[CERT-daily] Tageszusammenfassung - 07.03.2018

Daily end-of-shift report team at cert.at
Wed Mar 7 18:57:09 CET 2018


=====================
= End-of-Day report =
=====================

Timeframe:   Dienstag 06-03-2018 18:00 − Mittwoch 07-03-2018 18:00
Handler:     Nina Bieringer
Co-Handler:  Robert Waldner

=====================
=       News        =
=====================

∗∗∗ Encryption 101: How to break encryption ∗∗∗
---------------------------------------------
Continuing on in our Encryption 101 series, where we gave a malware analyst’s primer on encryption and demonstrated encryption techniques using ShiOne ransomware, we now look at what it takes to break an encryption. In order for something as powerful as encryption to break, there needs to be some kind of secret flaw. That flaw is often a result of an error in implementation.
---------------------------------------------
https://blog.malwarebytes.com/threat-analysis/2018/03/encryption-101-how-to-break-encryption/



=====================
=  Vulnerabilities  =
=====================

∗∗∗ Google Releases Security Update for Chrome ∗∗∗
---------------------------------------------
Google has released Chrome version 65.0.3325.146 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to obtain access to sensitive information.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/03/06/Google-Releases-Security-Update-Chrome


∗∗∗ DFN-CERT-2018-0444/">Citrix NetScaler Application Delivery Controller, Citrix NetScaler Gateway: Mehrere Schwachstellen ermöglichen u.a. die Übernahme des Systems ∗∗∗
---------------------------------------------
Eine Schwachstelle in Citrix VPX ermöglicht einem entfernten, einfach authentisierten Angreifer die Ausführung beliebigen Programmcodes und damit letztlich die Übernahme des Systems. Weitere Schwachstellen ermöglichen einem entfernten, vermutlich nicht authentisierten Angreifer das Ausspähen beliebiger Dateien, die Eskalation von Privilegien sowie einen Cross-Site-Scripting (XSS)-Angriff.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2018-0444/


∗∗∗ FortiWebs cookie tampering protection can be bypassed by erasing the FortiWeb session cookie ∗∗∗
---------------------------------------------
FortiWeb 5.6.0 introduced a feature called "Signed Security Mode", which, when enabled, would prevent an attacker from tampering with "regular" cookies set by the web-sites protected by FortiWeb; in effect, access to the protected web-site can be blocked when cookie tampering is detected (depending on the "Action" selected by the FortiWeb admin).This protection can however be made inoperant if the attacker removes FortiWebs own session cookie.
---------------------------------------------
http://fortiguard.com/psirt/FG-IR-17-279


∗∗∗ RSA Archer eGRC Bugs Let Remote Users Redirect Users to an Arbitrary Site and Let Remote Authenticated Users Obtain Username Information ∗∗∗
---------------------------------------------
A remote authenticated user can exploit an access control flaw in an API to determine valid usernames on the target system [CVE-2018-1219].
A remote user can exploit a flaw in the QuickLinks feature to redirect the target user to an arbitrary site [CVE-2018-1220].
---------------------------------------------
http://www.securitytracker.com/id/1040457


∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (python-django and python2-django), Debian (leptonlib), Fedora (bugzilla, cryptopp, electrum, firefox, freexl, glibc, jhead, libcdio, libsamplerate, libXcursor, libXfont, libXfont2, mingw-wavpack, nx-libs, php, python-crypto, quagga, sharutils, unzip, x2goserver, and xen), Gentoo (exim), openSUSE (cups, go1.8, ImageMagick, jgraphx, leptonica, openexr, tor, and wavpack), Red Hat (389-ds-base, java-1.7.1-ibm, kernel, kernel-rt, libreoffice, and
---------------------------------------------
https://lwn.net/Articles/748741/


∗∗∗ Hirschmann Automation and Control GmbH Classic Platform Switches ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01


∗∗∗ Schneider Electric SoMove Software and DTM Software Components ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-065-02


∗∗∗ Eaton ELCSoft ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-065-03


∗∗∗ Security Advisory - Information Leak Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180307-01-phone-en


∗∗∗ Security Advisory - Permission Control Vulnerability in Huawei Video Application ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180307-01-hicinema-en


∗∗∗ Security Advisory - Authentication Bypass Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180307-01-smartphone-en


∗∗∗ IBM Security Bulletin: Information disclosure in WebSphere Application Server Admin Console (CVE-2017-1741) ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22012342


∗∗∗ IBM Security Bulletin: Vulnerability in IBM WebSphere Application Server Affects IBM Emptoris Sourcing, IBM Emptoris Contract Management, IBM Emptoris Spend Analysis, IBM Emptoris Program Management and IBM Emptoris Service Procurement ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22014257

-- 
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily




More information about the Daily mailing list