Red Hat Enterprise Linux: Updated Red Hat Enterprise MRG Realtime packages that add one enhancement are
now available for Red Hat Enterprise MRG 2.5.
Monthly Archives: September 2016
RHBA-2016:1903-1: Red Hat JBoss Web Server 2.1.1 httpd update
Red Hat Enterprise Linux: An update to Red Hat JBoss Web Server 2.1.1 httpd
RHBA-2016:1830-1: oci-register-machine bug fix update
Red Hat Enterprise Linux: Updated oci-register packages that fix one bug are now available for Red Hat
Enterprise Linux 7 Extras.
RHBA-2016:1829-1: docker-latest bug fix and enhancement update
Red Hat Enterprise Linux: Updated docker-latest packages that fix several bugs and add various
enhancements are now available for Red Hat Enterprise Linux 7 Extras.
RHBA-2016:1828-1: etcd bug fix update
Red Hat Enterprise Linux: Updated etcd packages that fix one bug and add two enhancements are now
available for Red Hat Enterprise Linux 7 Extras.
RHBA-2016:1827-1: docker bug fix update
Red Hat Enterprise Linux: Updated docker packages that fix several bugs are now available for Red Hat
Enterprise Linux 7 Extras.
USN-3080-1: Python Imaging Library vulnerabilities
Ubuntu Security Notice USN-3080-1
15th September, 2016
python-imaging vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 12.04 LTS
Summary
Python Imaging Libary could be made to crash if it received specially crafted
input or opened a specially crafted file.
Software description
- python-imaging
– Python Imaging Library
Details
Eric Soroos discovered that the Python Imaging Library incorrectly handled
certain malformed FLI or PhotoCD files. A remote attacker could use this
issue to cause Python Imaging Library to crash, resulting in a denial of
service. (CVE-2016-0775, CVE-2016-2533)
Andrew Drake discovered that the Python Imaging Libray incorrectly validated
input. A remote attacker could use this to cause Python Imaging Library to
crash, resulting in a denial of service. (CVE-2014-3589)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 12.04 LTS:
-
python-imaging
1.1.7-4ubuntu0.12.04.2
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
ST16-001: Securing Voter Registration Data
Original release date: September 15, 2016
|
|
Overview
Voter registration databases (VRDB) and election systems are rich targets and may continue to experience frequent attempted intrusions. This problem is not unique to individual states—it is shared across the nation. The keys to good cybersecurity are awareness and constant vigilance.
What are the threats that may place voter data at risk?
Malicious actors may use a variety of methods to interfere with voter registration websites and databases. Some methods of attack are listed below.
- Phishing emails attempt to manipulate users into clicking on a malicious link or downloading a malicious file attachment. Systems infected through phishing attacks act as an entry point for threat actors to spread throughout an organization, steal voter information, or disrupt voting operations. For guidance to defend against phishing, see the United States Computer Emergency Readiness Team (US-CERT) Tip on Avoiding Social Engineering and Phishing Attacks.
- Structured Query Language (SQL) injection is an attack technique that attempts to subvert the relationship between a webpage and its supporting database, typically to obtain information in the voter registration database. See US-CERT’s Publication on SQL Injection for more information.
- Cross-site scripting (XSS) vulnerabilities allow threat actors to insert and execute unauthorized code in web applications. Successful XSS attacks on voter registration websites can provide the attacker unauthorized access to voter information. For prevention and mitigation strategies against XSS, see US-CERT’s Alert on Compromised Web Servers and Web Shells.
- Denial-of-service (DoS) attacks prevent legitimate users from accessing information or services. A DoS attack can make a voter registration website unavailable or deny access to voter registration data. Contact your Internet service provider (ISP) to discuss ways they can help block DoS attacks targeting your organization. For more information on DoS, see US-CERT’s Tip on Understanding Denial-of-Service Attacks.
- Server vulnerabilities may be exploited to allow unauthorized access to sensitive information. An attack against a poorly configured server running a voter registration website may allow an adversary access to critical information and to the supporting voter registration database itself. See US-CERT’s Tip on Website Security for additional information.
- Ransomware is a type of malicious software that infects a computer system and restricts users’ access to system resources or data until a ransom is paid to unlock it. Affected organizations are discouraged from paying the ransom, as this does not guarantee access will be restored to a compromised VRDB. For more information on ransomware, see US-CERT’s Publication on Ransomware.
What prevention measures should I employ to protect against these threats?
DHS encourages election officials and network administrators to implement the recommendations below, which can prevent as many as 85 percent of targeted cyber attacks. These strategies are common sense to many, but DHS continues to see intrusions because organizations fail to use these basic measures.
- Application whitelisting – This is one of the best security strategies as it allows only specified programs to run while blocking all others, including malicious software.
- Patch applications and operating systems – Vulnerable applications and operating systems are the targets of most attacks. Ensuring these are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker.
- Restrict administrative privileges – Limiting user permissions to only necessary functions may prevent malicious software from running or limit its capability to spread through the network.
- Understanding firewalls – When anyone or anything can access your network at any time, your network is more susceptible to being attacked. Firewalls can be configured to block data from certain locations (IP whitelisting) or applications while allowing relevant and necessary data through.
A commitment to good cybersecurity and best practices is critical to protecting voter registration data. Here are some questions you may want to ask of your organization to help prevent attacks against voter registration websites and databases:
- Backups: Do we backup all critical information? Are the backups stored offline? Have we tested our ability to revert to backups during an incident?
- Risk Analysis: Have we conducted a cybersecurity risk analysis of the organization?
- Staff Training: Have we trained staff on cybersecurity best practices?
- Vulnerability Patching: Have we applied appropriate patching of known system vulnerabilities?
- Application Whitelisting: Do we allow only approved programs to run on our networks?
- Incident Response: Do we have an incident response plan and have we practiced it?
- Business Continuity: Are we able to sustain business operations without access to certain systems? For how long? Have we tested this?
- Penetration Testing: Have we attempted to hack into our own systems to test the security of our systems and our ability to defend against attacks?
How do I respond to unauthorized access to voter registration data?
Implement your security incident response and business continuity plan. It may take time for your organization’s IT professionals to isolate and remove threats to your systems and restore normal operations. In the meantime, you should take steps to maintain your organization’s essential functions according to your business continuity plan. Organizations should maintain and regularly test backup plans, disaster recovery plans, and business continuity procedures.
Contact law enforcement or DHS immediately. We encourage you to contact your local FBI field office, the FBI Internet Crime Complaint Center (IC3), or DHS’s National Cybersecurity and Communications Integration Center (NCCIC) immediately to report an intrusion and to request incident response resources or technical assistance.
Author: US-CERT Publications
This product is provided subject to this Notification and this Privacy & Use policy.
Vuln: Splunk Web Unspecified Open Redirection Vulnerability
Splunk Web Unspecified Open Redirection Vulnerability
Vuln: Splunk Web Unspecified Cross Site Scripting Vulnerability
Splunk Web Unspecified Cross Site Scripting Vulnerability