[CERT-daily] Tageszusammenfassung - 22.01.2019

Daily end-of-shift report team at cert.at
Tue Jan 22 18:17:17 CET 2019


=====================
= End-of-Day report =
=====================

Timeframe:   Montag 21-01-2019 18:00 − Dienstag 22-01-2019 18:00
Handler:     Dimitri Robl
Co-Handler:  Robert Waldner

=====================
=       News        =
=====================

∗∗∗ Remote Code Execution Bug Patched in APT Linux Package Manager ∗∗∗
---------------------------------------------
A remote code execution bug was discovered by security contractor Max Justicz in the APT high level package manager used by Debian, Ubuntu, and other related Linux distributions. The bug has been fixed today in the latest versions of APT.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/remote-code-execution-bug-patched-in-apt-linux-package-manager/


∗∗∗ Sicherheitsupdates: Adobe Experience Manager könnte Daten leaken ∗∗∗
---------------------------------------------
Adobe hat wichtige Patches für Experience Manager und Experience Manager Forms veröffentlicht. Keine Sicherheitslücke gilt als kritisch.
---------------------------------------------
http://heise.de/-4284723


∗∗∗ Gefälschte Apple Pay E-Mails im Umlauf ∗∗∗
---------------------------------------------
Internetnutzer/innen erhalten Rechnungen von Apple Pay. Darin werden Käufe aufgelistet, die nie stattgefunden haben. Um ein Problem zu melden, sollen Betroffene einem Link folgen, der auf eine gefälschte Support-Seite führt. Konsument/innen dürfen hier keine Daten angeben! Kriminelle versuchen fremde Apple-IDs zu stehlen.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-apple-pay-e-mails-im-umlauf/


∗∗∗ Kein Geld von Spar Kredit ∗∗∗
---------------------------------------------
Konsument/innen, die auf sparkredit.net einen Kredit beantragen, müssen dem Unternehmen persönliche Daten nennen und einen Meldezettel samt Personalausweis übermitteln. Sie erfahren, dass sie Vorschusszahlungen an Spar Kredit leisten müssen, bevor es zu einer Kreditauszahlung kommt. In Wahrheit erhalten Konsument/innen kein Geld und werden Opfer eines Identitätsdiebstahls.
---------------------------------------------
https://www.watchlist-internet.at/news/kein-geld-von-spar-kredit/


∗∗∗ DNS Flag Day am 01.02.2019 ∗∗∗
---------------------------------------------
Am Freitag, 01.02.2019 ist DNS Flag Day. Aber um welche "Flag" geht es hier? Ab diesem Tag wird eine Reihe großer DNS-Anbieter, darunter Google und Cloudflare, und alle großen Anbieter von opensource rekursiver DNS Software, darunter BIND und unbound, aufhören Workarounds einzusetzen, um mit Domains kommunizieren zu können, die den EDNS0 Standard (RFC 6891) nicht erfüllen.
---------------------------------------------
http://www.cert.at/services/blog/20190122154001-2371.html



=====================
=  Vulnerabilities  =
=====================

∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (apt and aria2), Fedora (kernel-headers, kernel-tools, and openssh), openSUSE (webkit2gtk3), Oracle (perl), Red Hat (perl), SUSE (freerdp, python-urllib3, systemd, and wireshark), and Ubuntu (apt, poppler, and tiff).
---------------------------------------------
https://lwn.net/Articles/777315/


∗∗∗ TYPO3 9.5.4 and 8.7.23 security releases published ∗∗∗
---------------------------------------------
https://typo3.org/article/typo3-954-and-8723-security-releases-published/


∗∗∗ IBM Security Bulletin: Financial Transaction Manager for Corporate Payment Services is affected by a potential directory listing of internal product files vulnerability (CVE-2018-2026) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-financial-transaction-manager-for-corporate-payment-services-is-affected-by-a-potential-directory-listing-of-internal-product-files-vulnerability-cve-2018-2026/


∗∗∗ IBM Security Bulletin: Financial Transaction Manager for Digital Payments is affected by a potential directory listing of internal product files vulnerability (CVE-2018-2026) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-financial-transaction-manager-for-digital-payments-is-affected-by-a-potential-directory-listing-of-internal-product-files-vulnerability-cve-2018-2026/


∗∗∗ IBM Security Bulletin: IBM MessageSight is affected by the following four IBM Java vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-messagesight-is-affected-by-the-following-four-ibm-java-vulnerabilities/


∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Rational Application Developer for WebSphere Software ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilities-in-ibm-java-sdk-affect-ibm-rational-application-developer-for-websphere-software-6/


∗∗∗ IBM Security Bulletin: Security Bulletin: IBM MessageSight is affected by an IBM WebSphere Liberty expression language vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-security-bulletin-ibm-messagesight-is-affected-by-an-ibm-websphere-liberty-expression-language-vulnerability/


∗∗∗ IBM Security Bulletin: IBM Security Key Lifecycle Manager uses Less Secure Algorithms ( CVE-2018-1751) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-key-lifecycle-manager-uses-less-secure-algorithms-cve-2018-1751/


∗∗∗ IBM Security Bulletin: BigFix Platform 9.5.x / 9.2.x affected by multiple vulnerabilities (CVE-2018-0732, CVE-2018-0737, CVE-2018-14618, CVE-2018-1000301) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-bigfix-platform-9-5-x-9-2-x-affected-by-multiple-vulnerabilities-cve-2018-0732-cve-2018-0737-cve-2018-14618-cve-2018-1000301/


∗∗∗ TYPO3-PSA-2019-001: Possible Arbitrary Code Execution in CommandUtility API ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2019-001/


∗∗∗ TYPO3-PSA-2019-002: Username and Email Address Enumeration ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2019-002/


∗∗∗ TYPO3-PSA-2019-003: Cross-Site Scripting in Flash component (ELTS) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2019-003/


∗∗∗ TYPO3-EXT-SA-2019-004: Object Injection in extension "mkmailer" (mkmailer) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2019-004/


∗∗∗ TYPO3-EXT-SA-2019-003: Multiple vulnerabilities in extension "femanager" (femanager) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2019-003/


∗∗∗ TYPO3-EXT-SA-2019-002: Multiple vulnerabilities in extension "typo3_forum" (typo3_forum) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2019-002/


∗∗∗ Linux kernel vulnerability CVE-2018-18710 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K11165942

-- 
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily




More information about the Daily mailing list