[CERT-daily] Tageszusammenfassung - Mittwoch 27-03-2013
Daily end-of-shift report
team at cert.at
Wed Mar 27 18:12:58 CET 2013
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 26-03-2013 18:00 − Mittwoch 27-03-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Microsoft Security Advisory (2819682): Security Updates for Microsoft Windows Store Applications - Version: 1.0 ***
---------------------------------------------
Microsoft is announcing the availability of security updates for Windows Store applications running on Windows 8, Windows RT, and Windows Server 2012 (Windows Server 2012 Server Core installations are not affected).
---------------------------------------------
http://technet.microsoft.com/en-us/security/advisory/2819682
*** IBM Lotus Domino Cross-Site Scripting ***
---------------------------------------------
Topic: IBM Lotus Domino Cross-Site Scripting Risk: Low Text:I want to warn you about multiple Cross-Site Scripting vulnerabilities in IBM Lotus Domino. Last year Ive announced multip...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/4yG8wBlWdJY/WLB-2013030225
*** Wordpress trafficanalyzer Plugin XSS ***
---------------------------------------------
Topic: Wordpress trafficanalyzer Plugin XSS Risk: Low Text:# Exploit Title: Wordpress trafficanalyzer Plugin Xss ((|)) # Vulnerability ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/EPjJkeXhZCc/WLB-2013030233
*** 6 Emerging Security Threats, and How to Fight Them ***
---------------------------------------------
"The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So its important to be aware of the threats to enterprise security that are coming over the horizon and heading this way. Its a question the Georgia Institute of Technology addresses in its Emerging Cyber Threat Report 2013, in which researchers identify at least six threats that all security professionals should know
---------------------------------------------
http://www.esecurityplanet.com/network-security/6-emerging-security-threats-and-how-to-fight-them.html
*** EAST Releases First 2013 European Fraud Update ***
---------------------------------------------
"The first European Fraud Update of 2013 was recently released at the 29th European ATM Security Team (EAST) meeting, held in Brussels on February 6th of this year. This update represents the Single Euro Payments Area (SEPA) consisting of 21 countries, and two non-SEPA countries, EAST stated in a press release. Thieves have gone to new technical limits, using ATM skimming to make fraudulent transactions...."
---------------------------------------------
http://www.pymnts.com/briefing-room/PYMNTS-International/2013/03/EAST-Releases-First-2013-European-Fraud-Update/
*** HPSBUX02857 SSRT101103 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities ***
---------------------------------------------
Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other exploits.
---------------------------------------------
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03714148
*** SCADA and ICS Security Patching: The Good, the Bad and the Ugly ***
---------------------------------------------
"In my last blog, I discussed the reasons why critical industrial infrastructure control systems are so vulnerable to attacks from security researchers and hackers, and explained why patching for such systems is not a workable solution. But lets now examine the good, the bad and the ugly details of patching as a means to secure SCADA and ICS systems. And to begin, lets suppose patches could be installed without shutting down the process (for example, through the staged patching of
---------------------------------------------
http://www.infosecisland.com/blogview/23039-SCADA-and-ICS-Security-Patching-The-Good-the-Bad-and-the-Ugly.html
*** WordPress plugin user-photo file upload arbitrary PHP code execution ***
---------------------------------------------
Topic: WordPress plugin user-photo file upload arbitrary PHP code execution Risk: High Text:Can I get CVE identifier for WordPress plugin user-photo file upload arbitrary PHP code execution security vulnerability. Diff...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/boTyNVQ8PAs/WLB-2013030240
*** EMC Smarts Network Configuration Manager Improper Authentication Vulnerability ***
---------------------------------------------
Topic: EMC Smarts Network Configuration Manager Improper Authentication Vulnerability Risk: Medium Text:ESA-2013-016: EMC Smarts Network Configuration Manager Improper Authentication Vulnerability EMC Identifier: ESA-2013-016 ...
---------------------------------------------
http://feedproxy.google.com/~r/securityalert_database/~3/bpGpOtUKF0M/WLB-2013030239
*** 2nd Annual Cyber Security for the Chemical & Petrochem Industries Europe ***
---------------------------------------------
"Another very good security event this year, the Cyber Security for the Chemical & Petrochem Industries Europe. There has been a huge increase in the amount of press lately around new cyber-attacks in the chemical and oil and gas industries. The words DuQu, Gauss, Flame and Shamoon have filled board rooms with fear and angst over the last year as the trend for such cyber threats appears to be gaining momentum...."
---------------------------------------------
http://www.felipemartins.info/2013/03/2nd-annual-cyber-security-for-the-chemical-petrochem-industries-europe/
*** Juniper NetScreen ScreenOS OpenSSL DER Format Data Processing Vulnerability ***
---------------------------------------------
Juniper NetScreen ScreenOS OpenSSL DER Format Data Processing Vulnerability
---------------------------------------------
https://secunia.com/advisories/52724
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
Cisco IOS Software IP Service Level Agreement Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ipsla
Cisco IOS Software Protocol Translation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-pt
Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-rsvp
Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-cce
Cisco IOS Software Smart Install Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall
Cisco IOS Software Internet Key Exchange Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ike
Cisco IOS Software Network Address Translation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat
---------------------------------------------
More information about the Daily
mailing list