Resolved Bugs
1209580 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks [fedora-all]
1209631 – CVE-2015-1821 chrony: Heap out of bound write in address filter
1209572 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks
1209634 – CVE-2015-1822 CVE-2015-1821 chrony: various flaws [fedora-all]
1209632 – CVE-2015-1822 chrony: uninitialized pointer in cmdmon reply slots<br
Security fix for CVE-2015-1853, CVE-2015-1821, CVE-2015-1822
Monthly Archives: April 2015
Fedora 20 Security Update: knot-1.6.3-1.fc20
new upstream release
Fedora 21 Security Update: knot-1.6.3-1.fc21
new upstream release
Fedora 21 Security Update: chrony-1.31.1-1.fc21
Resolved Bugs
1209580 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks [fedora-all]
1209631 – CVE-2015-1821 chrony: Heap out of bound write in address filter
1209572 – CVE-2015-1853 chrony: authentication doesn’t protect symmetric associations against DoS attacks
1209634 – CVE-2015-1822 CVE-2015-1821 chrony: various flaws [fedora-all]
1209632 – CVE-2015-1822 chrony: uninitialized pointer in cmdmon reply slots<br
Security fix for CVE-2015-1853, CVE-2015-1821, CVE-2015-1822
TA15-098A: AAEH
Original release date: April 09, 2015
Systems Affected
- Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
- Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
Overview
AAEH is a family of polymorphic downloaders created with the primary purpose of downloading other malware, including password stealers, rootkits, fake antivirus, and ransomware.
The United States Department of Homeland Security (DHS), in collaboration with Europol, the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), released this Technical Alert to provide further information about the AAEH botnet, along with prevention and mitigation recommendations.
Description
AAEH is often propagated across networks, removable drives (USB/CD/DVD), and through ZIP and RAR archive files. Also known as VObfus, VBObfus, Beebone or Changeup, the polymorphic malware has the ability to change its form with every infection. AAEH is a polymorphic downloader with more than 2 million unique samples. Once installed, it morphs every few hours and rapidly spreads across the network. AAEH has been used to download other malware families, such as Zeus, Cryptolocker, ZeroAccess, and Cutwail.
Impact
A system infected with AAEH may be employed to distribute malicious software, harvest users’ credentials for online services, including banking services, and extort money from users by encrypting key files and then demanding payment in order to return the files to a readable state. AAEH is capable of defeating anti-virus products by blocking connections to IP addresses associated with Internet security companies and by preventing anti-virus tools from running on infected machines.
Solution
Users are recommended to take the following actions to remediate AAEH infections:
- Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
- Change your passwords – Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
- Keep your operating system and application software up-to-date – Install software patches so that attackers can’t take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
- Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection.
Users can consider employing a remediation tool (examples below) that will help with the removal of AAEH from your system.
Note: AAEH blocks AV domain names thereby preventing infected users from being able to download remediation tools directly from an AV company. The links below will take you to the tools at the respective AV sites. In the event that the tools cannot be accessed or downloaded from the vendor site, the tools are accessible from Shadowserver (http://aaeh.shadowserver.org).
The below are examples only and do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.
References
- F-Secure Online Scanner for Windows Vista, 7 and 8
- F-Secure Removal Tools for Windows XP
- McAfee Stinger for Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7 and 8
- Microsoft Safety Scanner for Windows 8.1, Windows 8, Windows 7, Windows Vista, and Windows XP
- Sophos Virus Removal for Windows XP SP2 and above
- Trend Micro Threat Detector for Windows XP, Windows Vista, Windows 7, Windows 8/8.1, Windows Server 2003/2008, and 2008 R2
Revision History
- April 9, 2015: Initial Release
This product is provided subject to this Notification and this Privacy & Use policy.
WordPress Windows Desktop And iPhone Photo Uploader File Upload
WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability.
DSA-3217 dpkg – security update
Jann Horn discovered that the source package integrity verification in
dpkg-source can be bypassed via a specially crafted Debian source
control file (.dsc). Note that this flaw only affects extraction of
local Debian source packages via dpkg-source but not the installation of
packages from the Debian archive.
Apple Releases Security Updates for OS X, iOS, Safari, and Apple TV
Original release date: April 08, 2015
Apple has released security updates for OS X, iOS, Safari, and Apple TV to address multiple vulnerabilities. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of the affected system.
Available updates include:
- OS X Yosemite v10.10.3 and Security Update 2015-004 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10 to v10.10.2
- iOS 8.3 for iPhones 4s and later, iPod touch 5th generation and later, and iPad 2 and later
- Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2
- Apple TV 7.2 for Apple TV 3rd generation and later
US-CERT encourages users and administrators to review Apple security updates HT204659, HT204661, HT204658, and HT204662, and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Vulnerabilities Identified in Network Time Protocol Daemon (ntpd)
Original release date: April 08, 2015
The Network Time Foundation’s NTP Project has released an update addressing multiple vulnerabilities in ntpd. Exploitation of these vulnerabilities may allow an attacker to conduct a man-in-the-middle attack or cause a denial of service condition.
Users and administrators are encouraged to review Vulnerability Note VU#374268 for more information and update to NTP 4.2.8p2 if necessary.
This product is provided subject to this Notification and this Privacy & Use policy.
APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5
From: Apple Product Security
Reply to list
APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 are now available and address the following: Safari Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10. [...]