[CERT-daily] Tageszusammenfassung - Dienstag 14-05-2013

Daily end-of-shift report team at cert.at
Tue May 14 18:52:45 CEST 2013


=======================
= End-of-Shift report =
=======================

Timeframe:   Montag 13-05-2013 18:00 − Dienstag 14-05-2013 18:00
Handler:     Matthias Fraidl
Co-Handler:  Robert Waldner

*** It's official: Password strength meters aren't security theater ***
---------------------------------------------
Does your password go up to 11? Probably not. But one day it could.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/fbIJ27hOPLI/




*** Kerberos kpasswd UDP ping-pong vulnerability ***
---------------------------------------------
Topic: Kerberos kpasswd UDP ping-pong vulnerability Risk: High
Text:This flaw has commonly been referred to as CVE-1999-0103 because that CVE also describes a UDP ping-pong attack. The same typ...
---------------------------------------------
http://cxsecurity.com/wlb/WLB-2013050118




*** Vuln: Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability ***
---------------------------------------------
Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
---------------------------------------------
http://www.securityfocus.com/bid/59826




*** Telekom lanciert Cloud-Service zum Aufspüren von Sicherheitslücken ***
---------------------------------------------
Mit dem Developer Garden Code Analyzer bietet die Deutsche Telekom eine Cloud-basierte statische Code-Analyse zum Finden von Sicherheitslücken in Web-Anwendungen und mobilen Apps.
---------------------------------------------
http://www.heise.de/security/meldung/Telekom-lanciert-Cloud-Service-zum-Aufspueren-von-Sicherheitsluecken-1860980.html




*** Travnet Botnet Controls Victims With Remote Admin Tool ***
---------------------------------------------
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more...
---------------------------------------------
http://blogs.mcafee.com/mcafee-labs/travnet-botnet-controls-victims-with-remote-admin-tool




*** Vorsicht beim Skypen - Microsoft liest mit ***
---------------------------------------------
Wer glaubt, ein Skype-Chat wäre privat, unterliegt einem unter Umständen folgenschweren Irrtum. Wie heise Security feststellten musste, wertet Skype beziehungsweise Microsoft alle verschickten Daten aus.
---------------------------------------------
http://www.heise.de/security/meldung/Vorsicht-beim-Skypen-Microsoft-liest-mit-1857620.html




*** WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
Charlie Eriksen has discovered a vulnerability in the Related Posts plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53122




*** AV-Software beseitigt Unrat des BKA-Trojaners ***
---------------------------------------------
Nach einem Stupser durch heise Security und das BSI erkennen und entfernen Antiviren-Programme nun auch die nachgeladenen kinderpornographischen Bilder des BKA-Trojaners.
---------------------------------------------
http://www.heise.de/security/meldung/AV-Software-beseitigt-Unrat-des-BKA-Trojaners-1862799.html




*** Back to skule: One Pad, Two Pad, Me Pad, You Pad - Cryptanalysis for beginners ***
---------------------------------------------
A couple of weeks ago, Kev Sheldrake from Head Hacking gave a fascinating talk on NLP and Social Engineering at Londons DEFCON group, DC4420 (called "Social Engineering Lies!"). Afterwards, over drinks, he told me about a free cryptography course that Stanford was running, and how much fun he and his workmates were having competing with each other to solve the homework problems that were set each week...
---------------------------------------------
http://adamsblog.aperturelabs.com/2013/05/back-to-skule-one-pad-two-pad-me-pad.html




*** Beta-Bot ergaunert sich Admin-Rechte und killt Virenscanner ***
---------------------------------------------
Mit einem perfiden Trick versucht der Bot, sein Opfer dazu zu bringen, einen UAC-Dialog abzunicken. Die Admin-Rechte benötigt er, um anschließend den Virenscanner abzuschießen.
---------------------------------------------
http://www.heise.de/security/meldung/Beta-Bot-ergaunert-sich-Admin-Rechte-und-killt-Virenscanner-1862780.html




*** WiFi Album application for iPad and iPhone command execution ***
---------------------------------------------
WiFi Album application for iPad and iPhone could allow a local attacker to execute arbitrary commands on the system, caused by an error in the index module when processing to load the unique ipad or iphone photo album folder names.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/84162




*** Debian Security Advisory DSA-2667 mysql-5.5 ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2667




*** Debian Security Advisory DSA-2666 xen ***
---------------------------------------------
several vulnerabilities
---------------------------------------------
http://www.debian.org/security/2013/dsa-2666


More information about the Daily mailing list