[CERT-daily] Tageszusammenfassung - Freitag 12-08-2016
Daily end-of-shift report
team at cert.at
Fri Aug 12 18:14:59 CEST 2016
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 11-08-2016 18:00 − Freitag 12-08-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** An ATM hack and a PIN-pad hack show chip cards aren't impervious to fraud ***
---------------------------------------------
The good news? Hacks are limited for now. The bad news? Hackers will get better.
---------------------------------------------
http://arstechnica.com/security/2016/08/an-atm-hack-and-a-pin-pad-hack-show-chip-cards-arent-impervious-to-fraud/
*** Four free tools for handling Amazon Web Services security incident response ***
---------------------------------------------
Responding to security incidents that involve deployments within Amazon Web Services is a lot different from responding to incidents that happen on corporate-owned gear, and two researchers have come up with free tools to make that process easier.Obtaining forensic evidence is different, primarily because security pros can't obtain physical access to the machines on which their AWS instances are running.+More on Network World: Black Hat: 9 free security tools for defense...
---------------------------------------------
http://www.cio.com/article/3106302/security/four-free-tools-for-handling-amazon-web-services-security-incident-response.html#tk.rss_security
*** Looking for the insider: Forensic Artifacts on iOS Messaging App, (Thu, Aug 11th) ***
---------------------------------------------
Most of the times we care about and focus on external threats, looking for actors that may attack us via phishing emails, vulnerable web services, misconfigured network devices, etc. However, sometimes the threat may come from the inside. In fact, it is not so uncommon to have disloyal/disgruntled employees exfiltrating information from the company (e.g. Intellectual Property to competitors, confidential information to the press, etc.). In such situations, a full forensics analysis of the...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21363&rss
*** Decrypting Chimera ransomware ***
---------------------------------------------
We take a technical look at validating the leaked Chimera ransomware keys as well as if we can decrypt files with these keys.
---------------------------------------------
https://blog.malwarebytes.com/cybercrime/2016/08/decrypting-chimera-ransomware/
*** Ransomware Decryption Tools ***
---------------------------------------------
IMPORTANT! Before downloading and starting the solution, read the how-to guide. Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files.
---------------------------------------------
https://www.nomoreransom.org/decryption-tools.html
*** Analyzing and Cleaning Hijacked Google SEO Spam Results ***
---------------------------------------------
Blackhat SEO spam comes in many forms, and one of the most nefarious is hijacked search results. This happens when search engines crawl and display unwanted content in the title and description of infected web pages. The negative impact to the infected website cannot be understated. This harms the website's reputation with visitors and will...
---------------------------------------------
https://blog.sucuri.net/2016/08/cleaning-hijacked-google-seo-spam-results.html
*** Microsofts compromised Secure Boot implementation ***
---------------------------------------------
Theres been a bunch of coverage of this attack on Microsofts Secure Boot implementation, a lot of which has been somewhat confused or misleading. Heres my understanding of the situation.Windows RT devices were shipped without the ability to disable Secure Boot. Secure Boot is the root of trust for Microsofts User Mode Code Integrity (UMCI) feature, which is what restricts Windows RT devices to running applications signed by Microsoft. This restriction is somewhat inconvenient for developers, so...
---------------------------------------------
http://mjg59.dreamwidth.org/44223.html
*** Security-Fixes für Ruby on Rails verfügbar ***
---------------------------------------------
Die Updates verhindern Cross-Site-Scritping-Attacken über html_safe in den Hauptversionen 3, 4 und 5 sowie die Möglichkeit, Queries in Rails 4.2.x zu manipulieren.
---------------------------------------------
http://heise.de/-3293426
*** This is strictly a violation of the TCP specification ***
---------------------------------------------
I was asked to debug another weird issue on our network. Apparently every now and then a connection going through CloudFlare would time out with 522 HTTP error. 522 error on CloudFlare indicates a connection issue between our edge server and the...
---------------------------------------------
https://blog.cloudflare.com/this-is-strictly-a-violation-of-the-tcp-specification/
*** Finding and Enumerating Processes within Memory: Memory and Volatility ***
---------------------------------------------
In this article series, we will learn about how processes reside in memory and various ways to find and enumerate them. I will be using Volatility plugins to find processes in memory. Once we know how to find processes within memory, in Part 2 we will see how to enumerate through them. Note: The scope...
---------------------------------------------
http://resources.infosecinstitute.com/finding-and-enumerating-processes-within-memory-part-1/
*** VU#301735: ZModo ZP-NE14-S DVR and ZP-IBH-13W cameras contain hard-coded credentials ***
---------------------------------------------
Vulnerability Note VU#301735 ZModo ZP-NE14-S DVR and ZP-IBH-13W cameras contain hard-coded credentials Original Release date: 12 Aug 2016 | Last revised: 12 Aug 2016 Overview The ZModo ZP-NE14-S DVR and ZP-IBH-13W cameras contain hard-coded credentials and run telnet by default. Description CWE-798: Use of Hard-coded Credentials - CVE-2016-5081According to the reporter, the Zmodo ZP-NE14-S DVR and ZP-IBH-13W cameras contain undocumented credentials for accessing the device via telnet.
---------------------------------------------
http://www.kb.cert.org/vuls/id/301735
*** HPSBHF03440 rev.1 - HPE iLO 3 using JQuery, Remote Cross-Site Scripting (XSS) ***
---------------------------------------------
A potential security vulnerability in JQuery was addressed by HPE Integrated Lights-Out 3. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS).
---------------------------------------------
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05232730
*** HPSBGN03630 rev.2 - HP Operations Manager for Unix, Solaris, and Linux using Apache Commons Collections (ACC), Remote Code Execution ***
---------------------------------------------
A vulnerability in Apache Commons Collections (ACC) for handling Java object deserialization was addressed in the AdminUI of HP Operations Manager for Unix, Solaris and Linux. The vulnerability could be exploited remotely to allow remote code execution.
---------------------------------------------
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05206507
*** IDM 4.5 SOAP Driver Version 4.0.0.4 ***
---------------------------------------------
Abstract: Patch update for the Novell Identity Manager SOAP driver. The patch will take the driver version to 4.0.0.4. You must have IDM 4.0.2 or later to use this driver. Document ID: 5251690Security Alert: YesDistribution Type: Field Test FileEntitlement Required: NoFiles:IDM45_SOAP_4004.zip (161.66 kB)Products:Identity Manager 4.5Superceded Patches:IDM 4.5 SOAP Driver Version 4.0.0.3
---------------------------------------------
https://download.novell.com/Download?buildid=95cHErCKIOQ~
*** F5 Security Advisory: libssh2 vulnerability CVE-2016-0787 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/21/sol21531693.html?ref=rss
*** F5 Security Advisory: TMM vulnerability CVE-2016-5023 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/19/sol19784568.html?ref=rss
*** VU#332115: D-Link routers contain buffer overflow vulnerability ***
---------------------------------------------
Vulnerability Note VU#332115 D-Link routers contain buffer overflow vulnerability Original Release date: 11 Aug 2016 | Last revised: 11 Aug 2016 Overview D-Link DIR routers contain a stack-based buffer overflow vulnerability, which may allow a remote attack to execute arbitrary code. Description CWE-121: Stack-based Buffer Overflow - CVE-2016-5681A stack-based buffer overflow occurs in the function within the cgibin binary which validates the session cookie.This function is used by a service...
---------------------------------------------
http://www.kb.cert.org/vuls/id/332115
*** Rockwell Automation MicroLogix 1400 SNMP Credentials Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a privileged simple network management protocol vulnerability in Rockwell Automation's MicroLogix 1400 programmable logic controllers.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-224-01
*** DSA-3646 postgresql-9.4 - security update ***
---------------------------------------------
Several vulnerabilities have been found in PostgreSQL-9.4, a SQLdatabase system.
---------------------------------------------
https://www.debian.org/security/2016/dsa-3646
*** FortiVoice 5.0 Filter Bypass & Persistent Web Vulnerabilities ***
---------------------------------------------
A vulnerablity in FortiVoice 5.0 web-application could allow malicious script being injected in the affected module; this potentially enables XSS attacks.
---------------------------------------------
http://fortiguard.com/advisory/fortivoice-5-0-filter-bypass-persistent-web-vulnerabilities
*** Cisco Aironet 1800, 2800, and 3800 Series Access Point Platforms ARP Request Handling Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability exists in Cisco Access Point (AP) platforms when processing Address Resolution Protocol (ARP) packets that could allow an unauthenticated, adjacent attacker to inject crafted entries into the ARP table and eventually cause a reload of the affected device.The vulnerability is due to improper processing of illegal ARP packets. An attacker could exploit this vulnerability by sending crafted ARP packets to be processed by an affected device. An exploit could allow the attacker to...
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160608-aironet
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager for Web is affected by vulnerabilities in OpenSSL ***
http://www.ibm.com/support/docview.wss?uid=swg21987903
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affects IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2109, CVE-2016-2176). ***
http://www-01.ibm.com/support/docview.wss?uid=swg21988350
---------------------------------------------
*** IBM Security Bulletin: Multiple security vulnerabilities have been identified in WebSphere Application Server and bundling products shipped with IBM Cloud Orchestrator (CVE-2016-3426, CVE-2016-3427) ***
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000178
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager for Mobile is affected by vulnerabilities in OpenSSH (CVE-2016-3115, CVE-2016-1908) ***
http://www.ibm.com/support/docview.wss?uid=swg21987636
---------------------------------------------
*** IBM Security Bulletin: IBM Security Access Manager for Web is affected by vulnerabilities in OpenSSH (CVE-2016-3115, CVE-2016-1908) ***
http://www.ibm.com/support/docview.wss?uid=swg21987638
---------------------------------------------
*** IBM Security Bulletin: IBM Netezza SQL Extensions is vulnerable to an OpenSource PCRE Vulnerability (CVE-2016-1283, CVE-2016-3191) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985982
---------------------------------------------
Next End-of-Shift report: 2016-08-16
More information about the Daily
mailing list