Tageszusammenfassung - 22.05.2020

End-of-Day report

Timeframe: Mittwoch 20-05-2020 18:00 - Freitag 22-05-2020 18:00 Handler: Stephan Richter Co-Handler: n/a

News

Drahtlos-Standard: Bluetooth-Sicherheitslücke betrifft praktisch alle Geräte

Bluetooth erfordert beim Verbindungsaufbau keine beidseitige Authentifizierung. Der Angriff Bias funktioniert als Master und als Slave.

https://www.golem.de/news/drahtlos-standard-bluetooth-sicherheitsluecke-betrifft-praktisch-alle-geraete-2005-148659-rss.html


Sarwent Malware Continues to Evolve With Updated Command Functions

Sarwent has received little attention from researchers, but this backdoor malware is still being actively developed, with new commands and a focus on RDP.

https://labs.sentinelone.com/sarwent-malware-updates-command-detonation/


Shining a light on -Silent Night- Zloader/Zbot

The latest Malwarebytes Threat Intel report focuses on Silent Night, a new banking Trojan recently tracked as Zloader/Zbot.

https://blog.malwarebytes.com/threat-analysis/2020/05/the-silent-night-zloader-zbot/


Vulnerability Spotlight: Memory corruption vulnerability in GNU Glibc leaves smart vehicles open to attack

Modern automobiles are complex machines, merging both mechanical and computer systems under one roof. As automobiles become more advanced, additional sensors and devices are added to help the vehicle understand its internal and external environments. These sensors provide drivers with real-time information, connect the vehicle to the global fleet network and, in some cases, actively use and interpret this telemetry data to drive the [...]

https://blog.talosintelligence.com/2020/05/cve-2020-6096.html


Bequemlichkeit vs. Sicherheit bei Smart-Home Geräten

Trotz der wachsenden Akzeptanz von Smart-Home-Geräten, sollten wir unsere Privatsphäre und Sicherheit nicht der Bequemlichkeit opfern.

https://www.welivesecurity.com/deutsch/2020/05/20/bequemlichkeit-vs-sicherheit-bei-smart-home-geraeten/


Tools Used in GhostDNS Router Hijack Campaigns Dissected

The source code of the GhostDNS exploit kit (EK) has been obtained and analyzed by researchers. GhostDNS is used to compromise a wide range of routers to facilitate phishing -- perhaps more accurately, pharming -- for banking credentials. Target routers are mostly, but not solely, located in Latin America.

https://www.securityweek.com/tools-used-ghostdns-router-hijack-campaigns-dissected


Ragnar Locker Ransomware Uses Virtual Machines for Evasion

The Ragnar Locker ransomware has been deploying a full virtual machine to ensure that it can evade detection, Sophos reveals.

https://www.securityweek.com/ragnar-locker-ransomware-uses-virtual-machines-evasion


Free ImmuniWeb Tool Allows Organizations to Check Dark Web Exposure

Web security company ImmuniWeb this week announced a free tool that allows businesses and government organizations to check their dark web exposure.

https://www.securityweek.com/free-immuniweb-tool-allows-organizations-check-dark-web-exposure


Wahre Liebe oder Betrug? So finden Sie es heraus!

Egal ob auf Sozialen Netzwerken wie Facebook oder Instagram, auf Online-Partnerbörsen oder einfach per Mail - immer wieder melden uns LeserInnen sogenannte Love- oder Romance-Scammer. Durch Liebesbeteuerungen und Geschichten aus Ihrem Alltag erschleichen sich die BetrügerInnen das Vertrauen der Opfer. Tatsächlich geht es aber auch bei dieser Betrugsmasche nur um eines: Geld.

https://www.watchlist-internet.at/news/wahre-liebe-oder-betrug-so-finden-sie-es-heraus/


Spectra: Neuartiger Angriff überwindet Trennung von WLAN und Bluetooth

Er richtet sich gegen Combo-Chips der Hersteller Broadcom und Cypress. Sie finden sich unter anderem in iPhones, MacBooks und Galaxy-S-Smartphones. Spectra nutzt Schwachstellen in einer Funktion, die einen schnellen Wechsel von einer Funktechnik zur anderen erlaubt.

https://www.zdnet.de/88380022/spectra-neuartiger-angriff-ueberwindet-trennung-von-wlan-und-bluetooth/

Vulnerabilities

Drupal core - Moderately critical - Open Redirect - SA-CORE-2020-003

Drupal 7 has an Open Redirect vulnerability. For example, a user could be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. The vulnerability is caused by insufficient validation of the destination query parameter in the drupal_goto() function.

https://www.drupal.org/sa-core-2020-003


Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2020-002

The jQuery project released version 3.5.0, and as part of that, disclosed two security vulnerabilities that affect all prior versions. As mentioned in the jQuery blog, both are [...] security issues in jQuery-s DOM manipulation methods, as in .html(), .append(), and the others.

https://www.drupal.org/sa-core-2020-002


Apple Security Update: Xcode 11.5

Impact: A crafted git URL that contains a newline in it may cause credential information to be provided for the wrong host

https://support.apple.com/en-us/HT211183


Security updates for Thursday

Security updates have been issued by Arch Linux (keycloak, qemu, and thunderbird), Debian (dovecot), Fedora (abcm2ps and oddjob), Red Hat (java-1.7.1-ibm, java-1.8.0-ibm, and kernel-rt), SUSE (ant, bind, and freetype2), and Ubuntu (bind9 and linux, linux-aws, linux-aws-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3,linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3, linux-raspi2 ).

https://lwn.net/Articles/821093/


Security updates for Friday

Security updates have been issued by CentOS (firefox, ipmitool, kernel, squid, and thunderbird), Debian (pdns-recursor), Fedora (php and ruby), Red Hat (dotnet and dotnet3.1), SUSE (dom4j, dovecot23, memcached, and tomcat), and Ubuntu (clamav, libvirt, and qemu).

https://lwn.net/Articles/821205/


Hackers Can Target Rockwell Industrial Software With Malicious EDS Files

Rockwell Automation recently patched two vulnerabilities related to EDS files that can allow malicious actors to expand their access within a targeted organization-s OT network.

https://www.securityweek.com/hackers-can-target-rockwell-industrial-software-malicious-eds-files


2020-05-21: SECURITY ABB Device Library Wizard Information Disclosure Vulnerability (2PAA121681)

https://search.abb.com/library/Download.aspx?DocumentID=2PAA121681&LanguageCode=en&DocumentPartId=&Action=Launch


Cisco AMP for Endpoints Linux Connector and AMP for Endpoints Mac Connector Software Memory Buffer Vulnerability

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb


Cisco Unified Contact Center Express Remote Code Execution Vulnerability

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-rce-GMSC6RKN


Cisco Prime Collaboration Provisioning Software SQL Injection Vulnerability

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pcp-sql-inj-22Auwt66


Cisco Prime Network Registrar DHCP Denial of Service Vulnerability

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpnr-dhcp-dos-BkEZfhLP


Cisco AMP for Endpoints Mac Connector Software File Scan Denial of Service Vulnerability

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4emac-dos-kfKjUGtM


IBM Security Bulletins

https://www.ibm.com/blogs/psirt/


[webapps] PHPFusion 9.03.50 - Persistent Cross-Site Scripting

https://www.exploit-db.com/exploits/48497


CVE-2004-0230 Blind Reset Attack Using the RST/SYN Bit

https://fortiguard.com/psirt/FG-IR-16-039


Linux kernel vulnerability CVE-2019-19059

https://support.f5.com/csp/article/K06554372


Linux kernel vulnerability CVE-2019-19062

https://support.f5.com/csp/article/K84797753