End-of-Shift report
Timeframe: Montag 22-09-2014 18:00 − Dienstag 23-09-2014 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
Cyber Campaigns
This website simply lists multiple cyber-espionage and cyber-attack campaigns. These campaigns have successfully compromised hundreds of government entities and global corporations in over 50 countries. Click on any of the links below to access more detailed information regarding these cyber campaigns. If you see one missing, just let me know.
http://cybercampaigns.net/
Whonix Anonymous Operating System Version 9 Released
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
https://www.whonix.org/blog/whonix-anonymous-9-released
UK banks hook themselves up to real-time cop data feed
Not like the movies: Law enforcement is on it... UK banks will receive real-time warnings about threats to their customers accounts as well as the overall integrity of their banking systems from a new financial crime alert system.
http://go.theregister.com/feed/www.theregister.co.uk/2014/09/23/uk_bank_fraud_alert_system/
HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access
A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL. The vulnerability could be exploited remotely to allow remote unauthorized access.
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04451722
BIND 9.8.8, 9.9.6 and 9.10.1 Release Notes
https://kb.isc.org/article/AA-01211/81/BIND-9.8.8-Release-Notes.html
https://kb.isc.org/article/AA-01210/81/BIND-9.9.6-Release-Notes.html
https://kb.isc.org/article/AA-01209/81/BIND-9.10.1-Release-Notes.html
Bugtraq: Glype proxy cookie jar path traversal allows code execution
http://www.securityfocus.com/archive/1/533504
Security Advisory-Screen Capture Vulnerability on Huawei Ascend P6 Mobile Phones
Sep 23, 2014 17:47
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372118.htm
TYPO3 CMS 4.5.36, 6.1.11 and 6.2.5 released
All versions are maintenance releases and contain bug fixes.
https://typo3.org/news/article/typo3-cms-4536-6111-and-625-released/
[20140901] - Core - XSS Vulnerability
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 3.2.0 through 3.2.4, 3.3.0 through 3.3.3 Exploit type: XSS Vulnerability Reported Date: 2014-August-27 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6631 Description Inadequate escaping leads to XSS vulnerability in com_media. Affected Installs Joomla! CMS versions 3.2.0 through 3.2.4 and 3.3.0 through 3.3.3 Solution Upgrade to version 3.2.5 or 3.3.4 Contact The JSST at the Joomla! Security Center. Reported By: Dingjie (Daniel)
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/EiyFsQIjpu4/593-20140901-core-xss-vulnerability.html
[20140902] - Core - Unauthorised Logins
Project: Joomla! SubProject: CMS Severity: Moderate Versions: 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Exploit type: Unauthorised Logins Reported Date: 2014-September-09 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6632 Description Inadequate checking allowed unauthorised logins via LDAP authentication. Affected Installs Joomla! CMS versions 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Solution
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/uFCKpt1YcxU/594-20140902-core-unauthorised-logins.html
XEN Security Advisories
Race condition in HVMOP_track_dirty_vram
http://xenbits.xen.org/xsa/advisory-104.html
Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation
http://xenbits.xen.org/xsa/advisory-105.html
Missing privilege level checks in x86 emulation of software interrupts
http://xenbits.xen.org/xsa/advisory-106.html