 Decoding Buffer Overflow Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/56729
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 31-01-2014 18:00 − Montag 03-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Telefonie-Missbrauch anscheinend kein Massenhack von AVMs Fritzboxen ***
---------------------------------------------
In den letzten Tagen wunderten sich einige Fritzbox-Nutzer über hohe, teils exorbitante Telefongebühren. Dahinter stecken anscheinend Angriffe mit bekannten Zugangsdaten auf die Fernkonfiguration der verwendeten Fritzboxen.
---------------------------------------------
http://www.heise.de/security/meldung/Telefonie-Missbrauch-anscheinend-kein-…
*** Hackers Use a Trick to Deliver Zeus Banking Malware ***
---------------------------------------------
IDG News Service - Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details. Security company Malcovery Security, based in Georgia, alerted security analysts after finding that none of 50 security programs on Googles online virus scanning service VirusTotal were catching it as of early Sunday.
---------------------------------------------
http://www.cio.com/article/747601/Hackers_Use_a_Trick_to_Deliver_Zeus_Banki…
*** More than a million Android devices infected with bootkit trojan ***
---------------------------------------------
More than a million Android mobile devices worldwide are now infected with a crafty bootkit trojan known as Android.Oldboot.1.origin - a number that has more than tripled in a week.
---------------------------------------------
http://www.scmagazine.com//more-than-a-million-android-devices-infected-wit…
*** DailyMotion Still Infected, Serving Fake AV Malware ***
---------------------------------------------
DailyMotion, one of the most popular websites on the Web, is still serving fake AV malware three weeks after it was notified of a compromise.
---------------------------------------------
http://threatpost.com/dailymotion-still-infected-serving-fake-av-malware/10…
*** SSA-342587 (Last Update 2014-02-03): Vulnerabilities in SIMATIC WinCC Open Architecture ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** VU#250358: Various Inmarsat broadband satellite terminals contain multiple vulnerabilities ***
---------------------------------------------
A number of broadband satellite terminals which utilize the Inmarsat satellite telecommunications network have been found to contain undocumented hardcoded login credentials (CWE-798). Additionally, these broadband satellite terminals utilize an insecure proprietary communications protocol that allows...
---------------------------------------------
http://www.kb.cert.org/vuls/id/250358
*** DSA-2851 drupal6 ***
---------------------------------------------
impersonation
---------------------------------------------
http://www.debian.org/security/2014/dsa-2851
*** IBM Financial Transaction Manager multiple vulnerabilities ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/90584http://xforce.iss.net/xforce/xfdb/90585http://xforce.iss.net/xforce/xfdb/90586http://xforce.iss.net/xforce/xfdb/90612
*** Security Bulletin: Cross-Site Request Forgery in IBM InfoSphere Master Data Management - Collaborative Edition (CVE-2013-5427) ***
---------------------------------------------
Due to insufficient safeguards against cross-site request forgery, an attacker can trick a legitimate user into opening a URL that results in an action being taken as that user, potentially without the knowledge of that user. Any actions taken require that the legitimate user be already authenticated or to authenticate separately as part of the attack.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21663181
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 30-01-2014 18:00 − Freitag 31-01-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Researcher Warns of Critical Flaws in Oracle Servers ***
---------------------------------------------
There are two vulnerabilities in some of Oracle's older database packages that allow an attacker to access a remote server without a password and even view the server's filesystem and dump arbitrary files. Oracle has not released a patch for one of the flaws, even though it was reported by a researcher more than two...
---------------------------------------------
http://threatpost.com/researcher-warns-of-critical-flaws-in-oracle-servers/…
*** Linux: Sicherheitslücke in x32-Code ***
---------------------------------------------
Eine Sicherheitslücke im Linux-Kernel ermöglicht Nutzern das Schreiben in beliebige Speicherbereiche. Betroffen sind nur Kernel mit Unterstützung für x32-Code, in Ubuntu ist dies standardmäßig aktiviert.
---------------------------------------------
http://www.golem.de/news/linux-sicherheitsluecke-in-x32-code-1401-104300-rs…
*** Yahoo! Mail! users! change! your! passwords! NOW! ***
---------------------------------------------
Web giant blames third-party database compromise Yahoo! is urging users of its Mail service to change their passwords to something secure and unique to the web giant - after a security breach exposed account login details to theft.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/01/31/yahoo_mail_…
*** Akamai Releases Third Quarter, 2013 State of the Internet Report ***
---------------------------------------------
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released its Third Quarter, 2013 State of the Internet Report. Based on data gathered from the Akamai Intelligent Platform, the report provides insight into key global statistics such as network connectivity and connection speeds, attack traffic, and broadband adoption and availability, among many others.
---------------------------------------------
http://www.akamai.com/html/about/press/releases/2014/press_012814.html
*** Chewbacca Point-of-Sale Malware Campaign Found in 10 Countries ***
---------------------------------------------
A criminal campaign using the Tor-based Chewbacca Trojan, which includes memory-scraping malware and a keylogger, is responsible for the theft of more than 49,000 credit card numbers in 10 countries.
---------------------------------------------
http://threatpost.com/chewbacca-point-of-sale-malware-campaign-found-in-10-…
*** 3S CoDeSys Runtime Toolkit NULL Pointer Dereference ***
---------------------------------------------
Independent researcher Nicholas Miles has identified a NULL pointer dereference vulnerability in Smart Software Solutions (3S) CoDeSys Runtime Toolkit application. 3S has produced an update that mitigates this vulnerability. Nicholas Miles has tested the update to validate that it resolves the vulnerability. This vulnerability could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-030-01
*** Schneider Electric Telvent SAGE RTU DNP3 Improper Input Validation Vulnerability ***
---------------------------------------------
This advisory was originally posted to the US-CERT secure portal library on January 06, 2014, and is now being released to the NCCIC/ICS-CERT Web site. Adam Crain of Automatak and independent researchers Chris Sistrunk and Adam Todorski have identified an improper input validation in the Schneider Electric Telvent SAGE 3030 remote terminal unit (RTU). Schneider Electric has produced a patch that mitigates this vulnerability. This vulnerability could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-006-01
*** Moodle - MSA-14-0002: Group constraints lacking in "login as" ***
---------------------------------------------
Users were able to log in as a user who in a is not in the same group without the permission to see all groups.
---------------------------------------------
https://moodle.org/mod/forum/discuss.php?d=252415
*** TYPO3-PSA-2014-001: Cross-Site Request Forgery Protection in TYPO3 CMS 6.2 ***
---------------------------------------------
In TYPO3 CMS, protection against CSRF has been implemented for many important actions (like creating, editing or deleting records) but is still missing in other places (like Extension Manager, file upload, configuration module). The upcoming 6.2 LTS version will finally close this gap and will protect editors or administrators from these kind of attacks.
---------------------------------------------
https://typo3.org/teams/security/security-bulletins/psa/typo3-psa-2014-001/
*** Puppet - CVE-2013-6450 - Potential denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. ***
---------------------------------------------
The DTLS retransmission implementation in OpenSSL through 0.9.8y and 1.x through 1.0.1e does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context by interfering with packet delivery, related...
---------------------------------------------
http://puppetlabs.com/security/cve/cve-2013-6450
*** VU#108062: Lexmark laser printers contain multiple vulnerabilities ***
---------------------------------------------
Certain Lexmark devices are vulnerable to unverified password changes and stored cross-site scripting attacks.
---------------------------------------------
http://www.kb.cert.org/vuls/id/108062
*** A10 Networks Loadbalancer GET directory traversal ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/90814
*** Check Point Endpoint Security MI Server Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1029704
*** Bugtraq: [SECURITY] [DSA 2849-1] curl security update ***
---------------------------------------------
http://www.securityfocus.com/archive/1/530910
*** Bugtraq: Joomla! JomSocial component < 3.1.0.1 - Remote code execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/530909
*** Joomla! JV Comment Component "id" SQL Injection Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/56588
*** Vuln: OpenStack Compute (Nova) Compressed qcow2 Disk Images Denial of Service Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/63467
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 29-01-2014 18:00 − Donnerstag 30-01-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** New Clues in the Target Breach ***
---------------------------------------------
An examination of the malware used in the Target breach suggests that the attackers may have taken advantage of a poorly secured feature built into a widely-used IT management software product that was running on the retailers internal network.
---------------------------------------------
http://krebsonsecurity.com/2014/01/new-clues-in-the-target-breach/
*** How to Debug DKIM, (Wed, Jan 29th) ***
---------------------------------------------
DKIM is one way to make it easier for other servers to figure out if an e-mail sent on behalf of your domain is spoofed. Your mail server will add a digital signature to each email authenticating the source. This isnt as good a signing the entire e-mail, but it is a useful tool to at least validate the domain used as part of the "From" header. The problem is that DKIM can be tricky to debug. If you have mail rejected, it is useful to be able to manually verify what went wrong. For
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17528
*** Honey Encryption Tricks Hackers with Decryption Deception ***
---------------------------------------------
Honey Encryption is an encryption tool in the works that fools an attacker with bogus decrypted data that looks like it could be a plausible guess at an encryption key or password.
---------------------------------------------
http://threatpost.com/honey-encryption-tricks-hackers-with-decryption-decep…
*** Attacker extorts coveted Twitter username in elaborate social engineering scheme ***
---------------------------------------------
Naoki Hiroshima recently relinquished to an attacker a prized possession that he owned since 2007: a very rare Twitter username so coveted that not only have people tried to steal it, but one person offered $50,000 for it.
---------------------------------------------
http://www.scmagazine.com//attacker-extorts-coveted-twitter-username-in-ela…
*** Security 101 fail: 3G/4G modems expose control panels to hackers ***
---------------------------------------------
Embedded kit depressingly riddled with cross-site request forgery vulns, says researcher Vulnerabilities in a number of 3G and 4G USB modems can be exploited to steal login credentials - or rack up victims mobile bills by sending text messages to premium-rate numbers - a security researcher warns.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/01/30/3gmodem_sec…
*** Energy: cyber security is crucial for protection against threats for smart grids which are key for energy availability claims EU cyber security Agency in new report ***
---------------------------------------------
The EU's cyber security agency ENISA signals that assessing the threats for smart grids is crucial for their protection and is therefore a key element in ensuring energy availability.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/energy-cyber-security-is-cr…
*** Code-Einschleusung durch MediaWiki-Lücke ***
---------------------------------------------
In der beliebten Wiki-Software klafft eine kritische Lücke, durch die Angreifer den Server kompromittieren können. Gepatchte Versionen sorgen für Abhilfe.
---------------------------------------------
http://www.heise.de/security/meldung/Code-Einschleusung-durch-MediaWiki-Lue…
*** Windows-Taskmanager Process Explorer 16 mit Einbindung von VirusTotal ***
---------------------------------------------
Die nun erschienene Version 16 des Process Explorer befragt auf Wunsch den web-basierten Multi-Scanner VirusTotal. Dort prüfen rund 50 Virenscanner, ob eine Datei gefährlich ist.
---------------------------------------------
http://www.heise.de/security/meldung/Windows-Taskmanager-Process-Explorer-1…
*** Critical infrastructure hack data found in public domain ***
---------------------------------------------
Data available from mainstream online media - such as blogs, social networking websites, and specialist online publications - could be used by malevolent agents to mount a cyber-attack on UK critical national infrastructure (CNI), the findings of an investigative assessment to be presented next week will warn.
---------------------------------------------
http://eandt.theiet.org/news/2014/jan/ics-security.cfm
*** Pidgin Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to compromise a user's system.
---------------------------------------------
https://secunia.com/advisories/56693
*** Bugtraq: SimplyShare v1.4 iOS - Multiple Web Vulnerabilities ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple web vulnerabilities in the official SimplyShare v1.4 iOS mobile application.
---------------------------------------------
http://www.securityfocus.com/archive/1/530906
*** OTRS Security Advisory 2014-01 - CSRF issue in customer web interface ***
---------------------------------------------
An attacker that managed to take over the session of a logged in customer could create tickets and/or send follow-ups to existing tickets due to missing challenge token checks.
---------------------------------------------
https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-inte…
*** OTRS Security Advisory 2014-02 - SQL injection issue ***
---------------------------------------------
Affected by this vulnerability are all releases of OTRS 3.1.x up to and including 3.1.18, 3.2.x up to and including 3.2.13 and 3.3.x up to and including 3.3.3.
---------------------------------------------
https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/
*** VLC Media Player RTSP Processing "parseRTSPRequestString()" Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in VLC Media Player, which can be exploited by malicious people to compromise a user's system.
---------------------------------------------
https://secunia.com/advisories/56676
*** SA-CONTRIB-2014-007 - Services - Multiple access bypass vulnerabilities ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-007
Project: Services (third-party module)
Version: 7.xDate: 2014-January-29
Security risk: Highly critical
Exploitable from: Remote
Vulnerability: Multiple access bypass vulnerabilitiesDescriptionThis module enables you to expose an API to third party systems using REST, XML-RPC or other protocols.The form API provides a method for developers to submit forms programmatically using the function drupal_form_submit(). During programmatic form submissions, all access...
---------------------------------------------
https://drupal.org/node/2184843
*** SA-CONTRIB-2014-008 - Tribune - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-008
Project: Tribune (third-party module)Version: 6.x, 7.xDate: 2014-January-29
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
DescriptionA tribune is a type of chatroom.The module doesnt sufficiently filter user provided text from Tribune node titles.This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create a Tribune node.
---------------------------------------------
https://drupal.org/node/2184845
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-01-2014 18:00 − Mittwoch 29-01-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Introducing ModSecurity Status Reporting ***
---------------------------------------------
The Trustwave SpiderLabs Research team is committed to making ModSecurity the best open source WAF possible. To this end, we have deployed Buildbot platforms and revamped regression tests for our different ports to ensure code quality and reliability. But we want to take it even further. The question is, how else can we improve ModSecurity development and support? To best answer that question, we need some basic insight into the ModSecurity user community: How many ModSecurity deployments are...
---------------------------------------------
http://blog.spiderlabs.com/2014/01/introducing-modsecurity-status-reporting…
*** Defending Against Tor-Using Malware, Part 1 ***
---------------------------------------------
In the past few months, the Tor anonymity service as been in the news for various reasons. Perhaps most infamously, it was used by the now-shuttered Silk Road underground marketplace. We delved into the topic of the Deep Web in a white paper titled Deepweb and Cybercrime. In our 2014 predictions, we noted that cybercriminals would go deeper...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/F4F76IP9KP8/
*** Eyeing SpyEye ***
---------------------------------------------
Earlier this week, it was announced by the United States Department of Justice that the creator of the notorious SpyEye banking malware, Aleksandr Andreevich Panin (also known as Gribodemon or Harderman), had pleaded guilty before a federal court to charges related to creating and distributing SpyEye. Trend Micro was a key part of this investigation...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/4eIEz-KJvXo/
*** This tool demands access to YOUR ENTIRE DIGITAL LIFE. Is it from GCHQ? No - its by IKEA ***
---------------------------------------------
Order a flat-pack kitchen, surrender your HDDs contents If the Target hack - along with all its predecessors - taught us anything, its that the database isnt the vulnerability. Its the data thats the problem.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/01/29/ikea_demand…
*** Botnetz nutzt Lücke in alten Java-Versionen ***
---------------------------------------------
Sicherheitsexperten haben Schadsoftware entdeckt, die eine vor Monaten geschlossene Java-Lücke ausnutzt, um ein Botnetz aufzubauen. Das Programm läuft auf Windows, Linux und Mac OSX; Abhilfe ist einfach möglich.
---------------------------------------------
http://www.heise.de/security/meldung/Botnetz-nutzt-Luecke-in-alten-Java-Ver…
*** Cisco Network Time Protocol Distributed Reflective Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Network Time Protocol (NTP) package of several Cisco products could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** WordPress WebEngage Plugin Multiple Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been discovered in the WebEngage plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/56700
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-01-2014 18:00 − Dienstag 28-01-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Making Your Printer Say "Feed Me a Kitten" and Also Exfiltrate Sensitive Data ***
---------------------------------------------
As of this last release, PJL (HP's Printer Job Language) is now a grown-up Rex::Proto protocol! Since extending a protocol in Metasploit is beyond the scope of this post, we'll just be covering how to use the PoC modules included with the new protocol. Feel free to dig around in lib/rex/proto/pjl*, though!
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/01/23/hacking-p…
*** Coordinated malware eradication ***
---------------------------------------------
Today, as an industry, we are very effective at disrupting malware families, but those disruptions rarely eradicate them. Instead, the malware families linger on, rearing up again and again to wreak havoc on our customers. To change the game, we need to change the way we work. It is counterproductive when you think about it. The antimalware ecosystem encompasses many strong groups: security vendors, service providers, CERTs, anti-fraud departments, and law enforcement. Each group uses their...
---------------------------------------------
https://blogs.technet.com/b/mmpc/archive/2014/01/27/industry-needs-to-work-…
*** Trustworthy electronic signatures, secure e-Government and trust: the way forward for improving EU citizens' trust in web services, outlined by EU Agency ENISA ***
---------------------------------------------
The EU's cyber security Agency, ENISA, is publishing a series of new studies about the current security practices of Trust Service Providers (TSPs) and recommendations for improving cross-border trustworthiness and interoperability for the new regulated TSPs and for e-Government services using them.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/trustworthy-electronic-sign…
*** Android VPN redirect vuln now spotted lurking in Kitkat 4.4 ***
---------------------------------------------
Now may be a good time to check this out, says securo-bod Israeli researchers who specialise in ferreting out Android vulns have discovered a new flaw in KitKat 4.4 that allows an attacker to redirect secure VPN traffic to a third-party server.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/01/28/android_vpn…
*** File Infectors and ZBOT Team Up, Again ***
---------------------------------------------
File infectors and ZBOT don't usually go together, but we recently saw a case where these two kinds of threats did. This particular file infector - PE_PATNOTE.A - appends its code to all executable files on the infected system,...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/n_0oP1-kYzo/
*** Login-Diebstahl: Warnung vor manipuliertem Filezilla-Client ***
---------------------------------------------
Avast warnt vor manipulierten Programmversionen des beliebten Filezilla-Clients. Wer die falsche Version des FTP-Programms nutzt, gibt Kriminellen die Zugangsdaten für die verwendeten FTP-Server. Betroffen sind nur Anwender, die Filezilla von der falschen Quelle heruntergeladen haben.
---------------------------------------------
http://www.golem.de/news/login-diebstahl-warnung-vor-manipuliertem-filezill…
*** Blog: A cross-platform java-bot ***
---------------------------------------------
Early this year, we received a malicious Java application for analysis, which turned out to be a multi-platform bot capable of running on Windows, Mac OS and Linux. The bot was written entirely in Java. The attackers used vulnerability CVE-2013-2465 to infect users with the malware.
---------------------------------------------
http://www.securelist.com/en/blog/8174/A_cross_platform_java_bot
*** DDoS attacks become smarter, faster and more severe ***
---------------------------------------------
DDoS attacks will continue to be a serious issue in 2014 - as attackers become more agile and their tools become more sophisticated, according to Radware. Their report was compiled using data from over 300 cases and the Executive Survey consisting of personal interviews with 15 high-ranking security executives.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16268
*** Worldwide Infrastructure Security Report ***
---------------------------------------------
Arbor's annual Worldwide Infrastructure Security Report offers unique insight from network operators on the front lines in the global battle against network threats.
---------------------------------------------
http://www.arbornetworks.com/resources/infrastructure-security-report
*** SI6 Networks IPv6 Toolkit ***
---------------------------------------------
A security assessment and troubleshooting tool for the IPv6 protocols
---------------------------------------------
http://www.si6networks.com/tools/ipv6toolkit/
*** Security Bulletin: Multiple vulnerabilities in IBM QRadar SIEM (CVE-2014-0838, CVE-2014-0835, CVE-2014-0836, CVE-2014-0837) ***
---------------------------------------------
Multiple vulnerabilities exist in the AutoUpdate settings page and the AutoUpdate process within the IBM QRadar SIEM that when used together could result in remote code execution.
---------------------------------------------
https://www-304.ibm.com/support/docview.wss?uid=swg21663066
*** VU#686662: Fail2ban postfix and cyrus-imap filters contain denial-of-service vulnerabilities ***
---------------------------------------------
Fail2ban versions prior to 0.8.11 are susceptible to a denial-of-service attack when a maliciously crafted email address is parsed by the postfix or cyrus-imap filters. If users have not deployed either of these filters then they are not affected.
---------------------------------------------
http://www.kb.cert.org/vuls/id/686662
*** VU#863369: Mozilla Thunderbird does not adequately restrict HTML elements in email message content ***
---------------------------------------------
Mozilla Thunderbird does not adequately restrict HTML elements in email content, which could allow an attacker to execute arbitrary script when a specially-crafted email message is forwarded or replied to. ---------------------------------------------
http://www.kb.cert.org/vuls/id/863369
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-01-2014 18:00 − Montag 27-01-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** ModSecurity Advanced Topic of the Week: HMAC Token Protection ***
---------------------------------------------
This blog post presents a powerful feature of ModSecurity v2.7 that has been highly under-utilized by most users: HMAC Token Protection. There was a previous blog post written that outlined some usage examples here, however we did not properly demonstrate the protection coverage gained by its usage. Specifically, by using the HMAC Token Protection capabilities of ModSecurity, you can reduce the attack surface of the following attacks/vulnerabilities: Forceful Browsing of Website Content
---------------------------------------------
http://feedproxy.google.com/~r/SpiderlabsAnterior/~3/4JiUhR_1fSQ/modsecurit…
*** Mitigation of NTP amplification attacks involving Junos ***
---------------------------------------------
When an NTP client or server is enabled within the [edit system ntp] hierarchy level of the Junos configuration, REQ_MON_GETLIST and REQ_MON_GETLIST_1 control messages supported by the monlist feature within NTP may allow remote attackers to cause a denial of service. NTP is not enabled in Junos by default. Once NTP is enabled, an attacker can exploit these control messages in two different ways:...
---------------------------------------------
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10613
*** Sicherheitslücke in Pages: Update angeraten ***
---------------------------------------------
Nutzer der Mac- und iOS-Version von Pages sollten die neueste Version installieren - eine Sicherheitslücke in älteren Versionen erlaubt unter Umständen das Ausführen von Schadcode.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-in-Pages-Update-ange…
*** First Android bootkit has infected 350,000 devices ***
---------------------------------------------
January 24, 2014 Russian anti-virus company Doctor Web is warning users about a dangerous Trojan for Android that resides in the memory of infected devices and launches itself early on in the OS loading stage, acting as a bootkit. This allows the Trojan to minimize the possibility that it will be deleted, without tampering with the devices file system. Currently, this malignant program is operating on more than 350,000 mobile devices belonging to users in various countries,...
---------------------------------------------
http://news.drweb.com/show/?i=4206&lng=en&c=9
*** Security Advisory-DoS Vulnerability in Eudemon8000E ***
---------------------------------------------
Huawei Eudemon8000E firewall allows users to log in to the device using Telnet or SSH. When an attacker sends to the device a mass of TCP packets with special structure, the logging process become slowly and users may be unable to log in to the device (HWNSIRT-2014-0101).
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Security Bulletin: GSKit certificate chain vulnerability in IBM Security Directory Server and Tivoli Directory Server (CVE-2013-6747) ***
---------------------------------------------
A vulnerability has been identified in the GSKit component utilized by IBM Security Directory Server (ISDS) and IBM Tivoli Directory Server (TDS). A malformed certificate chain can cause the ISDS or TDS client application or server process using GSKit to hang or crash.
---------------------------------------------
https://www-304.ibm.com/support/docview.wss?uid=swg21662902
*** Security Bulletin: IBM Security SiteProtector System can be affected by a vulnerability in the IBM Java JRE (CVE-2013-5809) ***
---------------------------------------------
IBM Security SiteProtector System can be affected by vulnerability in the IBM Java JRE. This vulnerability could allow a remote attacker to affect confidentiality, integrity, and availability by means of unknown vectors related to the Java 2D component.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21662685
*** Security Bulletin eDiscovery Manager (CVE-2013-5791 and CVE-2013-5763) ***
---------------------------------------------
CVE-2013-5791 - CVSS Score: 10 An unspecified vulnerability in Oracle Outside In Technology related to the Outside In Filters component could allow a local attacker to cause a denial of service. CVE-2013-5763 - CVSS Score: 6.8 Oracle Outside In technology is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the OS/2 Metafile parser. By causing a vulnerable application to process a malicious file, a remote attacker...
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21659481
*** Vulnerability Note VU#168751 - Emerson Network Power Avocent MergePoint Unity 2016 KVM switches contain a directory traversal vulnerability ***
---------------------------------------------
Emerson Network Power Avocent MergePoint Unity 2016 (MPU2016) KVM switches running firmware version 1.9.16473 and possibly previous versions contain a directory traversal vulnerability. An attacker can use directory traversal to download critical files such as /etc/passwd to obtain the credentials for the device.
---------------------------------------------
http://www.kb.cert.org/vuls/id/168751
*** Vulnerability Note VU#105686 - Thecus NAS Server N8800 contains multiple vulnerabilities ***
---------------------------------------------
CVE-2013-5667 - Thecus NAS Server N8800 Firmware 5.03.01 get_userid OS Command Injection CVE-2013-5668 - Thecus NAS Server N8800 Firmware 5.03.01 CVE-2013-5669 - Thecus NAS Server N8800 Firmware 5.03.01 plain text administrative password
---------------------------------------------
http://www.kb.cert.org/vuls/id/105686
*** Cisco Video Surveillance Operations Manager MySQL Database Insufficient Authentication Controls ***
---------------------------------------------
A vulnerability in the configuration of the MySQL database as installed by Cisco Video Surveillance Operations Manager (VSOM) could allow an unauthenticated, remote attacker to access the MySQL database.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Security update available for Adobe Digital Editions ***
---------------------------------------------
Adobe has released a security update for Adobe Digital Editions for Windows and Macintosh. This update addresses a vulnerability in the software that could cause the application to crash and potentially allow an attacker to take control of the affected system.
---------------------------------------------
http://helpx.adobe.com/security/products/Digital-Editions/apsb14-03.html
*** Hitachi Cosminexus Products Multiple Java Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/56545
*** Drupal Doubleclick for Publishers Module Slot Names Script Insertion Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/56521
*** WordPress SS Downloads Plugin Multiple Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/56532
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-01-2014 18:00 − Freitag 24-01-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Russische Spione im Tor-Netz enttarnt ***
---------------------------------------------
Forscher stießen auf 20 Exit Nodes, welche die HTTPS-Verbindungen von Tor-Nutzern aufzubrechen versuchten. Die meisten davon stammen aus Russland.
---------------------------------------------
http://www.heise.de/security/meldung/Russische-Spione-im-Tor-Netz-enttarnt-…
*** Bug Exposes IP Cameras, Baby Monitors ***
---------------------------------------------
A bug in the software that powers a broad array of Webcams, IP surveillance cameras and baby monitors made by Chinese camera giant Foscam allows anyone with access to the devices Internet address to view live and recorded video footage, KrebsOnSecurity has learned.
---------------------------------------------
http://krebsonsecurity.com/2014/01/bug-exposes-ip-cameras-baby-monitors/
*** "Syrian Electronic Army" attackierten Twitter-Account von CNN ***
---------------------------------------------
Sender: "Ja, es ist auch uns passiert. CNN-Accounts gehackt"
---------------------------------------------
http://derstandard.at/1389858074081
*** 65.000 E-Mail-Konten bei Salzburg AG gehackt ***
---------------------------------------------
Bei der Salzburg AG sind die Zugangsdaten von mehr als 65.000 E-Mail- und Internetkonten gehackt worden. Bankdaten seien nicht betroffen, betonte das Unternehmen. Die Hintergründe der Tat sind unklar. User und Kunden üben Kritik.
---------------------------------------------
http://news.orf.at/stories/2215391/
*** Angebliche Sicherheitslücke in aktuellem Chrome nicht zu finden ***
---------------------------------------------
Ein Fehler in Googles Browser lässt sich mit der aktuellen Version nicht reproduzieren. Google will die Lücke schon vor Längerem geschlossen haben.
---------------------------------------------
http://www.heise.de/security/meldung/Angebliche-Sicherheitsluecke-in-aktuel…
*** Malicious links for iOS users ***
---------------------------------------------
January 23, 2014 Russian anti-virus company Doctor Web is warning iOS device users about a growing number of incidents involving the distribution of links to bogus sites via mobile app advertisements. An iOS user misguided by such fraud can end up subscribed to a pseudo-service and thus lose money from their mobile account. Recently, users of mobile devices running iOS have been encountering advertisements with increasing frequency in the free applications on their smart phones and tablets. Ads
---------------------------------------------
http://news.drweb.com/show/?i=4204&lng=en&c=9
*** GE Proficy Multiple Vulnerabilities ***
---------------------------------------------
Researchers amisto0x07 and Z0mb1E of Zero Day Initiative (ZDI) have identified two vulnerabilities in the General Electric (GE) Proficy human-machine interface/supervisory control and data acquisition (HMI/SCADA) - CIMPLICITY application. GE has released security advisories, GEIP13-05 and GEIP13-06, to inform customers about these vulnerabilities.These vulnerabilities could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-023-01
*** DSA-2848 mysql-5.5 ***
---------------------------------------------
Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.35. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details.
---------------------------------------------
http://www.debian.org/security/2014/dsa-2848
*** Bugtraq: [CVE-2014-1607.] Cross Site Scripting(XSS) in Drupal Event calendar module ***
---------------------------------------------
Reflected cross-site scripting (XSS) vulnerability in Drupal 7.14 EventCalendar Module, found in eventcalendar/year allows remote attackers to inject arbitrary web scripts or HTML after the inproperly sanitizited Year Parameter.
---------------------------------------------
http://www.securityfocus.com/archive/1/530876
*** Cisco TelePresence Video Communication Server Expressway Default SSL Certificate Vulnerability ***
---------------------------------------------
A vulnerability in the Cisco TelePresence Video Communication Server (VCS) Expressway could allow an unauthenticated, remote attacker to execute a man-in-the-middle (MITM) attack between one or more affected devices.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-01-2014 18:00 − Donnerstag 23-01-2014 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** SA-CONTRIB-2014-005 - Leaflet - Access bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-005
Project: Leaflet (third-party module)
Version: 7.xDate: 2014-January-22
Security risk: Critical
Exploitable from: Remote
Vulnerability: Access bypass
Description
The Leaflet module enables you to display an interactive map using the Leaflet library, using entities as map features.The module exposes complete data from entities used as map features to any site visitor with a Javascript inspector (like Firebug).
---------------------------------------------
https://drupal.org/node/2179103
*** New Android Malware Steals SMS Messages, Intercepts Calls ***
---------------------------------------------
A new strain of Android malware has emerged that masquerades as an Android security app but once installed, can steal text messages and intercept phone calls.
---------------------------------------------
http://threatpost.com/new-android-malware-steals-sms-messages-intercepts-ca…
*** Official PERL Blogs hacked, 2,924 Author Credentials Leaked by ICR ***
---------------------------------------------
The breach has seen 2,924 user account credentials published to quickleak.org as well as the blog having a deface page added but was not obtrusive to the actually website.
---------------------------------------------
http://www.cyberwarnews.info/2014/01/22/official-perl-blogs-hacked-2924-aut…
*** CrowdStrike Takes On Chinese, Russian Attack Groups in Threat Report ***
---------------------------------------------
Russian attackers targeted energy sector targets and a Chinese nexus intrusion group infected foreign embassies with malware using watering hole tactics in 2013, CrowdStrike researchers found in its first-ever Global Threat Report.
---------------------------------------------
http://www.securityweek.com/crowdstrike-takes-chinese-russian-attack-groups…
*** Outdated energy, water and transport Industrial Control Systems without sufficient cyber security controls require coordinated testing of capability at EU levels, says the EU's cyber security Agency ENISA ***
---------------------------------------------
Today, the EU's cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated Industrial Control Systems (ICS) for European industries. Among the key recommendations is the testing of ICS is a concern for all EU Member States and could be dealt with at EU levels according to ENISA.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/ics-without-sufficient-cybe…
*** Analysis: Spam in December 2013 ***
---------------------------------------------
In December, spammers continued to honor the traditions of the season and tried to attract potential customers with a variety of original gift and winter vacation offers, taking advantage of the approaching holidays.
---------------------------------------------
http://www.securelist.com/en/analysis/204792323/Spam_in_December_2013
*** Chrome Eavesdropping Exploit Published ***
---------------------------------------------
Exploit code has been published for a Google Chrome bug that allows malicious websites granted permission to use a computers microphone for speech recognition to continue listening after a user leaves the website.
---------------------------------------------
http://threatpost.com/chrome-eavesdropping-exploit-published/103798