End-of-Shift report
Timeframe: Dienstag 24-09-2013 18:00 − Mittwoch 25-09-2013 18:00
Handler: Robert Waldner
Co-Handler: n/a
IBM Rational ClearCase / ClearQuest GSKit Information Disclosure Weakness
IBM has acknowledged a weakness in IBM Rational ClearCase and Rational ClearQuest, which can be exploited by malicious people to disclose certain sensitive information.
The weakness is caused due to a bundled vulnerable version of IBM Global Security ToolKit.
https://secunia.com/advisories/54928
7 Characteristics of a Secure Mobile App
Keeping a mobile application secure is tough, but not impossible, and certain aspects of session management can go a long way in helping.
http://www.csoonline.com/article/740266/7-characteristics-of-a-secure-mobile-app?source=rss_application_security
WordPress Custom Website Data Plugin Cross-Site Scripting Vulnerability
A vulnerability has been discovered in the Custom Website Data plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
https://secunia.com/advisories/54865
Linux Kernel "free_netdev()" Use-After-Free Vulnerability
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.
The vulnerability is caused due to a use-after-free error in the "tun_set_iff()" function (drivers/net/tun.c) and can be exploited to dereference already freed memory.
https://secunia.com/advisories/54753
FFmpeg Multiple Vulnerabilities
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service).
https://secunia.com/advisories/54972
Vuln: Cisco MediaSense CVE-2013-5502 Information Disclosure Vulnerability
Cisco MediaSense is prone to an information-disclosure vulnerability.
A man-in-the-middle attacker may be able to exploit this issue to obtain sensitive information. Information obtained may aid in further attacks.
http://www.securityfocus.com/bid/62601
Wordpress simple forum Cross site scripting Vulnerability
Exploit Title : Wordpress simple forum Cross site scripting Vulnerability
Exploit Author : Ashiyane Digital Security Team
Software Link :
http://wordpress.org
Tested on: Windows 7 , Linux
Date: 2013/09/23
Exploit : Cross site scripting
http://cxsecurity.com/issue/WLB-2013090168
Bugtraq: CVE-2013-5118 - XSS Good for Enterprise iOS
Last month I identified a XSS vulnerability in the Good for Enterprise iOS application.
The vulnerable versions are v2.2.2.1611 and earlier
http://www.securityfocus.com/archive/1/528839
Now You See Me – H-worm by Houdini
H-worm is a VBS (Visual Basic Script) based RAT written by an individual going by the name Houdini. We believe the author is based in Algeria and has connections to njq8, the author of njw0rm and njRAT/LV
http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html
Security Bulletin: IBM Tivoli Composite Application Manager for Transactions affected by vulnerabilities in IBM JRE (Multiple CVEs)
IBM Tivoli Composite Application Manager for Transactions is shipped with two IBM JREs that are based on Oracle Java. It is also dependent on ITM 6.2.1 Framework, which also has its own JRE. Oracle has released an April 2013 Critical Patch Update (CPU) that contains security vulnerability fixes and IBM Java is affected. CVE(s): CVE-2013-0401 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_tivoli_composite_application_manager_for_transactions_affected_by_vulnerabilities_in_ibm_jre_multiple_cves1?lang=en_us
Is mobile anti-virus necessary?
Experts disagree over whether or not there are any immediate threats
http://www.csoonline.com/article/740301/is-mobile-anti-virus-necessary-?source=rss_application_security
Social media spam on the rise, says study
Recent report from Nexgate points to 355 percent increase in social media spam in 2013 alone
http://www.csoonline.com/article/740292/social-media-spam-on-the-rise-says-study?source=rss_application_security
SurgeMail surgeweb interface security bypass
SurgeMail could allow a remote attacker to bypass security restrictions, caused by the failure to restrict access to other accounts by the surgeweb interface. An attacker could exploit this vulnerability to login to another user's accounts.
http://xforce.iss.net/xforce/xfdb/87335
Google Chrome 31.0 Webkit Auditor Bypass
Topic: Google Chrome 31.0 Webkit Auditor Bypass
Risk: Low
Title: Chrome 31.0 Webkit XSS Auditor Bypass
Author: Rafay Baloch @rafaybaloch And PEPE Vila
http://cxsecurity.com/issue/WLB-2013090173
Newly launched E-shop offers access to hundreds of thousands of compromised accounts
In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented cybercrime ecosystem, the increasing availability of sophisticated commercial/leaked DIY undetectable malware generating tools, malware-infected hosts as a service, log files on demand services, as well as basic data mining concepts applied on behalf of the operator of a particular botnet. What
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/iHbGGHj2f1o/
Details zum iPhone-5s-Hack
ct dokumentiert Schritt-für-Schritt, wie Starbug den Fingerabdruck-Sensor des iPhone 5S austrickst.
http://www.heise.de/newsticker/meldung/c-t-veroeffentlicht-Details-zu-iPhone-5S-Hack-1966079.html
elproLOG MONITOR WebAccess Two Cross-Site Scripting Vulnerabilities
Vulnerability Lab has reported two vulnerabilities in elproLOG MONITOR WebAccess, which can be exploited by malicious people to conduct cross-site scripting attacks.
https://secunia.com/advisories/54955
IT-Sicherheitsbranche: it-sa 2013 wieder mit Kongress, aber ohne Extraentgelt
2012 begleitete die it-sa erstmalig ein Kongressprogramm. Der Kongress ist nun wieder dabei, muss aber nicht mehr extra bezahlt werden. Für Studierende der Informatik gibt es spezielle Vorträge und Sonderschauen.
http://www.heise.de/newsticker/meldung/IT-Sicherheitsbranche-it-sa-2013-wieder-mit-Kongress-aber-ohne-Extraentgelt-1965352.html
Bugtraq: GreHack 2013 - 15 Nov. Grenoble, France - Conf. Registration OPEN
GREHACK 2013 - 2nd International Symposium in Grey-Hat Hacking
2nd Edition - p*wn me i'm famous!
http://grehack.org
https://twitter.com/grehack
Grenoble, France
November 15, 2013
http://www.securityfocus.com/archive/1/528852
UKs Get Safe Online? No one cares - run the blockbuster ads instead
Something like Jack Bauers 24 ... whatever itll take to teach kids how to bat away hackers The UKs Get Safe Online campaign has failed to teach Brits how to secure their computers - so says the ex top cop who established the information security awareness effort in 2004.…
http://go.theregister.com/feed/www.theregister.co.uk/2013/09/25/gets_safe_online_has_failed_to_change_behaviours/
Splunk Alert Test Scripts Arbitrary Command Execution Vulnerabilities
Some vulnerabilities have been reported in Splunk, which can be exploited by malicious users to compromise a vulnerable system.
The vulnerabilities are caused due to some errors related to alert testing and troubleshooting scripts and can be exploited to execute arbitrary shell scripts.
The vulnerabilities are reported in versions prior to 5.0.5.
https://secunia.com/advisories/54934
Oracle Solaris Tomcat FormAuthenticator Session Hijacking Weakness
Oracle has acknowledged a weakness in Tomcat included in Solaris, which can be exploited by malicious people to hijack a user's session.
https://secunia.com/advisories/55033
Oracle Solaris Kerberos KDC Two Vulnerabilities
Oracle has acknowledged two vulnerabilities in Kerberos included in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system and by malicious people to potentially compromise a vulnerable system.
https://secunia.com/advisories/55036
IBM Sterling External Authentication Server JRE Multiple Vulnerabilities
The application bundles a vulnerable version of the Java Runtime Environment (JRE).
https://secunia.com/advisories/55004
Several vulnerabilities in extension Apache Solr for TYPO3 (solr)
It has been discovered that the extension "Apache Solr for TYPO3" (solr) is vulnerable to Cross-Site Scripting and Insecure Unserialize. Affected Versions: Version 2.8.2 and below
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-009/
Security issues in several third party TYPO3 ectensions
Direct Mail (direct_mail)
RealURL: speaking paths for TYPO3 (realurl)
Formhandler (formhandler) AWStats (cc_awstats)
booking (booking)
ICS AWStats (ics_awstats)
Simple Image Gallery (iflowgallery)
Ratsinformationssystem (RIS) (cronmm_ratsinfo)
Frontend User Registration (ke_userregister)
AWStats with individual access (meta_beawstatsind)
Powermail double opt-in (powermail_optin)
smarty (smarty)
Youtube Channel Videos (youtubevideos)
http://lists.typo3.org/pipermail/typo3-announce/2013/000285.html
iPhone-Trojaner verdient mit Klickbetrug
Eine App für iPhones mit Jailbreak, die eigentlich im Browser WebGL-Funktionen freischalten soll, bringt dem Entwickler nebenbei noch Einnahmen aus versteckt angezeigter Werbung ein.
http://www.heise.de/newsticker/meldung/iPhone-Trojaner-verdient-mit-Klickbetrug-1966560.html
ClearSCADA Web Requests Handling Denial of Service Vulnerability
A vulnerability has been reported in ClearSCADA, which can be exploited by malicious people to cause a DoS (Denial of Service).
https://secunia.com/advisories/54931
Oracle Solaris Kerberos kpasswd UDP Packet Processing Denial of Service Vulnerability
Oracle has acknowledged a vulnerability in Kerberos included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).
https://secunia.com/advisories/55039
Cyber attacks will cause real world harm in next seven years
New technologies such as Google Glass and IPv6 will lead to new, deadly forms of cyber attack if current manufacturing security practices continue, according to experts from Europol, Trend Micro and The International Cyber Security Protection Alliance (ICSPA). The experts made the warning in a recently published Scenarios for the Future of Cyber Crime white paper. The paper explored what threats the experts expect to emerge in the next six and a half years ...
http://www.v3.co.uk/v3-uk/analysis/2296357/cyber-attacks-will-cause-real-world-harm-in-next-seven-years
Secure Domain Name System (DNS) Deployment Guide
This document provides deployment guidelines for securing DNS within an enterprise. Because DNS data is meant to be public, preserving the confidentiality of DNS data. The primary security goals for DNS are data integrity and source authentication, which are needed to ensure the authenticity of domain name information and maintain the integrity of domain name information in transit. This document provides extensive guidance on maintaining data integrity and performing source authentication.
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81-2.pdf
How to Protect Your Privacy on Social Media
How do you keep information private on social networking sites? ... Relying on a site’s privacy settings is just the start. While stricter account settings and tools can help you maintain privacy, there are other ways your personal information can leak out to the public. Knowing and addressing these potential privacy risks will help you protect your data.
http://about-threats.trendmicro.com/ebooks/how-to-protect-your-privacy-on-social-media/files/assets/downloads/how-to-protect-your-privacy-on-social-media.pdf
Oracle Solaris LibXSLT "xsltDocumentFunction()" and "xsltAddKey()" Denial of Service Vulnerabilities
Oracle has acknowledged two vulnerabilities in LibXSLT included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).
https://secunia.com/advisories/55030