=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 12-11-2013 18:00 − Mittwoch 13-11-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Summary for November 2013 - Version: 1.0 ***
---------------------------------------------
This bulletin summary lists security bulletins released for November 2013. With the release of the security bulletins for November 2013, this bulletin summary replaces the bulletin advance notification originally issued November 7, 2013.
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-nov
*** Blog: Sinkholing the Hlux/Kelihos botnet - what happened? ***
---------------------------------------------
Back in March 2012 we teamed up with Crowdstrike, the Honeynet Project and Dell SecureWorks in disabling the second version of the Hlux/Kelihos-Botnet. Now we thought it would be a good time for an update on what has happened to that sinkhole-server over the last 19 months.
---------------------------------------------
http://www.securelist.com/en/blog/208214147/Sinkholing_the_Hlux_Kelihos_bot…
*** Microsoft Warns Customers Away From SHA-1 and RC4 ***
---------------------------------------------
The RC4 and SHA-1 algorithms have taken a lot of hits in recent years, with new attacks popping up on a regular basis. Many security experts and cryptographers have been recommending that vendors begin phasing the two out, and Microsoft on Tuesday said that is now recommending to developers that they deprecate RC4 and stop using the SHA-1 hash algorithm.
---------------------------------------------
http://threatpost.com/microsoft-warns-customers-away-from-sha-1-and-rc4/102…
*** Introducing Enhanced Mitigation Experience Toolkit (EMET) 4.1 ***
---------------------------------------------
In June 2013, we released EMET 4.0 and customer response has been fantastic. Many customers across the world now include EMET as part of their defense-in-depth strategy and appreciate how EMET helps businesses prevent attackers from gaining access to computers systems. Today, we´re releasing a new version, EMET 4.1, with updates that simplify configuration and accelerate deployment.
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2013/11/12/introducing-enhanced-miti…
*** Adobe Patches Flash, ColdFusion Flaws Unrelated to Breach ***
---------------------------------------------
Adobe patched critical vulnerabilities in its Flash Player and ColdFusion Web application server; the company said the bugs are unrelated to the recent breach and source code theft.
---------------------------------------------
http://threatpost.com/adobe-patches-flash-coldfusion-flaws-unrelated-to-bre…
*** Simulated attacks give London banks a trial run in readiness ***
---------------------------------------------
The planned event, called "Waking Shark II," marks the second year the city of London had participated in the security preparedness exercises.
---------------------------------------------
http://www.scmagazine.com//simulated-attacks-give-london-banks-a-trial-run-…
*** November Patch Tuesday Addresses New IE Zero-Day Exploit, But TIFF Vulnerability Still Unpatched ***
---------------------------------------------
It´s worth noting that another recent TIFF-related zero-day that we discussed has not been patched as part of this month´s update, so the recommendations and work-arounds that were suggested at that time remain in effect.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/november-patch-t…
*** Malicious multi-hop iframe campaign affects thousands of Web sites, leads to a cocktail of client-side exploits ***
---------------------------------------------
Sharing is caring. In this post, I´ll put the spotlight on a currently circulating, massive - thousands of sites affected - malicious iframe campaign, that attempts to drop malicious software on the hosts of unaware Web site visitors through a cocktail of client-side exploits. The campaign, featuring a variety of evasive tactics making it harder to analyze, continues to efficiently pop up on thousands of legitimate Web sites.
---------------------------------------------
http://www.webroot.com/blog/2013/11/13/malicious-multi-hop-iframe-campaign-…
*** Cross-site scripting vulnerabilities in EMC Documentum eRoom ***
---------------------------------------------
Due to improper input validation, Documentum eRoom suffers from multiple cross-site scripting vulnerabilities, which allow an attacker to steal other users sessions, to impersonate other users and to gain unauthorized access to documents hosted in eRooms.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** BlackBerry Patches Remote Access Feature Vulnerable to Exploit ***
---------------------------------------------
BlackBerry patched two serious vulnerabilities in its BlackBerry Link product.
---------------------------------------------
http://threatpost.com/blackberry-patches-remote-access-feature-vulnerable-t…
*** cPanel Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/55478
*** Red Hat Network Satellite Server Grants Administrative Access to Remote Users ***
---------------------------------------------
http://www.securitytracker.com/id/1029331
*** JunOS 11.4 Cross Site Scripting ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110085
*** FortiAnalyzer 5.0.4 - CSRF Vulnerability ***
---------------------------------------------
http://www.exploit-db.com/exploits/29550
*** Security Bulletin: Potential Security Vulnerability fixed in WebSphere Virtual Enterprise (CVE-2013-5425) ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_pot…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 11-11-2013 18:00 − Dienstag 12-11-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** ActiveX Control issue being addressed in Update Tuesday ***
---------------------------------------------
Late last Friday, November 8, 2013, a vulnerability, CVE-2013-3918, affecting an Internet Explorer ActiveX Control was publically disclosed. We have confirmed that this vulnerability is an issue already scheduled to be addressed in 'Bulletin 3', which will be released as MS13-090, as listed in the November Advanced Notification Service (ANS).
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-be…
*** Samsung, Nokia say they don´t know how to track a powered-down phone ***
---------------------------------------------
Back in July 2013, The Washington Post reported that nearly a decade ago, the National Security Agency developed a new technique that allowed spooks to find cellphones even when they were turned off.
---------------------------------------------
http://arstechnica.com/security/2013/11/samsung-nokia-say-they-dont-know-ho…
*** Chinese Bitcoin exchange shutters, taking £2.5 MEEELION ***
---------------------------------------------
Another one Bits the dust... Chinese Bitcoin exchange GBL has shut down, taking with it over 25 million yuan ($US4.1m) of investors´ money, in another warning to those who don't look before they leap with the digital currency.
---------------------------------------------
http://www.theregister.co.uk/2013/11/12/bitcoin_gbl_hong_kong_collapse/
MSRT November 2013 - Napolar
---------------------------------------------
We first noticed the new family we named Win32/Napolar being distributed in the wild in early August this year. It quickly became a big problem on our customers´ machines. Napolar is one of two families targeted by the Malicious Software Removal Tool (MSRT) this month. The other is the bitcoin mining family Win32/Deminnix.
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2013/11/12/msrt-november-2013-napol…
*** GCHQ Used Fake LinkedIn Pages to Target Engineers ***
---------------------------------------------
The Belgacom employees probably thought nothing was amiss when they pulled up their profiles on LinkedIn, the professional networking site. The pages looked the way they always did, and they didnt take any longer than usual to load.
---------------------------------------------
http://www.spiegel.de/international/world/ghcq-targets-engineers-with-fake-…
*** Smartphone PIN revealed by camera and microphone ***
---------------------------------------------
The PIN for a smartphone can be revealed by its camera and microphone, researchers have warned. Using a programme called PIN Skimmer a team from the University of Cambridge found that codes entered on a number-only soft keypad could be identified.
---------------------------------------------
http://www.bbc.co.uk/news/technology-24897581
*** A Peek Inside a Customer-ized API-enabled DIY Online Lab for Generating Multi-OS Mobile Malware ***
---------------------------------------------
The exponential growth of mobile malware over the last couple of years, can be attributed to a variety of growth factors, the majority of which continue playing an inseparable role in the overall success and growth of the cybercrime ecosystem in general.
---------------------------------------------
http://ddanchev.blogspot.co.uk/2013/11/a-peek-inside-customer-ized-api-enab…
*** Cyber Attack on Finland is a Warning for the EU ***
---------------------------------------------
A highly sophisticated multi-year cyber attack targeting Finland´s diplomatic communications is likely to have been replicated against other EU and Western countries.
---------------------------------------------
http://www.chathamhouse.org/media/comment/view/195392?
*** Selfish Miners Could Exploit P2P Nature of Bitcoin Network ***
---------------------------------------------
While researchers and academics are just at the beginning of the process of trying to judge the value of a recent paper on a vulnerability in the Bitcoin protocol, some are arguing that there is a smaller point that´s being missed in all of the back and forth: There is a problem with the peer-to-peer set-up of the Bitcoin network that could be exploited for profit.
---------------------------------------------
http://threatpost.com/selfish-miners-could-exploit-p2p-nature-of-bitcoin-ne…
*** Vuln: strongSwan CVE-2013-6075 Authorization Security Bypass and Denial of Service Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/63489
*** FOSCAM IP-Cameras SSID cross-site scripting ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/88629
*** Belkin NetCam Wifi Camera Hardcoded Credentials ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110079
*** WordPress Curvo Themes - Arbitrary code execution ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110081
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 08-11-2013 18:00 − Montag 11-11-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** New IE Zero-Day found in Watering Hole Attack ***
---------------------------------------------
FireEye Labs has identified a new IE zero-day exploit hosted on a breached website based in the U.S. It´s a brand new IE zero-day that compromises anyone visiting a malicious website; classic drive-by download attack. The exploit leverages a new information leakage vulnerability and an IE out-of-bounds memory access vulnerability to achieve code execution.
---------------------------------------------
http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-wate…
FOLLOW-UP:
*** Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method ***
---------------------------------------------
Recently, we discovered a new IE zero-day exploit in the wild, which has been used in a strategic Web compromise. Specifically, the attackers inserted this zero-day exploit into a strategically important website, known to draw visitors that are likely interested in national and international security policy.
---------------------------------------------
http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephe…
*** No Patch Tuesday update for Microsoft zero-day vulnerability ***
---------------------------------------------
Microsoft is preparing eight fixes for next weeks upcoming Nov. 12 Patch Tuesday, but an update to a recently discovered zero-day vulnerability is not one of them.
---------------------------------------------
http://www.scmagazine.com/no-patch-tuesday-update-for-microsoft-zero-day-vu…
*** Case Study: Analyzing a WordPress Attack - Dissecting the webr00t cgi shell - Part I ***
---------------------------------------------
November 1st started like any other day on the web. Billions of requests were being shot virtually between servers in safe and not so safe attempts to access information. After months of waiting, finally one of those not so safe request hit one of our honeypots.
---------------------------------------------
http://blog.sucuri.net/2013/11/case-study-analyzing-a-wordpress-attack-diss…
*** CryptoLocker Emergence Connected to Blackhole Exploit Kit Arrest ***
---------------------------------------------
The past few weeks have seen the ransomware CryptoLocker emerge as a significant threat for many users. Our monitoring of this threat has revealed details on how it spreads, specifically its connection to spam and ZeuS. However, it looks there is more to the emergence of this thread than initially discovered.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/cryptolocker-eme…
*** October 2013 virus activity overview ***
---------------------------------------------
November 5, 2013 Mid-autumn 2013 was marked by an upsurge in the number of encryption Trojans: hundreds of users whose systems were compromised by encoders contacted Doctor Webs support service in October. Also discovered were new malicious programs for Android, which has long been targeted by intruders. Viruses Statistics collected in October by Dr.Web CureIt! indicate that the downloader Trojan.LoadMoney.1 tops the list of detected threats.
---------------------------------------------
http://news.drweb.com/show/?i=4052&lng=en&c=9
*** Supertrojaner BadBIOS: Unwahrscheinlich, aber möglich ***
---------------------------------------------
Der Sicherheitsforscher Dragos Ruiu behauptet, auf seinen Rechnern wüte ein im BIOS verankerter Supertrojaner, der auch ohne Netzanschluss kommuniziert. Es mehren sich skeptische Stimmen - technisch unmöglich ist Malware wie BadBIOS jedoch nicht.
---------------------------------------------
http://www.heise.de/security/meldung/Supertrojaner-BadBIOS-Unwahrscheinlich…
*** Hintergrund: ENISA-Empfehlungen zu Krypto-Verfahren ***
---------------------------------------------
Die oberste, europäische Sicherheitsbehörde, die ENISA gibt Empfehlungen zu Algorithmen und Schlüssellängen.
---------------------------------------------
http://www.heise.de/security/artikel/ENISA-Empfehlungen-zu-Krypto-Verfahren…
*** Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream ***
---------------------------------------------
This month, a security researcher disclosed that a version of the old banking Trojan 'Trojan.ibank' has been modified to look for SAP GUI installations, a concerning sign that SAP system hacking has gone into mainstream cybercrime.
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/11/11/learn-to-…
*** Erweiterungen für Googles Webbrowser Chrome nur noch aus offiziellem Store ***
---------------------------------------------
Google will Windows-Anwender besser vor Malware schützen. Chrome-Versionen für andere Plattformen sind von der Maßnahme nicht betroffen.
---------------------------------------------
http://www.heise.de/security/meldung/Erweiterungen-fuer-Googles-Webbrowser-…
*** Horde Groupware Web Mail Edition 5.1.2 - CSRF Vulnerability ***
---------------------------------------------
http://www.exploit-db.com/exploits/29519
*** Debian Security Advisory DSA-2793 libav ***
---------------------------------------------
http://www.debian.org/security/2013/dsa-2793
*** Redaxo 4.5 CMS Vulnerabilities ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110070
*** Bugtraq: Belkin WiFi NetCam video stream backdoor with unchangeable admin/admin credentials ***
---------------------------------------------
http://www.securityfocus.com/archive/1/529722
*** D-Link Router 2760N Multiple XSS ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110075
*** Security Bulletin: IBM WebSphere Portal vulnerable to URL Manipulation CVE-2013-5454 PM99205 ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Security Bulletin: Multiple vulnerabilities in Security AppScan Enterprise (CVE-2013-5453, CVE-2013-5450) ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_mul…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 07-11-2013 18:00 − Freitag 08-11-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Advance Notification for November 2013 - Version: 1.0 ***
---------------------------------------------
This is an advance notification of security bulletins that Microsoft is intending to release on November 12, 2013.
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-nov
*** Clarification on Security Advisory 2896666 and the ANS for the November 2013 Security Bulletin Release ***
---------------------------------------------
Today, we're providing advance notification for the release of eight bulletins, three Critical and five Important, for November 2013. The Critical updates address vulnerabilities in Internet Explorer and Microsoft Windows, and the Important updates address issues in Windows and Office. While this release won't include an update for the issue first described in Security Advisory 2896666, we'd like to tell you a bit more about it. We're working to develop a security update...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/11/07/clarification-on-securit…
*** Exploits of critical Microsoft zero day more widespread than thought ***
---------------------------------------------
At least two hacker gangs exploit TIFF vulnerability to hijack users computers.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/6hCE3JS8yQI/story01…
*** Despite patches, Supermicros IPMI firmware is far from secure, researchers say ***
---------------------------------------------
The IPMI in Supermicro motherboards has vulnerabilities that can give attackers unuathorized access to servers, Rapid7 researchers said
---------------------------------------------
http://www.csoonline.com/article/742836/despite-patches-supermicro-39-s-ipm…
*** PCI council publishes updated payment security standards ***
---------------------------------------------
Version 3.0 of the PCI Data Security Standard (PCI DSS) and the Payment Application Data Security Standard (PA-DSS) became available today.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/Ktdq0wWA1L8/
*** VU#274923: Dual_EC_DRBG output using untrusted curve constants may be predictable ***
---------------------------------------------
Vulnerability Note VU#274923 Dual_EC_DRBG output using untrusted curve constants may be predictable Original Release date: 07 Nov 2013 | Last revised: 07 Nov 2013 Overview Output of the Dual Elliptic Curve Deterministic Random Bit Generator (DUAL_EC_DRBG) algorithm may be predictable by an attacker who has chosen elliptic curve parameters in advance. Description NIST SP 800-90A defines three elliptic curves for use in Dual_EC_DBRG but does not describe the provenance of the parameters used
---------------------------------------------
http://www.kb.cert.org/vuls/id/274923
*** Source code for proprietary spam bot offered for sale, acts as force multiplier for cybercrime-friendly activity ***
---------------------------------------------
In a professional cybercrime ecosystem, largely resembling that of a legitimate economy, market participants constantly strive to optimize their campaigns, achieve stolen assets liquidity, and most importantly, aim to reach a degree of efficiency that would help them gain market share. Thus, help them secure multiple revenue streams. Despite the increased transparency on the Russian/Easter European underground market - largely thanks to improved social networking courtesy of the...
---------------------------------------------
http://www.webroot.com/blog/2013/11/07/source-code-proprietary-spam-bot-off…
*** Security Bulletin: Vulnerabilities in Sametime Enterprise Meeting Server (CVE-2013-3044, CVE-2013-3045, CVE-2013-0537, CVE-2013-3985) ***
---------------------------------------------
The security bulletin addresses various vulnerabilities found in the Sametime Enterprise Meeting Server regarding spoofing and domain cookies. CVE(s): and CVE-2013-3044, CVE-2013-3045, CVE-2013-0537, CVE-2013-3985 Affected product(s) and affected version(s): IBM Lotus Sametime WebPlayer versions 8.5.2 and 8.5.2.1 Refer to the following reference URLs for remediation and additional vulnerability details. Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21654355 X-Force
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_vul…
*** Security Bulletin: IBM Lotus Sametime WebPlayer Denial-of-Service (CVE-2013-3986) ***
---------------------------------------------
An attacker participating in a Sametime Audio Visual (AV) session may be able to crash the IBM Sametime WebPlayer extension (Firefox extension) session of other users. CVE(s): and CVE-2013-3986 Affected product(s) and affected version(s): IBM Lotus Sametime WebPlayer versions 8.5.2 and 8.5.2.1 Refer to the following reference URLs for remediation and additional vulnerability details. Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21654041 X-Force Database:
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Security Bulletin: For safer administration of IBM Domino server, use Domino Administrator client instead of Domino Web Administrator ***
---------------------------------------------
IBM Domino Web Administrator (webadmin.nsf) has two cross-site scripting vulnerabilities and one cross-site request forgery of low CVSS score. These vulnerabilities do not exist in the Domino Administrator client. To prevent the potential for these attacks, use the Domino Administrator client or mitigations listed below. Domino Web Administrator is deprecated. CVE(s): CVE-2013-4051, CVE-2013-4055, CVE-2013-4050..
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_for…
*** IBM WebSphere Real Time Java Multiple Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/55618
*** CTF365: A New Capture The Flag Platform for Ongoing Competitions ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/11/08/ctf365--i…
*** OpenSSH Security Advisory: gcmrekey.adv ***
---------------------------------------------
A memory corruption vulnerability exists in the post-authentication sshd process when an AES-GCM cipher (aes128-gcm(a)openssh.com or aes256-gcm(a)openssh.com) is selected during kex exchange.
---------------------------------------------
http://www.openssh.org/txt/gcmrekey.adv
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 06-11-2013 18:00 − Donnerstag 07-11-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** The Dual Use Exploit: CVE-2013-3906 Used in Both Targeted Attacks and Crimeware Campaigns ***
---------------------------------------------
A zero-day vulnerability was recently discovered that exploits a Microsoft graphics component using malicious Word documents as the initial infection vector. Microsoft has confirmed that this exploit has been used in "attacks observed are very limited and carefully carried out...
---------------------------------------------
http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/the-dual-use-e…
*** Analysis: Spam in Q3 2013 ***
---------------------------------------------
The percentage of spam in total email traffic decreased by 2.4% from the second quarter of 2013 and came to 68.3%.
---------------------------------------------
http://www.securelist.com/en/analysis/204792311/Spam_in_Q3_2013
*** Blackhat SEO and ASP Sites ***
---------------------------------------------
It's all too easy to scream and holler at PHP based websites and the various malware variants associate with the technology, but perhaps we're a bit too biased. Here is a quick post on ASP variant. Thought we'd give you Microsoft types some love too. Today we found this nice BlackHat SEO attack: Finding it...
---------------------------------------------
http://blog.sucuri.net/2013/11/blackhat-seo-and-asp-sites.html
*** Bugtraq: CVE-2013-4425: Private key disclosure, Osirix (lite, 64bit and FDA cleader version) (Medical Application) ***
---------------------------------------------
http://www.securityfocus.com/archive/1/529659
*** Vuln: Imperva SecureSphere Web Application Firewall Search Field SQL Injection Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/62948
*** Security Bulletin: Multiple vulnerabilities in current releases of the IBM SDK, Java Technology Edition ***
---------------------------------------------
Issues disclosed in the Oracle October 2013 Java SE Critical Patch Update, plus 6 additional vulnerabilities
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21655201
*** [20131103] Joomla! Core XSS Vulnerability ***
---------------------------------------------
Inadequate filtering leads to XSS vulnerability in com_contact.
---------------------------------------------
http://developer.joomla.org/security/572-core-xss-20131103.html
*** Vuln: Google Android Signature Verification Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/63547
*** SA-CONTRIB-2013-089 - Node Access Keys - Access Bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2013-089Project: Node Access Keys (third-party module)Version: 7.xDate: 2013-November-06Security risk: Moderately criticalExploitable from: RemoteVulnerability: Access bypassDescriptionNode Access Keys helps to grant users temporary view permissions to selected content types on a per user role basis. However, it only implements hook_node_access() and not hook_query_alter(), which means any listing of nodes does not respect the node view access.CVE identifier(s)...
---------------------------------------------
https://drupal.org/node/2129379
*** SA-CONTRIB-2013-088 - Secure Pages - Missing Encryption of Sensitive Data ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2013-088Project: Secure Pages (third-party module)Version: 6.xDate: 2013-November-06Security risk: Less criticalExploitable from: RemoteVulnerability: Missing Encryption of Sensitive DataDescriptionThe Secure Pages module manages redirects between HTTP and HTTPS pages.A flaw in the URL path matching could lead some pages and forms to be transmitted via plain HTTP, even if the administrator intended those pages to use HTTPS. This flaw may surface either due to a...
---------------------------------------------
https://drupal.org/node/2129381
*** SA-CONTRIB-2013-087 - Payment for Webform - Access Bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2013-087Project: Payment for Webform (third-party module)Version: 7.xDate: 2013-November-06Security risk: Not criticalExploitable from: RemoteVulnerability: Access bypassDescriptionThis module enables you to ask for or require payments before users can submit webforms. It previously allowed anonymous users to sometimes use other anonymous users payments when submitting a form. Payment for Webform never supported anonymous users, but there was also nothing that...
---------------------------------------------
https://drupal.org/node/2129373
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 05-11-2013 18:00 − Mittwoch 06-11-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Attacks on New Microsoft Zero Day Using Multi-Stage Malware ***
---------------------------------------------
Attackers exploiting the Microsoft Windows and Office zero day revealed yesterday are using an exploit that includes a malicious RAR file as well as a fake Office document as the lure, and are installing a wide variety of malicious components on newly infected systems. The attacks seen thus far are mainly centered in Pakistan. The...
---------------------------------------------
http://threatpost.com/attacks-on-new-microsoft-zero-day-using-multi-stage-m…
*** Malicious PDF Analysis Evasion Techniques ***
---------------------------------------------
In many exploit kits, malicious PDF files are some of the most common threats used to try to infect users with various malicious files. Naturally, security vendors invest in efforts to detect these files properly - and their creators invest in efforts to evade those vendors. Using feedback provided by the Smart Protection Network, we...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/XOJob_q_Zag/
*** Asus fixt schwerwiegende Sicherheitslücke in WebStorage ***
---------------------------------------------
Die Client-Software WebStorage gehört zu einer Reihe von Apps, die Asus auf seinen Android-Geräten ab Werk installiert. heise netze hatte bei Routine-Kontrollen einen Implementierungsfehler aufgedeckt.
---------------------------------------------
http://www.heise.de/security/meldung/Asus-fixt-schwerwiegende-Sicherheitslu…
*** Google Bots Doing SQL Injection Attacks ***
---------------------------------------------
One of the things we have to be very sensitive about when writing rules for our CloudProxy Website Firewall is to never block any major search engine bot (ie., Google, Bing, Yahoo, etc..). To date, we've been pretty good about this, but every now and then you come across unique scenarios like the one in this post, that make you scratch your head and think, what if a legitimate search engine bot was being used to attack the site? Should we still allow the attack to go through?
---------------------------------------------
http://blog.sucuri.net/2013/11/google-bots-doing-sql-injection-attacks.html
*** Security Bulletin: IBM Sterling Certificate Wizard Shared Memory Permission Vulnerability (CVE-2013-1500) ***
---------------------------------------------
The IBM Sterling Certificate Wizard is susceptible to a shared memory permission vulnerability. CVE(s): CVE-2013-1500 Affected product(s) and affected version(s): IBM Sterling Certificate Wizard: 1.3, 1.4
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Security Bulletin: Potential security vulnerability exist in the IBM Java SDKs TLS implementation that is shipped with Tivoli Netcool/OMNIbus Web GUI (CVE-2012-5081) ***
---------------------------------------------
The JDKs TLS implementation does not strictly check the TLS vector length as set out in the latest RFC 5246. CVE(s): CVE-2012-5081 Affected product(s) and affected version(s): Tivoli Netcool/OMNIbus Web GUI: 7.3.0, 7.3.1, 7.4.0
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_pot…
*** Security Bulletin: IBM Sterling Connect:Enterprise Secure Client Shared Memory Permission Vulnerability (CVE-2013-1500) ***
---------------------------------------------
The IBM Sterling Connect:Enterprise Secure Client is susceptible to a shared memory permission vulnerability. CVE(s): CVE-2013-1500 Affected product(s) and affected version(s): IBM Sterling Secure Client: 1.3, 1.4
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Vivotek IP Cameras RTSP Authentication Bypass ***
---------------------------------------------
Topic: Vivotek IP Cameras RTSP Authentication Bypass Risk: High Text:Core Security - Corelabs Advisory http://corelabs.coresecurity.com Vivotek IP Cameras RTSP Authentication Bypass 1. *A...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110038
*** Bugtraq: Open-Xchange Security Advisory 2013-11-06 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/529635
*** Kerberos Multi-realm KDC NULL Pointer Dereference Denial of Service Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/55588
*** Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco WAAS Mobile Remote Code Execution Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco TelePresence VX Clinical Assistant Administrative Password Reset Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Tweetbot for Mac / for iOS Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/55462
*** Arbor Peakflow X Security Bypass and Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/55536
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 04-11-2013 18:00 − Dienstag 05-11-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Switzerland to set up Swiss cloud free of NSA, GCHQ snooping (it hopes) ***
---------------------------------------------
Gnomes of Zurich want spook-immune system Swisscom, the Swiss telco thats majority owned by its government, will set up a "Swiss cloud" hosted entirely in the land of cuckoo clocks and fine chocolate - and try to make the service impervious to malware and uninvited spooks.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/11/04/switzerland…
*** Is your vacuum cleaner sending spam?, (Tue, Nov 5th) ***
---------------------------------------------
Past week, a story in a Saint Petersburg (the icy one, not the beach) newspaper caught quite some attention, and was picked up by The Register [1]. The story claimed that appliances like tea kettles, vacuum cleaners and iron(y|ing) irons shipped from China and sold in Russia were discovered to contain rogue, WiFi enabled chip sets. As soon as power was applied, the vacuum cleaner began trolling for open WiFi access points, and if it found one, it would hook up to a spam relay and start ...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16958
*** When attackers use your DNS to check for the sites you are visiting, (Mon, Nov 4th) ***
---------------------------------------------
Nowadays, attackers are definitely interested in checking what sites you are visiting. Depending on that information, they can setup attacks like the following: Phising websites and e-mail scams targeted to specific people so they leave their private information. Network spoofing with tools like dsniff, where attackers can tell computers that the sites they want to visit are located somewhere else, therefore enabling them to interact with victims posing like the original site.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16955
*** Manifest: Bei XMPP/Jabber soll Verschlüsselung zur Pflicht werden ***
---------------------------------------------
Entwickler und Betreiber von XMPP-/Jabber-Software und -Diensten, darunter auch der Jabber-Erfinder Jeremie Miller, wollen es zur Pflicht machen, die Kommunikation über XMPP in Zukunft zu verschlüsseln.
---------------------------------------------
http://www.golem.de/news/manifest-bei-xmpp-jabber-soll-verschluesselung-zur…
*** Biggest Risks in IPv6 Security Today ***
---------------------------------------------
Although IPv6 packets have started to flow, network engineers still tread lightly because of lingering security concerns. Here are the top six security risks in IPv6 network security today as voted by gogoNET members, a community of 95,000 network professionals.
---------------------------------------------
http://www.cio.com/article/742652/Biggest_Risks_in_IPv6_Security_Today
*** WhatsApp-Backup speichert Klartext bei Apple ***
---------------------------------------------
Die eingebaute Backup-Funktion des beliebten Messaging-Programms speichert auf dem iPhone alle Texte und Bilder bei Apples iCloud - und zwar völlig unverschlüsselt.
---------------------------------------------
http://www.heise.de/security/meldung/WhatsApp-Backup-speichert-Klartext-bei…
*** Cisco Security Notices ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** Vuln: Cisco Prime Central for Hosted Collaboration Solution CVE-2013-5564 Denial of Service Vulnerability ***
---------------------------------------------
Cisco Prime Central for Hosted Collaboration Solution CVE-2013-5564 Denial of Service Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/63490
*** Bugtraq: ESA-2013-070: EMC Documentum Cross Site Scripting Vulnerability. ***
---------------------------------------------
http://www.securityfocus.com/archive/1/529620
*** Bugtraq: ESA-2013-073: EMC Documentum eRoom Multiple Cross Site Scripting Vulnerabilities. ***
---------------------------------------------
http://www.securityfocus.com/archive/1/529621
*** VU#436214: Attachmate Verastream Host Integrator Vulnerable to Arbitrary File Uploads ***
---------------------------------------------
Vulnerability Note VU#436214 Attachmate Verastream Host Integrator Vulnerable to Arbitrary File Uploads Original Release date: 04 Nov 2013 | Last revised: 04 Nov 2013 Overview The Attachmate Verastream Host Integrator (VHI) is vulnerable to arbitrary file uploads.
---------------------------------------------
http://www.kb.cert.org/vuls/id/436214
*** GitLab Remote code execution vulnerability in the code search feature ***
---------------------------------------------
Topic: GitLab Remote code execution vulnerability in the code search feature Risk: High Text:Remote code execution vulnerability in the code search feature of GitLab There is a remote code execution vulnerability in t...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110026
*** GitLab Remote code execution vulnerability in the SSH key upload ***
---------------------------------------------
Topic: GitLab Remote code execution vulnerability in the SSH key upload Risk: High Text:# Remote code execution vulnerability in the SSH key upload feature of GitLab There is a remote code execution vulnerability...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013110025
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 31-10-2013 18:00 − Montag 04-11-2013 18:00
Handler: Otmar Lendl
Co-Handler: Stephan Richter
*** Top three recommendations for securing your personal data using cryptography, by EU cyber security Agency ENISA in new report ***
---------------------------------------------
ENISA, the European Union's "cyber security" Agency today launched a report that all authorities should better promote cryptographic measure to safeguard personal data.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/top-three-recommendations-f…
*** Know Your Enemy: Tracking A Rapidly Evolving APT Actor ***
---------------------------------------------
Between Oct. 24-25 FireEye detected two spear-phishing attacks attributed a threat actor we have previously dubbed admin(a)338.[1] The newly discovered attacks targeted a number of organizations and were apparently focused on gathering data related to international trade, finance and economic...
---------------------------------------------
http://www.fireeye.com/blog/technical/2013/10/know-your-enemy-tracking-a-ra…
*** How To Avoid CryptoLocker Ransomware ***
---------------------------------------------
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from "CryptoLocker," the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks is usually either to pay up or suck it up. This post offers a few pointers to help readers avoid becoming the next victim.
---------------------------------------------
http://krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransomware/
*** Why Motivated Attackers Often Get What They Want ***
---------------------------------------------
Do you work for a company possessing information which could be of financial value to people outside the organization? Or, perhaps even a foreign state would find it useful to gain access to the documents youre storing on that shared network drive? Yes? Then congratulations, you may already be the target of a persistent and motivated attacker (who sometimes, but rarely, is also advanced).According to this CERT-FI presentation, even Finland has seen nearly a decade of these attacks. Nowadays,
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002632.html
*** Google-dorks based mass Web site hacking/SQL injecting tool helps facilitate malicious online activity ***
---------------------------------------------
Among the most common misconceptions regarding the exploitation (hacking) of Web sites, is that no one would exclusively target *your* Web site, given that the there are so many high profile Web sites to hack into. In reality though, thanks to the public/commercial availability of tools relying on the exploitation of remote Web application vulnerabilities, the insecurely configured Web sites/forums/blogs, as well as the millions of malware-infected hosts internationally, virtually every Web
---------------------------------------------
http://www.webroot.com/blog/2013/11/01/peek-inside-google-dorks-based-mass-…
*** Secunias PSI Country Report - Q3 2013, (Fri, Nov 1st) ***
---------------------------------------------
On the heels of discussing Microsofts Security Intelligence Report v15 wherein the obvious takeaway is "Windows XP be gone!", Secunias just-released PSI Country Report - Q3 2013 is an interesting supplemental read. Here are the summary details: Programs Installed: 75, from 25 different vendors 40% (30 of 75) of these programs are Microsoft programs 60% (45 of 75) of these programs are from third-party vendors Users with unpatched Operating Systems: 14.6% (WinXP, Win7, Win8,
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16943&rss
*** July-September 2013 ***
---------------------------------------------
NOTE 1: The "ICS-CERT Monitor" newsletter offers a means of promoting preparedness, information sharing, and collaboration with the 16 critical infrastructure sectors. ICS-CERT accomplishes this on a day-to-day basis through sector briefings, meetings, conferences, and information product releases.
---------------------------------------------
http://ics-cert.us-cert.gov/monitors/ICS-MM201310
*** SOHO Router Horror Stories: German Webcast with Mike Messner ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/11/04/soho-rout…
*** Nordex NC2 - Cross-Site Scripting Vulnerability ***
---------------------------------------------
NCCIC/ICS-CERT is aware of a public report of a Cross-Site Scripting vulnerability affecting the Nordex Control 2 (NC2) application, a supervisory control and data acquisition/human-machine interface (SCADA/HMI) product. According to this report, the vulnerability is exploitable by allowing a specially crafted request that could execute arbitrary script code. This report was released without coordination with either the vendor or NCCIC/ICS-CERT. NCCIC/ICS-CERT is attempting to...
---------------------------------------------
http://ics-cert.us-cert.gov/alerts/ICS-ALERT-13-304-01
*** VU#450646: Tiki Wiki CMS Groupware version 11.0 contains a cross-site scripting (XSS) vulnerability ***
---------------------------------------------
Vulnerability Note VU#450646 Tiki Wiki CMS Groupware version 11.0 contains a cross-site scripting (XSS) vulnerability Original Release date: 31 Oct 2013 | Last revised: 31 Oct 2013 Overview Tiki Wiki CMS Groupware version 11.0 and possibly earlier versions contain a cross-site scripting (XSS) vulnerability (CWE-79). Description CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)Tiki Wiki CMS Groupware version 11.0 and possibly earlier versions contain a
---------------------------------------------
http://www.kb.cert.org/vuls/id/450646
*** VMSA-2013-0009.2 ***
---------------------------------------------
VMware vSphere, ESX and ESXi updates to third party libraries
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2013-0009.html
*** TP-Link Cross Site Request Forgery Vulnerability ***
---------------------------------------------
Topic: TP-Link Cross Site Request Forgery Vulnerability Risk: Medium Text:I. Introduction Today the majority of wired Internet connections is used with an embedded NAT router, which allows using ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100223
*** Zend Framework Proxied Request Processing IP Spoofing Weakness ***
---------------------------------------------
https://secunia.com/advisories/55529
*** Novell ZENworks Configuration Management Directory Traversal Flaw Lets Remote Users Obtain Files ***
---------------------------------------------
http://www.securitytracker.com/id/1029289
*** Security Bulletins for multiple HP Products ***
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Security Bulletins for multiple IBM Products ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_inf…https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_pot…https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_mul…http://www.securityfocus.com/bid/62018
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 30-10-2013 18:00 − Donnerstag 31-10-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** VU#326830: NAS4Free version 9.1.0.1 contains a remote command execution vulnerability ***
---------------------------------------------
NAS4Free version 9.1.0.1.804 and possibly earlier versions contain a remote code execution vulnerability. NAS4Free allows an authenticated user to post PHP code to an HTTP script and have the code executed remotely. By default, NAS4Free runs with root privileges. A remotely authenticated attacker can send an HTTP POST request that contains a malicious PHP file which can cause the script to run directly on the machine.
---------------------------------------------
http://www.kb.cert.org/vuls/id/326830
*** Mozilla Fixes 10 Vulnerabilities with Firefox 25 ***
---------------------------------------------
Mozilla released Firefox 25 yesterday, fixing 10 vulnerabilities, five of them critical.
---------------------------------------------
http://threatpost.com/mozilla-fixes-10-vulnerabilities-with-firefox-25/1027…
*** A New Wave of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis ***
---------------------------------------------
Introduction and setting the context Over the last month, the ThreatLabZ researchers have been actively monitoring a recent uptick in the numbers of Win32/Caphaw (henceforward known as Caphaw) infections that have been actively targeting users bank accounts since 2011.
---------------------------------------------
http://research.zscaler.com/2013/09/a-new-wave-of-win32caphaw-attacks.html
*** Silent Circle and Lavabit launch 'DarkMail Alliance' to thwart e-mail spying ***
---------------------------------------------
Silent Circle CTO: "What we're getting rid of is SMTP."
---------------------------------------------
http://arstechnica.com/business/2013/10/silent-circle-and-lavabit-launch-da…
*** MS Security Intelligence Report Volume 15: January 2013 to June 2013 ***
---------------------------------------------
The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people.
---------------------------------------------
http://download.microsoft.com/download/5/0/3/50310CCE-8AF5-4FB4-83E2-03F1DA…
*** Meet 'badBIOS', the mysterious Mac and PC malware that jumps airgaps ***
---------------------------------------------
Like a super strain of bacteria, the rookkit plaguing Dragos Ruiu is omnipotent.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/jeFXBU0x_Vc/story01…
*** Compliance Checklist: Cloud Encryption Best Practices for Banks and Insurance Companies ***
---------------------------------------------
For industries whose handling of sensitive consumer data renders them subject to strict regulations, the cloud is anything but a simple choice. Before you can commit to the cloud, you'll have to understand exactly what cloud information protection measures you must take to remain in regulatory compliance.
---------------------------------------------
http://blog.ciphercloud.com/compliance-checklist-cloud-encryption-practices…
*** Weekly Update: Exploiting (Kind of) Popular FOSS Apps ***
---------------------------------------------
- Moodle Remote Command Execution
- vTigerCRM v5.4.0/v5.3.0 Authenticated Remote Code Execution
- Zabbix Authenticated Remote Command Execution
- Mac OS X Persistent Payload Installer
- Persistent Payload in Windows Volume Shadow Copy
- and many more
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2013/10/30/weekly-up…
*** Cisco IOS XE Multiple Bugs Let Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1029277
*** Moodle Remote Command Execution ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100211
*** D-Link Backdoor Czechr Exploit ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100219
*** ISPConfig Authenticated Arbitrary PHP Code Execution ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100215
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 29-10-2013 18:00 − Mittwoch 30-10-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Nuclear Exploit Pack Getting More Aggresive ***
---------------------------------------------
Churning through our logs, we recently observed a significant rise in the number of transactions involving the Nuclear Exploit Pack, which has been in the news for quite some time now. In the past week, we stumbled upon thousands of transactions involving the Nuclear Exploit Pack infestation.
---------------------------------------------
http://research.zscaler.com/2013/10/nuclear-exploit-pack-getting-more.html
*** A Tour Through The Chinese Underground ***
---------------------------------------------
The Chinese underground has played host to many cybercriminals over the years. In the research brief titled Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market, we provide some details of the current state of the Chinese underground economy. Last year, we looked into this underground sector, and this brief is a continuation of those efforts.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/a-tour-through-t…
*** Major Corporations Fail to Defend Against Social Engineering ***
---------------------------------------------
Companies such as Apple and General Motors gave up crucial company information to social engineers during the annual Capture the Flag contest at Def Con.
---------------------------------------------
http://threatpost.com/major-corporations-fail-to-defend-against-social-engi…
*** iOS apps can be hijacked to show fraudulent content and intercept data ***
---------------------------------------------
A large number of apps for iPhones and iPads are susceptible to hacks that cause them to surreptitiously send and receive data to and from malicious servers instead of the legitimate ones they were designed to connect to, security researchers said on Tuesday.
---------------------------------------------
http://arstechnica.com/security/2013/10/ios-apps-can-be-hijacked-to-show-fr…
*** New Injection Campaign Peddling Rogue Software Downloads ***
---------------------------------------------
A mass injection campaign surfaced over the last two weeks that´s already compromised at least 40,000 web pages worldwide and is tricking victims into downloading rogue, unwanted software to their computer.
---------------------------------------------
http://threatpost.com/new-injection-campaign-peddling-rogue-software-downlo…
*** Defending Against CryptoLocker ***
---------------------------------------------
CryptoLocker infections were found across different regions, including North America, Europe Middle East and the Asia Pacific. Almost two-thirds of the affected victims - 64% - were from the US. Other affected countries include the UK and Canada, with 11% and 6% of global victims, respectively.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/defending-agains…
*** Analysis: Kaspersky Lab Report: Java under attack - the evolution of exploits in 2012-2013 ***
---------------------------------------------
One of the biggest problems facing the IT security industry is the use of vulnerabilities in legitimate software to launch malware attacks. Malicious programs can use these vulnerabilities to infect a computer without attracting the attention of the user and, in some cases, without triggering an alert from security software.
---------------------------------------------
http://www.securelist.com/en/analysis/204792310/Kaspersky_Lab_Report_Java_u…
*** Microsoft sieht Rückgang der Virengefahr, aber steigende Infektionen ***
---------------------------------------------
In fast allen großen Ländern habe die Zahl der 'Begegnungen mit Schad-Software' deutlich abgenommen, konstatiert der aktuelle Microsoft Security Intelligence Report. Für Entwarnung ist es jedoch zu früh - denn die Zahl der Infektionen nimmt trotzdem zu.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-sieht-Rueckgang-der-Virengef…
*** Joomla! Media Manager allows arbitrary file upload and execution ***
---------------------------------------------
A vulnerability has been discovered in older versions of the Joomla! content management software that allow an authenticated attacker to upload active content through the media manager form ('administrator/components/com_media/helpers/media.php'). Joomla! allows files with a trailing '.' to pass the upload checks.
---------------------------------------------
http://www.kb.cert.org/vuls/id/639620
*** Apples Siri is helping users bypass iOS security ***
---------------------------------------------
Siri was designed to be an effective personal assistant, but since the release of iOS 7, the artificial intelligence is bringing the bad with the good.
---------------------------------------------
http://www.scmagazine.com/apples-siri-is-helping-users-bypass-ios-security/…
*** [remote] - Apache / PHP 5.x Remote Code Execution Exploit ***
---------------------------------------------
+++ Betrifft veraltete Versionen +++
Unaffected versions are patched by CVE-2012-1823.
---------------------------------------------
http://www.exploit-db.com/exploits/29290
*** Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5599 Remote Memory Corruption Vulnerability ***
---------------------------------------------
+++ Betrifft veraltete Versionen +++
---------------------------------------------
http://www.securityfocus.com/bid/63423
*** ASUS RT-N13U Backdoor Account ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100206
*** Vuln: XAMPP for Windows Multiple Cross Site Scripting and SQL Injection Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/53979
*** Citrix XenDesktop Upgrade Feature Bug Lets Remote Authenticated Users Bypass Policy Controls ***
---------------------------------------------
http://www.securitytracker.com/id/1029263
*** WordPress MoneyTheme Cross Site Scripting / Shell Upload ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100199
*** WordPress Curvo Shell Upload ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100197
*** Google Play Billing Bypass ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100203
*** sup Remote Command Execution ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013100202