Thursday, January 31, 2019

AFP concerned about approving state police usage of Australia's encryption laws

Firefox will soon warn users of software that performs MitM attacks

Symantec tops Q3 targets, CFO to step down


Symantec published better-than-expected third quarter results on Thursday and raised its revenue guidance for the fiscal year. The cybersecurity company posted Q3 non-GAAP earnings per share of 44 cents on revenue of $1.21 billion.

Wall Street was looking for earnings of 39 cents per share on revenue of $1.18 billion. Shares of Symantec were up more than 5 percent after hours.

For Q4, Symantec now expects non-GAAP earnings between 37 cents and 41 cents on revenue between $1.185 billion and $1.215 billion. Analysts are expecting non-GAAP earnings per share of 38 cents on revenue of $1.21 billion.

"We achieved operating results in line or above guidance, while delivering strong cash flow from operations," said Symantec CEO Greg Clark, in prepared remarks. The company ended the quarter with $2.31 billion in cash and equivalents. 

Symantec also announced that its chief financial officer Nicholas Noviello is stepping down. He'll remain with the company until a successor is appointed.



from Latest Topic for ZDNet in... https://zd.net/2RZkCfv

Company selling social media 'likes' and 'followers' settles with US authorities

USN-3871-2: Linux kernel regression

linux regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS

Summary

Multiple regressions were fixed in the Linux kernel.

Software Description

  • linux - Linux kernel

Details

USN-3871-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. Unfortunately, that update introduced regressions with docking station displays and mounting ext4 file systems with the meta_bg option enabled. This update fixes the problems.

We apologize for the inconvenience.

Original advisory details:

Wen Xu discovered that a use-after-free vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10876, CVE-2018-10879)

Wen Xu discovered that a buffer overflow existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10877)

Wen Xu discovered that an out-of-bounds write vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10878, CVE-2018-10882)

Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly ensure that xattr information remained in inode bodies. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash). (CVE-2018-10880)

Wen Xu discovered that the ext4 file system implementation in the Linux kernel could possibly perform an out of bounds write when updating the journal for an inline file. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash). (CVE-2018-10883)

It was discovered that a race condition existed in the vsock address family implementation of the Linux kernel that could lead to a use-after-free condition. A local attacker in a guest virtual machine could use this to expose sensitive information (host machine kernel memory). (CVE-2018-14625)

Cfir Cohen discovered that a use-after-free vulnerability existed in the KVM implementation of the Linux kernel, when handling interrupts in environments where nested virtualization is in use (nested KVM virtualization is not enabled by default in Ubuntu kernels). A local attacker in a guest VM could possibly use this to gain administrative privileges in a host machine. (CVE-2018-16882)

Jann Horn discovered that the procfs file system implementation in the Linux kernel did not properly restrict the ability to inspect the kernel stack of an arbitrary task. A local attacker could use this to expose sensitive information. (CVE-2018-17972)

Jann Horn discovered that the mremap() system call in the Linux kernel did not properly flush the TLB when completing, potentially leaving access to a physical page after it has been released to the page allocator. A local attacker could use this to cause a denial of service (system crash), expose sensitive information, or possibly execute arbitrary code. (CVE-2018-18281)

Wei Wu discovered that the KVM implementation in the Linux kernel did not properly ensure that ioapics were initialized. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-19407)

It was discovered that the debug interface for the Linux kernel’s HID subsystem did not properly perform bounds checking in some situations. An attacker with access to debugfs could use this to cause a denial of service or possibly gain additional privileges. (CVE-2018-9516)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-45-generic - 4.15.0-45.48
linux-image-4.15.0-45-generic-lpae - 4.15.0-45.48
linux-image-4.15.0-45-lowlatency - 4.15.0-45.48
linux-image-4.15.0-45-snapdragon - 4.15.0-45.48
linux-image-generic - 4.15.0.45.47
linux-image-generic-lpae - 4.15.0.45.47
linux-image-lowlatency - 4.15.0.45.47
linux-image-snapdragon - 4.15.0.45.47

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References



from Ubuntu Security Notices http://bit.ly/2CUdmr3

Hey Apple. Why not ban all of Facebook's apps?

USN-3877-1: LibVNCServer vulnerabilities

libvncserver vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in LibVNCServer.

Software Description

  • libvncserver - vnc server library

Details

It was discovered that LibVNCServer incorrectly handled certain operations. A remote attacker able to connect to applications using LibVNCServer could possibly use this issue to obtain sensitive information, cause a denial of service, or execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
libvncclient1 - 0.9.11+dfsg-1.1ubuntu0.1
libvncserver1 - 0.9.11+dfsg-1.1ubuntu0.1
Ubuntu 18.04 LTS
libvncclient1 - 0.9.11+dfsg-1ubuntu1.1
libvncserver1 - 0.9.11+dfsg-1ubuntu1.1
Ubuntu 16.04 LTS
libvncclient1 - 0.9.10+dfsg-3ubuntu0.16.04.3
libvncserver1 - 0.9.10+dfsg-3ubuntu0.16.04.3
Ubuntu 14.04 LTS
libvncserver0 - 0.9.9+dfsg-1ubuntu1.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart LibVNCServer applications to make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2UCdQJR

New security flaw impacts 5G, 4G, and 3G telephony protocols

Why Business Leaders Should Care About Quantum Computing


In the tech sector, pundits are always hyping the next, disruptive technology on the verge of changing, well, everything. “Embrace this transformative new force or ignore it at your peril,” they warn. Sometimes, they even get it right. Quantum computing may very likely be one of those times.

If you haven’t heard, the race is on to build the world’s first commercially viable quantum computer. If you believe the buzz, anyone with a quantum computer—be it a hostile government, business competitor, or lone hacker—would be able to crack any cybersecurity encryption on the planet instantly.

Before you run screaming for your information security officer, let me put your mind to rest. Despite the hype, quantum computing is not right around the corner—nor can it instantly crack any encryption. That said, quantum computing will no doubt arrive, and it will be an immensely powerful tool for good as well as for evil. Here’s what you need to know.

Encryption is everywhere

To understand why cybersecurity experts are concerned, you need to know a little bit about how encryption works, where it is used, and how quantum computers are fundamentally different from today’s digital computers.

Encryption is a cryptography method for protecting digital data by making it unreadable in the event it is stolen or intercepted by an unauthorized party. Encryption transforms readable text into unintelligible code or cyphertext that requires a “key” in order to decrypt the data and make it readable.  The longer the key, the harder it is to crack the code.

You don’t need to work in the military or intelligence community to use encryption. It is literally everywhere.

  • If you buy or sell anything over the web, that credit card transaction is protected by encryption.
  • If you or your employees use a Virtual Private Network (VPN) to protect corporate information while working remotely, you’re using encryption.
  • If you use direct deposit or any other type of electronic funds transfers, you rely on encryption.

Today’s web browsers automatically encrypt text when they connect to a secure server, and its use is growing thanks to stricter industry and government mandates, such as the GDPR, for the protection of personal data.

Quantum computing is a different breed of cat

The digital computers we all use today operate using a sequence of binary bits: ones and zeroes. Each bit is always in one of two definitive states, acting as an on or off switch to drive computer functions. Quantum computers are different beasts altogether—to explain that difference, we need to get into a little bit of quantum physics. I promise it won’t be painful.

According to quantum mechanics, subatomic particles exist in all possible states at once until someone observes them. (You may have heard of Schrödinger’s cat, the thought experiment that places a hypothetical cat in a box and asks “is the cat alive or dead”? The answer is both, until you open the box to find out.)

Because of this “superposition,” as it’s called in physics, the quantum bits, or qubits, in a quantum computer can represent both a one and a zero at the same time. This enables a quantum computer to process highly complex problems with a vast multitude of different outcomes (such as long-key encryption) far faster than the fastest digital computer.

The quantum advantage

Superposition gives quantum computers both speed and parallelism, enabling them to work on millions of computations at the same time.  In order to crack an encryption key, a traditional digital computer would have to try every possible key one at a time. The longer the encryption key (64 bits, 128 bits, 256 bits), the more combinations the computer must try to find the correct key. If the key is 64-bits long, then there are 264 possible keys, for example.

A digital computer can crack a 64-bit key in under a minute. That’s why most organizations have moved to 128-bit or even the 256-bit Advanced Encryption Standard (AES). There aren’t enough digital computers on the planet or time in the world to crack a 256-bit key.

The hype surrounding quantum computers would have you believe that they will be able to break any encryption key instantly, but that’s not exactly true. The quantum advantage basically enables you to figure out the correct key as if that key were half as long as it really is. The take away here is that a quantum computer would treat a 128-bit key, which is the current standard for symmetric e-commerce encryption, as if it were a 64-bit key…and break that key in under a minute.

A quantum computer would still have a hard time with 256-bit encryption, which is why businesses with security concerns are already moving to 256-bit encryption for some applications.

The sky is falling…but not quite yet

While quantum computers exist on a small scale today, they are highly unstable, need to be manually coded and staffed with quantum PhDs. The cost to operate them far exceeds what they’re presently worth. But this will change. A few big tech companies and vendors with a vested interested in quantum computing will tell you that commercially viable generic quantum computers are just around the corner. In reality, we’re probably 5-10 years out and there are many technical issues that need to be solved:

  • A quantum computer computes only once. You must reset it after each function.
  • Qubits are prone to error, with two-thirds being down at any given time.
  • You need enough qubits to crack a key, and they all need to be in the same state (superposition) at the same time.

Until a viable quantum computer emerges, the industry has time to continue its research into cryptography methods that would be resistant to quantum computing. To learn more, you can read what Cisco’s Advanced Security Research Group is doing in this area. Ideally, research will be completed and quantum-resistant security products will be deployed before that day comes. Realistically, there’s a lot of work that still needs to be done.

What can you do in the meantime?

Plenty. Tell your OS vendors and your network equipment suppliers that you want to know what their quantum resistance roadmap is. Until further guidance is released from agencies like NIST, quantum resistance is primarily concerned with supporting longer keys than the current market typically requires—support for 256-bit symmetric keys, for example. Vendors should at least have a plan. Pressure from you will help get a fire going if they don’t.

Here’s the bottom line: Quantum computing is a threat to cybersecurity, but it’s not an imminent threat. If you use shorter keys, like 128 bits, quantum computing is going to be a problem for you. If you’re in an industry that requires long-term storage in an encrypted state, you should consider re-encrypting that data with substantially longer keys. If your RFPs call for support of quantum resistance through use of longer key lengths now, you will help mitigate a major risk that is going to appear sooner or later.

 

Share:



from Cisco Blog » Security http://bit.ly/2Wq6Y3I

IBM Security Bulletin: IBM Security Identity Manager is affected by a limited code injection vulnerability (CVE-2019-4038)

Jan 31, 2019 9:01 am EST

Categorized: High Severity

Share this post:

IBM Security Identity Manager (ISIM) has addressed the following vulnerability that can allow attackers to compromise user accounts via limited code injection.

CVE(s): CVE-2019-4038

Affected product(s) and affected version(s):

Product Version
IBM Security Identity Manager 6.0.0 – 6.0.0.20
IBM Security Identity Manager VA 7.0.0 – 7.0.1.10

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://www-01.ibm.com/support/docview.wss?uid=ibm10869604
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/156162



from IBM Product Security Incident Response Team https://ibm.co/2sWzo7Q

IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Tivoli Storage Manager FastBack (CVE-2018-3139, CVE-2018-3180)

Jan 31, 2019 9:01 am EST

Categorized: Medium Severity

Share this post:

There are multiple vulnerabilities in IBM® Runtime Environment Java™ that is used by Tivoli Storage Manager FastBack. These issues were disclosed as part of the IBM Java SDK updates in October 2018.

CVE(s): CVE-2018-3139, CVE-2018-3180

Affected product(s) and affected version(s):

Tivoli Storage Manager FastBack versions 6.1.0.0 through 6.1.12.6 are affected.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10793819
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/151455
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/151497



from IBM Product Security Incident Response Team https://ibm.co/2MFjWpM

IBM Security Bulletin: IBM Tivoli Application Dependency Discovery Manager (TADDM) could expose password hashes stored in system memory on target Windows systems that are discovered by TADDM

Jan 31, 2019 9:00 am EST

Categorized: Medium Severity

Share this post:

IBM Tivoli Application Dependency Discovery Manager (TADDM) requires a local service account to communicate with Windows servers (targets) via WMI. WMI caches the password hash in memory on each target Windows system when using certain authentication methods. By TADDM design, and according to standard implementation, the service account password is the same for all Windows targets. The cached password can be viewed in memory on any target Windows server using open source windows credential tools such as “mimikatz”. A local user can execute this tool and view the password hash from memory on the target systems. This essentially exposes the password for all other Windows targets that are configured to use TADDM. No access to the TADDM server is necessary to view the password. The local TADDM service account on each target system is a privileged account, so a local attacker could potentially gain access and administrative authority to all target Windows systems.

CVE(s): CVE-2018-1675

Affected product(s) and affected version(s):

TADDM 7.2.2.0 – 7.2.2.5
TADDM 7.3.0.0 – 7.3.0.5

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10742403
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/145110



from IBM Product Security Incident Response Team https://ibm.co/2sVVyXY

Plagued by robocalls? 26 billion spam calls in 2018, quarter from scammers

Cookieminer: New malware targets Macs to steal from cryptocurrency wallets

Black hat hackers, white collar criminals snuggle up to operate insider trading schemes

USN-3876-2: Avahi vulnerabilities

avahi vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM

Summary

Several security issues were fixed in Avahi.

Software Description

  • avahi - Avahi IPv4LL network address configuration daemon

Details

USN-3876-1 fixed a vulnerability in Avahi. This update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Chad Seaman discovered that Avahi incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-6519, CVE-2018-1000845)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM
avahi-daemon - 0.6.30-5ubuntu2.3
libavahi-core7 - 0.6.30-5ubuntu2.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2UvMuom

USN-3876-1: Avahi vulnerabilities

avahi vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Avahi.

Software Description

  • avahi - Avahi IPv4LL network address configuration daemon

Details

Chad Seaman discovered that Avahi incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-6519, CVE-2018-1000845)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
avahi-daemon - 0.7-4ubuntu2.1
libavahi-core7 - 0.7-4ubuntu2.1
Ubuntu 18.04 LTS
avahi-daemon - 0.7-3.1ubuntu1.2
libavahi-core7 - 0.7-3.1ubuntu1.2
Ubuntu 16.04 LTS
avahi-daemon - 0.6.32~rc+dfsg-1ubuntu2.3
libavahi-core7 - 0.6.32~rc+dfsg-1ubuntu2.3
Ubuntu 14.04 LTS
avahi-daemon - 0.6.31-4ubuntu1.3
libavahi-core7 - 0.6.31-4ubuntu1.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2ShNW0d

IoT botnet used in YouTube ad fraud scheme

Google shuts down iPhone data-gathering app: 'This was a mistake, and we apologize'

Apple pulls the plug on Facebook’s internal iOS apps

Airbus Suffers Data Breach, Some Employees' Data Exposed


European airplane maker Airbus admitted yesterday a data breach of its "Commercial Aircraft business" information systems that allowed intruders to gain access to some of its employees' personal information.

Though the company did not elaborate on the nature of the hack, it claimed that the security breach did not affect its commercial operations. So, there's no impact on aircraft production.

Airbus confirmed that the attackers unauthorized accessed some data earlier this month, which the plane manufacturer claimed was "mostly professional contact and IT identification details of some Airbus employees in Europe."

"Investigations are ongoing to understand if any specific data was targeted; however we do know some personal data was accessed," Airbus said in its press release published on Wednesday.

After detecting the security breach, the plan manufacturer started an investigation to determine the origin of the hack and to understand the full scope of the data breach and if any specific data was targeted.

The company has begun taking "immediate and appropriate actions to reinforce existing security measures," which were not enough to keep the hackers out of their systems, "and to mitigate its potential impact" so that it can prevent similar incidents from happening in the future.

The company has also instructed its employees to "take all necessary precautions going forward," to strengthen their security defenses.

Airbus also said it was in contact with the relevant regulatory authorities and the data protection authorities pursuant to the European Union's new GDPR (General Data Protection Regulation) rules.

Airbus is the world's second-largest manufacturers of commercial airplanes, after Boeing which was also hit by a cyber attack (a variant of the infamous

WannaCry ransomware

) in March last year that "affected a small number of systems" with no impact on production.



from The Hacker News http://bit.ly/2HIaoM2

FBI Mapping 'Joanap Malware' Victims to Disrupt the North Korean Botnet


The United States Department of Justice (DoJ) announced Wednesday its effort to "map and further disrupt" a botnet tied to North Korea that has infected numerous Microsoft Windows computers across the globe over the last decade.

Dubbed

Joanap

, the botnet is believed to be part of "

Hidden Cobra

"—an Advanced Persistent Threat (APT) actors' group often known as Lazarus Group and Guardians of Peace and backed by the North Korean government.

Hidden Cobra is the same hacking group that has been allegedly associated with the

WannaCry ransomware

menace in 2016, the

SWIFT Banking attack

in 2016, as well as

Sony Motion Pictures hack

in 2014.

Dates back to 2009, Joanap is a remote access tool (RAT) that lands on a victim's system with the help an

SMB worm

called

Brambul

, which crawls from one computer to another by brute-forcing Windows Server Message Block (SMB) file-sharing services using a list of common passwords.

Once there, Brambul downloads Joanap on the infected Windows computers, effectively opening a backdoor for its masterminds and giving them remote control of the network of infected Windows computers.

If You Want to Beat Them, Then First Join Them

Interestingly, the computers infected by Joanap botnet don’t take commands from a centralized command-and-control server; instead it relies on peer-to-peer (P2P) communications infrastructure, making every infected computer a part of its command and control system.

Even though Joanap is currently being detected by many malware protection systems, including Windows Defender, the malware's peer-to-peer (P2P) communications infrastructure still leaves large numbers of infected computers connected to the Internet.

So to identify infected hosts and take down the botnet, the FBI and the Air Force Office of Special Investigations (AFOSI) obtained legal search warrants that allowed the agencies to join the botnet by creating and running "intentionally infected" computers mimicking its peers to collect both technical and "limited" identifying information in an attempt to map them, the DoJ said in its

press release

.

"While the Joanap botnet was identified years ago and can be defeated with antivirus software, we identified numerous unprotected computers that hosted the malware underlying the botnet," said U.S. Attorney Nicola T. Hanna.

"The search warrants and court orders announced today as part of our efforts to eradicate this botnet are just one of the many tools we will use to prevent cybercriminals from using botnets to stage damaging computer intrusions."

The collected information about computers infected with the Joanap malware included IP addresses, port numbers, and connection timestamps which allowed the FBI and AFOSI to build a map of the current Joanap botnet.

The agencies are now notifying victims of the presence of Joanap on their infected computers through their Internet Service Providers (ISPs) and even sending personal notifications to people who don't have a router or firewall protecting their systems.

The US Justice Department and FBI will also coordinate the notification of overseas victims of the Joanap malware by sharing the data with the government of other countries.

The efforts to disrupt the Joanap botnet began after the United States

unsealed charges against

a North Korean computer programmer named

Park Jin Hyok

in September last year for his role in masterminding the

Sony Pictures

and

WannaCry

 ransomware attacks.

Joanap and Brambul were also recovered from computers of the victims of the campaigns listed in the Hyok's September indictment, suggesting that he aided the development of the Joanap botnet.



from The Hacker News http://bit.ly/2G0c5ms

Wednesday, January 30, 2019

Corporate Membership for Startup Solution Providers


This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our

Privacy Policy

.



from Cloud Security Alliance Blog http://bit.ly/2SkcSEg

USN-3875-1: OpenJDK vulnerability

openjdk-8, openjdk-lts vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 16.04 LTS

Summary

Java applets or applications could be made to expose sensitive information.

Software Description

  • openjdk-lts - Open Source Java implementation
  • openjdk-8 - Open Source Java implementation

Details

It was discovered that a memory disclosure issue existed in the OpenJDK Library subsystem. An attacker could use this to expose sensitive information and possibly bypass Java sandbox restrictions. (CVE-2019-2422)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
openjdk-11-jdk - 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre - 11.0.1+13-3ubuntu3.18.10.1
openjdk-11-jre-headless - 11.0.1+13-3ubuntu3.18.10.1
Ubuntu 16.04 LTS
openjdk-8-jdk - 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre - 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-headless - 8u191-b12-2ubuntu0.16.04.1
openjdk-8-jre-jamvm - 8u191-b12-2ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2RZewfl

USN-3874-1: Firefox vulnerabilities

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software Description

  • firefox - Mozilla Open Source web browser

Details

Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, gain additional privileges by escaping the sandbox, or execute arbitrary code. (CVE-2018-18500, CVE-2018-18501, CVE-2018-18502, CVE-2018-18503, CVE-2018-18504, CVE-2018-18505)

It was discovered that Firefox allowed PAC files to specify that requests to localhost are sent through the proxy to another server. If proxy auto-detection is enabled, an attacker could potentially exploit this to conduct attacks on local services and tools. (CVE-2018-18506)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
firefox - 65.0+build2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS
firefox - 65.0+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
firefox - 65.0+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
firefox - 65.0+build2-0ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2HHsi1s

Airbus data breach impacts employees in Europe

NSW police corruption body wants access to encrypted communications

DOJ moves to take down Joanap botnet operated by North Korean state hackers

Amazon gets Harrison Ford to reveal the grim future of Alexa

Cisco Job Posting Targets Korean Candidates


Threat Research

Cisco Job Posting Targets Korean Candidates

Edmund Brumaghin and Paul Rascagneres authored this post, with contributions from Jungsoo An.

Executive summary

Cisco Talos recently observed a targeted malware campaign being leveraged in an attempt to compromise specific organizations. The infection vector associated with this campaign was a Microsoft Word document that was disguised as a job posting for Cisco Korea, and leveraged legitimate content available as part of job postings on various websites. EST Security also described this campaign in a blog post this week. This malicious Office document appears to have been the initial portion of what was designed to be a multi-stage infection process.

During our analysis of this campaign, we located additional samples that we believe are linked to multiple previous campaigns associated with the same threat actor. Each of the campaigns leveraged malicious documents and initial stage payloads that all featured similar tactics, techniques, and procedures (TTP). Due to the targeted nature of this campaign, the lack of widespread indicator of compromise data, and the apparent nature of the targeting, this appears to be associated with a sophisticated attacker. This sort of attack has become more common as threat actors continue to target users to gain an initial foothold in environments. Organizations are encouraged to employ a defense-in-depth approach to security and disallow the execution of macros where possible.

Read More >>

Share:



from Cisco Blog » Security http://bit.ly/2UqZCez

Log-free email provider Posteo: 'You must log user IP addresses', court rules

Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5


Threat Research

Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5

Cisco Talos is disclosing several vulnerabilities in ACD Systems’ Canvas Draw 5, a graphics-editing tool for Mac. The vulnerable component of Canvas Draw 5 lies in the handling of TIFF and PCX images. TIFF is a raster-based image format used in graphics editing projects, thus making it a very common file format that’s used in Canvas Draw. PCX was a popular image format with early computers, and although it’s been replaced by more sophisticated formats, it is still in use and fully supported by Canvas Draw.

In accordance with our coordinated disclosure policy, Cisco Talos worked with ACD Systems to ensure that these issues are resolved and that an update is available for affected customers.

Read more about these vulnerabilities here.

Share:

Tags:



from Cisco Blog » Security http://bit.ly/2HGetAo

NCCIC Awareness Briefing on Chinese Malicious Cyber Activity

Original release date: January 30, 2019

The Cybersecurity and Infrastructure Security Agency (CISA) will conduct a series of virtual awareness briefings on Chinese malicious cyber activity targeting managed service providers (MSPs). Briefings will be held from 1–2 p.m. ET on the dates listed below:

CISA encourages MSPs and their customers to register for the briefing by clicking on one of the dates listed above. The briefing will provide a background on the identified cyber activity and mitigation techniques.   


This product is provided subject to this Notification and this Privacy & Use policy.




from US-CERT National Cyber Alert System http://bit.ly/2FZxQCO

MS-ISAC Releases Advisory on DNS Flag Day

Original release date: January 30, 2019

The Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an alert on Domain Name System (DNS) Flag Day, which is Friday, February 1, 2019. On DNS Flag Day, DNS software and service providers will roll out updates to remove workarounds that allow users to bypass the Extension Mechanisms Protocol for DNS (EDNS). While the updates will improve DNS operations, some domains served by DNS servers operating out-of-date software may become unavailable.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review MS-ISAC's Cyber Alert: DNS Flag Day for more information and the DNS Flag Day website to determine whether a domain name will be affected.


This product is provided subject to this Notification and this Privacy & Use policy.




from US-CERT National Cyber Alert System http://bit.ly/2GbbFss

Mozilla Releases Security Update for Thunderbird

Original release date: January 30, 2019

Mozilla has released a security update to address vulnerabilities in Thunderbird. An attacker could exploit one of these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the Mozilla Security Advisory for Thunderbird 60.5 and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.




from US-CERT National Cyber Alert System http://bit.ly/2Wxsgwj

Ubuntu 18.04 needs patching

IBM Security Bulletin: IBM MQ Cloud Paks are vulnerable to multiple vulnerabilities in Perl (CVE-2018-18312 CVE-2018-18313 CVE-2018-18314 CVE-2018-18311)

Several vulnerabilities were identified with versions of perl which are included in IBM MQ Cloud Paks.

CVE(s): CVE-2018-18312, CVE-2018-18313, CVE-2018-18314, CVE-2018-18311

Affected product(s) and affected version(s):

IBM MQ CloudPak for IBM Cloud Private

v1.0.0 – v2.2.0

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://www-01.ibm.com/support/docview.wss?uid=ibm10791475
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/153587
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/153588
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/153589
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/153586

The post IBM Security Bulletin: IBM MQ Cloud Paks are vulnerable to multiple vulnerabilities in Perl (CVE-2018-18312 CVE-2018-18313 CVE-2018-18314 CVE-2018-18311) appeared first on IBM PSIRT Blog.



from IBM Product Security Incident Response Team https://ibm.co/2t4lT6t

IBM Security Bulletin: IBM Navigator for i is affected by CVE-2019-4040

Jan 30, 2019 9:01 am EST

Categorized: Medium Severity

Share this post:

IBM Navigator for i is supported by IBM i. IBM i has addressed the applicable CVE.

CVE(s): CVE-2019-4040

Affected product(s) and affected version(s):

Releases 7.3 and 7.2 of IBM i are affected.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10869384
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/156164



from IBM Product Security Incident Response Team https://ibm.co/2MGEpe7

IBM Security Bulletin: Code execution vulnerability in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1851)

Jan 30, 2019 9:01 am EST

Categorized: High Severity

Share this post:

There is a potential code execution vulnerability in WebSphere Application Server Liberty OpenID connect which affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center).

CVE(s): CVE-2018-1851

Affected product(s) and affected version(s):

Affected Product Affected Versions
IBM Spectrum Control 5.2.14 – 5.2.17.1
IBM Spectrum Control 5.3.0

The versions listed above apply to all licensed offerings of IBM Spectrum Control.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10738391
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/150999



from IBM Product Security Incident Response Team https://ibm.co/2Gcv64o

IBM Security Bulletin: Bypass security vulnerability in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2014-7810)

Jan 30, 2019 9:00 am EST

Categorized: Medium Severity

Share this post:

There is a potential bypass security vulnerability in the expression language library used by WebSphere Application Server which affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center).

CVE(s): CVE-2014-7810

Affected product(s) and affected version(s):

Affected Product Affected Versions
IBM Tivoli Storage Productivity Center 5.2.0 – 5.2.7.1
IBM Spectrum Control 5.2.8 – 5.2.17.1
IBM Spectrum Control 5.3.0

The versions listed above apply to all licensed offerings of IBM Spectrum Control.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10738367
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/103155



from IBM Product Security Incident Response Team https://ibm.co/2sXJmWS

IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Security Access Manager

Jan 30, 2019 9:00 am EST

Categorized: High Severity

Share this post:

There are multiple vulnerabilities in IBM® SDK Java™ Technology Edition, Versions 6, 7 & 8 and IBM® Runtime Environment Java™ Versions 6,7 & 8 used by IBM Security Access Manager software and appliances. These issues were disclosed as part of the IBM Java SDK updates in January 2018.

CVE(s): CVE-2018-2795, CVE-2018-2796, CVE-2018-2797, CVE-2018-2799, CVE-2018-2783

Affected product(s) and affected version(s):

IBM Tivoli Access Manager for e-business version 6.1

IBM Tivoli Access Manager for e-business version 6.1.1

IBM Security Access Manager for Web version 7.0 software release

IBM Security Access Manager for Web version 8 appliance

IBM Security Access Manager for Mobile version 8 appliance

IBM Security Access Manager version 9 appliance

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10731815
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/141951
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/141952
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/141953
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/141955
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/141939



from IBM Product Security Incident Response Team https://ibm.co/2MHMhM4

This is how YouTube influencer scam artists operate

Matrix has slowly evolved into a 'Swiss Army knife' of the ransomware world

Windows 7: What is your company's exit strategy?

iPhone FaceTime bug: Now Apple sued over eavesdrop on lawyer's client phone call

Google Chrome to get warnings for 'lookalike URLs'

Struggling to comply with GDPR? Microsoft 365 rolls out new privacy dashboards

USN-3873-1: Open vSwitch vulnerabilities

openvswitch vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in Open vSwitch.

Software Description

  • openvswitch - Ethernet virtual switch

Details

It was discovered that Open vSwitch incorrectly decoded certain packets. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. (CVE-2018-17204)

It was discovered that Open vSwitch incorrectly handled processing certain flows. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17205)

It was discovered that Open vSwitch incorrectly handled BUNDLE action decoding. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. (CVE-2018-17206)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
openvswitch-common - 2.9.2-0ubuntu0.18.04.3
Ubuntu 16.04 LTS
openvswitch-common - 2.5.5-0ubuntu0.16.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2sYbfhr

Facebook slammed over covert app that pays teenagers for data

Facebook Paid Teens $20 to Install 'Research' App That Collects Private Data


If you are thinking that Facebook is sitting quietly after being forced to remove its Onavo VPN app from Apple's App Store, then you are mistaken.

It turns out that Facebook is paying teenagers around $20 a month to use its VPN app that aggressively monitors their smartphone and web activity and then sends it back to Facebook.

The social media giant was previously caught collecting some of this data through

Onavo Protect

, a Virtual Private Network (VPN) service that it acquired in 2013.

However, the company was forced to

pull the app from the App Store

in August 2018 after Apple found that Facebook was using the VPN service to track its user activity and data across multiple apps, which clearly violates its App Store guidelines on data collection.

Onavo Protect became a data collection tool for Facebook helping the company track smartphone users' activities across multiple different apps to learn insights about how Facebook users use third-party apps.

Facebook's Paid Market Research

Now according to a report

published

by TechCrunch, Facebook has been doing much more than just collecting some data on its users—this time in the name of an app called "

Facebook Research

" for iOS and Android since at least 2016.

In some documentation, this program has been referred to as "Project Atlas." Facebook has also confirmed the existence of the app to the publication.

The report said the company has been paying people aged between 13 and 35 as much as $20 per month along with referral fees in exchange for installing Facebook Research on their iPhone or Android devices, saying it's a "paid social media research study."

Instead of downloading the app via any app store, Facebook has been using third-party beta testing services—Applause, BetaBound and uTest—that specifically runs ads on Instagram and Snapchat recruiting participants to install Facebook Research.

Facebook Research App Collects Troves of User Data

The app requires users to install a custom root enterprise certificate, which gives the social media giant the level of access that can allow it to see users’ private messages in social media apps, non-e2e chats from instant messaging apps, emails, web searches, web browsing activity, and ongoing location information.

Although it is not clear if Facebook is accessing this data, but if the company wants it could, according to security researcher Will Strafach, who was commissioned by the publication.

In some instances, the Facebook Research app also asked users to take screenshots of their Amazon order histories and send it back to Facebook.

According to the Facebook Research’s terms of service, installing the app gives the company permission to collect information about other mobile apps on a participant's smartphone as well as how and when those apps are used.

"This means you are letting our client collect information such as which apps are on your phone, how and when you use them, data about your activities and content within those apps, as well as how other people interact with you or your content within those apps," the terms read.

"You're also letting our client collect information about your internet browsing activity (including the websites you visit and data is exchanged between your device and those websites) and your use of other online services. There're some instances when our client will collect this information even where the app uses encryption, or from within secure browser sessions."

Facebook Acknowledges the Existence of the Program

While acknowledging the existence of this program, Facebook said, "like many companies, we invite people to participate in research that helps us identify things we can be doing better."

Since Facebook Research is aimed at "helping Facebook understand how people use their mobile devices, we have provided extensive information about the type of data we collect and how they can participate. We do not share this information with others, and people can stop participating at any time."

Though Facebook's spokesperson claimed that the app was in line with Apple's Enterprise Certificate program, but since Apple requires developers to only use this certificate system for distributing internal corporate apps to their own employees, "recruiting testers and paying them a monthly fee appears to violate the spirit of that rule," the report reads.

Apple is "aware" of the issue, but it is unclear if the iPhone maker might ban Facebook from using its Enterprise Developer Certificates or not.

In response to the report, Facebook said the company is planning to shut down the iOS version of its Research app. BetaBound, uTest, and Applause have not yet responded to the report.



from The Hacker News http://bit.ly/2RoH9xq

iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret


Late last year when an unknown group of

hackers stole secret access tokens

for millions of Facebook accounts by taking advantage of a flaw in its website, the company disclosed the incident and informed its affected users.

Similarly, when Twitter was hit by multiple vulnerabilities (

#1

,

#2

,

#3

) in the last few months, the social media company disclosed those incidents and informed its affected users.

And Guess What? Google is going to shut down its social media network Google+ in April this year after admitting

two security flaws

in its platform that exposed private data of hundreds of thousands of users to third-party developers.

It turns out that Apple also possibly suffered a privacy breach late last year due to a bug in its platform that might have exposed some of your iCloud data to other users, but the company chose to keep the incident secret... maybe because it was not worth to disclose, or perhaps much more complicated.

Last week, Turkish security researcher

Melih Sevim

contacted The Hacker News and claimed to have discovered a flaw in Apple services that allowed him to view partial data, especially notes, from random iCloud accounts as well as on targeted iCloud users just by knowing their associated phone numbers.

Melih confirmed The Hacker News that he discovered the alleged flaw in October 2018, and then responsibly reported it to the Apple's security team with steps to reproduce the bug and a video demonstration, showing how he was able to read personal iCloud data from other Apple users without their knowledge.

"I discovered that when there is an active data transfer between the user and Apple servers if I open my (attacker's) iCloud account, there is a possibility to view some random data on every refresh due to the bug," Melih told The Hacker News.

After patching it in November 2018, Apple acknowledged the issue to Melih but responded that the company had already addressed it before receiving details from him.

Apple then immediately closed the ticket and buried the lead.

A Mysterious iCloud Bug

Based upon Melih explanation, the alleged flaw resided in the way Apple "internally" linked, either accidentally or intentionally, a phone number saved in the billing information of an Apple ID to the iCloud account on a device using the same phone number.

According to Melih, after following some specific steps on his iPhone and then saving a new phone number linked to another Apple ID in the billing information related settings on his device, he was able to view partial iCloud data from the account associated with that number.

"Let suppose, if abc@icloud.com's mobile number is 12345 and when I enter 12345 mobile number to my xyz@icloud.com Apple ID account, I could see abc's data on xyz's account," Melih told THN.
"During my researcher, I saw many notes from other Apple users who kept their bank account related information and passwords in the iCloud."

Since the flaw was in the section of iCloud settings for iOS devices that load from Apple servers in real-time using the Internet, it was silently patched by Apple team from the background without releasing a new iOS update.

If Melih's report is accurate, the next detail makes the issue more serious…

Melih also confirmed The Hacker News that the text-box asking users to enter a phone number was not validating the user input, thus allowing an attacker even to save a single digit input.

As shown in the video demonstration shared by Melih with THN, the trick eventually exploited the same flaw into fetching personal data from random iCloud accounts matching the input digit to their associated phone numbers.

Apple Acknowledged the Problem, But...

To confirm Melih's bug and know the full extent of the incident, we reached out to the Apple security team before publishing this article.

In response to The Hacker News email and knowing that we are working on a story, Apple acknowledged the bug report, saying "the issue was corrected back in November," without responding to some other important questions, including for how many weeks the flaw remained open, the estimated number of affected users (if any) and if there is any evidence of malicious exploitation?

Well, that was weird, but not new...

Just yesterday, Apple temporarily took down its Group FaceTime service after the public disclosure of a

bug in its video-calling app

that allows FaceTime users to hear or see other users before they even pick up the call.

Later it turned out that Apple was apparently

notified

of the

FaceTime eavesdropping bug

over a

week ago by a 14-year-old

boy before it made headlines, but again, the Apple security team failed to communicate promptly, leaving its millions of users unaware of the issue and at risk.

If the suspected iCloud leak was minor, then Apple could have confirmed us, but it's silence over the report makes the incident more suspicious.



from The Hacker News http://bit.ly/2HE834B

Severe vulnerability in Apple FaceTime found by Fortnite player

Home Affairs reveals Australian authorities already using new encryption powers

Tuesday, January 29, 2019

Australian web hosts hit with a Manic Menagerie of malware

Google Releases Security Updates for Chrome

Original release date: January 29, 2019

Google has released Chrome version 72.0.3626.81 for Windows, Mac, and Linux. This version addresses multiple vulnerabilities that an attacker could exploit to take control of an affected system.  

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the Chrome Releases page and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.




from US-CERT National Cyber Alert System http://bit.ly/2WpOrop

Google Chrome 72 removes HPKP, deprecates TLS 1.0 and TLS 1.1

EU to tech giants: Step up fake news fight before European elections

Fixing Virtualbox RDP Server with DetectionLab

Yesterday I posted about DetectionLab, but noted that I was having trouble with the RDP servers offered by Virtualbox. If you remember, DetectionLab builds four virtual machines:

root@LAPTOP-HT4TGVCP C:\Users\root>"c:\Program Files\Oracle\VirtualBox\VBoxManage" list runningvms
"logger" {3da9fffb-4b02-4e57-a592-dd2322f14245}
"dc.windomain.local" {ef32d493-845c-45dc-aff7-3a86d9c590cd}
"wef.windomain.local" {7cd008b7-c6e0-421d-9655-8f92ec98d9d7}
"win10.windomain.local" {acf413fb-6358-44df-ab9f-cc7767ed32bd}

I was having a problem with two of the VMs sharing the same port for the RDP server offered by Virtualbox. This meant I could not access one of them. (Below, port 5932 has the conflict.)

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo logger | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 5955, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address  = "0.0.0.0"

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo dc.windomain.local | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 5932, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address = "0.0.0.0"

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo wef.windomain.local | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 5932, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address = "0.0.0.0"

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo win10.windomain.local | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 5981, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address = "0.0.0.0"

To fix this, I explicitly added port values to the configuration in the Vagrantfile. Here is one example:

      vb.customize ["modifyvm", :id, "--vrde", "on"]
      vb.customize ["modifyvm", :id, "--vrdeaddress", "0.0.0.0"]
      vb.customize ["modifyvm", :id, "--vrdeport", "60101"]

After a 'vagrant reload', the RDP servers were now listening on new ports, as I hoped.

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo logger | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 60101, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address  = "0.0.0.0"

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo dc.windomain.local | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 60102, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address = "0.0.0.0"

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo wef.windomain.local | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 60103, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address = "0.0.0.0"

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>"c:\Program Files\Oracle\VirtualBox\VBoxManage" showvminfo win10.windomain.local | findstr /I vrde | findstr /I address
VRDE:                        enabled (Address 0.0.0.0, Ports 60104, MultiConn: off, ReuseSingleConn: off, Authentication type: null)
VRDE property               : TCP/Address = "0.0.0.0"

This is great, but I am still encountering a problem with avoiding port collisions when Vagrant remaps ports for services on the VMs.

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>vagrant status
Current machine states:

logger                    running (virtualbox)
dc                        running (virtualbox)
wef                       running (virtualbox)
win10                     running (virtualbox)

This environment represents multiple VMs. The VMs are all listed
above with their current state. For more information about a specific
VM, run `vagrant status NAME`.

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>vagrant port logger
The forwarded ports for the machine are listed below. Please note that
these values may differ from values configured in the Vagrantfile if the
provider supports automatic port collision detection and resolution.

    22 (guest) => 2222 (host)

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>vagrant port dc
The forwarded ports for the machine are listed below. Please note that
these values may differ from values configured in the Vagrantfile if the
provider supports automatic port collision detection and resolution.

  3389 (guest) => 3389 (host)
    22 (guest) => 2200 (host)
  5985 (guest) => 55985 (host)
  5986 (guest) => 55986 (host)

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>vagrant port wef
The forwarded ports for the machine are listed below. Please note that
these values may differ from values configured in the Vagrantfile if the
provider supports automatic port collision detection and resolution.

  3389 (guest) => 2201 (host)
    22 (guest) => 2202 (host)
  5985 (guest) => 2203 (host)
  5986 (guest) => 2204 (host)

root@LAPTOP-HT4TGVCP C:\Users\root\git\detectionlab\DetectionLab\Vagrant>vagrant port win10
The forwarded ports for the machine are listed below. Please note that
these values may differ from values configured in the Vagrantfile if the
provider supports automatic port collision detection and resolution.

  3389 (guest) => 2205 (host)
    22 (guest) => 2206 (host)
  5985 (guest) => 2207 (host)
  5986 (guest) => 2208 (host)

The entry in bold is the problem. Vagrant should not be mapping port 3389, which is already in use by the RDP server on the Windows 10 host, such that it tries to be available to the guest.

I tried telling Vagrant by hand in the Vagrantfile to map port 3389 elsewhere, but nothing worked. (I tried entries like the following.)

    config.vm.network :forwarded_port, guest: 3389, host: 5789

I also searched to see if there might be a configuration outside the Vagrantfile that I was missing. Here is what I found:

ds61@ds61:~/DetectionLab-master$ find . | xargs grep "3389" *
./Terraform/Method1/main.tf:    from_port   = 3389
./Terraform/Method1/main.tf:    to_port     = 3389
./Packer/vagrantfile-windows_2016.template:    config.vm.network :forwarded_port, guest: 3389, host: 3389, id: "rdp", auto_correct: true
./Packer/scripts/enable-rdp.bat:netsh advfirewall firewall add rule name="Open Port 3389" dir=in action=allow protocol=TCP localport=3389
./Packer/vagrantfile-windows_10.template:    config.vm.network :forwarded_port, guest: 3389, host: 3389, id: "rdp", auto_correct: true

I wonder if those Packer templates have anything to do with it, or if I am encountering a problem with Vagrant? I have seen many people experience similar issues, so I don't know.

It's not a big deal, though. Now that I can directly access the virtual screens for each VM on Virtualbox via the RDP server, I don't need to RDP to port 3389 on each Windows VM in order to interact with it.

If anyone has any ideas, though, I'm interested!
Copyright 2003-2018 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and http://bit.ly/1fDn3pG)


from TaoSecurity http://bit.ly/2DJwQ3h

Oregon lawmakers roll out bill to let patients get paid for health data

Mozilla Releases Security Updates for Firefox

Original release date: January 29, 2019

Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the Mozilla Security Advisories for Firefox 65 and Firefox ESR 60.5 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.




from US-CERT National Cyber Alert System http://bit.ly/2SbyPp8