Tageszusammenfassung - Dienstag 23-09-2014

End-of-Shift report

Timeframe: Montag 22-09-2014 18:00 − Dienstag 23-09-2014 18:00 Handler: Stephan Richter Co-Handler: Robert Waldner

Cyber Campaigns

This website simply lists multiple cyber-espionage and cyber-attack campaigns. These campaigns have successfully compromised hundreds of government entities and global corporations in over 50 countries. Click on any of the links below to access more detailed information regarding these cyber campaigns. If you see one missing, just let me know.

http://cybercampaigns.net/


Whonix Anonymous Operating System Version 9 Released

Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

https://www.whonix.org/blog/whonix-anonymous-9-released


UK banks hook themselves up to real-time cop data feed

Not like the movies: Law enforcement is on it... UK banks will receive real-time warnings about threats to their customers accounts as well as the overall integrity of their banking systems from a new financial crime alert system.

http://go.theregister.com/feed/www.theregister.co.uk/2014/09/23/uk_bank_fraud_alert_system/


HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access

A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL. The vulnerability could be exploited remotely to allow remote unauthorized access.

https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04451722


BIND 9.8.8, 9.9.6 and 9.10.1 Release Notes

https://kb.isc.org/article/AA-01211/81/BIND-9.8.8-Release-Notes.html https://kb.isc.org/article/AA-01210/81/BIND-9.9.6-Release-Notes.html https://kb.isc.org/article/AA-01209/81/BIND-9.10.1-Release-Notes.html


Bugtraq: Glype proxy cookie jar path traversal allows code execution

http://www.securityfocus.com/archive/1/533504


Security Advisory-Screen Capture Vulnerability on Huawei Ascend P6 Mobile Phones

Sep 23, 2014 17:47

http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372118.htm


TYPO3 CMS 4.5.36, 6.1.11 and 6.2.5 released

All versions are maintenance releases and contain bug fixes.

https://typo3.org/news/article/typo3-cms-4536-6111-and-625-released/


[20140901] - Core - XSS Vulnerability

Project: Joomla! SubProject: CMS Severity: Moderate Versions: 3.2.0 through 3.2.4, 3.3.0 through 3.3.3 Exploit type: XSS Vulnerability Reported Date: 2014-August-27 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6631 Description Inadequate escaping leads to XSS vulnerability in com_media. Affected Installs Joomla! CMS versions 3.2.0 through 3.2.4 and 3.3.0 through 3.3.3 Solution Upgrade to version 3.2.5 or 3.3.4 Contact The JSST at the Joomla! Security Center. Reported By: Dingjie (Daniel)

http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/EiyFsQIjpu4/593-20140901-core-xss-vulnerability.html


[20140902] - Core - Unauthorised Logins

Project: Joomla! SubProject: CMS Severity: Moderate Versions: 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Exploit type: Unauthorised Logins Reported Date: 2014-September-09 Fixed Date: 2014-September-23 CVE Number: CVE-2014-6632 Description Inadequate checking allowed unauthorised logins via LDAP authentication. Affected Installs Joomla! CMS versions 2.5.24 and earlier 2.5.x versions, 3.2.4 and earlier 3.x versions, 3.3.0 through 3.3.3 Solution

http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/uFCKpt1YcxU/594-20140902-core-unauthorised-logins.html


XEN Security Advisories

Race condition in HVMOP_track_dirty_vram

http://xenbits.xen.org/xsa/advisory-104.html


Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation

http://xenbits.xen.org/xsa/advisory-105.html


Missing privilege level checks in x86 emulation of software interrupts

http://xenbits.xen.org/xsa/advisory-106.html