Fedora 20 Security Update: chrony-1.31.1-1.fc20

Resolved Bugs
1209580 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks [fedora-all]
1209631 – CVE-2015-1821 chrony: Heap out of bound write in address filter
1209572 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks
1209634 – CVE-2015-1822 CVE-2015-1821 chrony: various flaws [fedora-all]
1209632 – CVE-2015-1822 chrony: uninitialized pointer in cmdmon reply slots<br
Security fix for CVE-2015-1853, CVE-2015-1821, CVE-2015-1822

Fedora 21 Security Update: chrony-1.31.1-1.fc21

Resolved Bugs
1209580 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks [fedora-all]
1209631 – CVE-2015-1821 chrony: Heap out of bound write in address filter
1209572 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks
1209634 – CVE-2015-1822 CVE-2015-1821 chrony: various flaws [fedora-all]
1209632 – CVE-2015-1822 chrony: uninitialized pointer in cmdmon reply slots<br
Security fix for CVE-2015-1853, CVE-2015-1821, CVE-2015-1822

TA15-098A: AAEH

Original release date: April 09, 2015

Systems Affected

  • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
  • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012

Overview

AAEH is a family of polymorphic downloaders created with the primary purpose of downloading other malware, including password stealers, rootkits, fake antivirus, and ransomware.

The United States Department of Homeland Security (DHS), in collaboration with Europol, the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), released this Technical Alert to provide further information about the AAEH botnet, along with prevention and mitigation recommendations.

Description

AAEH is often propagated across networks, removable drives (USB/CD/DVD), and through ZIP and RAR archive files. Also known as VObfus, VBObfus, Beebone or Changeup, the polymorphic malware has the ability to change its form with every infection. AAEH is a polymorphic downloader with more than 2 million unique samples. Once installed, it morphs every few hours and rapidly spreads across the network.  AAEH has been used to download other malware families, such as Zeus, Cryptolocker, ZeroAccess, and Cutwail.

Impact

A system infected with AAEH may be employed to distribute malicious software, harvest users’ credentials for online services, including banking services, and extort money from users by encrypting key files and then demanding payment in order to return the files to a readable state. AAEH is capable of defeating anti-virus products by blocking connections to IP addresses associated with Internet security companies and by preventing anti-virus tools from running on infected machines.  

Solution

Users are recommended to take the following actions to remediate AAEH infections:

  • Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
  • Change your passwords – Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
  • Keep your operating system and application software up-to-date – Install software patches so that attackers can’t take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
  • Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection.

Users can consider employing a remediation tool (examples below) that will help with the removal of AAEH from your system.

Note: AAEH blocks AV domain names thereby preventing infected users from being able to download remediation tools directly from an AV company. The links below will take you to the tools at the respective AV sites. In the event that the tools cannot be accessed or downloaded from the vendor site, the tools are accessible from Shadowserver (http://aaeh.shadowserver.org).

The below are examples only and do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.

References

Revision History

  • April 9, 2015: Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.

DSA-3217 dpkg – security update

Jann Horn discovered that the source package integrity verification in
dpkg-source can be bypassed via a specially crafted Debian source
control file (.dsc). Note that this flaw only affects extraction of
local Debian source packages via dpkg-source but not the installation of
packages from the Debian archive.

Apple Releases Security Updates for OS X, iOS, Safari, and Apple TV

Original release date: April 08, 2015

Apple has released security updates for OS X, iOS, Safari, and Apple TV to address multiple vulnerabilities. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of the affected system.

Available updates include:

  • OS X Yosemite v10.10.3 and Security Update 2015-004 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10 to v10.10.2
  • iOS 8.3 for iPhones 4s and later, iPod touch 5th generation and later, and iPad 2 and later
  • Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2
  • Apple TV 7.2 for Apple TV 3rd generation and later

US-CERT encourages users and administrators to review Apple security updates HT204659, HT204661, HT204658, and HT204662, and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

Vulnerabilities Identified in Network Time Protocol Daemon (ntpd)

Original release date: April 08, 2015

The Network Time Foundation’s NTP Project has released an update addressing multiple vulnerabilities in ntpd. Exploitation of these vulnerabilities may allow an attacker to conduct a man-in-the-middle attack or cause a denial of service condition.

Users and administrators are encouraged to review Vulnerability Note VU#374268 for more information and update to NTP 4.2.8p2 if necessary.


This product is provided subject to this Notification and this Privacy & Use policy.