11.5 C
London
Sunday, October 22, 2017

WikiLeaks Dump Shows CIA Interdiction of iPhone Supply Chain

Today's WikiLeaks Vault 7 Dark Matter release shows the CIA's capabilities to attack and persist on Apple iPhone and Mac firmware and an apparent interdiction of the iPhone supply chain.

Infotec Printer Drivers 10.0 for OS X

This download includes the latest printing and scanning software for OS X Lion, Mac OS X v10.6 and Mountain Lion. For information about supported printer models, see: http://support.apple.com/kb/HT3669    

Cisco ASR 5000 Series IKEv2 Denial of Service Vulnerability

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco ASR 5000 Series Software could allow an unauthenticated, remote attacker to cause a reload of the ipsecmgr process. The vulnerability is due to a race...

Digital Camera RAW Compatibility Update 4.08

This update adds RAW image compatibility for the following cameras to Aperture 3 and iPhoto '11:   Canon EOS 70D Fujifilm X-M1 Leica M Leica M Monochrom Nikon COOLPIX P330 Pentax 645D Sony Cyber-shot DSC-RX1R Sony Cyber-shot DSC-RX100...

Cisco Email Security Appliance Max Files Denial of Service Vulnerability

A vulnerability in file descriptor handling of the Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition due to the affected device unexpectedly reloading. ...

RHBA-2015:0025-1: Red Hat OpenShift Enterprise 2.2 jasper bug fix update

[unable to retrieve full-text content]Red Hat Enterprise Linux: Updated jasper-devel packages are now available for Red Hat OpenShift Enterprise release 2.2. These packages are required to avoid dependency issues with the base channel for Red Hat Ente...

Microsoft Releases Outlook and Office Click-to-Run Patches

Microsoft patched three new Outlook vulnerabilities and re-released updates from a broken June update.

RHBA-2014:0495-1: rhel-guest-image bug fix update

An updated rhel-guest-image package that fixes one bug is now available for RedHat Common for Red Hat Enterprise Linux 6. The rhel-guest-image packages provide a Red Hat Enterprise Linux 6.5 KVM GuestImage for cloud instances. This image is provided ...

RHBA-2016:0400-1: unboundid-ldapsdk bug fix and enhancement update

Details Updated unboundid-ldapsdk packages that fix several bugs and add variousenhancements are now available. The UnboundID LDAP SDK for Java is a free Java library for communicating withLDAP directory servers and performing related tasks like reading and writingLDIF, encoding and decoding data using base64 and ASN.1 BER, and performingsecure communication. Solution Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258 Updated packages Red Hat Enterprise Virtualization 3.6 SRPMS: unboundid-ldapsdk-3.0.0-1.el6ev.src.rpm     MD5: ba4a36f310b4202f6811aa7c6d16bd28SHA-256: 6a80fe7da9cc9a908e4fad8278f76e15c199b2537ad3b7611c80baf97e05e93b   x86_64: unboundid-ldapsdk-3.0.0-1.el6ev.noarch.rpm     MD5: 100364ac1e119c688e58b228f04c7f22SHA-256: 418feb0985b900eec247093d83f81a5dc02f47420ef62f35cabf084717f1fec7 unboundid-ldapsdk-javadoc-3.0.0-1.el6ev.noarch.rpm     MD5: 6c69baacf8b1eeb428c5f0ea35c4133fSHA-256: 41d274e37d728ba65ef4056d5fcd493441eeda97167737a27b01e4ffc87f4277   (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 1237311 - [RFE] unboundid-ldapsdk-3.0.0 version bump These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/

Cisco Unified Communications Domain Manager Cross-Site Scripting Vulnerability

A vulnerability in the web framework of Cisco Unified Communications Domain Manager (UCDM) Software could allow an unauthenticated, remote attacker to perform a cross-site scripting (XSS) attack. The vulnerability is due to insuff...

Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products

Multiple Cisco products include an implementation of the Apache Struts 2 component that is affected by a remote command execution vulnerability. The vulnerability is due to insufficient sanitization of user-supplied input. An att...

TA15-314A: Web Shells – Threat Awareness and Guidance

Original release date: November 10, 2015Systems Affected Web servers that allow web shells Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert outlines the threat and provides prevention, detection, and mitigation strategies.Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to significant cyber incidents.This product was developed in collaboration with US-CERT partners in the United Kingdom, Australia, Canada, and New Zealand based on activity seen targeting organizations across these countries. The detection and mitigation measures outlined in this document represent the shared judgement of all participating agencies. Description Web Shell DescriptionA web shell is a script that can be uploaded to a web server to enable remote administration of the machine. Infected web servers can be either Internet-facing or internal to the network, where the web shell is used to pivot further to internal hosts.A web shell can be written in any language that the target web server supports. The most commonly observed web shells are written in languages that are widely supported, such as PHP and ASP. Perl, Ruby, Python, and Unix shell scripts are also used.Using network reconnaissance tools, an adversary can identify vulnerabilities that can be exploited and result in the installation of a web shell. For example, these vulnerabilities can exist in content management systems (CMS) or web server software.Once successfully uploaded, an adversary can use the web shell to leverage other exploitation techniques to escalate privileges and to issue commands remotely. These commands are directly linked to the privilege and functionality available to the web server and may include the ability to add, delete, and execute files as well as the ability to run shell commands, further executables, or scripts.How and why are they used by malicious adversaries?Web shells are frequently used in compromises due to the combination of remote access and functionality. Even simple web shells can have a considerable impact and often maintain minimal presence.Web shells are utilized for the following purposes:To harvest and exfiltrate sensitive data and credentials;To upload additional malware for the potential of creating, for example, a watering hole for infection and scanning of further victims;To use as a relay point to issue commands to hosts inside the network without direct Internet access;To use as command-and-control infrastructure, potentially in the form of a bot in a botnet or in support of compromises to additional external networks. This could occur if the adversary intends to maintain long-term persistence.While a web shell itself would not normally be used for denial of service (DoS) attacks, it can act as a platform for uploading further tools, including DoS capability.ExamplesWeb shells such as China Chopper, WSO, C99 and B374K are frequently chosen by adversaries; however these are just a small number of known used web shells. (Further information linking to IOCs and SNORT rules can be found in the Additional Resources section).China Chopper – A small web shell packed with features. Has several command and control features including a password brute force capability.WSO – Stands for “web shell by orb” and has the ability to masquerade as an error page containing a hidden login form.C99 – A version of the WSO shell with additional functionality. Can display the server’s security measures and contains a self-delete function.B374K – PHP based web shell with common functionality such as viewing processes and executing commands.Delivery TacticsWeb shells can be delivered through a number of web application exploits or configuration weaknesses including:Cross-Site Scripting;SQL Injection;Vulnerabilities in applications/services  (e.g., WordPress or other CMS applications);File processing vulnerabilities (e.g., upload filtering or assigned permissions);Remote File Include (RFI) and Local File Include (LFI) vulnerabilities;Exposed Admin Interfaces (possible areas to find vulnerabilities mentioned above).The above tactics can be and are combined regularly. For example, an exposed admin interface also requires a file upload option, or another exploit method mentioned above, to deliver successfully. Impact A successfully uploaded shell script may allow a remote attacker to bypass security restrictions and gain unauthorized system access. Solution Prevention and MitigationInstallation of a web shell is commonly accomplished through web application vulnerabilities or configuration weaknesses. Therefore, identification and closure of these vulnerabilities is crucial to avoiding potential compromise. The following suggestions specify good security and web shell specific practices:Employ regular updates to applications and the host operating system to ensure protection against known vulnerabilities.Implement a least-privileges policy on the web server to:Reduce adversaries’ ability to escalate privileges or pivot laterally to other hosts.Control creation and execution of files in particular directories.If not already present, consider deploying a demilitarized zone (DMZ) between your webfacing systems and the corporate network. Limiting the interaction and logging traffic between the two provides a method to identify possible malicious activity.Ensure a secure configuration of web servers. All unnecessary services and ports should be disabled or blocked. All necessary services and ports should be restricted where feasible. This can include whitelisting or blocking external access to administration panels and not using default login credentials.Utilize a reverse proxy or alternative service, such as mod_security, to restrict accessible URL paths to known legitimate ones.Establish, and backup offline, a “known good” version of the relevant server and a regular change-management  policy to enable monitoring for changes to servable content with a file integrity system.Employ user input validation to restrict local and remote file inclusion vulnerabilities.Conduct regular system and application vulnerability scans to establish areas of risk. While this method does not protect against zero day attacks it will highlight possible areas of concern.Deploy a web application firewall and conduct regular virus signature checks, application fuzzing, code reviews and server network analysis.DetectionDue to the potential simplicity and ease of modification of web shells, they can be difficult to detect. For example, anti-virus products sometimes produce poor results in detecting web shells.The following may be indicators that your system has been infected by a web shell. Note a number of these indicators are common to legitimate files. Any suspected malicious files should be considered in the context of other indicators and triaged to determine whether further inspection or validation is required.Abnormal periods of high site usage (due to potential uploading and downloading activity);Files with an unusual timestamp (e.g., more recent than the last update of the web applications installed);Suspicious files in Internet-accessible locations (web root);Files containing references to suspicious keywords such as cmd.exe or eval;Unexpected connections in logs. For example:A file type generating unexpected or anomalous network traffic (e.g., a JPG file making requests with POST parameters);Suspicious logins originating from internal subnets to DMZ servers and vice versa.Any evidence of suspicious shell commands, such as directory traversal, by the web server process. For investigating many types of shells, a search engine can be very helpful. Often, web shells will be used to spread malware onto a server and the search engines are able to see it. But many web shells check the User-Agent and will display differently for a search engine spider (a program that crawls through links on the Internet, grabbing content from sites and adding it to search engine indexes) than for a regular user. To find a shell, you may need to change your User-Agent to one of the search engine bots. Some browsers have plugins that allow you to easily switch a User-Agent. Once the shell is detected, simply delete the file from the server.Client characteristics can also indicate possible web shell activity. For example, the malicious actor will often visit only the URI where the web shell script was created, but a standard user usually loads the webpage from a linked page/referrer or loads additional content/resources. Thus, performing frequency analysis on the web access logs could indicate the location of a web shell. Most legitimate URI visits will contain varying user-agents, whereas a web shell is generally only visited by the creator, resulting in limited user-agent variants. References Australian Cyber Security Centre – Securing Content Management Systems (CMS) FireEye China Chopper – The Little Malware That Could. Detecting and Defeating the China Chopper Web Shell MANDIANT – Old Web Shells New Tricks FireEye – Breaking Down the China Chopper Web Shell Part I FireEye – Breaking Down the China Chopper Web Shell Part II WSO Information Exploit-db – China Chopper C99 INFOSEC Institute – Web Shell Detection Revision History November 10, 2015: Initial Release This product is provided subject to this Notification and this Privacy & Use policy.