Tageszusammenfassung - Mittwoch 25-09-2013

End-of-Shift report

Timeframe: Dienstag 24-09-2013 18:00 − Mittwoch 25-09-2013 18:00 Handler: Robert Waldner Co-Handler: n/a

IBM Rational ClearCase / ClearQuest GSKit Information Disclosure Weakness

IBM has acknowledged a weakness in IBM Rational ClearCase and Rational ClearQuest, which can be exploited by malicious people to disclose certain sensitive information. The weakness is caused due to a bundled vulnerable version of IBM Global Security ToolKit.

https://secunia.com/advisories/54928


7 Characteristics of a Secure Mobile App

Keeping a mobile application secure is tough, but not impossible, and certain aspects of session management can go a long way in helping.

http://www.csoonline.com/article/740266/7-characteristics-of-a-secure-mobile-app?source=rss_application_security


WordPress Custom Website Data Plugin Cross-Site Scripting Vulnerability

A vulnerability has been discovered in the Custom Website Data plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

https://secunia.com/advisories/54865


Linux Kernel "free_netdev()" Use-After-Free Vulnerability

A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to a use-after-free error in the "tun_set_iff()" function (drivers/net/tun.c) and can be exploited to dereference already freed memory.

https://secunia.com/advisories/54753


FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service).

https://secunia.com/advisories/54972


Vuln: Cisco MediaSense CVE-2013-5502 Information Disclosure Vulnerability

Cisco MediaSense is prone to an information-disclosure vulnerability. A man-in-the-middle attacker may be able to exploit this issue to obtain sensitive information. Information obtained may aid in further attacks.

http://www.securityfocus.com/bid/62601


Wordpress simple forum Cross site scripting Vulnerability

Exploit Title : Wordpress simple forum Cross site scripting Vulnerability Exploit Author : Ashiyane Digital Security Team Software Link : http://wordpress.org Tested on: Windows 7 , Linux Date: 2013/09/23 Exploit : Cross site scripting

http://cxsecurity.com/issue/WLB-2013090168


Bugtraq: CVE-2013-5118 - XSS Good for Enterprise iOS

Last month I identified a XSS vulnerability in the Good for Enterprise iOS application. The vulnerable versions are v2.2.2.1611 and earlier

http://www.securityfocus.com/archive/1/528839


Now You See Me – H-worm by Houdini

H-worm is a VBS (Visual Basic Script) based RAT written by an individual going by the name Houdini. We believe the author is based in Algeria and has connections to njq8, the author of njw0rm and njRAT/LV

http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html


Security Bulletin: IBM Tivoli Composite Application Manager for Transactions affected by vulnerabilities in IBM JRE (Multiple CVEs)

IBM Tivoli Composite Application Manager for Transactions is shipped with two IBM JREs that are based on Oracle Java. It is also dependent on ITM 6.2.1 Framework, which also has its own JRE. Oracle has released an April 2013 Critical Patch Update (CPU) that contains security vulnerability fixes and IBM Java is affected. CVE(s): CVE-2013-0401 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563

https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_tivoli_composite_application_manager_for_transactions_affected_by_vulnerabilities_in_ibm_jre_multiple_cves1?lang=en_us


Is mobile anti-virus necessary?

Experts disagree over whether or not there are any immediate threats

http://www.csoonline.com/article/740301/is-mobile-anti-virus-necessary-?source=rss_application_security


Social media spam on the rise, says study

Recent report from Nexgate points to 355 percent increase in social media spam in 2013 alone

http://www.csoonline.com/article/740292/social-media-spam-on-the-rise-says-study?source=rss_application_security


SurgeMail surgeweb interface security bypass

SurgeMail could allow a remote attacker to bypass security restrictions, caused by the failure to restrict access to other accounts by the surgeweb interface. An attacker could exploit this vulnerability to login to another user's accounts.

http://xforce.iss.net/xforce/xfdb/87335


Google Chrome 31.0 Webkit Auditor Bypass

Topic: Google Chrome 31.0 Webkit Auditor Bypass Risk: Low Title: Chrome 31.0 Webkit XSS Auditor Bypass Author: Rafay Baloch @rafaybaloch And PEPE Vila

http://cxsecurity.com/issue/WLB-2013090173


Newly launched E-shop offers access to hundreds of thousands of compromised accounts

In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented cybercrime ecosystem, the increasing availability of sophisticated commercial/leaked DIY undetectable malware generating tools, malware-infected hosts as a service, log files on demand services, as well as basic data mining concepts applied on behalf of the operator of a particular botnet. What

http://feedproxy.google.com/~r/WebrootThreatBlog/~3/iHbGGHj2f1o/


Details zum iPhone-5s-Hack

ct dokumentiert Schritt-für-Schritt, wie Starbug den Fingerabdruck-Sensor des iPhone 5S austrickst.

http://www.heise.de/newsticker/meldung/c-t-veroeffentlicht-Details-zu-iPhone-5S-Hack-1966079.html


elproLOG MONITOR WebAccess Two Cross-Site Scripting Vulnerabilities

Vulnerability Lab has reported two vulnerabilities in elproLOG MONITOR WebAccess, which can be exploited by malicious people to conduct cross-site scripting attacks.

https://secunia.com/advisories/54955


IT-Sicherheitsbranche: it-sa 2013 wieder mit Kongress, aber ohne Extraentgelt

2012 begleitete die it-sa erstmalig ein Kongressprogramm. Der Kongress ist nun wieder dabei, muss aber nicht mehr extra bezahlt werden. Für Studierende der Informatik gibt es spezielle Vorträge und Sonderschauen.

http://www.heise.de/newsticker/meldung/IT-Sicherheitsbranche-it-sa-2013-wieder-mit-Kongress-aber-ohne-Extraentgelt-1965352.html


Bugtraq: GreHack 2013 - 15 Nov. Grenoble, France - Conf. Registration OPEN

GREHACK 2013 - 2nd International Symposium in Grey-Hat Hacking 2nd Edition - p*wn me i'm famous! http://grehack.org https://twitter.com/grehack Grenoble, France November 15, 2013

http://www.securityfocus.com/archive/1/528852


UKs Get Safe Online? No one cares - run the blockbuster ads instead

Something like Jack Bauers 24 ... whatever itll take to teach kids how to bat away hackers The UKs Get Safe Online campaign has failed to teach Brits how to secure their computers - so says the ex top cop who established the information security awareness effort in 2004.…

http://go.theregister.com/feed/www.theregister.co.uk/2013/09/25/gets_safe_online_has_failed_to_change_behaviours/


Splunk Alert Test Scripts Arbitrary Command Execution Vulnerabilities

Some vulnerabilities have been reported in Splunk, which can be exploited by malicious users to compromise a vulnerable system. The vulnerabilities are caused due to some errors related to alert testing and troubleshooting scripts and can be exploited to execute arbitrary shell scripts. The vulnerabilities are reported in versions prior to 5.0.5.

https://secunia.com/advisories/54934


Oracle Solaris Tomcat FormAuthenticator Session Hijacking Weakness

Oracle has acknowledged a weakness in Tomcat included in Solaris, which can be exploited by malicious people to hijack a user's session.

https://secunia.com/advisories/55033


Oracle Solaris Kerberos KDC Two Vulnerabilities

Oracle has acknowledged two vulnerabilities in Kerberos included in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system and by malicious people to potentially compromise a vulnerable system.

https://secunia.com/advisories/55036


IBM Sterling External Authentication Server JRE Multiple Vulnerabilities

The application bundles a vulnerable version of the Java Runtime Environment (JRE).

https://secunia.com/advisories/55004


Several vulnerabilities in extension Apache Solr for TYPO3 (solr)

It has been discovered that the extension "Apache Solr for TYPO3" (solr) is vulnerable to Cross-Site Scripting and Insecure Unserialize. Affected Versions: Version 2.8.2 and below

http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-009/


Security issues in several third party TYPO3 ectensions

Direct Mail (direct_mail) RealURL: speaking paths for TYPO3 (realurl) Formhandler (formhandler) AWStats (cc_awstats) booking (booking) ICS AWStats (ics_awstats) Simple Image Gallery (iflowgallery) Ratsinformationssystem (RIS) (cronmm_ratsinfo) Frontend User Registration (ke_userregister) AWStats with individual access (meta_beawstatsind) Powermail double opt-in (powermail_optin) smarty (smarty) Youtube Channel Videos (youtubevideos)

http://lists.typo3.org/pipermail/typo3-announce/2013/000285.html


iPhone-Trojaner verdient mit Klickbetrug

Eine App für iPhones mit Jailbreak, die eigentlich im Browser WebGL-Funktionen freischalten soll, bringt dem Entwickler nebenbei noch Einnahmen aus versteckt angezeigter Werbung ein.

http://www.heise.de/newsticker/meldung/iPhone-Trojaner-verdient-mit-Klickbetrug-1966560.html


ClearSCADA Web Requests Handling Denial of Service Vulnerability

A vulnerability has been reported in ClearSCADA, which can be exploited by malicious people to cause a DoS (Denial of Service).

https://secunia.com/advisories/54931


Oracle Solaris Kerberos kpasswd UDP Packet Processing Denial of Service Vulnerability

Oracle has acknowledged a vulnerability in Kerberos included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

https://secunia.com/advisories/55039


Cyber attacks will cause real world harm in next seven years

New technologies such as Google Glass and IPv6 will lead to new, deadly forms of cyber attack if current manufacturing security practices continue, according to experts from Europol, Trend Micro and The International Cyber Security Protection Alliance (ICSPA). The experts made the warning in a recently published Scenarios for the Future of Cyber Crime white paper. The paper explored what threats the experts expect to emerge in the next six and a half years ...

http://www.v3.co.uk/v3-uk/analysis/2296357/cyber-attacks-will-cause-real-world-harm-in-next-seven-years


Secure Domain Name System (DNS) Deployment Guide

This document provides deployment guidelines for securing DNS within an enterprise. Because DNS data is meant to be public, preserving the confidentiality of DNS data. The primary security goals for DNS are data integrity and source authentication, which are needed to ensure the authenticity of domain name information and maintain the integrity of domain name information in transit. This document provides extensive guidance on maintaining data integrity and performing source authentication.

http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81-2.pdf


How to Protect Your Privacy on Social Media

How do you keep information private on social networking sites? ... Relying on a site’s privacy settings is just the start. While stricter account settings and tools can help you maintain privacy, there are other ways your personal information can leak out to the public. Knowing and addressing these potential privacy risks will help you protect your data.

http://about-threats.trendmicro.com/ebooks/how-to-protect-your-privacy-on-social-media/files/assets/downloads/how-to-protect-your-privacy-on-social-media.pdf


Oracle Solaris LibXSLT "xsltDocumentFunction()" and "xsltAddKey()" Denial of Service Vulnerabilities

Oracle has acknowledged two vulnerabilities in LibXSLT included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

https://secunia.com/advisories/55030