===================== = End-of-Day report = =====================
Timeframe: Dienstag 04-09-2018 18:00 − Mittwoch 05-09-2018 18:00 Handler: Stephan Richter Co-Handler: n/a
===================== = News = =====================
∗∗∗ Verschlüsselung: NSA-Chiffre Speck fliegt aus dem Linux-Kernel ∗∗∗ --------------------------------------------- Mit der NSA-Chiffre Speck wollte Google ursprünglich den Speicher von Low-End-Android-Smartphones verschlüsseln, doch nun hat das Unternehmen seine Unterstützung dafür zurückgezogen. Die umstrittene Verschlüsselung wird deshalb wieder aus dem Linux-Kernel entfernt. (Linux-Kernel, Verschlüsselung) --------------------------------------------- https://www.golem.de/news/verschluesselung-nsa-chiffre-speck-fliegt-aus-dem-...
∗∗∗ Multiple Remote Code-Execution Flaws Patched in Opsview Monitor ∗∗∗ --------------------------------------------- Five flaws were disclosed Tuesday in monitoring software Opsview Monitor. --------------------------------------------- https://threatpost.com/multiple-remote-code-execution-flaws-patched-in-opsvi...
∗∗∗ WordPress Database Upgrade Phishing Campaign ∗∗∗ --------------------------------------------- We have recently been notified of phishing emails that target WordPress users. The content informs site owners that their database requires an update and looks like this: The email’s appearance resembles that of a legitimate WordPress update message, however the content includes typos and uses an older messaging style. Another suspicious item in the content is the deadline. --------------------------------------------- https://blog.sucuri.net/2018/09/wordpress-database-upgrade-phishing-campaign...
∗∗∗ PowerPool malware exploits ALPC LPE zero-day vulnerability ∗∗∗ --------------------------------------------- Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure --------------------------------------------- https://www.welivesecurity.com/2018/09/05/powerpool-malware-exploits-zero-da...
∗∗∗ Lets Trade: You Read My Email, Ill Read Your Password! ∗∗∗ --------------------------------------------- Its been a while, but my last few posts have been on password spraying, which is great approach if your customer has an userid / password interface that faces the internet. I also ran a walk-through on using responder and LLMNR. But what if you are on the outside, and your customer is wise enough to front all of those interfaces with two-factor authentication, or mutual certificate authentication? --------------------------------------------- https://isc.sans.edu/forums/diary/Lets+Trade+You+Read+My+Email+Ill+Read+Your...
===================== = Vulnerabilities = =====================
∗∗∗ VU#598349: Problems with automatic DNS registration and autodiscovery ∗∗∗ --------------------------------------------- Problems with automatic DNS registration and autodiscovery. If an attacker with access to the network adds a malicious device to the network with the name WPAD, such an attacker may be able to utilize DNS autoregistration and autodiscovery to act as a proxy for victims on the network, resulting in a loss of confidentiality and [...] --------------------------------------------- http://www.kb.cert.org/vuls/id/598349
∗∗∗ Opto22 PAC Control Basic and PAC Control Professional ∗∗∗ --------------------------------------------- This advisory includes mitigation recommendations for a stack-based buffer overflow vulnerability in Opto22s PAC Control software. --------------------------------------------- https://ics-cert.us-cert.gov/advisories/ICSA-18-247-01
∗∗∗ Android Security Bulletin - September 2018 ∗∗∗ --------------------------------------------- The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. [...] The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. --------------------------------------------- https://source.android.com/security/bulletin/2018-09-01
∗∗∗ (0Day) Cisco WebEx Network Recording Player Improper Access Control Privilege Escalation Vulnerability ∗∗∗ --------------------------------------------- This vulnerability allows local attackers to escalate privileges on vulnerable installations of Cisco WebEx Network Recording Player. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. --------------------------------------------- https://www.zerodayinitiative.com/advisories/ZDI-18-998/
∗∗∗ Remote Code Execution Vulnerabilities in WECON LeviStudioU ∗∗∗ --------------------------------------------- http://www.zerodayinitiative.com/advisories/ZDI-18-989/ http://www.zerodayinitiative.com/advisories/ZDI-18-990/ http://www.zerodayinitiative.com/advisories/ZDI-18-991/ http://www.zerodayinitiative.com/advisories/ZDI-18-992/ http://www.zerodayinitiative.com/advisories/ZDI-18-993/ http://www.zerodayinitiative.com/advisories/ZDI-18-994/ http://www.zerodayinitiative.com/advisories/ZDI-18-995/ http://www.zerodayinitiative.com/advisories/ZDI-18-996/ http://www.zerodayinitiative.com/advisories/ZDI-18-997/
∗∗∗ Security updates for Wednesday ∗∗∗ --------------------------------------------- Security updates have been issued by Debian (lcms2), openSUSE (yubico-piv-tool), Oracle (kernel), and SUSE (cobbler and kvm). --------------------------------------------- https://lwn.net/Articles/764182/
∗∗∗ Synology-SA-18:52 Android Moments ∗∗∗ --------------------------------------------- A vulnerability allows man-in-the-middle attackers to execute arbitrary code via a susceptible version of Android Moments. --------------------------------------------- https://www.synology.com/en-global/support/security/Synology_SA_18_52
∗∗∗ Red Hat Gluster Storage Wed Administration, tendrl-api: Eine Schwachstelle ermöglicht das Umgehen von Sicherheitsvorkehrungen ∗∗∗ --------------------------------------------- https://adv-archiv.dfn-cert.de/adv/2018-1790/
∗∗∗ Red Hat Virtualization: Mehrere Schwachstellen ermöglichen u. a. das Ausführen beliebigen Programmcodes ∗∗∗ --------------------------------------------- https://adv-archiv.dfn-cert.de/adv/2018-1798/
∗∗∗ cURL: Eine Schwachstelle ermöglicht u. a. einen Denial-of-Service-Angriff ∗∗∗ --------------------------------------------- https://adv-archiv.dfn-cert.de/adv/2018-1796/
∗∗∗ IBM Security Bulletins ∗∗∗ --------------------------------------------- https://www.ibm.com/blogs/psirt/
∗∗∗ Security Advisory - FRP Bypass Vulnerability in Huawei Smart Phones ∗∗∗ --------------------------------------------- http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180905-0...
∗∗∗ Security Advisory - DoS Vulnerability in Some Huawei Smart Phones ∗∗∗ --------------------------------------------- http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180905-0...
∗∗∗ Python vulnerability CVE-2014-9365 ∗∗∗ --------------------------------------------- https://support.f5.com/csp/article/K11068141
∗∗∗ HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service Processor, Multiple Vulnerabilities ∗∗∗ --------------------------------------------- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=em...