=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 03-07-2013 18:00 − Donnerstag 04-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Alstom Grid S1 Agile Improper Authorization ***
---------------------------------------------
This advisory provides mitigation details for a vulnerability affecting the Alstom Grid MiCOM S1 Agile and S1 Studio Software.Note: Alstom Grid MiCOM S1 Studio Software is its own software suite. A user could have MiCOM S1 Studio Software from a different vendor. This advisory only addresses the Alstom software product.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-184-01
*** Security Bulletin: IBM Business Process Manager (BPM) Vulnerable URLs (CVE-2013-0581) ***
---------------------------------------------
When a dashboard is opened or a service is executed, a malicious attacker can intercept network requests from the client. Then, the attacker can modify the URL parameters of the request so that malicious code can be executed within the client browser. CVE(s): CVE-2013-0581 Affected product(s) and affected version(s): IBM Business Process Manager Standard Versions 7.5.1.x, 8.0.0.x, 8.0.1.x IBM Business Process Manager Express Versions 7.5.1.x,8.0.0.x, 8.0.1.x IBM Business Process Manager
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm…
*** Deceptive ads targeting German users lead to the W32/SomotoBetterInstaller Potentially Unwanted Application (PUA) ***
---------------------------------------------
By Dancho Danchev We've just intercepted yet another campaign serving deceptive ads, this time targeting German-speaking users into downloading and installing the privacy-invading "FLV Player" Potentially Unwanted Application (PUA), part of Somoto's pay-per-install network. More details: ...
---------------------------------------------
http://blog.webroot.com/2013/07/03/deceptive-ads-targeting-german-users-lea…
*** IBM AIX TFTP RBAC Bug Lets Remote Authenticated Users Read and Overwrite Root-Owned Files ***
---------------------------------------------
A vulnerability was reported in IBM AIX. A remote authenticated user can read and overwrite files on the target system with root privileges.
---------------------------------------------
http://www.securitytracker.com/id/1028728
*** Androids Code-Signatur lässt sich umgehen ***
---------------------------------------------
Ein junges US-Sicherheitsunternehmen will einen Android-Fehler entdeckt haben, der das Einschleusen beliebigen Codes in signierte App-Pakete erlaubt, ohne die Signatur zu brechen.
---------------------------------------------
http://www.heise.de/security/meldung/Androids-Code-Signatur-laesst-sich-umg…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 02-07-2013 18:00 − Mittwoch 03-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cybercriminals experiment with Tor-based C&C, ring-3-rootkit empowered, SPDY form grabbing malware bot ***
---------------------------------------------
By Dancho Danchev Keeping in pace with the latest and most widely integrated technologies, with the idea to abuse them in a fraudulent/malicious way, is an everyday reality in today’s cybercrime ecosystem that continues to be over-supplied with modified and commoditized malicious software. This is achieved primarily through either leaked source code or a slightly different set of 'common'...
---------------------------------------------
blog.webroot.com/2013/07/02/cybercriminals-experiment-with-tor-based-cc-rin…
*** DSA-2718 wordpress ***
---------------------------------------------
Several vulnerabilities were identified in WordPress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the wordpress package to the latest upstream version instead of backporting the patches.
This means extra care should be taken when upgrading, especially when using third-party plugins or themes, since compatibility may have been impacted along the way. We recommend that users check their install before doing the upgrade.
---------------------------------------------
http://www.debian.org/security/2013/dsa-2718
*** Apple Mac OS X Multiple Vulnerabilities ***
---------------------------------------------
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.
The vulnerabilities are caused due to a bundled version of QuickTime.
---------------------------------------------
https://secunia.com/advisories/54049
*** Vulnerabilities in multiple WordPress Plugins ***
---------------------------------------------
https://secunia.com/advisories/52958https://secunia.com/advisories/54018https://secunia.com/advisories/54035https://secunia.com/advisories/54048
*** Vuln: Multiple Vendors Multiple EAS Devices Private SSH Key Information Disclosure Vulnerability ***
---------------------------------------------
Multiple Vendors Multiple EAS Devices are prone to an information-disclosure vulnerability.
Remote attackers can exploit this issue to gain access to the root SSH private key.
---------------------------------------------
http://www.securityfocus.com/bid/60810
*** Vuln: ansible paramiko_ssh.py Security Bypass Vulnerability ***
---------------------------------------------
ansible is prone to a security-bypass vulnerability.
An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions.
---------------------------------------------
http://www.securityfocus.com/bid/60869
*** Rampant Apache website attack hits visitors with highly malicious software ***
---------------------------------------------
Darkleech is back. Or maybe it never left. Either way, its a growing problem.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/e7uQIRcAY78/
*** Bugtraq: Multiple Vulnerabilities in OpenX ***
---------------------------------------------
High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in OpenX, which can be exploited to execute arbitrary PHP code, perform Cross-Site Scripting (XSS) attacks and compromise vulnerable system.
---------------------------------------------
http://www.securityfocus.com/archive/1/527051
*** Sony Multiple Network Cameras Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in multiple Sony Network Cameras, which can be exploited by malicious people to conduct cross-site forgery attacks.
The device allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. create a user with administrative privileges when a logged-in administrative user visits a specially crafted web page.
---------------------------------------------
https://secunia.com/advisories/53758
*** MachForm Form Maker 2 view.php file upload ***
---------------------------------------------
MachForm Form Maker2 could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions by the view.php script. By sending a specially-crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious PHP script, which could allow the attacker to execute arbitrary PHP code on the vulnerable system.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85386
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 01-07-2013 18:00 − Dienstag 02-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Bugtraq: [SECURITY] CVE-2013-1777: Apache Geronimo 3 RMI classloader exposure ***
---------------------------------------------
A misconfigured RMI classloader in Apache Geronimo 3.0 may enable an attacker to send a serialized object via JMX that could compromise the system.
---------------------------------------------
http://www.securityfocus.com/archive/1/527022
*** Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities ***
---------------------------------------------
Topic: Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities Risk: Low Text:Barracuda SSL VPN 680Vx 2.3.3.193 Multiple Script Injection Vulnerabilities Vendor: Barracuda Networks, Inc. Product web ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013070014
*** Hackers Aggressively Scanning ICS, SCADA Default Credentials, Vulnerabilities ***
---------------------------------------------
Attacks against industrial control systems and SCADA equipment are progressing beyond automated scans for vulnerabilities or default credentials hitting honeypots, and are leading to service disruptions.
---------------------------------------------
http://threatpost.com/hackers-aggressively-scanning-ics-scada-default-crede…
*** Bugtraq: Linksys EA - 2700, 3500, 4200, 4500 w/ Lighttpd 1.4.28 Unauthenticated Remote Administration Access ***
---------------------------------------------
- Unauthenticated remote access to all pages of the router
administration GUI, bypassing any credential prompts under certain
common configurations (see below)
- Direct access to several other critical files, unauthenticated as well
---------------------------------------------
http://www.securityfocus.com/archive/1/527027
*** Symantec Security Information Manager Console Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in Symantec Security Information Manager, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to disclose sensitive information and conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53990
*** IBM Rational Automation Framework Java JSSE Denial of Service Vulnerability ***
---------------------------------------------
IBM has acknowledged a vulnerability in IBM Rational Automation Framework, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54034
*** IBM Sterling B2B Integrator / IBM Sterling File Gateway Multiple Vulnerabilities ***
---------------------------------------------
Multiple vulnerabilities have been reported in IBM Sterling B2B Integrator and IBM Sterling File, where one has an unknown impact and others can be exploited by malicious users to conduct SQL injection attacks, disclose certain sensitive information, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53850
*** HPSBHF02888 rev.1 - HP ProCurve, H3C, 3COM Routers and Switches, Remote Information Disclosure and Code Execution ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP, 3COM, and H3C routers and switches. The vulnerabilities could be remotely exploited resulting in disclosure of information and execution of code.
---------------------------------------------
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Cisco TC Software SIP Implementation Error May Affect Communications Integrity ***
---------------------------------------------
A vulnerability in the Session Initiation Protocol (SIP) implementation used in TC Software could allow an unauthenticated, remoteattacker to cause an endpoint to process unintended SIP NOTIFY messages.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
*** TRENDnet Multiple Products Security Bypass Security Issue ***
---------------------------------------------
A security issue has been reported in multiple TRENDnet products, which can be exploited by malicious users to bypass certain security restrictions.
---------------------------------------------
https://secunia.com/advisories/53926
*** HTTPS Side-Channel Attack A Tool For Encrypted Secret Theft ***
---------------------------------------------
Researchers to release details on how SSL vulnerability gives attackers ability to steal everything from OAuth tokens to PII through an enterprise app in just 30 seconds.
---------------------------------------------
http://www.darkreading.com/vulnerability/https-side-channel-attack-a-tool-f…
*** IBM Storwize V7000 Unified Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Storwize V7000 Unified, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/54036
*** HP-UX update for Java ***
---------------------------------------------
HP has issued an update for Java in HP-UX. This fixes multiple vulnerabilities which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53999https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** Fortinet FortiOS (FortiGate) Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Fortinet FortiOS (FortiGate), which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53996
*** Hacker Holes in Server Management System Allows ‘Almost-Physical’ Access ***
---------------------------------------------
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out. The vulnerabilities exist in more than 100,000 servers connected ...
---------------------------------------------
http://www.wired.com/threatlevel/2013/07/ipmi/
*** HP-UX update for Apache with Tomcat Servlet Engine ***
---------------------------------------------
HP has issued an update for Apache with Tomcat Servlet Engine. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53989
*** Alcatel-Lucent OmniTouch Multiple Products Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been reported in multiple Alcatel-Lucent OmniTouch products, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/54000
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-06-2013 18:00 − Montag 01-07-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** How cybercriminals create and operate Android-based botnets ***
---------------------------------------------
By Dancho Danchev On their way to acquire the latest and coolest Android game or application, end users with outdated situational awareness on the latest threats facing them often not only undermine the confidentiality and integrity of their devices, but also, can unknowingly expose critical business data to the cybercriminals who managed to infect their...
---------------------------------------------
http://blog.webroot.com/2013/06/28/how-cybercriminals-create-and-operate-an…
*** Fortigate Firewall Cross Site Request Forgery ***
---------------------------------------------
Topic: Fortigate Firewall Cross Site Request Forgery Risk: Low Text:Vulnerability ID: CVE-2013-1414 Vulnerability Type: CSRF (Cross-Site Request Forgery) Product: All Fortigate Firewalls Vendo...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060241
*** Several Flaws Discovered in ZRTPCPP Library Used in Secure Phone Apps ***
---------------------------------------------
A security researcher has uncovered a number of serious vulnerabilities in one of the core security components of several secure telephony applications, including the Silent Circle system developed by PGP creator Phil Zimmermann.
---------------------------------------------
http://threatpost.com/several-flaws-discovered-in-zrtpcpp-library-used-in-s…
*** NIST Cybersecurity Framework, (Sun, Jun 30th) ***
---------------------------------------------
The NIST has published a voluntary framework to reduce cyber risk to critical infrastructure as a result of a directive inside the Presidents execute order for improving critical infrastructure cybersecurity. The core of this framework is composed of a function matrix and a framework implementation level matrix. The function matrix contains the five top-level cybersecurity functions, which are: Know: Gaining the institutional understanding to identify what systems need to be protected,...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16093
*** Backdoor Discovered In Atlassian Crowd ***
---------------------------------------------
An anonymous reader writes "Recently published on the Command Five website is a technically detailed threat advisory (PDF) in relation to a recurring vulnerability in Atlassian Crowd. Tucked away inconspicuously at the end of this document in a section entitled Unpatched Vulnerabilities is the real security bombshell: Atlassians turnkey solution for enterprise single sign-on and secure user authentication contains an unpatched backdoor. The backdoor allows anyone to remotely take full...
---------------------------------------------
http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlass…
*** Xorbin Multiple Products "widgetUrl" Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability has been discovered in multiple Xorbin products, which can be exploited by malicious people to conduct cross-site scripting attacks.
---------------------------------------------
https://secunia.com/advisories/53979
*** IBM Tivoli Composite Application Manager for Transactions OpenSSL Multiple Vulnerabilities ***
---------------------------------------------
IBM has acknowledged multiple vulnerabilities in IBM Tivoli Composite Application Manager for Transactions, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/54029
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-06-2013 18:00 − Freitag 28-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Apache XML Security, which can be exploited by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53959
*** April-June 2013 ***
---------------------------------------------
The “ICS-CERT Monitor” newsletter offers a means of promoting preparedness, information sharing, and collaboration with the 16 critical infrastructure sectors. ICS‑CERT accomplishes this on a day-to-day basis through sector briefings, meetings, conferences, and information product releases.
---------------------------------------------
http://ics-cert.us-cert.gov/monitors/ICS-MM201306
*** Citadel Trojan Variant Delivers Localized Content, Targets Amazon Customers ***
---------------------------------------------
A new variant of the Citadel banking malware was discovered, this one delivering localized content for European targets that include not only banks but major ecommerce sites such as Amazon.
---------------------------------------------
http://threatpost.com/citadel-trojan-variant-delivers-localized-content-tar…
*** One-click/key attack forces IE and Chrome to execute malicious code ***
---------------------------------------------
Minimal user interaction increases chances that social engineering will succeed.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/siZrFBsO_0E/
*** Ruby Certificate Hostname Validation Flaw Lets Remote Users Spoof SSL Servers ***
---------------------------------------------
A vulnerability was reported in Ruby. A remote user can spoof SSL servers.
---------------------------------------------
http://www.securitytracker.com/id/1028714
*** Bugtraq: Mobile USB Drive HD 1.2 - Arbitrary File Upload Vulnerability ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the Mobile USB Drive HD v1.2 apple iOS application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526997
*** Bugtraq: eFile Wifi Transfer Manager 1.0 iOS - Multiple Vulnerabilities ***
---------------------------------------------
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the eFile Wifi Manager v1.0 iOS mobile application.
---------------------------------------------
http://www.securityfocus.com/archive/1/526995
*** Bugtraq: Re: Re: EMC Avamar: World writable cache files ***
---------------------------------------------
Due to a vulnerability, described in detail below, the Avamar client leaves certain directories and files as world writable. The presence of world writable directories and files may inadvertently result in elevation of privileges by a user who has access to the local file system.
---------------------------------------------
http://www.securityfocus.com/archive/1/526996
*** Bugtraq: Barracuda CudaTel 2.6.02.04 - Multiple Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/526999http://www.securityfocus.com/archive/1/527000
*** Xerox WorkCube / Xerox ColorQube Unspecified Vulnerabilities ***
---------------------------------------------
Some vulnerabilities with an unknown impact have been reported in Xerox WorkCube and Xerox ColorQube.
---------------------------------------------
https://secunia.com/advisories/54005
*** Criminals sell access to rooted servers via online shop ***
---------------------------------------------
Researchers have discovered an online store where criminals sell access to hacked servers, another cautionary example of miscreants commercialization of stolen data.
---------------------------------------------
http://www.scmagazine.com//criminals-sell-access-to-rooted-servers-via-onli…
*** Cisco ASA Next-Generation Firewall Services Fragmented Traffic Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Cisco ASA Next-Generation Firewall Services, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53971
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 26-06-2013 18:00 − Donnerstag 27-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
*** Windows 8.1: Defender mit Verhaltenserkennung ***
---------------------------------------------
Mit dem kommenden Windows-Upgrade rüstet Microsoft zahlreiche Security-Features nach. Einige sind längst überfällig, andere innovativ. Auf der TechEd Europe ging das Unternehmen ins Detail.
---------------------------------------------
http://www.heise.de/security/meldung/Windows-8-1-Defender-mit-Verhaltenserk…
*** Styx Exploit Kit Takes Advantage of Vulnerabilities ***
---------------------------------------------
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits target vulnerabilities in popular applications and provide an effective way for cybercriminals to distribute malware. We have already discussed Red Kit, a common exploit kit. Recently McAfee Labs has observed an increase in the prevalence Read more...
---------------------------------------------
http://blogs.mcafee.com/mcafee-labs/styx-exploit-kit-takes-advantage-of-vul…
*** Attackers sign malware using crypto certificate stolen from Opera Software ***
---------------------------------------------
A "few thousand" users may have automatically installed malware signed by expired cert.
---------------------------------------------
http://arstechnica.com/security/2013/06/attackers-sign-malware-using-crypto…
*** Gezielter Phishing-Angriff auf Eset-Kunden ***
---------------------------------------------
Kunden des Antiviren-Software-Herstellers Eset erhalten momentan sehr gut gemachte Phishing-Mails, mit denen Kreditkartendaten geklaut werden sollen.
---------------------------------------------
http://www.heise.de/security/meldung/Gezielter-Phishing-Angriff-auf-Eset-Ku…
*** Analysis: Redirects in Spam ***
---------------------------------------------
We will look at the most popular spammer tricks that use redirects and the most widely used types of redirect.
---------------------------------------------
http://www.securelist.com/en/analysis/204792295/Redirects_in_Spam
*** Top 5 Fake Security Rogues of 2013 ***
---------------------------------------------
By Tyler Moffitt We see users on the internet getting infected with Rogue Security Malware all the time. In fact, it's one of the most common and obvious type of infections we see. The Rogues lock-down your computer and prevent you from opening any applications so you're forced to read their scam.
---------------------------------------------
http://blog.webroot.com/2013/06/27/top-5-fake-security-rogues-of-2013/
*** Magnolia CMS multiple security bypass ***
---------------------------------------------
Magnolia CMS could allow a remote attacker to bypass security restrictions, caused by improper verification of access permissions. An attacker could exploit this vulnerability by accessing and executing multiple administrative functionalities to bypass security and gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85252
*** Drupal 7.x Fast Permissions Administration Access bypass ***
---------------------------------------------
The Fast Permissions Administration module enables you to use inline filters on the permissions page, as well as loading the permissions form through a modal dialog. The module doesn't sufficiently check user access for the modal content callback, allowing unauthorized access to the permissions edit form.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060226
*** Bugtraq: HP-UX Running HP Secure Shell, Remote Denial of Service (DoS) ***
---------------------------------------------
Potential Security Impact: Remote Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
---------------------------------------------
http://www.securityfocus.com/archive/1/526986
*** Multiple Vulnerabilities in Cisco Web Security Appliance ***
---------------------------------------------
Cisco IronPort AsyncOS Software for Cisco Web Security Appliance is affected by the following vulnerabilities:
- Two authenticated command injection vulnerabilities
- Management GUI Denial of Service Vulnerability
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 25-06-2013 18:00 − Mittwoch 26-06-2013 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Cisco Linksys X3000 Router apply.cgi cross-site scripting ***
---------------------------------------------
Cisco Linksys X3000 Router is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the apply.cgi script. A remote attacker could exploit this vulnerability using the...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85186
*** Vast majority of malware attacks spawned from legit sites ***
---------------------------------------------
Drive-by attacks not just from porn and warez sites, new Google data shows.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/_ndPPR-K7Z4/
*** Google adds malware, phishing to transparency report to make the Web safer ***
---------------------------------------------
The data come from the companys Safe Browsing technology, which flags up to 10,000 sites daily
---------------------------------------------
http://www.csoonline.com/article/735463/google-adds-malware-phishing-to-tra…
*** Forticlient VPN client credential interception vulnerability ***
---------------------------------------------
Topic: Forticlient VPN client credential interception vulnerability Risk: Medium Text:FORTICLIENT VPN CLIENT CREDENTIAL INTERCEPTION VULNERABILITY == Description -- The Fortinet FortiClient ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060220
*** aSc TimeTables Add Subject buffer overflow ***
---------------------------------------------
aSc TimeTables is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Add Subject functionality. A remote authenticated attacker could exploit this vulnerability using a...
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85199
*** IBM OpenPages GRC Platform Multiple Java Vulnerabilities ***
---------------------------------------------
Where: From remote
Impact: Spoofing, Manipulation of data, Exposure of sensitive information, DoS, System access
Solution Status: Unpatched
---------------------------------------------
https://secunia.com/advisories/53962
*** Bugtraq: [SECURITY] [DSA 2716-1] iceweasel security update ***
---------------------------------------------
Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser: Multiple memory safety errors,...
The iceweasel version in the oldstable distribution (squeeze) is no
longer supported with security updates.
---------------------------------------------
http://www.securityfocus.com/archive/1/526973
*** Apache Qpid Python Client SSL Certificate Verification Security Issue ***
---------------------------------------------
A security issue has been reported in Apache Qpid, which can be exploited by malicious people to conduct spoofing attacks.
---------------------------------------------
https://secunia.com/advisories/53968
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 24-06-2013 18:00 − Dienstag 25-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Latest Pushdo Variants Challenge Antimalware Solution ***
---------------------------------------------
Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other tricks. However, hiding the network traffic specifically from monitoring outside an infected computer is not an easy task, but is something that the botnet creators have improved through the years.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/latest-pushdo-va…
*** Backdoor in Backup-Servern von HP ***
---------------------------------------------
Einem Hacker zufolge besitzt die Software auf den Backup-Systemen der Serie "StoreOnce" von HP eine Hintertür. Zur Ausnutzung der Lücke soll ein SSH-Zugang ausreichen.
---------------------------------------------
http://www.heise.de/security/meldung/Backdoor-in-Backup-Servern-von-HP-1895…
*** Raspberry Pi bot tracks hacker posts to vacuum up passwords and more ***
---------------------------------------------
Dumpmon scours Twitter for sensitive data hiding in plain site.
---------------------------------------------
http://arstechnica.com/security/2013/06/raspberry-pi-bot-tracks-hacker-post…
*** Trend Micro turns RAT catcher as Taiwan cops cuff hacker ***
---------------------------------------------
Ghost RAT attacks hit thousands on the island... Security vendor Trend Micro has embiggened its industry collaboration credentials this week after helping Taiwanese police arrest one man in connection with a widespread targeted attack, and teaming up with Interpol on a new cyber crime prevention centre.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2013/06/25/trend_micro…
*** SIP-based API-supporting fake caller ID/SMS number supporting DIY Russian service spotted in the wild ***
---------------------------------------------
By Dancho Danchev One of the most common myths regarding the emerging TDoS (Telephony Denial of Service) market segment, portrays a RBN (Russian Business Network) type of bulletproof infrastructure used to launch these attacks. The infrastructure's speculated resilience is supposed to be acting as a foundation for the increase of TDoS services and products.
---------------------------------------------
http://blog.webroot.com/2013/06/25/sip-based-api-supporting-fake-caller-ids…
*** Scam Sites Now Selling Instagram Followers ***
---------------------------------------------
Another scam site is offering to increase a user's Instagram followers. Unlike previous attacks, however, these sites require payment with the amount depending on the number of followers you prefer. Figure 1. Pricelist for Instagram followers Despite the sitess liberal use of the Instagram logo, it has nothing to do with the service.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/scam-sites-now-s…
*** Download me - Saying "yes" to the Web's most dangerous search terms ***
---------------------------------------------
Seeking "free games" and getting burned by illicit downloads is so 2008, right?
---------------------------------------------
http://arstechnica.com/information-technology/2013/06/download-me-saying-ye…
*** LG-Smartphones: Root-Zugriff durch Backup-Programm ***
---------------------------------------------
Android-Smartphones der Firma LG können durch Sicherheitslücken in ihrer vorinstallierten Backup-Software manipuliert werden.
---------------------------------------------
http://www.heise.de/security/meldung/LG-Smartphones-Root-Zugriff-durch-Back…
*** Carberp Source Code Leaked ***
---------------------------------------------
The source code for the Carberp Trojan, which typically sells for $40,000 on the underground, has been leaked and is now available to anyone who wants it. The leak has echoes of the release of the Zeus crimeware source code a couple of years ago and has security researchers concerned that it may lead to [...]
---------------------------------------------
http://threatpost.com/carberp-source-code-leaked/
*** Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ***
---------------------------------------------
A security issue and a vulnerability have been reported in the Login Security module for Drupal, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53717
*** cURL/libcURL curl_easy_unescape() function buffer overflow ***
---------------------------------------------
cURL/libcURL is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the curl_easy_unescape() function in lib/escape.c. While decoding URL encoded strings to raw binary data, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85180
*** MoinMoin twikidraw Action Traversal File Upload ***
---------------------------------------------
This module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files.
---------------------------------------------
http://www.exploit-db.com/exploits/26422
*** [2013-06-25] Multiple vulnerabilities in IceWarp Mail Server ***
---------------------------------------------
IceWarp Mail Server is vulnerable to reflected Cross-Site Scripting and XXE Injection attacks. By exploiting the XXE vulnerability, an unauthenticated attacker can get read access to the filesystem of the IceWarp Mail Server host and thus obtain sensitive information such as the configuration files.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2013…
*** Stream Video Player plugin for WordPress cross site request forgery ***
---------------------------------------------
Stream Video Player plugin for WordPress is vulnerable to an unspecified cross-site request forgery. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify plugin settings and perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85155
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 21-06-2013 18:00 − Montag 24-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Otmar Lendl
*** Tausende Domains ***
---------------------------------------------
Die Adressen verschiedener Dienste wie LinkedIn, Yelp oder Fidelity wurden durch einen menschlichen Fehler für mehrere Stunden auf andere Webseiten umgeleitet. Cisco geht von 5000 betroffenen Domains aus.
---------------------------------------------
http://www.heise.de/security/meldung/Tausende-Domains-1894195.html
*** Dirt Jumper DDoS Variant Drive 'Much More Powerful' Than Predecessors ***
---------------------------------------------
A variant of the Dirt Jumper DDoS engine called Drive has been detected. Drive includes new capabilities and has already targeted a number popular destinations on the Internet.
---------------------------------------------
http://threatpost.com/dirt-jumper-ddos-variant-drive-much-more-powerful-tha…
*** Security Bulletin: WebSphere Commerce Java API Documentation Frame Injection Vulnerability (CVE-2013-1571) ***
---------------------------------------------
Java API Documentation contains a frame injection vulnerability.
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_web…
*** WordPress Maintenance Mode Plugin Cross-site request forgery vulnerability ***
---------------------------------------------
WordPress Maintenance Mode Plugin Cross-site request forgery vulnerability
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85146
*** Adobe Flash spoof leads to infectious audio ads ***
---------------------------------------------
We've seen quite a few audio ads infecting users recently. We think it's a good idea to go over an in-depth look at how they infect your computer and how to remediation them. As you can see in this first picture, this is another Adobe Flash spoof that launches its signature update window.
---------------------------------------------
http://blog.webroot.com/2013/06/21/adobe-flash-spoof-leads-to-infectious-au…
*** Device-disabling Fake AV migrates to Android phones, demands ransom ***
---------------------------------------------
Long the bane of computer users, Fake antivirus may extort Android owners, too.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/esDZHzGloyI/
*** Google Translate Cross Site Request Forgery ***
---------------------------------------------
1)Vulnerability Description
I discovered a new CSRF vulnerability on translate.google.com web site which could allow an attacker to insert items (Words/Phrases/Urls and related translations) into the user's Phrasebook. Furthermore an attacker could also inserta potentially malicious Urls - into the
above mentioned Phrasebook - towards which the victim could be redirected simply clicking on the "Go to <website>" right-click option on translate.google.com.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060181
*** McAfee ePolicy Orchestrator 4.6.5 SQL injection & directory traversal ***
---------------------------------------------
Main Features:
Remote command execution on the ePo server.
Remote command execution on the Managed stations (one ring to rule them all).
File upload on the ePo server.
Active Directory credentials stealing.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060183
*** Datenpanne bei Facebook ***
---------------------------------------------
Nicht-öffentliche Telefonnummern und E-Mai-Adressen von ungefähr sechs Millionen Facebook-Usern wurden fälschlich an andere Facebook-Nutzer weitergegeben.
---------------------------------------------
http://www.heise.de/security/meldung/Datenpanne-bei-Facebook-1894855.html
*** Vuln: HAProxy CVE-2013-2175 Multiple Denial of Service Vulnerabilities ***
---------------------------------------------
HAProxy is prone to multiple denial-of-service vulnerabilities.
Exploiting these issues allow remote attackers to trigger denial-of-service conditions.
---------------------------------------------
http://www.securityfocus.com/bid/60588
*** Is SSH no more secure than telnet?, (Sun, Jun 23rd) ***
---------------------------------------------
In SSHs default (and most common) deployment: Yes. It is no more secure than telnet, but it can be better. Apologies to Ian Betteridge If you ask any sysadmin, they say that SSH is more secure than telnet, and theyll likely comment that opening telnet up to the Internet is reckless. One can simulate asking general opinion with a little googling: "ssh is more secure than telnet": 11,500 "telnet is more secure than ssh": 81 So, the Conventional Wisdom is that
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=16049&rss
*** ZPanel 10.0.0.2 htpasswd Module Username Command Execution ***
---------------------------------------------
This module exploits a vulnerability found in ZPanel's htpasswd module. When creating .htaccess using the htpasswd module, the username field can be used to inject system commands, which is passed on to a system() function for executing the system's htpasswd's command.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060193
*** Bugtraq: Linksys X3000 - Multiple Vulnerabilities ***
---------------------------------------------
The vulnerability is caused by missing input validation in the ping_ip parameter and can be exploited to inject and execute arbitrary shell commands.
You need to be authenticated to the device or you have to find other methods for inserting the malicious commands.
---------------------------------------------
http://www.securityfocus.com/archive/1/526945
*** Wordpress: Update schließt zwölf Sicherheitslücken ***
---------------------------------------------
Mit dem Update auf Version 5.3.2 schließt Wordpress Schwachstellen, die mit Cross-Site-Scripting, Server-Side-Request-Forgery- und Denial-of-Service-Attacken ausgenutzt werden können.
---------------------------------------------
http://www.heise.de/security/meldung/Wordpress-Update-schliesst-zwoelf-Sich…
*** Beware Of HTML5 Development Risks ***
---------------------------------------------
Local storage is a big change from HTML of the past, where browsers could only use cookies to store small bits of information, such as session tokens, for managing identity. HTML5 changes this with sessionStorage, localStorage, and client-side databases to allow developers to store vast amounts of data in the browser that is all accessible from JavaScript.
---------------------------------------------
http://www.darkreading.com/applications/beware-of-html5-development-risks/2…
*** Apple Phishing Scams on the Rise ***
---------------------------------------------
Apple has one of the more gilded consumer brands and the company spends a lot of time and money to keep it that way. Consumers love Apple. Scammers and attackers do too, though, and security researchers in recent months have seen a major spike in the volume of phishing emails abusing Apple's brand, most of which are focused on stealing users' Apple IDs and payment information.
---------------------------------------------
https://threatpost.com/apple-phishing-scams-on-the-rise/
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 20-06-2013 18:00 − Freitag 21-06-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Stephan Richter
*** Common Web Vulnerabilities Plague Top WordPress Plug-Ins ***
---------------------------------------------
Top WordPress plug-ins and themes remain vulnerable to common Web-based attacks such as cross-site scripting and SQL injection.
---------------------------------------------
http://threatpost.com/common-web-vulnerabilities-plague-top-wordpress-plug-…
*** New E-Shop sells access to thousands of malware-infected hosts, accepts Bitcoin ***
---------------------------------------------
By Dancho Danchev Thanks to the buzz generated over the widespread adoption of the decentralized P2P based E-currency, Bitcoin, we continue to observe an overall increase in international underground market propositions that accept it as means for fellow cybercriminals to pay for the goods/services that they want to acquire.
---------------------------------------------
http://blog.webroot.com/2013/06/20/new-e-shop-sells-access-to-thousands-of-…
*** Trojan.APT.Seinup Hitting ASEAN ***
---------------------------------------------
The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.
---------------------------------------------
http://www.fireeye.com/blog/technical/malware-research/2013/06/trojan-apt-s…
*** PoisonIvy Uses Legitimate Application as Loader ***
---------------------------------------------
I recently obtained a PoisonIvy sample which uses a legitimate application in an effort to stay under the radar. In this case, the PoisonIvy variant detected as BKDR_POISON.BTA (named as newdev.dll) took advantage of a technique known as a DLL preloading attack (aka binary planting) instead of exploiting previously known techniques. The malware was located [...]
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/C9_ZJyLJ1YA/
*** WordPress Slash WP theme XSS and Content Spoofing vulnerabilities ***
---------------------------------------------
Topic: WordPress Slash WP theme XSS and Content Spoofing vulnerabilities Risk: Low Text:I want to warn you about multiple vulnerabilities in Slash WP theme for WordPress. This is commercial theme for WP. These ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013060173
*** BSI nimmt WordPress, Typo3 & Co. unter die Security-Lupe ***
---------------------------------------------
Das Bundesamt für Sicherheit in der Informationstechnologie hat im Rahmen einer Studie das Sicherheitsniveau der gängigen Content Management Systeme analysiert. Die Gefahr geht demnach zu bis zu 95 Prozent von Add-Ons aus.
---------------------------------------------
http://www.heise.de/security/meldung/BSI-nimmt-WordPress-Typo3-Co-unter-die…
*** Login Security module for Drupal soft blocking security bypass ***
---------------------------------------------
Login Security module for Drupal could allow a remote attacker to bypass security restrictions, caused by incorrect use of string filtering. When the soft blocking option is disabled, an attacker could exploit this vulnerability to gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85135
*** OpenStack python-keystoneclient memcache signing/encryption security bypass ***
---------------------------------------------
OpenStack python-keystoneclient could allow a remote attacker to bypass security restrictions, caused by an error in the memcache signing/encryption feature. An attacker could exploit this vulnerability by inserting malicious data to the memcache backend to bypass security and gain unauthorized access to the vulnerable application.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/85139
*** Is Hotel WiFi Secure? ***
---------------------------------------------
When you check in to a hotel, you assume that the company will keep you and your valuables safe by not sharing your room keys and providing a safe for your belongings. But a much greater threat could be lurking in your rented room - the free WiFi connection that most lodging providers offer.
---------------------------------------------
http://blog.hotspotshield.com/2013/06/17/hotel-wifi-security/
*** Avaya Aura Session Manager ISC BIND Record Handling Lockup Vulnerability ***
---------------------------------------------
Avaya has acknowledged a vulnerability in Avaya Aura Session Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).
---------------------------------------------
https://secunia.com/advisories/53906
*** Hitachi Cosminexus Products Oracle Java Multiple Vulnerabilities ***
---------------------------------------------
Hitachi has acknowledged multiple vulnerabilities in multiple Cosminexus products, which can be exploited by malicious, local users to disclose certain sensitive information, manipulate certain data, and gain escalated privileges and by malicious people to conduct spoofing attacks, disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
---------------------------------------------
https://secunia.com/advisories/53759
*** How to backdoor an encryption app ***
---------------------------------------------
Over the past week or so theres been a huge burst of interest in encryption software. Applications like Silent Circle and RedPhone have seen a major uptick in new installs. CryptoCat alone has seen a zillion new installs, prompting several infosec researchers to nearly die of irritation.
---------------------------------------------
http://blog.cryptographyengineering.com/2013/06/how-to-backdoor-encryption-…
*** Hackers and viruses now stalking smart phones ***
---------------------------------------------
Computer viruses have plagued consumers for many years now, causing companies to spend heavily on installing every kind of firewall known to mankind to keep their security software updated.
---------------------------------------------
http://www.nation.co.ke/oped/Opinion/Hackers-and-viruses-now-stalking-smart…
*** Buffalo WZR-HP-G300NH2 Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability has been reported in Buffalo WZR-HP-G300NH2, which can be exploited by malicious people to conduct cross-site request forgery attacks.
---------------------------------------------
https://secunia.com/advisories/53750
*** Oracle Solaris Multiple Vulnerabilities ***
---------------------------------------------
Oracle has acknowledged multiple vulnerabilities in multiple packages included in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to compromise an application using the library.
---------------------------------------------
https://secunia.com/advisories/53843