=======================
= End-of-Shift report =
=======================
Timeframe: Montag 22-04-2013 18:00 − Dienstag 23-04-2013 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
*** Cisco Firewall Services Module time-range Object Security Bypass Security Issue ***
---------------------------------------------
Cisco Firewall Services Module time-range Object Security Bypass Security Issue
---------------------------------------------
https://secunia.com/advisories/53140
*** Cisco ASA Software time-range Object Security Bypass Security Issue ***
---------------------------------------------
Cisco ASA Software time-range Object Security Bypass Security Issue
---------------------------------------------
https://secunia.com/advisories/53131
*** CAPTCHA-solving Russian email account registration tool helps facilitate cybercrime ***
---------------------------------------------
By Dancho Danchev Just how challenged are cybercriminals when they’re being exposed to CAPTCHAs in 2013? Not even bothering to “solve the problem” by themselves anymore, thanks to the cost-efficient, effective, and fully working process of outsourcing the CAPTCHA solving process to humans thereby allowing the cybercriminals to abuse any given Web property, as if it were multiple [...]
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/SpUsORYAF3o/
*** MyBB Multiple Vulnerabilities ***
---------------------------------------------
MyBB Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/52828
*** VirusTotal += PCAP Analyzer ***
---------------------------------------------
VirusTotal is a greedy creature, one of its gluttonous wishes is to be able to understand and characterize all the races it encounters, it already understood the insurgent collective of Portable Executables, the greenish creatures known as Android APKs, the talkative PDF civilization, etc. as of today it also figures out PCAPs, a rare group of individuals obsessed with recording everything they see.
---------------------------------------------
http://blog.virustotal.com/2013/04/virustotal-pcap-analyzer.html
*** Crypto guru: Dont blame users, get coders security training instead ***
---------------------------------------------
Murdochs infosec man adds arrogant techies also vulnerable Infosec 2013 Experts on both sides of the vendor-customer divide in the UK and a US cryptographer are at odds over whether or not security training is a waste of time.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/04/23/security_aw…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 19-04-2013 18:00 − Montag 22-04-2013 18:00
Handler: Stephan Richter
Co-Handler: Otmar Lendl
*** OpenStack keystone.conf insecure file permissions ***
---------------------------------------------
Topic: OpenStack keystone.conf insecure file permissions Risk: Medium Text:As reported: https://bugs.launchpad.net/keystone/+bug/1168252 The password configuration of LDAP and admin_token in keystone...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/Y9fS7PiNeIM/WLB-20…
*** nginx Arbitrary Code Execution NullByte Injection ***
---------------------------------------------
Topic: nginx Arbitrary Code Execution NullByte Injection Risk: Low Text:# Exploit Title: nginx Arbitrary Code Execution NullByte Injection # Date: 24/08/2011 # Exploit Author: Neal Poole # Vendor ...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013040142
*** Vuln: Opera Web Browser Information Disclosure and Unspecified Vulnerabilities ***
---------------------------------------------
Opera Web Browser Information Disclosure and Unspecified Vulnerabilities
---------------------------------------------
http://www.securityfocus.com/bid/58864
*** libxml2 Multiple Use-After-Free Vulnerabilities ***
---------------------------------------------
Topic: libxml2 Multiple Use-After-Free Vulnerabilities Risk: Medium Text:1) An use-after-free error in "htmlParseChunk()" can be exploited to dereference already freed memory. 2) Two use-after-free...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/yn55M8Cmawk/WLB-20…
*** Family of “BadNews” malware in Google Play downloaded up to 9 million times ***
---------------------------------------------
Apps steal sensitive data, push SMS app that racks up charges to pricey service.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/hS0_oWvBHPU/
*** A Chargen-based DDoS? Chargen is still a thing?, (Sun, Apr 21st) ***
---------------------------------------------
In the recent few days there was another denial of service attack launched at financial organizations. (Yeah, I know, DDoS on a bank, thats *totally* never happens). What is newsworthy isnt that it happened, it was the means used to execute the attack. Specifically, the organizations were flooded with UDP port 19 traffic which is the chargen protocol. I am not sure Ive ever seen a legitimate use of this protocol or encountered a machine that had it on intentionally before. For review, chargen...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15647&rss
*** ownCloud Server 5.0.x/4.5.x XSS and Privilege escalation ***
---------------------------------------------
Topic: ownCloud Server 5.0.x/4.5.x XSS and Privilege escalation Risk: Medium Text:This vulnerabilities only affect ownCloud Server 5.0.x and 4.5.x, the 4.0.x branch is not affected and still supported with se...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013040156
*** Und täglich grüßt die Router-Lücke ***
---------------------------------------------
Belkin, D-Link, Linksys, Netgear, Sitecom, TP-Link – es gibt kaum Hersteller, die bei der Firmware-Entwicklung nicht patzen. Es ist nach wie vor schockierend, was für mitunter haarsträubende Schwachstellen in verbreiteten Router-Modellen schlummern.
---------------------------------------------
http://www.heise.de/security/meldung/Und-taeglich-gruesst-die-Router-Luecke…
*** Avaya Communication Manager OpenSSL and glibc Vulnerabilities ***
---------------------------------------------
Avaya Communication Manager OpenSSL and glibc Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53166
*** 8 tips for a security incident handling plan ***
---------------------------------------------
Most of us know that there is no such thing as 100% security, and that - unfortunately - its only a matter of time until a security incident occurs. Despite this, its rare to see a good incident response process and plan in place.
---------------------------------------------
http://nakedsecurity.sophos.com/2013/04/20/tips-incident-handling-plan/
*** McAfee Security Bulletin - ePO update fixes two vulnerabilities ***
---------------------------------------------
Five separate CVE reports of potential ePO vulnerabilities were reported: CVE-2013-0169, CVE-2013-1484, CVE-2013-1485, CVE-2013-1486, CVE-2013-1487. Collectively, these vulnerabilities could allow unauthorized disclosure of information, unauthorized modification, or disruption of service. ePO is not vulnerable to any of these CVE vulnerabilities.
---------------------------------------------
https://kc.mcafee.com/corporate/index?page=content&id=SB10041
*** Cisco Unified Contact Center Express Editor Information Disclosure Vulnerability ***
---------------------------------------------
A vulnerability in the scripts editor software of the Cisco Unified Contact Center Express (Cisco Unified CCX) could allow an unauthenticated, remote attacker to have read access to scripts that are stored in the Cisco Unified CCX scripts repository.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=29050
*** Firefox FirePHP Extension Arbitrary Command Execution Weakness ***
---------------------------------------------
Firefox FirePHP Extension Arbitrary Command Execution Weakness
---------------------------------------------
https://secunia.com/advisories/53163
*** Global Mapper Insecure Library Loading Vulnerability ***
---------------------------------------------
Global Mapper Insecure Library Loading Vulnerability
---------------------------------------------
https://secunia.com/advisories/51510
*** DDoS Strikes Take EU Banks Offline ***
---------------------------------------------
Experts Say Outages Not Linked to U.S. Attacks Distributed-denial-of-service attacks against banking institutions are becoming a global concern, and experts say many organizations outside the U.S. financial-services sector are ill-equipped to defend themselves. DDoS strikes have taken down online-banking sites in Northern Europe in recent days and weeks, several security experts say. Scott Hammack, CEO of DDoS-mitigation provider Prolexic, says...
---------------------------------------------
http://www.bankinfosecurity.com/ddos-strikes-take-eu-banks-offline-a-5701/o…
*** Bugtraq: [SE-2012-01] Yet another Reflection API flaw affecting Oracles Java SE ***
---------------------------------------------
[SE-2012-01] Yet another Reflection API flaw affecting Oracles Java SE
---------------------------------------------
http://www.securityfocus.com/archive/1/526415
*** Security Bulletin: IBM InfoSphere Data Replication Dashboard Username Enumeration (CVE-2013-0584) ***
---------------------------------------------
A remote, unauthenticated user can enumerate a list of InfoSphere Data Replication Dashboard user accounts including which accounts do not require a password.
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21634798
*** A Primer on IPv4, IPv6 and Transition ***
---------------------------------------------
There is something badly broken in todays Internet. At first blush that may sound like a contradiction in terms, or perhaps a wild conjecture intended only to grab your attention to get you to read on. After all, the Internet is a modern day technical marvel. In just a couple of decades the Internet has not only...
---------------------------------------------
http://www.circleid.com/posts/20130421_a_primer_on_ipv4_ipv6_and_transition/
*** Security Advisory-The AR Abnormally Resets When Receiving Special DHCP Packets ***
---------------------------------------------
Apr 20, 2013 14:38
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** WordPress - Vulnerabilities in multiple Plugins ***
---------------------------------------------
WordPress All in One Webmaster Plugin Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/52877
WordPress FourSquare Checkins Plugin Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/53151
WordPress Facebook Members Plugin Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/52962
WordPress W3 Total Cache Arbitrary Code Execution Vulnerability
---------------------------------------------
https://secunia.com/advisories/53052
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 18-04-2013 18:00 − Freitag 19-04-2013 18:00
Handler: Stephan Richter
Co-Handler: L. Aaron Kaplan
*** Yes, “design flaw” in 1Password is a problem, just not for end users ***
---------------------------------------------
It may very well be time for a new and improved hashing function.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/p6YJzwrXgpU/
*** SAP ConfigServlet command execution ***
---------------------------------------------
SAP ConfigServlet command execution
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83637
*** IBM Lotus Connections reflected cross-site scripting ***
---------------------------------------------
IBM Lotus Connections reflected cross-site scripting
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/82265
*** Microsoft releases 4 of Enhanced Mitigation Experience Toolkit (EMET), More here: http://www.microsoft.com/en-us/download/details.aspx?id=38761, (Thu, Apr 18th) ***
---------------------------------------------
-- John Bambenek bambenek \at\ gmail /dot/ com Bambenek Consulting (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15635&rss
*** ISC Handler Lenny Zeltsers REMnux v4 Reviewed on Hak5, (Thu, Apr 18th) ***
---------------------------------------------
Earlier this money, Lenny released version 4 of REMnux, a lightweight Ubuntu Linux-based distro for analyzing malware. It was recently reviewed on Hak5. Take a look and if you havent already, download the image and send Lenny your feedback. -- John Bambenek bambenek \at\ gmail /dot/ com Bambenek Consulting (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15638&rss
*** Novell GroupWise WebAccess Input Validation Flaw in OnError Attribute Permits Cross-Site Scripting Attacks ***
---------------------------------------------
Novell GroupWise WebAccess Input Validation Flaw in OnError Attribute Permits Cross-Site Scripting Attacks
---------------------------------------------
http://www.securitytracker.com/id/1028454
*** Xen denial of service ***
---------------------------------------------
Xen denial of service
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83645http://xforce.iss.net/xforce/xfdb/83646
*** SWFUpload v.ALL <= (Object Injection/CSRF) Vulnerabilities ***
---------------------------------------------
Topic: SWFUpload v.ALL
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/jQYLW7Im9Hg/WLB-20…
*** Vuln: Drupal MP3 Player Module Cross Site Scripting Vulnerability ***
---------------------------------------------
Drupal MP3 Player Module Cross Site Scripting Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/59276
*** Vuln: Drupal elFinder Module Cross Site Request Forgery Vulnerability ***
---------------------------------------------
Drupal elFinder Module Cross Site Request Forgery Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/59277
*** WordPress attack highlights 30 million targets ***
---------------------------------------------
Summary: The recent botnet attack on websites running WordPress hasnt had much impact — yet. But with millions of vulnerable sites and a knowledge gap at the low end of the market, things could get much, much worse.
---------------------------------------------
http://www.zdnet.com/wordpress-attack-highlights-30-million-targets-7000014…
*** Using Nessus to Discover Malware and Botnet Hosts ***
---------------------------------------------
...Tenable has released several plugins to identify hosts in your environment that show signs of a compromise such as containing malware or participating in a botnet. The steps below outline which plugins to enable and how to create filters to easily find the relevant plugins...
---------------------------------------------
http://www.tenable.com/blog/using-nessus-to-discover-malware-and-botnet-hos…
*** OpenPGP Best Practices ***
---------------------------------------------
Some thoughts on best practices for OpenPGP keys
---------------------------------------------
https://we.riseup.net/debian/openpgp-best-practices
*** Facebook closes cross-site scripting holes ***
---------------------------------------------
Facebook has closed various cross-site scripting (XSS) holes that were discovered by security firm Break Security and which have now been described in greater detail. Break Securitys CEO, Nir Goldshlager, explains that the social network was vulnerable to attacks through its Chat feature as well as its "Check in" and Messenger for Windows components.
---------------------------------------------
http://www.h-online.com/security/news/item/Facebook-closes-cross-site-scrip…
*** Microsoft Discovers Trojan That Erases Evidence Of Its Existence ***
---------------------------------------------
Researchers at Microsoft have spotted a Trojan downloader that does something very savvy yet rare: It deletes its own components so researchers and forensics investigators cant analyze or identify it.
---------------------------------------------
http://www.darkreading.com/vulnerability/microsoft-discovers-trojan-that-er…
*** Hitachi Vulnerabilities in Multiple Products ***
---------------------------------------------
Hitachi Multiple Products Apache HTTP Server Cross-Site Scripting Vulnerability
---------------------------------------------
https://secunia.com/advisories/52990https://secunia.com/advisories/53136https://secunia.com/advisories/53139
*** Bugtraq: TWSL2013-004: Group Name Enumeration Vulnerability in Cisco IKE Implementation ***
---------------------------------------------
TWSL2013-004: Group Name Enumeration Vulnerability in Cisco IKE Implementation
---------------------------------------------
http://www.securityfocus.com/archive/1/526403
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 17-04-2013 18:00 − Donnerstag 18-04-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Cisco Network Admission Control Manager SQL Injection Vulnerability ***
---------------------------------------------
Cisco Network Admission Control (NAC) Manager contains a vulnerability that could allow an unauthenticated remote attacker to execute arbitrary code and take full control of the vulnerable system.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Sitecom WLM-3500 Backdoor Accounts ***
---------------------------------------------
Sitecom WLM-3500 routers contain an undocumented access backdoor that can be abused to bypass existing authentication mechanisms. These hard-coded accounts are persistently stored inside the device firmware image.
---------------------------------------------
https://cxsecurity.com/wlb/WLB-2013040131
*** Open-Xchange 6 / OX AppSuite Cross Site Scripting ***
---------------------------------------------
Open-Xchange Security Advisory (multiple vulnerabilities) Multiple security issues for Open-Xchange Server 6 and OX AppSui...
---------------------------------------------
https://cxsecurity.com/wlb/WLB-2013040130
*** ZPanel Code Execution ***
---------------------------------------------
Theres an arbitrary (PHP) code execution in ZPanel, a free and open-source shared hosting control panel.
---------------------------------------------
https://cxsecurity.com/wlb/WLB-2013040127
*** DIY Russian mobile number harvesting tool spotted in the wild ***
---------------------------------------------
By Dancho Danchev Earlier this year we profiled a newly released mobile/phone number harvesting application, a common tool in the arsenal of mobile spammers, as well as vendors of mobile spam services. Since the practice is an inseparable part of the mobile spamming process, cybercriminals continue periodically releasing new mobile number harvesting applications, update their features, but most interestingly..
---------------------------------------------
http://blog.webroot.com/2013/04/18/diy-russian-mobile-number-harvesting-too…
*** Exploiting SOHO Routers ***
---------------------------------------------
Researchers have discovered critical security vulnerabilities in numerous small office/home office (SOHO) routers and wireless access points. We define a critical security vulnerability in a router as one that allows a remote attacker to take full control of the routers configuration settings, or one that allows a local attacker to bypass authentication and take control.
---------------------------------------------
http://securityevaluators.com//content/case-studies/routers/soho_router_hac…
*** Oracle schließt 128 Lücken in Datenbankprodukten ***
---------------------------------------------
Die Updates verteilen sich quer über das gesamte Produktspektrum des Herstellers; allein 25 betreffen die Open-Source-Datenbank MySQL.
---------------------------------------------
http://www.heise.de/security/meldung/Oracle-schliesst-128-Luecken-in-Datenb…
*** Microsoft Security Intelligence Report Vol. 14 ***
---------------------------------------------
The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people.
---------------------------------------------
https://www.microsoft.com/security/sir/default.aspx
*** Bostoner Attentat wird für neue Spamwelle missbraucht ***
---------------------------------------------
Zehn bis zwanzig Prozent des gesamten Spam-Aufkommens soll der "Boston Spam" schon ausmachen. Die Kriminellen starten falsche Twitter-Accounts zur "Spendenaquise" und lenken Nutzer auf verseuchte Webseiten.
---------------------------------------------
http://www.heise.de/security/meldung/Bostoner-Attentat-wird-fuer-neue-Spamw…https://www.cert.at/services/blog/20130417110508-824.html
*** Cyberthugs put YOUR PC to work as Bitcoin-mining SLAVE ***
---------------------------------------------
E-currency just went mainstream The recent crash in the value of Bitcoins hasnt prevented cybercriminals from cooking up new ways to distribute malware engineered to mine the currency using compromised computers.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/04/18/bitcoin_min…
*** Magic mystery malware menaces many UK machines - new claim ***
---------------------------------------------
Who exactly is spying on thousands of Brit biz PCs? Security researchers have found malware that communicates using an unknown protocol and is largely targeting UK businesses.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/04/18/magic_malwa…
*** Plone Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Plone, which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/52955
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 16-04-2013 18:00 − Mittwoch 17-04-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** NQ Mobile: Android Malware Doubled in 2012 ***
---------------------------------------------
Throw another log onto the proverbial Android malware fire: According to mobile security firm NQ Mobile, infections targeting devices running the Google-based operating system doubled in 2012. That translates to a 163 percent increase from 2011 and accounts for over 65,000 different types of malware discovered, up 30,000 from 25,000 the year before.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/nq-mobile-android-malware-doubled-2012-0…
*** SAP BASIS Communication Services Command Execution ***
---------------------------------------------
Topic: SAP BASIS Communication Services Command Execution Risk: High Text: [ESNC-2013-003] Remote OS Command Execution in SAP BASIS Communication Services Please refer to www.esnc.de for the origin...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/uQXsNLsq7cM/WLB-20…
*** Fueled by super botnets, DDoS attacks grow meaner and ever-more powerful ***
---------------------------------------------
Average amount of bandwidth used in DDoS attacks spiked eight-fold last quarter.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/QTLIjglO7vc/
*** MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data ***
---------------------------------------------
MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
---------------------------------------------
http://www.securitytracker.com/id/1028449
*** A peek inside a (cracked) commercially available RAT (Remote Access Tool) ***
---------------------------------------------
By Dancho Danchev In an attempt to add an additional layer of legitimacy to their malicious software, cybercriminals sometimes simply reposition them as Remote Access Tools, also known as R.A.Ts. What they seem to be forgetting is that, no legitimate Remote Access Tool would posses any spreading capabilities, plus, has the capacity to handle tens of [...]
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/iV7a86XP2vA/
*** Apple aktualisiert Safari und Java-6-Unterstützung ***
---------------------------------------------
Apple hat in der Nacht zum Mittwoch seinen Web-Browser mit einer neuen Sicherheitsfunktion ausgestattet, mit der Java-Applets Website-spezifisch freigegeben werden können. Außerdem wurde ein neuerliches Java-6-Update veröffentlicht.
---------------------------------------------
http://www.heise.de/security/meldung/Apple-aktualisiert-Safari-und-Java-6-U…
*** 90% of game hacks and cracks contain malware ***
---------------------------------------------
Computer and online gaming is big business for companies creating the games, but a considerable drain on the finances of gamers, so it should not come as a surprise that many of the latter decide against buying games and add-ons, choosing instead to download cracked games, keygens, patches and more from torrent or file-sharing sites.
---------------------------------------------
https://www.net-security.org/malware_news.php?id=2468
*** Oracle Java Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious, local users to manipulate certain data and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53008
*** Linksys WRT54GL Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. upload a firmware image when a logged-in administrative user visits a specially crafted web page.
---------------------------------------------
https://secunia.com/advisories/53068
*** The beginners guide to breaking website security with nothing more than a Pineapple ***
---------------------------------------------
You know how security people get all uppity about SSL this and SSL that? Stuff like posting creds over HTTPS isn't enough, you have to load login forms over HTTPS as well and then you can't send auth cookies over HTTP because they'll get sniffed and sessions hijacked and so on and so forth.
---------------------------------------------
http://www.troyhunt.com/2013/04/the-beginners-guide-to-breaking-website.html
*** ACLU asks feds to probe wireless carriers over Android security updates ***
---------------------------------------------
Civil liberties advocates have asked the US Federal Trade Commission to take action against the nations four major wireless carriers for selling millions of Android smartphones that never, or only rarely, receive updates to patch dangerous security vulnerabilities.
---------------------------------------------
http://arstechnica.com/security/2013/04/wireless-carriers-deceptive-and-unf…
*** Boston-Related Malware Campaigns Have Begun, (Wed, Apr 17th) ***
---------------------------------------------
About mid-afternoon yesterday (Central time - US), Boston related spam campaigns have begun. The general "hook" is that it sends a URL with a subject about the video from the explosions. Similar to when Osama Bin Laden was killed and fake images were used as a hook, in this case, the video is relevant to the story and being used as a hook. Right now, very roughly 10-20% of all spam is related to this (some spamtraps reporting more, some less). Similar IPs have also been sending pump
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=15629&rss
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 15-04-2013 18:00 − Dienstag 16-04-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** How mobile spammers verify the validity of harvested phone numbers ***
---------------------------------------------
By Dancho Danchev Just as we anticipated earlier this year in our "How mobile spammers verify the validity of harvested phone number" post, mobile spammers and cybercriminals in general will continue ensuring that QA (Quality Assurance) is applied to their upcoming campaigns. This is done in an attempt to both successfully reach a wider audience and to..
---------------------------------------------
http://blog.webroot.com/2013/04/16/how-mobile-spammers-verify-the-validity-…
*** Analyzing Malicious PDFs or: How I Learned to Stop Worrying and Love Adobe Reader ***
---------------------------------------------
This blog post and the next blog post will focus on analyzing malicious PDF files and the changes we've made to jsunpack to facilitate this analysis.
---------------------------------------------
http://visiblerisk.com/blog/2013/4/8/analyzing-malicious-pdfs-or-how-i-lear…
*** Tricks neu aufgelegt: Vorsicht bei Copy&Paste ***
---------------------------------------------
Mit einem nicht ganz neuen Trick, der derzeit verstärkt wieder kursiert, können Web-Seiten etwa arglosen Linux-Usern, die zu faul zum Tippen sind, Befehle unterjubeln und deren System kapern.
---------------------------------------------
http://www.heise.de/security/meldung/Tricks-neu-aufgelegt-Vorsicht-bei-Copy…
*** New security protection, fixes for 39 exploitable bugs coming to Java ***
---------------------------------------------
Oracle plans to release an update for the widely exploited Java browser plugin. The update fixes 39 critical vulnerabilities and introduces changes designed to make it harder to carry out drive-by attacks on end-user computers.
---------------------------------------------
http://arstechnica.com/security/2013/04/new-security-protection-fixes-for-3…
*** Linode Hacked Through ColdFusion Zero Day ***
---------------------------------------------
The attackers who compromised Web hosting provider Linode used a zero day vulnerability in Adobe ColdFusion and were able to access the companys database, source code and customers credit card numbers and passwords. The company said that the customer credit card numbers were encrypted, as were the passwords, but it forced a system-wide password reset after the attack was discovered.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/linode-hacked-through-coldfusion-zero-da…
*** MediaWiki Two XML External Entities Vulnerabilities ***
---------------------------------------------
Two vulnerabilities have been reported in MediaWiki, which can be exploited by malicious people to potentially disclose sensitive information and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53054
*** Nitro Pro Insecure Library Loading Vulnerability ***
---------------------------------------------
SEC Consult has reported a vulnerability in Nitro Pro, which can be exploited by malicious people to compromise a user's system.
---------------------------------------------
https://secunia.com/advisories/52907
*** EasyPHPCalendar Date Picker Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been reported in EasyPHPCalendar, which can be exploited by malicious people to conduct cross-site scripting attacks. Certain unspecified input related to the date picker is not properly sanitised before being returned to the user.
---------------------------------------------
https://secunia.com/advisories/53025
*** NetGear WNR1000 ".jpg" Security Bypass Vulnerability ***
---------------------------------------------
Roberto Paleari has reported a vulnerability in NetGear WNR1000, which can be exploited by malicious people to bypass certain security restrictions. The application does not properly restrict access to certain web pages with appended ".jpg" to the URL and can be exploited to e.g. gain knowledge the configuration file including admin credentials.
---------------------------------------------
https://secunia.com/advisories/52856
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 12-04-2013 18:00 − Montag 15-04-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
*** Brute Force Attacks Build WordPress Botnet ***
---------------------------------------------
Security experts are warning that an escalating series of attacks designed to break into poorly-secured WordPress blogs is fueling the growth of a botnet made up of Web servers that could be the precursor to a broad-scale campaign to distribute malicious software and launch debilitating network attacks.Related Posts:Network Solutions Again Under SiegeAdobe, Microsoft, WordPress Issue Security FixesNew Tools Bypass Wireless Router SecurityPassword Do’s and Don’tsAttackers Hit Weak
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/EBD0wNNgwW0/
*** USA und China richten Arbeitsgruppen für Internet-Sicherheit ein ***
---------------------------------------------
Bei seinem China-Besuch hat der US-Außenminister die Einsetzung von Arbeitsgruppen zu den Themen Cyber-Security und globaler Klimaschutz vereinbart.
---------------------------------------------
http://www.heise.de/security/meldung/USA-und-China-richten-Arbeitsgruppen-f…
*** Social Media Widget remote file inclusion ***
---------------------------------------------
Topic: Social Media Widget remote file inclusion Risk: High Text:http://blog.sucuri.net/2013/04/wordpress-plugin-social-media-widget.ht…http://securityledger.com/hacked-wordpress-plug-in-pu...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/AgtWJoX3sg0/WLB-20…
*** Under the microscope: The bug that caught PayPal with its pants down ***
---------------------------------------------
Payment giant suffers textbook SQL injection flaw Security researchers have published a more complete rundown on a recently patched SQL injection flaw on PayPals website.…
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/04/15/paypal_sql_…
*** 8 Steps To Secure Your WordPress Blog ***
---------------------------------------------
Wordpress blogs are regular targets to brute force attacks, there is one large attack going on right now. These attacks are automated across all the hosting platforms and attempt to find bloggers that are using default usernames, weak passwords and outdated WordPress installations.
---------------------------------------------
http://www.howtomakemyblog.com/wordpress/7-simple-steps-to-make-your-wordpr…
*** Kippo 0.8 small SSH honeypot to keep track of brute force attacks ***
---------------------------------------------
New release have been announced on Kippo one of the most widely used ssh honeypot. this tool is a python based and emulates a shell on the server end to detect brute force attack. Kippo is a low to medium interaction SSH honeypot and can be a good addition to your honeypot solution.
---------------------------------------------
http://www.sectechno.com/2013/04/14/kippo-0-8-small-ssh-honeypot-to-keep-tr…
*** Linksys EA2700 Multiple Vulnerabilities ***
---------------------------------------------
Linksys EA2700 Multiple Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/52985
*** AndroTotal ***
---------------------------------------------
AndroTotal is a free service to scan suspicious APKs against multiple mobile antivirus apps.
---------------------------------------------
http://beta.andrototal.org/
*** Parallels Plesk Panel Privilege Escalation Vulnerabilities ***
---------------------------------------------
Parallels Plesk Panel Privilege Escalation Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/52998
*** Vaillant-Heizungen mit Sicherheits-Leck ***
---------------------------------------------
Die Heizungsanlage ecoPower 1.0 kann man über das Internet steuern – allerdings auch dann, wenn man dazu gar nicht berechtigt ist. Ein Angreifer könnte die Anlage dadurch potenziell dauerhaft beschädigen. Kunden sollen jetzt den Netzwerkstecker ziehen.
---------------------------------------------
http://www.heise.de/security/meldung/Vaillant-Heizungen-mit-Sicherheits-Lec…
*** Blog: Winnti returns with PlugX ***
---------------------------------------------
Continuing our investigation into Winnti, in this post we describe how the group tried to re-infect a certain gaming company and what malware they used. After discovering that the company’s servers were infected, we began to clean them up in conjunction with the company’s system administrator, removing malicious files from the corporate network. This took a while because it was not clear at first exactly how the cybercriminals had penetrated the corporate network; we couldn’t
---------------------------------------------
http://www.securelist.com/en/blog/208194224/Winnti_returns_with_PlugX
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 11-04-2013 18:00 − Freitag 12-04-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Data-Stealing Spyware Redpill Back, Targeting India ***
---------------------------------------------
A form of spyware first seen in 2008 and known for siphoning away users bank account credentials, emails, screenshots and various other bits of information has surfaced again this time targeting computer users in India.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/data-stealing-spyware-redpill-back-targe…
*** Bugtraq: MacOSX 10.8.3 ftpd Remote Resource Exhaustion ***
---------------------------------------------
MacOSX 10.8.3 ftpd Remote Resource Exhaustion
---------------------------------------------
http://www.securityfocus.com/archive/1/526343
*** Study Shows Google Better than Bing at Filtering Malicious Web Sites ***
---------------------------------------------
A German security company spent 18 months analyzing malware among millions of Web sites ranked by the worlds most popular search engines and concluded Google was safer than Bing.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/study-shows-google-better-bing-filtering…
*** Check Point bakes anti-malware tech into firewall bricks ***
---------------------------------------------
Software blades whisper from scabbards. En garde Check Point is baking in cyber-espionage defences to its enterprise firewall and gateway security products with the incorporation of sandbox-style technology.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/04/12/check_point…
*** Spider Video Player plugin for WordPress settings.php SQL injection ***
---------------------------------------------
Spider Video Player plugin for WordPress is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the settings.php script using the theme parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/83374
*** American Airlines 'You can download your ticket' themed emails lead to malware ***
---------------------------------------------
By Dancho Danchev Cybercriminals are currently spamvertising tens of thousands of emails impersonating American Airlines in an attempt to trick its customers into thinking that they've received a download link for their E-ticket. Once they download and execute the malicious attachment, their PCs automatically join the botnet operated by the cybercriminal/gang of cybercriminals behind the campaign. More details: [...]
---------------------------------------------
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/Upf44191rw4/
*** Microsoft zieht Sicherheitsspatch für Windows und Windows Server zurück ***
---------------------------------------------
Ein am vergangenen Dienstag veröffentlichtes Windows-Update kann dazu führen, das der Rechner nicht mehr hochfährt. Dann hilft nur noch die Wiederherstellungskonsole. Wer das Update bereits installiert hat, soll es wieder entfernen.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-zieht-Sicherheitsspatch-fuer…
*** Bitcoin Botnet Ranked as Top Threat for Q1 2013 ***
---------------------------------------------
Looking at the threats that targeted the Web in the first quarter of the year, Fortinet says that ZeroAccess, a botnet that mines the popular electronic currency Bitcoins, was the top problem. It wasn't alone however, as attacks on South Korea and Adware on Android made the list.
---------------------------------------------
https://www.securityweek.com/bitcoin-botnet-ranked-top-threat-q1-2013
*** jPlayer "jQuery" Cross-Site Scripting Vulnerability ***
---------------------------------------------
Input passed via the "jQuery" parameter to Jplayer.swf is not properly sanitised before being passed to the "ExternalInterface.call()" method. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
---------------------------------------------
https://secunia.com/advisories/52978
*** Social Engineering Skype Support team to hack any account instantly ***
---------------------------------------------
You can install the industry's strongest and most expensive firewall. You can educate employees about basic security procedures and the importance of choosing strong passwords. You can even lock-down the server room, but how do you protect a company from the threat of social engineering attacks?
---------------------------------------------
http://thehackernews.com/2013/04/social-engineering-skype-support-team.html
*** Angriffswelle auf 1&1-Server ***
---------------------------------------------
Cyber-Kriminelle haben anscheinend verstärkt versucht, 1&1-Server mit Schadsoftware zu infizieren. Dadurch sind einige Dienste unter Umständen nur eingeschränkt zu erreichen.
---------------------------------------------
http://www.heise.de/security/meldung/Angriffswelle-auf-1-1-Server-1841085.h…
*** Mehrere DoS-Lücken in Ciscos ASA ***
---------------------------------------------
Im Betriebssystem für einige Netzwerkgeräte hat Cisco Lücken gefunden, die zu Denial-of-Service-Angriffen ausgenutzt werden könnten. Auch die Firewalls mancher Switches und Router sind betroffen.
---------------------------------------------
http://www.heise.de/security/meldung/Mehrere-DoS-Luecken-in-Ciscos-ASA-1841…
*** Cisco AnyConnect VPN Client Multiple Privilege Escalation Vulnerabilities ***
---------------------------------------------
Cisco AnyConnect VPN Client Multiple Privilege Escalation Vulnerabilities
---------------------------------------------
https://secunia.com/advisories/53015
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 10-04-2013 18:00 − Donnerstag 11-04-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Security Externalities and DDOS Attacks ***
---------------------------------------------
Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers goal was to flood Spamhaus or its network providers with Internet traffic, to overwhelm their capacity to handle incoming network packets. The main technical problem faced by a DoS attacker is how to amplify the attackers traffic-sending capacity, so that...
---------------------------------------------
http://www.schneier.com/blog/archives/2013/04/security_extern.html
*** Ransomware: The cybercrime money machine of 2013 ***
---------------------------------------------
"Towards the end of last year, when the major security firms were compiling their customary run-downs of the biggest threats expected to emerge in 2013, ransomware figured prominently as an ominous one to watch. This breed of malicious software owes its name to the way in which it attacks a computer, quite literally holding it ransom by paralysing the device and demanding payment for it to be unlocked. By February this year, the experts prophecies began to be realised as a sophisticated...
---------------------------------------------
http://www.itproportal.com/2013/04/10/ransomware-the-cybercrime-money-machi…
*** Cisco ASA Multiple Bugs Let Remote Users Deny Service ***
---------------------------------------------
Cisco ASA Multiple Bugs Let Remote Users Deny Service
---------------------------------------------
http://www.securitytracker.com/id/1028415
*** Summary for April 2013 - Version: 1.1 ***
---------------------------------------------
This bulletin summary lists security bulletins released for April 2013. With the release of the security bulletins for April 2013, this bulletin summary replaces the bulletin advance notification originally issued April 4, 2013. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.
---------------------------------------------
http://technet.microsoft.com/en-us/security/bulletin/ms13-apr
*** Cisco Prime Network Control System Default Credentials Let Remote Users Modify the Configuration ***
---------------------------------------------
Cisco Prime Network Control System Default Credentials Let Remote Users Modify the Configuration
---------------------------------------------
http://www.securitytracker.com/id/1028419
*** Adobe Security Bulletins Posted ***
---------------------------------------------
Today, we released the following Security Bulletins: APSB13-10 Security update: Security Hotfix available for ColdFusion APSB13-11 Security updates available for Adobe Flash Player APSB13-12 Security update available for Adobe Shockwave Player Customers of the affected products should...
---------------------------------------------
http://blogs.adobe.com/psirt/2013/04/adobe-security-bulletins-posted-5.html
*** Request Tracker 4.0.10 SQL Injection ***
---------------------------------------------
Request Tracker 4.0.10 SQL Injection
Risk: Medium
RT: Request Tracker System
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/_dNhCwOTOjA/WLB-20…
*** Industrial IT Security - Roadshow Frankfurt am Main | 18.06.2013 ***
---------------------------------------------
Eine Arbeitsgruppe im Bayerischen IT-Sicherheitscluster beschäftigt sich seit dem spektakulären Stuxnet-Angriff auf eine Urananreicherungsanlage im Iran im Jahr 2010 mit der Entwicklung von Produkten, Lösungen und Prozessen für die Produktionsebene. In Zusammenarbeit mit der Kompetenzgruppe Sicherheit des eco werden die Ergebnisse nun erstmal ausserhalb von Bayern vorgestellt.
---------------------------------------------
http://www.eco.de/2013/veranstaltungen/industrial-it-security.html
*** Wordpress-Widget verbreitet Spam ***
---------------------------------------------
Das Social-Media-Widget von Wordpress wurde als Spam-Schleuder genutzt. Im Januar wechselte der Entwickler, seitdem ist das Widget auffällig. Wordpress reagiert mit einem Bann. Das Plug-in sollte so schnell wie möglich deaktiviert werden.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Wordpress-Widget-verbreitet-Spam-183…
*** Hijacking airplanes with an Android phone ***
---------------------------------------------
An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android app has galvanized the crowd attending the Hack In The Box Conference in Amsterdam today.
---------------------------------------------
https://www.net-security.org/secworld.php?id=14733
*** Debian Security Advisory DSA-2659 libapache-mod-security ***
---------------------------------------------
XML external entity processing vulnerability
---------------------------------------------
http://www.debian.org/security/2013/dsa-2659
*** Podcast: Switch To IPV6 Demands A Security Re-Think ***
---------------------------------------------
"Youre probably not aware of it, but a major transformation is taking place on the Internet. Weve exhausted the approximately 4. 3 billion available addresses for IPV4 Internet Protocol Version 4 the Internets lingua franca...."
---------------------------------------------
http://securityledger.com/podcast-switch-to-ipv6-demands-a-security-re-thin…
*** A dozen tools for removing almost any malware ***
---------------------------------------------
Here's a typical scenario for a veteran computer user. Having established best-security practices on your PC, you've been free of malware infections for a long time.
---------------------------------------------
https://windowssecrets.com/top-story/a-dozen-tools-for-removing-almost-any-…
*** Blog: The Winnti honeypot - luring intruders ***
---------------------------------------------
During our research on the Winnti group we discovered a considerable amount of Winnti samples targeting different gaming companies. Using this sophisticated malicious program cybercriminals gained remote access to infected workstations and then carried out further activity manually.
---------------------------------------------
http://www.securelist.com/en/blog/851/The_Winnti_honeypot_luring_intruders
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 09-04-2013 18:00 − Mittwoch 10-04-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Spiel mir das Lied vom Exploit: VirtualDJ führt Code in MP3s aus ***
---------------------------------------------
Beim Abspielen von MP3s stolpert die DJ-Software über speziell präparierte ID3-Tags. Dabei droht aber nicht nur der Absturz: Es kursiert bereits ein Exploit, der den Buffer Overflow ausnutzt.
---------------------------------------------
http://www.heise.de/security/meldung/Spiel-mir-das-Lied-vom-Exploit-Virtual…
*** Out with the old, in with the April 2013 security updates ***
---------------------------------------------
Windows XP was originally released on August 24, 2001. Since that time, high-speed Internet connections and wireless networking have gone from being a rarity to the norm, and Internet usage has grown from 360 million to almost two-and-a-half billion users. Thanks to programs like Skype, we now make video calls with regularity, and social media has grown from a curiosity to a part of our everyday lives. But through it all, Windows XP keeps chugging along. With its longevity and wide user base,...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2013/04/09/out-with-the-old-in-with…
*** Bericht: Microsoft plant Zwei-Faktor-Authentifizierung mit App ***
---------------------------------------------
Für Nutzerkonten will Microsoft offenbar bald eine Zwei-Faktor-Authentifizierung einführen. Zusätzlich zum Passwort müsste dann noch ein Code eingegeben werden, der von einer Smartphone-App generiert wird.
---------------------------------------------
http://www.heise.de/security/meldung/Bericht-Microsoft-plant-Zwei-Faktor-Au…
*** Sysax Multi Server SSH Component NULL Pointer Dereference Vulnerability ***
---------------------------------------------
Sysax Multi Server SSH Component NULL Pointer Dereference Vulnerability
---------------------------------------------
https://secunia.com/advisories/52934
*** Pwn2Own IE Vulnerabilities Missing from Microsoft Patch Tuesday Updates ***
---------------------------------------------
In an unexpected turn, Microsoft’s monthly Patch Tuesday security updates released today did not include patches for Internet Explorer vulnerabilities used during the Pwn2Own contest one month ago.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/pwn2own-ie-vulnerabilities-missing-micro…
*** 2nd Anuual Cyber Security UAE Summit 2013 ***
---------------------------------------------
"Assess the nature of the latest threats being faced and the impact of these upon your organisationDiscuss the most promising cyber security technologies in the marketplaceAssess the trends to watch in global cyber securityInternational Case Studies: Discover the best practice in protecting your organisation from cyber-attackNetwork with your industry peers in the comfort of a 5 star venueThe only event of its kind to take place in the Middle East..."
---------------------------------------------
http://www.cybersecurityuae.com/
*** Streaming Videos Vudu Issues Systemwide Password Reset After Theft ***
---------------------------------------------
The streaming video service Vudu on Tuesday began resetting its customers passwords after theives broke into the companys Santa Clara, Calif. headquarters and stole a number of items, including hard drives holding customer data.read more
---------------------------------------------
https://threatpost.com/en_us/blogs/streaming-videos-vudu-issues-systemwide-…
*** Linksys WRT54GL apply.cgi Command Execution ***
---------------------------------------------
Topic: Linksys WRT54GL apply.cgi Command Execution Risk: High Text:## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/hE7MhGTEKrY/WLB-20…
*** Top Level Domains: ICANN erfüllt Wünsche der Strafverfolger ***
---------------------------------------------
Die Dienstleister für Domainregistrierungen müssen künftig striktere Auflagen bei der Registrierung von Domains für ihre Kunden beachten, etwa bei der Überprüfung von Kundendaten und der Vorratsdatenspeicherung von Domain-Inhaberdaten.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Top-Level-Domains-ICANN-erfuellt-Wue…
*** Vuln: phpMyAdmin tbl_gis_visualization.php Multiple Cross Site Scripting Vulnerabilities ***
---------------------------------------------
phpMyAdmin tbl_gis_visualization.php Multiple Cross Site Scripting Vulnerabilities
---------------------------------------------
http://www.securityfocus.com/bid/58962
*** Trojaner-Mail-Kampagne setzt auf Trusted Shops ***
---------------------------------------------
Trusted Shops genießen Vertrauen. Das will sich eine neue Trojaner-Mail-Kampagne zunutze machen und setzt auf die Angst vieler Kunden: Was, wenn die gekaufte Ware aus dem Internet nicht ankommt? Da greift doch der "Käuferschutz"?
---------------------------------------------
http://www.heise.de/security/meldung/Trojaner-Mail-Kampagne-setzt-auf-Trust…
*** WordPress GA Universal Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
WordPress GA Universal Plugin Cross-Site Request Forgery Vulnerability
---------------------------------------------
https://secunia.com/advisories/52976
*** Adobe April Patches ***
---------------------------------------------
Today, we released the following Security Bulletins: APSB13-10 – Security update: Security Hotfix available for ColdFusion APSB13-11 – Security updates available for Adobe Flash Player APSB13-12 – Security update available for Adobe Shockwave Player Customers of the affected products should consult the relevant Security Bulletin(s) for details.
---------------------------------------------
http://blogs.adobe.com/psirt/2013/04/adobe-security-bulletins-posted-5.html
*** Apple Mac OS X PDF Ink Annotations Processing Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-13-055/
*** Novell Identity Manager Unspecified Vulnerability ***
---------------------------------------------
Novell Identity Manager Unspecified Vulnerability
---------------------------------------------
https://secunia.com/advisories/52984