Old Alerts

phpnuke.org compromised...

FYI...

phpnuke .org ...compromised
- http://community.websense.com/blogs...0/05/07/phpnuke-org-has-been-compromised.aspx
7 May 2010 07:25 AM - "... PHP-Nuke is a popular Web content management system (CMS), based on PHP and a database such as MySQL, PostgreSQL, Sybase, or Adabas. Earlier versions were open source and free software protected by GNU Public License, but since then it has become commercial software. As it is still very popular in the Internet community, it is not surprising that it has become a target of blackhat attacks... The injected iframe hijacks the browser to a malicious site, where through several steps of iframe redirections the user finally ends up on a highly obfuscated malicious page... After de-obfuscating the code, we can see three different exploits, two of them targeting Internet Explorer and the third one targeting Adobe Reader. The first exploit targets a vulnerability in MDAC (CVE-2006-0003), described in Microsoft Security Bulletin MS06-014. If it succeeds, a malicious application is downloaded and stored in "%temp%\updates.exe". After this the downloaded trojan is executed, at which point it installs itself on the computer and attempts to access several Web sites... The second exploit uses a Java vulnerability to spawn shellcode, which then initiates the download action... The third exploit is a PDF exploit -- this actually merges three exploits targeting Adobe Reader. First the JavaScript in the HTML page checks if Adobe Reader is exploitable by checking its version number. The version should be between 7 and 7.1.4, 8 and 8.1.7, or 9 and 9.4. When a vulnerable version is found, the exploit downloads the malicious PDF file and as it is loaded by Adobe Reader, the malicious ActionScript in the file is executed automatically. The PDF itself contains an obfuscated ActionScript that utilizes one of the three different PDF exploits it hides. These are CVE-2009-4324, CVE-2007-5659, and CVE-2009-0927. If it succeeds, the download and installation of updates.exe happens in a similar manner to that described earlier. The downloaded executable is detected by 12% of antivirus products, according to VirusTotal*.
WARNING: At the time of writing the front page of phpnuke .org still contains the malicious iframe, so we advise users to stay away from the site until it has been fixed..."
* http://www.virustotal.com/analisis/...df26c1565026dc71712b9a391953fb9d24-1273013683
File 1e99dab3abd728300f055a047626d1211 received on 2010.05.04 22:54:43 (UTC)
Result: 5/41 (12.20%)

- http://pandalabs.pandasecurity.com/php-nuke-hacked-with-injected-iframe/
5/7/10

- http://www.theregister.co.uk/2010/05/11/phpnuke_infection_purged/
11 May 2010 - "The official website for content management system PHP-Nuke was purged of a nasty infection on Tuesday that for four days attempted to install malware on visitors' machines. The website, which used an out-of-date version of PHP, was compromised as long ago as Friday, according to reports from Websense and Panda Labs. The infection redirected anyone visiting the PHP-Nuke front page to a series of attack sites and wasn't cleaned up until Tuesday, Sophos said*..."
* http://www.sophos.com/blogs/sophoslabs/?p=9585
May 11th, 2010 - "... While writing this post the site has been cleaned up."

:mad::mad:
 
Last edited:
Irfanview v4.27 available

FYI...

Irfanview vulns - update available
- http://secunia.com/advisories/39036/
Last Update: 2010-05-17
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Solution: Update to version 4.27.
- http://irfanview.com/main_download_engl.htm

Current PlugIns
- http://fileforum.betanews.com/download/IrfanView-PlugIns/1099412658/1
irfanview_plugins_427_setup.exe

- http://irfanview.com/main_history.htm
Release date: 2010-05-09

- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1509
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1510
Last revised: 05/21/2010

:fear:
 
Last edited:
OpenDNS - DDoS ...resolved

FYI...

OpenDNS - Palo Alto – DDoS ...resolved
- http://system.opendns.com/2010/05/18/117/
May 18, 2010 6:20 am UTC* - "Starting at 10:15 PM PDT... all of our global locations suffered a significant denial of service attack. All sites withstood the attack with the exception of Palo Alto, which had sporadic reachability issues lasting for almost 30 minutes. This interruption took our engineers longer to diagnose than it normally would have due to some difficulty removing some routing advertisements between our routers and one of our ISPs... By 10:45 PM PDT, all DNS traffic was routed to alternate locations, including Los Angeles and Seattle, which were online serving traffic the entire time... By 11:10 PM PDT, all website services returned to normal and all services were online. As with any interruption of service, we will be evaluating our procedures, capacity planning models and will ultimately take whatever steps necessary to ensure it does not happen again.
* Update: To clarify some misunderstandings, DNS was not significantly impacted at any site besides Palo Alto (even though all sites were attacked). At Palo Alto, we have numerous connections to the Internet and peering partners and for reasons we are still investigating, one of our connections to the Internet had a prolonged service interruption and did not behave as designed."

- http://system.opendns.com/

:fear:
 
HP notebook battery recall expanded...

FYI...

HP notebook battery recall
- http://bpr.hpordercenter.com/hbpr/M14.aspx
May 19, 2010 - "On May 19, 2010, HP expanded a worldwide voluntary recall and replacement program in cooperation with various government agencies, adding battery packs to the replacement program announced on May 14, 2009 and revised on October 15, 2009. Product model series were also added to the list of products that may have been sold with affected batteries. HP customers affected by this program will be eligible to receive a replacement battery pack for each verified, recalled battery pack at no cost... HP and the battery manufacturers believe that certain battery packs shipped in HP notebook PC products manufactured between August 2007 and May 2008 may pose a potential safety hazard to customers. The batteries can overheat, posing a fire and burn hazard..."

- http://www.cpsc.gov/cpscpub/prerel/prhtml09/09221.html
Revised October 15, 2009"... Consumers should stop using recalled products immediately unless otherwise instructed... The recalled lithium-ion batteries can overheat, posing a fire and burn hazard to consumers... two reports of batteries that overheated and ruptured, resulting in flames/fire that caused minor property damage. No injuries have been reported... The recalled lithium-ion rechargeable batteries are used with various HP and Compaq notebook computers..."

- http://www.cpsc.gov/cpscpub/prerel/prhtml10/10240.html
May 21, 2010
Name of Product: Lithium-Ion batteries used in Hewlett-Packard and Compaq notebook computers
Units: About 54,000 (70,000 units were previously recalled in May 2009)

(Additional detail at all URLs above.)

:fear::fear:
 
Last edited:
Foxit Reader v3.3.1.0518 released

FYI...

Foxit Reader v3.3.1.0518 released
- http://www.foxitsoftware.com/downloads/index.php
May 20, 2010

What's New...
- http://www.foxitsoftware.com/pdf/reader/whatsnew331.htm
"... A pop-up dialog contains an area which is reserved for a message that is generated by the rendered PDF. Due to Foxit's concern that this message may mislead users to take an unadvisable action, Foxit Reader will no longer display the content of the message and removes any parameters within the Pop-up message that can be manipulated by the PDF."

Bug Fix List
- http://www.foxitsoftware.com/pdf/reader/bugfix.htm

Update available through the "Check for Updates" function:
From an admin. account > Help > Check for Updates now > FoxIt Reader 3.3.1.0518 Upgrade

:fear:
 
Last edited:
MySQL v5.1.47 update available

FYI...

MySQL v5.1.47 update available
- http://www.mysql.com/downloads/mysql/

Changes in MySQL 5.1.47
- http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html

- http://secunia.com/advisories/39792/
Last Update: 2010-05-21
Criticality level: Moderately critical
Impact: Security Bypass, DoS, System access
Where: From local network
Software: MySQL 5.x
CVE Reference(s): CVE-2010-1848, CVE-2010-1849, CVE-2010-1850
...The vulnerabilities are reported in versions prior to 5.1.47.
Solution: Update to version 5.1.47.

:fear:
 
Akami - Attack traffic increases ...

FYI...

Akami - Attack traffic at 206% above normal
- http://www.akamai.com/html/technology/dataviz1.html
2010.06.05 @08:53AM edt - 765 attacks / 24 hours ...

- http://www.akamai.com/html/technology/realtime_web_methodology.html
"Attack Traffic: ... The packets captured are generally from automated scanning trojans and worms looking to infect new computers scanning randomly generated IP addresses. The attack traffic depicts the total number of attacks over the last twenty-four hours. Values are measured in attacks per 24 hours (attacks/24hrs). Regions are displayed as countries or states..."

:fear::fear:
 
Skype exploit-in-the-wild...

FYI...

Skype 'Extras Manager' vuln found In The Wild...
- http://www.m86security.com/labs/i/S...lnerability-Found-In-The-Wild,trace.1347~.asp
June 16, 2010 - "On October 12th, 2009, Skype released an updated version (4.1.0.179) of their popular VoIP client, which fixed an unspecified vulnerability in their plug-in component for Skype called EasyBits Extras Manager. The EasyBits software is intended to protect commercial software, such as plug-ins, from illegal redistribution or unlicensed use... Vulnerability disclosures are one of the most common ways cybercriminals craft their exploits, including those seen in the exploit kits themselves. In this scenario, our Security Labs team has identified a working exploit in the wild that targets this vulnerability... the malicious code exploits a Skype ActiveX vulnerability using primitive obfuscation techniques in order to bypass Antivirus security solutions. We can confirm this exploit code works successfully against vulnerable Skype installations. Testing this exploit page with VirusTotal, illustrates the dismal results (1/41 - 2.44%)... It is interesting to note that within Skype's own release notes for the security vulnerability, they provide a recommendation to their users to "use virus protection services in case of any problems." Unfortunately for those users, the virus protection would have failed. However, the core issue here is not the antivirus solution's ability to mitigate this threat, but the fact that the update process remains problematic for many companies. Many users continue to run outdated applications for months, even years, and these old versions continue to be exploited by cybercriminals. Even with the disclosure and security fixes provided by application developers, cybercriminals know that most users rarely update, making it not only easy but beneficial to monitor sites that post disclosures and proof of concept code. Ask yourself: Do you know what version of Skype you're running?"

- http://secunia.com/vulnerability_scanning/online/?task=start

:fear::fear:
 
Last edited:
iTunes v9.2 release fixes multiple vulns...

FYI...

iTunes v9.2 released
- http://secunia.com/advisories/40196/
Release Date: 2010-06-17
Criticality level: Highly critical
Impact: Security Bypass, Exposure of sensitive information, System access
Where: From remote
Solution: Update to version 9.2.
Apple: http://support.apple.com/kb/HT4220
CVE Reference(s): CVE-2009-1726, CVE-2010-0544, CVE-2010-1119, CVE-2010-1387, CVE-2010-1390, CVE-2010-1392, CVE-2010-1393, CVE-2010-1395, CVE-2010-1396, CVE-2010-1397, CVE-2010-1398, CVE-2010-1399, CVE-2010-1400, CVE-2010-1401, CVE-2010-1402, CVE-2010-1403, CVE-2010-1404, CVE-2010-1405, CVE-2010-1408, CVE-2010-1409, CVE-2010-1410, CVE-2010-1411, CVE-2010-1412, CVE-2010-1414, CVE-2010-1415, CVE-2010-1416, CVE-2010-1417, CVE-2010-1418, CVE-2010-1419, CVE-2010-1421, CVE-2010-1422, CVE-2010-1749, CVE-2010-1758, CVE-2010-1759, CVE-2010-1761, CVE-2010-1763, CVE-2010-1769, CVE-2010-1770, CVE-2010-1771, CVE-2010-1774

- http://support.apple.com/downloads/
"... iTunes 9.2 provides a number of important bug fixes..."

- http://securitytracker.com/alerts/2010/Jun/1024108.html
June 16, 2010

:fear::fear:
 
Last edited:
Foxit Reader v4.0 released

FYI...

Foxit Reader v4.0 released
- http://www.foxitsoftware.com/downloads/index.php
06/29/10

- http://www.foxitsoftware.com/pdf/reader/bugfix.php

- http://www.foxitsoftware.com/pdf/reader/security.php
"... Foxit Reader 4.0 security options include, Security Warning Dialog, Trust Manager (Safe Mode), and in extreme situations the ability to Disable JavaScript completely..."

- http://www.foxitsoftware.com/pdf/reader/features_benefits.php

Update now available through the "Check for Updates" function:
From an admin. account > Help > Check for Updates now > FoxIt Reader 4.0.0.0619 Upgrade
07.02.2010

:fear:
 
iTunes accounts hacked...

FYI...

iTunes accounts hacked...
- http://isc.sans.edu/diary.html?storyid=9136
Last Updated: 2010-07-05 19:31:16 UTC - "... iTunes accounts have been hacked to make mass purchases of one developer's app. As a safety measure, I recommend to change your ITunes password ASAP and, if you feel paranoid like me, delete your credit card info from the account until this issue is clarified. More information at: http://www.alexbrie.com/archives/205 , http://thenextweb.com/apple/2010/07/04/app-store-hacked ..."

- http://www.theregister.co.uk/2010/07/05/itunes_app_store_manipulation/
5 July 2010 11:29 GMT

- http://blog.trendmicro.com/cybercriminals-make-money-out-of-app-store/
July 6, 2010 - "... cybercrime groups have now found a working business model in monetizing phished user accounts in Apple’s App Store. They’ve circumvented Apple’s “strict” app review process by submitting nonmalicious apps (doesn’t matter if the app is worthless) then used phished iTunes accounts to buy (and make money from) the worthless apps... by targeting user accounts, cybercriminals attacked the weakest link in the system (the user), only using Apple’s App Store as platform and the worthless apps as means to cash in on phished accounts. May this incident serve as a glaring reminder on the importance of our online accounts, especially if our credit and/or debit cards are tied to them."

:fear::mad::fear:
 
Last edited:
1H 2010 - Security bug count up - 3rd party apps ... Secunia report

FYI...

1H 2010 - Security bug count up - 3rd party apps ...
- http://www.theregister.co.uk/2010/07/12/secunia_threat_report/
12 July 2010 - "The number of vulnerabilities in the first half of 2010 was close to the number recorded in the whole of 2009, security notification firm Secunia reports*... Secunia reckons the security threat landscape is shifting from operating system vulnerabilities to bugs in third-party applications. Secunia reckons a typical end-user PC with 50 programs installed will be faced with 3.5 times more security bugs in the 24 third party programs running on their systems than in the 26 Microsoft programs installed. Secunia expects this ratio to increase to 4.4 in 2010. Patching to defend against these vulnerabilities is further complicated by the 13 different software update mechanisms running on each PC... study can be found here*."
* http://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf
"... The overall conclusion is that despite considerable security investments, the software industry at large still proves unable to produce software with substantially less vulnerabilities, highlighting the continued need for Vulnerability Intelligence and Patch Management... the report shows an alarming development in 3rd party program vulnerabilities, representing an increasing threat to both users and business..."

- http://www.pcmag.com/article2/0,2817,2366015,00.asp
07.02.2010

- http://isc.sans.edu/diary.html?storyid=9172
Last Updated: 2010-07-14 14:36:45 UTC

- http://www.bitdefender.com/files/News/file/H1_2010_E-Threats_Landscape_Report.pdf
"... During the last six months, China has been the most active country in terms of malware propagation, followed by the Russian Federation. Both countries are known for their lax legislation regarding cybercrime, as well as for the plethora of “bulletproof hosting” companies – such as the officially dead Russian Business Network (but extremely active in practice), Troyak (taken down in March 2010) or PROXIEZ-NET (gone as of May 2010). If both the Russian Federation and China are the main hosters for Zeus C & C panels / exploit packs, and medicine spam mass-mailers, Brazil – ranked third – has an industry of its own: the highly dangerous banker Trojans... "

:fear::fear:
 
Last edited:
Oracle critical patch update advisory - July 2010

FYI...

Oracle Critical Patch Update Advisory - July 2010
- http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html
2010-July-13 - "... Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 59 new security fixes..."
(More details at the URL above.)

- http://www.us-cert.gov/current/#oracle_releases_critical_patch_update13
"... security fixes:
• 6 for Oracle Database Server
• 2 for TimesTen In-Memory Database
• 5 for Oracle Secure Backup
• 7 for Oracle Fusion Middleware
• 1 for Oracle Enterprise Manager
• 7 for Oracle E-Business Suite
• 2 for Oracle Supply Chain Products Suite
• 8 for Oracle PeopleSoft and JDEdwards Suite
• 21 for Oracle Sun Products Suite ..."

- http://www.securitytracker.com/archives/summary/9000.html
2010-07-13 // 2010-07-14 - Oracle...
- http://www.securityfocus.com/
2010-07-13 // 2010-07-14 - Oracle...

:fear::fear:
 
Last edited:
vBulletin vuln - update 3.8.6 PL1 available

FYI...

vBulletin vuln - update available
- http://secunia.com/advisories/40675/
Last Update: 2010-07-23
Criticality level: Moderately critical
Impact: Exposure of sensitive information
Where: From remote
Solution Status: Vendor Patch
Software: vBulletin 3.x
... The vulnerability is reported in version 3.8.6. Prior versions may also be affected.
Solution: Apply patch 3.8.6 PL1...
Original Advisory: vBulletin:
http://www.vbulletin.com/forum/showthread.php?357818-Security-Patch-Release-3.8.6-PL1 ...
vbfans.com:
http://vbfans.com/wtn-official-products-services/251578-wtn-patch-vbulletin-3-8-6-faq-php/

:fear:
 
2010 Data Breach Investigations Report - Verizon...

FYI...

* http://securityblog.verizonbusiness.com/2010/07/28/2010-dbir-released/

- http://preview.tinyurl.com/37d8rea
"... Key findings of the 2010 report:
• Most data breaches (69%) caused by external sources
• Many breaches (48%) involved privilege misuse
• Nearly all data is breached from servers and online applications
• Most breaches (85%) were not difficult to carry out
• Most victims (87%) missed evidence of security breaches in their log files
• Recommendations for enterprises:
- Restrict and monitor privileged users
- Watch for minor policy violations
- Implement measures to stop the use of stolen credentials
- Focus on the size and volume of log files
- Share incident information with other organisations"

- http://krebsonsecurity.com/2010/07/hacked-companies-hit-by-the-obvious-in-2009/
July 28, 2010

:fear:
 
Foxit Reader v4.1.1.0805 available

FYI...

Foxit Reader v4.1.1.0805 available
- http://www.foxitsoftware.com/announcements/2010861227.html
Fixed in Foxit Reader 4.1.1
• Foxit Reader 4.1.1.0805 addresses vulnerability associated with the rendering of the PDF's embedded in the new iPhone/iPad jailbreak program.
CVE-2010-1797: http://www.f-secure.com/weblog/archives/00002004.html
August 6, 2010

Direct download - latest version
- http://www.foxitsoftware.com/downloads/download_links/downloadreader.php?tag=exe

Update now available through the "Check for Updates" function:
From an admin. account: > Help > Check for Updates now > FoxIt Reader 4.1.1.0805 Upgrade
8.6.2010

- http://www.foxitsoftware.com/pdf/reader/security_bulletins.php

- http://securitytracker.com/alerts/2010/Aug/1024294.html
Aug 6 2010

- http://www.us-cert.gov/current/#foxit_releases_foxit_reader_4

:fear:
 
Last edited:
Google Chrome v5.0.375.126 released

FYI...

Google Chrome v5.0.375.126 released
- http://googlechromereleases.blogspot.com/search/label/Stable updates
August 10, 2010 - "Google Chrome 5.0.375.126 has been released to the Stable channel on Linux, Mac, and Windows. This version contains an updated version of the Flash plugin..."

- http://secunia.com/advisories/40917/
Release Date: 2010-08-11
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution: Update to version 5.0.375.126...

:fear:
 
Last edited:
Back
Top