End-of-Shift report
Timeframe: Montag 13-05-2013 18:00 − Dienstag 14-05-2013 18:00
Handler: Matthias Fraidl
Co-Handler: Robert Waldner
It's official: Password strength meters aren't security theater
Does your password go up to 11? Probably not. But one day it could.
http://feeds.arstechnica.com/~r/arstechnica/security/~3/fbIJ27hOPLI/
Kerberos kpasswd UDP ping-pong vulnerability
Topic: Kerberos kpasswd UDP ping-pong vulnerability Risk: High
Text:This flaw has commonly been referred to as CVE-1999-0103 because that CVE also describes a UDP ping-pong attack. The same typ...
http://cxsecurity.com/wlb/WLB-2013050118
Vuln: Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
http://www.securityfocus.com/bid/59826
Telekom lanciert Cloud-Service zum Aufspüren von Sicherheitslücken
Mit dem Developer Garden Code Analyzer bietet die Deutsche Telekom eine Cloud-basierte statische Code-Analyse zum Finden von Sicherheitslücken in Web-Anwendungen und mobilen Apps.
http://www.heise.de/security/meldung/Telekom-lanciert-Cloud-Service-zum-Aufspueren-von-Sicherheitsluecken-1860980.html
Travnet Botnet Controls Victims With Remote Admin Tool
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more...
http://blogs.mcafee.com/mcafee-labs/travnet-botnet-controls-victims-with-remote-admin-tool
Vorsicht beim Skypen - Microsoft liest mit
Wer glaubt, ein Skype-Chat wäre privat, unterliegt einem unter Umständen folgenschweren Irrtum. Wie heise Security feststellten musste, wertet Skype beziehungsweise Microsoft alle verschickten Daten aus.
http://www.heise.de/security/meldung/Vorsicht-beim-Skypen-Microsoft-liest-mit-1857620.html
WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability
Charlie Eriksen has discovered a vulnerability in the Related Posts plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.
https://secunia.com/advisories/53122
AV-Software beseitigt Unrat des BKA-Trojaners
Nach einem Stupser durch heise Security und das BSI erkennen und entfernen Antiviren-Programme nun auch die nachgeladenen kinderpornographischen Bilder des BKA-Trojaners.
http://www.heise.de/security/meldung/AV-Software-beseitigt-Unrat-des-BKA-Trojaners-1862799.html
Back to skule: One Pad, Two Pad, Me Pad, You Pad - Cryptanalysis for beginners
A couple of weeks ago, Kev Sheldrake from Head Hacking gave a fascinating talk on NLP and Social Engineering at Londons DEFCON group, DC4420 (called "Social Engineering Lies!"). Afterwards, over drinks, he told me about a free cryptography course that Stanford was running, and how much fun he and his workmates were having competing with each other to solve the homework problems that were set each week...
http://adamsblog.aperturelabs.com/2013/05/back-to-skule-one-pad-two-pad-me-pad.html
Beta-Bot ergaunert sich Admin-Rechte und killt Virenscanner
Mit einem perfiden Trick versucht der Bot, sein Opfer dazu zu bringen, einen UAC-Dialog abzunicken. Die Admin-Rechte benötigt er, um anschließend den Virenscanner abzuschießen.
http://www.heise.de/security/meldung/Beta-Bot-ergaunert-sich-Admin-Rechte-und-killt-Virenscanner-1862780.html
WiFi Album application for iPad and iPhone command execution
WiFi Album application for iPad and iPhone could allow a local attacker to execute arbitrary commands on the system, caused by an error in the index module when processing to load the unique ipad or iphone photo album folder names.
http://xforce.iss.net/xforce/xfdb/84162
Debian Security Advisory DSA-2667 mysql-5.5
several vulnerabilities
http://www.debian.org/security/2013/dsa-2667
Debian Security Advisory DSA-2666 xen
several vulnerabilities
http://www.debian.org/security/2013/dsa-2666