Hackin9
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Good Technology has become one the leaders in mobile management, amassing more than 4,000 customers, including many in government and highly regulated industries.
 
A frame from a video demonstration showing a proof-of-concept malware attack on a smartphone-controlled light system from Philips.
Nitesh Dhanjani

Weaknesses in a popular brand of light system that's controlled by computers and smartphones can be exploited by attackers to cause blackouts that are remedied only by removing the wireless device that receives the commands, a security researcher said.

The vulnerabilities in the Hue LED lighting system made by Philips are another example of the risks posed by connecting thermostats, door locks, and other everyday devices to the Internet so they can be controlled by someone in the next room or across town. While the so-called Internet of Things phenomenon brings convenience and new capabilities to gadgets, they come at a cost. Namely, they're susceptible to the same kinds of hack attacks that have plagued computer users for decades. The ability to load a Web page that causes house or office lights to go black could pose risks that go well beyond the typical computer threat.

"Lighting is critical to physical security," Nitesh Dhanjani, the researcher who discovered the weaknesses and developed proof-of-concept attacks that exploit them, wrote in a blog post published Tuesday. "Smart lightbulb systems are likely to be deployed in current and new residential and corporate constructions. An abuse case such as the ability of an intruder to remotely shut off lighting in locations such as hospitals and other public venues can result in serious consequences."

Read 7 remaining paragraphs | Comments


    






 
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
A prominent U.S. Senate committee has launched a formal inquiry to investigate criminal activity and other risks tied to the use of virtual currencies such as Bitcoins.
 
Internet Explorer proved to be the biggest security concern for Microsoft in the last month, with the browser spurring 11 of the 19 critical vulnerabilities the company issued in August's "Patch Tuesday" set of software fixes.
 
Oracle has joined the market for pre-integrated systems intended to ease the process of setting up and managing a virtualized compute environment.
 
Instead of boarding a plane for your next business trip, ever think you might make the journey inside a solar-powered, car-sized aluminum pod shooting through a steel tube? That's the vision of Elon Musk, chief executive of electric car maker Tesla Motors and SpaceX.
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Oracle Outside In Technology CVE-2013-3781 Local Security Vulnerability
 
Oracle Fusion Middleware CVE-2013-2393 Local Security Vulnerability
 
Oracle Outside In Technology CVE-2013-3776 Local Security Vulnerability
 
A software bug that caused some characters to be substituted for others in scans by some Xerox machines is more serious than previously thought.
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Facebook said it is buying Mobile Technologies, a company known for its speech recognition and voice-to-voice translation technologies.
 
Some of the biggest names in hard disk drives will band together this week to remind the world that storage isn't all about flash.
 
Samsung Electronics America has started shipping its first curved OLED TV, pricing it at $8,999.99 and making it available through specialty retailers in the U.S.
 
Several law firms joined forces on Monday to sue Microsoft, accusing the company of misleading shareholders about sales of the Surface RT tablet and calling its entry into the market an 'unmitigated disaster.'
 
If it's true that the best CRM systems are built, not bought, then which features should you be building? And how should you build them? As with riding a bike, implementing a CRM system gets much harder once you take off the training wheels--or, in this case, the out-of-the-box features.
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 

Microsoft also released a couple of security advisories today.

Remote Desktop Protocol

SA 2861855 notifies of improvements in the RDP protocol to force users to authenticate themselves before they can get a logon screen. (Network Level Authentication (NLA))

Microsoft root certificates MD5 deprecation

SA 2862973 and the updated SA 2854544 describe efforts to phase out the use of the old MD5 hash algorithm in Microsoft root certificates. 

It amazes me how they still use such an ancient hash algorithm as MD5. I've been involved -now years ago- in a mandatory migration of SHA-1 to SHA-256 for use in (high end) certificates. The migration was mandatory from regulatory and legal perspective - ETSI TS 101 456.  I've had to write justifications on why we needed a few more months of use of SHA-1 than the deadline that was imposed on us and detail the risk mitigation we had in place in order to justify that.
I wonder how one could justify the use of MD5 till today even if one is not bound by legislation and regulation.

--
Swa Frantzen

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Teradici has updated the PCoIP Hardware Accelerator with caching and better GPU support to improve the performance of virtual desktop installations based on VMware's Horizon View platform.
 
Intel's 10-inch and 7-inch Android tablet designs are now available to manufacturers, and the resulting products could rekindle a long rivalry in the education market with One Laptop Per Child, whose first Android tablet became available in July.
 
[ MDVSA-2013:213 ] xymon
 
[ MDVSA-2013:212 ] otrs
 

Overview of the August 2013 Microsoft patches and their status.

# Affected Contra Indications - KB Known Exploits Microsoft rating(**) ISC rating(*)
clients servers
MS13-059 A multitude of new vulnerabilities have been added to the regular cumulative IE update. You want this one if you use IE.
MSIE

CVE-2013-3184
CVE-2013-3186
CVE-2013-3187
CVE-2013-3188
CVE-2013-3189
CVE-2013-3190
CVE-2013-3191
CVE-2013-3192
CVE-2013-3193
CVE-2013-3194
CVE-2013-3199
KB 2862772 No publicly known exploits Severity:Critical
Exploitability:1
Critical Important
MS13-060 A vulnerability in how OpenType fonts are handled allow for random code execution with the rights of the logged-on user. Note that exploitation over the Internet via a a browser is possible.
unicode font parsing

CVE-2013-3181
KB 2850869 No publicly known exploits Severity:Critical
Exploitability:2
Critical Important
MS13-061 Multiple publicly disclosed vulnerabilities allow random code execution when previewing malicious content using OWA (Outlook Web Access). The vulnerabilities are situated in the webready (to display attachments) and Data Loss Prevention (DLP) components.
Of interest is to note that
- it was Oracle who disclosed the vulnerabilities in their patch updates in April and July 2013. Microsoft licensed the vulnerable libraries from Oracle.
- There are also functional changes non security changes rolled up into this update
Exchange

CVE-2013-2393
CVE-2013-3776
CVE-2013-3781
KB 2876063 Publicly disclosed vulnerabilities. Severity:Critical
Exploitability:2
NA Critical
MS13-062 A vulnerability in the handling of asynchronous RPC requests allows for an escalation of privileges. As such it would allow execution of random code in the context of another user.
Microsoft RPC

CVE-2013-3175
KB 2849470 No publicly known exploits Severity:Important
Exploitability:1
Critical Important
MS13-063

Multiple vulnerabilities allow privilege escalation.
Of note is CVE-2013-2556, which allows to bypass a security feature called ASLR (Address Space Layout Randomization) 

Windows Kernel

CVE-2013-2556
CVE-2013-3196
CVE-2013-3197
CVE-2013-3198
KB 2859537 CVE-2013-2556 was publicly disclosed and exploitation was demonstrated. Severity:Important
Exploitability:1
Critical Important
MS13-064 A memory corruption vulnerability in the Windows NAT driver allows for a denial of service (DoS) situation that would cause the system to stop responding till restated. Relies on malicious ICMP packets. Unrelated to MS13-065.
NAT driver

CVE-2013-3182
KB 2849568 No publicly known exploits Severity:Important
Exploitability:3
Less urgent Important
MS13-065 A memory allocation problem in the ICMPv6 implementation allows attackers to cause a Denial of Service (DoS). Exploitation would cause the system to stop responding till restarted. Unrelated to MS13-064.
ICMPv6

CVE-2013-3183
KB 2868623 No publicly known exploits Severity:Important
Exploitability:3
Critical Critical
MS13-066 Active Directory Federation Services (AD FS) could reveal information about the service account used. This information could as an example subsequently be used in a Denial of Service attack by locking the account out, causing all users that rely on the federated service to be locked out as well.
Active Directory

CVE-2013-3185
KB 2873872 No publicly known exploits Severity:Important
Exploitability:3
NA Important
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.
  • The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
  • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
  • Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
  • All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them.

(**): The exploitability rating we show is the worst of them all due to the too large number of ratings Microsoft assigns to some of the patches.

--
Swa Frantzen

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Oracle CEO Larry Ellison in an interview on CBS yesterday praised Steve Jobs, the co-founder of Apple, calling him "our Edison," and argued that without him, Apple would lose its status as a technology leader.
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Amazon Web Services is offering a new service that aims to make it easier for developers to send push notifications to Android and iOS applications.
 
Apache Axis2 'engagingglobally' Cross-Site Scripting Vulnerability
 
SAP BusinessObjects 'Axis2' Component Default Password Security Bypass Vulnerability
 

Beware the ad-punting crapware-laden Firefox, warns infosec bods
Register
Internet users looking for a US Green Card are at risk of being conned by a fake advert into installing an adware-laden version of Firefox, security researchers have warned. The ruse was spotted over the weekend after it began appearing in online ads ...

 
Mobile ad networks can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner.
 
BlackBerry has launched the 9720 smartphone running the 7 OS in a bid to stay relevant in the growing low end of the smartphone market.
 
Xymon Remote Arbitrary File Deletion Vulnerability
 
Re: Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Review Board CVE-2013-2209 HTML Injection Vulnerability
 
OTRS and OTRS ITSM CVE-2013-4717 Unspecified SQL Injection Vulnerabilitiy
 
Amazon Web Services (AWS) has added new features to the company's management platform CloudFormation that aim to improve performance and simplify updates.
 
The "Comment Crew," a group of China-based hackers whose outing earlier this year in major media outlets caused a row with the U.S., have resumed their attacks against dissidents.
 
The Obama administration on Monday launched a review of whether the U.S. uses optimally advancements in technology to protect its national security while preventing unauthorized disclosure and maintaining public trust.
 
Almost 75 percent of government IT budgets globally were reported as flat or increasing in 2013, according to a Gartner CIO survey.
 
An analytics company is trying a novel approach to evaluating risk: by putting a price on it.
 
Google on Monday boosted its standard $1,000 Chrome bug bounty to as much as $5,000.
 
Squash Multiple Arbitrary Code Execution Vulnerabilities
 
Red Hat Enterprise Virtualization Hypervisor CVE-2013-0167 Denial of Service Vulnerability
 
While online data storage services claim your data is encrypted, there are no guarantees. And with government surveillance programs crawling the web for metadata and email, there's little doubt online privacy can exist without strong safeguards.
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
TRIDIUM NiagaraAX CVE-2012-4027 Directory Traversal Vulnerability
 
Struts2 Prefixed Parameters Open Redirect Vulnerability
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Struts2 Prefixed Parameters OGNL Injection Vulnerability
 
Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Open-FTPD Multiple Command Authentication Bypass Vulnerabilities
 
Niagara Framework Session Hijacking Vulnerability
 
CakePHP AssetDispatcher Local File Inclusion Vulnerability
 
HMS Testimonials Multiple Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
 

Posted by InfoSec News on Aug 13

http://www.healthdatamanagement.com/news/breach-notification-hipaa-privacy-security-46476-1.html

By Joseph Goedert
Health Data Management
Aug 12, 2013

Retinal Consultants Medical Group in Sacramento, with 10 offices serving
Northern California, has announced the theft of an unencrypted laptop
computer.

The organization has issued notifications but has not disclosed the number
of affected patients, which it will have to do when it files a...
 

Posted by InfoSec News on Aug 13

http://arstechnica.com/security/2013/08/theyre-ba-ack-hacker-gang-that-infiltrated-nyt-for-months-returns/

By Dan Goodin
The Register
Aug 12, 2013

The hacking team suspected of infiltrating New York Times computers for four
months has resurfaced with new attack tools after months of lying low, security
researchers said.

The group, commonly known as APT 12, has for years engaged in a series of
computer intrusions designed to obtain sensitive...
 

Posted by InfoSec News on Aug 13

http://www.csoonline.com/article/737954/how-security-smart-is-generation-y-

By Taylor Armerding
CSO Online
August 12, 2013

The generation gap has existed for —well — generations. But the current
divide between twentysomethings and their elders in the IT workforce, at
least according to some experts, goes beyond the older cohort simply
shaking their heads and muttering, "Kids these days." There is, they say,
a security divide....
 

Posted by InfoSec News on Aug 13

http://www.theregister.co.uk/2013/08/10/chrome_ssl_clickthrough_report/

By Jack Clark
The Register
10th August 2013

Admins of Chrome shops unite – your users are dabbling with dodgy SSL, and
you must teach them how to be safer online until Google updates its
browser.

That's the gist of a new report from Google researcher Adrienne Porter
Felt and University of California, Berkeley graduate student Devdatta
Akhawe, who trawled some 25...
 

Posted by InfoSec News on Aug 13

http://www.infosecnews.org/event/22nd-usenix-security-symposium/

August 14 - 16 | $895.00

Join us in Washington, D.C., August 14th - 16th, 2013, for the 22nd USENIX
Security Symposium. The USENIX Security Symposium brings together researchers,
practitioners, system administrators, system programmers, and others interested
in the latest advances in the security of computer systems and networks.

The Symposium will span three days, with a...
 
Internet Storm Center Infocon Status