[CERT-daily] Tageszusammenfassung - Montag 17-08-2015

Daily end-of-shift report team at cert.at
Mon Aug 17 18:19:44 CEST 2015

= End-of-Shift report =

Timeframe:   Freitag 14-08-2015 18:00 − Montag 17-08-2015 18:00
Handler:     Stephan Richter
Co-Handler:  n/a

*** My browser visited Weather.com and all I got was this lousy malware (Updated) ***
New rash of malvertising attacks threatens millions of Web surfers.

*** Security: Neuer digitaler Erpressungsdienst aufgetaucht ***
Encryptor RaaS nennt sich ein neuer digitaler Erpressungsdienst, der im Tor-Netzwerk aufgetaucht ist. Sein Erschaffer hat offenbar bei Reddit dafür geworben. Angeblich soll es bereits erste Kunden geben.

*** Unsicheres Smart Home: "Nutzer können nichts tun" ***
Wiener Sicherheitsforscher warnen davor aufs vernetzte Heim mit Funk-Alarmanlagen oder Türschlösser zu setzen, weil die funkgesteuerten Anlagen viele Risiken mit sich bringen.

*** Five points of failure in recovering from an attack ***
An over emphasis on defense is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defenses by focusing on detection and attack response but ...

*** MediaServer Takes Another Hit with Latest Android Vulnerability ***
The "hits" keep on coming for Android's mediaserver component. We have discovered yet another Android mediaserver vulnerability, which can be exploited to perform attacks involving arbitrary code execution. With this new vulnerability, an attacker would be able to run their code with the same permissions that the mediaserver program already has as part of its...

*** Google plugs Google Admin app sandbox bypass 0-day ***
After having had some trouble with fixing a sandbox bypass vulnerability in the Google Admin Android app, the Google Security team has finally released on Friday an update that plugs the hole. Goog...

*** Wieder Root-Lücke in OS X Yosemite - inklusive 10.10.5 ***
Nachdem das jüngste Update eine Rechteausweitung behoben hatte, ist nun die nächste entdeckt worden. Demonstrationscode für einen Exploit wurde bereits veröffentlicht.

*** BitTorrent clients can be made to participate in high-volume DoS attacks ***
A group of researchers have discovered a new type of DoS attack that can be pulled off by a single attacker exploiting weaknesses in the BitTorrent protocol family. The weaknesses in the Micro Tran...

*** In eigener Sache: Wartungsarbeiten Dienstag, 18. August 2015 ***
In eigener Sache: Wartungsarbeiten Dienstag, 18. August 2015 | 17. August 2015 | Am Dienstag, 18. August 2015, werden wir Wartungsarbeiten an unserer Infrastruktur vornehmen. Dies kann zu kurzen Service-Ausfällen führen (jeweils im Bereich weniger Minuten). Es gehen dabei keine Daten (zb Emails) verloren, es kann sich nur die Bearbeitung etwas verzögern. In dringenden Fällen können sie uns wie gewohnt...

*** Windows Platform Binary Table (WPBT) - BIOS PE backdoor ***
[...] This feature allows a BIOS to deliver the payload of an executable, which is run in memory, silently, each time a system is booted. The executable code is run under under Session Manager context (i.e. SYSTEM).

*** VMSA-2015-0003.10 ***
VMware product updates address critical information disclosure issue in JRE

*** TOTOLink Backdoor Persistence ***
Topic: TOTOLink Backdoor Persistence Risk: High Text:Hello, This is an update to: - Backdoor and RCE found in 8 TOTOLINK router models (http://seclists.org/fulldisclosure/20...

*** Bugtraq: BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities ***

*** OSIsoft PI Data Archive Server Vulnerabilities ***
This advisory provides mitigation details for 56 vulnerabilities that were identified in OSIsoft PI System software.

*** Cisco Nexus Operating System Address Resolution Protocol Denial of Service Vulnerability ***

*** Cisco TelePresence Video Communication Server Expressway Access Vulnerability ***

*** Cisco NX-OS Internet Group Management Protocol Denial of Service Vulnerability ***

*** F5 Security Advisories ***

*** Security Advisory: Multiple MySQL vulnerabilities ***

*** Security Advisory: Linux kernel vulnerability CVE-2015-1465 ***

*** Security Advisory: Apache Commons FileUpload vulnerability CVE-2014-0050 ***

*** Security Advisory: Linux kernel vulnerability CVE-2015-2042 ***

*** IBM Security Bulletins ***

*** IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK affect IBM Notes and Domino ***

*** IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Rational RequisitePro (CVE-2015-4000) ***

*** IBM Security Bulletin: Security Vulnerability in Apache Batik (CVE-2015-0250) ***

*** IBM Security Bulletin: IBM WebSphere Application Server Liberty Profile vulnerability affects IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2015-1885) ***

*** IBM Security Bulletin: Vulnerability in IBM Java Runtime affects IBM Content Classification CVE-2015-4760 ***

*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM DataQuant for Workstation (CVE-2015-2613, CVE-2015-2601, CVE-2015-2625) ***

*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects IBM InfoSphere Discovery (CVE-2015-1931 CVE-2015-2601 CVE-2015-2613 CVE-2015-2625) ***

*** IBM Security Bulletin: Multiple vulnerabilities in IBM Runtime Environment Java Technology Edition, Version 5, affects: Websphere Dashboard Framework ***

*** IBM Security Bulletin: Multiple vulnerabilities in IBM Runtime Environment Java Technology Edition, Version 5, affects: Lotus Widget Factory. ***

*** Bugtraq: ESA-2015-130: EMC Documentum WebTop and WebTop Clients Cross-Site Request Forgery Vulnerability ***

*** Bugtraq: ESA-2015-131: EMC Documentum Content Server Multiple Vulnerabilities ***

*** Bugtraq: ESA-2015-094: RSA Archer GRC Multiple Cross-Site Request Forgery Vulnerabilities ***

*** Bugtraq: ESA-2015-081: RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, SSL-J and SSL-C Multiple Vulnerabilities ***

*** WP REST API (WP API) <= 1.2.2 - Cross-Site Scripting (XSS) ***

*** WP OAuth Server <= 3.1.4 - Insecure Pseudorandom Number Generation ***

More information about the Daily mailing list