Tageszusammenfassung - Mittwoch 5-04-2017

End-of-Shift report

Timeframe: Dienstag 04-04-2017 18:00 − Mittwoch 05-04-2017 18:00 Handler: Stephan Richter Co-Handler: n/a

WordPress Security - Unwanted Redirects via Infected JavaScript Files

We've been watching a specific WordPress infection for several months and would like to share details about it. The attacks inject malicious JavaScript code into almost every .js file it can find. Previous versions of this malware injected only jquery.js files, but now we remove this code from hundreds of infected files. Due to a bug in the injector code, it also infects files whose extensions contain ".js" (such as .js.php or .json).

https://blog.sucuri.net/2017/04/wordpress-security-unwanted-redirects-via-infected-javascript-files.html


Encryption inside Utility Industrial Control Systems (ICS) communication protocols: a must to preserve the confidentiality of information and reliability of the industrial process, (Tue, Apr 4th)

Industrial control systems are sensitive systems that must make decisions in real time to ensure the operation of the industrial process they govern. The latency and reliability in packet transmission is fundamental, since the protocols are connection-oriented but because of the main speed goal, many of them do not have included error recovery schemes other than those included in the TCP / IP stack. Where is it possible to use encryption without affecting the operation of the industrial control...

https://isc.sans.edu/diary.html?storyid=22260&rss


Schneider Electric still shipping passwords in firmware

Youd think a vendor of critical infrastructure would at least pretend to care about security That "dont use hard-coded passwords" infosec rule? Someone needs to use a needle to write it on the corner of Schneider Electrics developers eyes so they dont forget it.

http://go.theregister.com/feed/www.theregister.co.uk/2017/04/05/schneider_istilli_shipping_passwords_in_firmware/


Internetplattform unterstützt Opfer von digitaler Erpressung

Für Betroffene von digitaler Erpressung ist es besonders wichtig, ihre Dateien schnell und einfach wiederherzustellen. Unter www.nomoreransom.org können verschiedene Entschlüsselungstools nun auch auf Deutsch aufgerufen werden.

http://www.bmi.gv.at/cms/bmi/_news/bmi.aspx?id=537A58584930536354666F3D&page=0&view=1


500.000 US-Dollar Lösegeld: Ransomware-Gangs nehmen Unternehmen aufs Korn

Sicherheitsforscher haben mindestens acht Gruppen ausgemacht, die sich auf Ransomware-Attacken auf Unternehmen spezialisiert haben. Je nach Anzahl der infizierten PCs und Server steigt das Lösegeld. Summen von bis zu 500.000 US-Dollar sind im Spiel.

https://heise.de/-3675612


Whitelists: The Holy Grail of Attackers, (Wed, Apr 5th)

As a defender, take the time to put yourself in the place of a bad guy for a few minutes. Youre writing some malicious code and you need to download payloads from the Internet or hide your code on a website. Once your malicious code spread in the wild, it will be quickly captured by honeypots, IDS, ... (name your best tool) and analysed automatically of manually by the good guys. Their goal of this is to extract abehavioural analysis of the code and generate indicators (IOCs) which will help to...

https://isc.sans.edu/diary.html?storyid=22262&rss


Broadcom-Sicherheitslücke: Angriff über den WLAN-Chip

Googles Project Zero zeigt, wie man ein Smartphone per WLAN übernehmen kann. WLAN-Chips haben heute eigene Betriebssysteme, denen jedoch alle modernen Sicherheitsmechanismen fehlen.

https://www.golem.de/news/broadcom-sicherheitsluecke-angriff-ueber-den-wlan-chip-1704-127151-rss.html


Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report."Were gathering threat data from hundreds of thousands of customers and network security appliances," said Corey Nachreiner, CTO at WatchGuard Technologies. "We have different types of malware detection services, including a signature and heuristic-based gateway antivirus. What we found was that 30 percent of the malware would have been missed...

http://www.cio.com/article/3187734/network-security/report-30-of-malware-is-zero-day-missed-by-legacy-antivirus.html#tk.rss_security


Changes coming to TLS: Part Two

In the first part of this two-part blog we covered certain performance improving features of TLS 1.3, namely 1-RTT handshakes and 0-RTT session resumption. In this part we shall discuss some security and privacy improvements.Remove Obsolete and insecure cryptographic primitivesRemove RSA HandshakesWhen RSA is used for key establishment there is no forward secrecy, which basically means that an adversary can record the encrypted conversation between the client and the server and later if it is...

https://access.redhat.com/blogs/766093/posts/2978671


Broadcom: Heap overflow in TDLS Teardown Request while handling Fast Transition IE

[...] Then, if the IE is present, its contents are copied into a heap-allocated buffer of length 256. The copy is performed using the length field present in the IE, and at a fixed offset from the buffers start address. Since the length of the FTIE is not verified prior to the copy, this allows an attacker to include a large FTIE (e.g., with a length field of 255), causing the memcpy to overflow the heap-allocated buffer.

https://bugs.chromium.org/p/project-zero/issues/detail?id=1046


Citrix XenServer Multiple Security Updates

A number of security issues have been identified within Citrix XenServer. The most significant of these issues could, if exploited, allow a malicious administrator of a 64-bit PV guest VM to compromise the host.

https://support.citrix.com/article/CTX222565


Django Input Validation Flaws Let Remote Users Conduct Cross-Site Scripting and Open Redirect Attacks

http://www.securitytracker.com/id/1038177


HPE Business Process Monitor Unspecified Flaw Lets Remote Users Access Data on the Target System

http://www.securitytracker.com/id/1038176


Asterisk Buffer Overflow in Processing CDR User Data Lets Remote Authenticated Users Execute Arbitrary Code

http://www.securitytracker.com/id/1038175


Security Advisory - Multiple Buffer Overflow Vulnerabilities in Bastet of Huawei Smart Phone

http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170405-01-smartphone-en


Security Advisory - Information Leak Vulnerability in Some Huawei Smart Phones

http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170405-02-smartphone-en


Schneider Electric Interactive Graphical SCADA System Software

This advisory contains mitigation details for a DLL hijacking vulnerability in Schneider Electric's Interactive Graphical SCADA System Software.

https://ics-cert.us-cert.gov/advisories/ICSA-17-094-01


Marel Food Processing Systems

This advisory contains mitigation details for hard-coded passwords and unrestricted upload vulnerabilities in Marel's Food Processing Systems.

https://ics-cert.us-cert.gov/advisories/ICSA-17-094-02


Rockwell Automation Allen-Bradley Stratix and Allen-Bradley ArmorStratix

This advisory contains mitigation details for an improper input validation vulnerability in Rockwell Automation's Allen-Bradley Stratix and ArmorStratix Industrial Ethernet and Distribution switches.

https://ics-cert.us-cert.gov/advisories/ICSA-17-094-03


IBM Security Bulletins

IBM Security Bulletin: Vulnerability in Apache Struts affects IBM Opportunity Detect (CVE-2017-5638)

http://www-01.ibm.com/support/docview.wss?uid=swg22001388

IBM Security Bulletin: IBM Security Guardium is affected by Open Source Oracle MySQL Vulnerability (CVE-2017-3302)

http://www-01.ibm.com/support/docview.wss?uid=swg21999203

IBM Security Bulletin: IBM Security Guardium is affected by Open Source Oracle MySQL Vulnerabilities (multiple CVEs)

http://www-01.ibm.com/support/docview.wss?uid=swg21999202

IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Guardium Database Activity Monitor

http://www-01.ibm.com/support/docview.wss?uid=swg21999580

Fortinet PSIRT Advisories

FortiClient SSLVPN Linux - Root privilege escalation with subproc

http://fortiguard.com/psirt/FG-IR-16-041

FortiClient SSLVPN Linux - Arbitrary write to log file

http://fortiguard.com/psirt/FG-IR-16-069

Multiple vulnerabilities in Linux kernels through 4.6.3

http://fortiguard.com/psirt/FG-IR-16-052

Unauthenticated XSS (Cross Site Scripting) in FortiMail

http://fortiguard.com/psirt/FG-IR-17-011

Linux kernel - challenge ack information leak

http://fortiguard.com/psirt/FG-IR-16-047

F5 Security Advisories

BIG-IP file validation vulnerability CVE-2015-8022

https://support.f5.com/csp/article/K12401251

OpenSSL vulnerability CVE-2015-3195

https://support.f5.com/csp/article/K12824341

OpenSSH vulnerability CVE-2016-6210

https://support.f5.com/csp/article/K14845276

Expat XML library vulnerability CVE-2015-1283

https://support.f5.com/csp/article/K15104541

glibc vulnerability CVE-2016-3075

https://support.f5.com/csp/article/K15439022

libxml2 vulnerability CVE-2016-1834

https://support.f5.com/csp/article/K16712298

glibc vulnerability CVE-2016-4429

https://support.f5.com/csp/article/K17075474

TMM vulnerability CVE-2016-5023

https://support.f5.com/csp/article/K19784568

Linux kernel vulnerability CVE-2013-7446

https://support.f5.com/csp/article/K20022580

OpenSSH vulnerability CVE-2015-8325

https://support.f5.com/csp/article/K20911042

NTP vulnerability CVE-2015-7976

https://support.f5.com/csp/article/K21230183

Linux kernel vulnerability CVE-2011-5321

https://support.f5.com/csp/article/K21632201

TMM vulnerability CVE-2016-9245

https://support.f5.com/csp/article/K22216037

glibc vulnerability CVE-2015-8776

https://support.f5.com/csp/article/K23946311

OpenSSL vulnerability CVE-2016-0800

https://support.f5.com/csp/article/K23196136

libarchive vulnerability CVE-2016-5844

https://support.f5.com/csp/article/K24036027

ISC DHCP vulnerability CVE-2016-2774

https://support.f5.com/csp/article/K30409575

Java commons-collections library vulnerability CVE-2015-4852

https://support.f5.com/csp/article/K30518307

PHP vulnerability CVE-2016-4070

https://support.f5.com/csp/article/K42065024

NTP vulnerability CVE-2016-2519

https://support.f5.com/csp/article/K41613034

GnuPG vulnerability CVE-2013-4402

https://support.f5.com/csp/article/K40131068

libarchive vulnerability CVE-2016-8688

https://support.f5.com/csp/article/K35263486

PHP vulnerability CVE-2016-3074

https://support.f5.com/csp/article/K34958244

OpenSSL vulnerability CVE-2016-7056

https://support.f5.com/csp/article/K32743437

OpenSSH vulnerability CVE-2016-10009

https://support.f5.com/csp/article/K31440025

BIG-IP APM access logs vulnerability CVE-2016-1497

https://support.f5.com/csp/article/K31925518