{"id":3336,"date":"2013-09-24T16:26:31","date_gmt":"2013-09-24T19:26:31","guid":{"rendered":"https:\/\/www.kwell.net\/kwell_blog\/?p=3336"},"modified":"2013-09-26T16:29:41","modified_gmt":"2013-09-26T19:29:41","slug":"alerta-de-vulnerabilidades-usuarios-tecnicos","status":"publish","type":"post","link":"https:\/\/www.kwell.net\/kwell_blog\/?p=3336","title":{"rendered":"Alerta de Vulnerabilidades (usuarios t\u00e9cnicos)"},"content":{"rendered":"<p>Title: Attacks against Internet Explorer 0-day continuing in the wild<\/p>\n<p>Description: Despite a major wave of publicity following the discovery last week of a 0-day remote code execution flaw in Internet Explorer, and the release of a workaround by Microsoft, in-the-wild exploitation of the flaw (CVE-2013-3893) is continuing to take place, with security vendor FireEye releasing an in-depth report about attacks occurring specifically in Japan. Live exploit code began appearing on public security research sites by Tuesday of this week, and worldwide exploitation by exploit kits and other large-scale vectors is likely to begin occurring well before the October 8 release of Microsoft&#8217;s standard patch cycle. System administrators are urged to ensure that Microsoft&#8217;s temporary fix has been applied immediately.<!--more--><\/p>\n<p>Reference:<\/p>\n<p><a href=\"http:\/\/www.fireeye.com\/blog\/technical\/cyber-exploits\/2013\/09\/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html\">http:\/\/www.fireeye.com\/blog\/technical\/cyber-exploits\/2013\/09\/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html<\/a><\/p>\n<p><a href=\"http:\/\/community.websense.com\/blogs\/securitylabs\/archive\/2013\/09\/18\/up-to-70-of-pcs-vulnerable-to-zero-day-cve-2013-3893.aspx\">http:\/\/community.websense.com\/blogs\/securitylabs\/archive\/2013\/09\/18\/up-to-70-of-pcs-vulnerable-to-zero-day-cve-2013-3893.aspx<\/a><\/p>\n<p><a href=\"https:\/\/community.rapid7.com\/community\/infosec\/blog\/2013\/09\/24\/ie-0-day-exploit-code-is-now-widely-available-cve-2013-3893\">https:\/\/community.rapid7.com\/community\/infosec\/blog\/2013\/09\/24\/ie-0-day-exploit-code-is-now-widely-available-cve-2013-3893<\/a><\/p>\n<p>Snort SID: 27943, 27944<\/p>\n<p>ClamAV: BC.Exploit.CVE_2013_3893<\/p>\n<p>&nbsp;<\/p>\n<p>Title: Apple iPhone TouchID broken<\/p>\n<p>Description: The Chaos Computer Club &#8211; one of the planet&#8217;s oldest hacking organizations &#8211; was declared the official winner of a bounty program that sprung up over the weekend to crack the new touch ID authentication system in new iPhone 5 hardware, after the group successfully lifted a print, replicated it with commonly available technology, and gained access to a phone protected by the system. The contest featured its share of hacker drama, after a pledge of $10,000 to the crowd-funded bounty was made by a venture capitalist who later reneged on his promise, after having received considerable media coverage for the pledge.<\/p>\n<p>Reference:<\/p>\n<p><a href=\"http:\/\/www.ccc.de\/en\/updates\/2013\/ccc-breaks-apple-touchid\">http:\/\/www.ccc.de\/en\/updates\/2013\/ccc-breaks-apple-touchid<\/a><\/p>\n<p><a href=\"http:\/\/www.zdnet.com\/charlatan-hijacks-iphone-5s-fingerprint-hack-contest-fools-press-7000020978\/\">http:\/\/www.zdnet.com\/charlatan-hijacks-iphone-5s-fingerprint-hack-contest-fools-press-7000020978\/<\/a><\/p>\n<p>Snort SID: N\/A<\/p>\n<p>ClamAV: N\/A<\/p>\n<p>&nbsp;<\/p>\n<p>Title: Fake iMessage for Android surfaces, sends data to China<\/p>\n<p>Description: An unofficial Apple iMessage client appeared in Google&#8217;s Android market this week, with tens of thousands of downloads before being pulled by Google. Several security researchers independently noted that the application sent copies of all of the user&#8217;s data to an IP address in China without any warning to the end user. While the developer of the app insisted that the data being sent was for legitimate purposes, the episode shows how easy it is for rogue apps to harvest huge amounts of data from unsuspecting users even in relatively well-policed markets such as Google Play.<\/p>\n<p>Reference:<\/p>\n<p><a href=\"https:\/\/plus.google.com\/u\/0\/116098411511850876544\/posts\/UkgaXa1oa6M\">https:\/\/plus.google.com\/u\/0\/116098411511850876544\/posts\/UkgaXa1oa6M<\/a><\/p>\n<p><a href=\"http:\/\/www.engadget.com\/2013\/09\/24\/imessage-for-android-app-risk\/\">http:\/\/www.engadget.com\/2013\/09\/24\/imessage-for-android-app-risk\/<\/a><\/p>\n<p>Snort SID: 28046<\/p>\n<p>ClamAV: Andr.Trojan.FakeiMessage<\/p>\n<p>&nbsp;<\/p>\n<p>Title: Java reflection attack allows remote code execution on Android &lt; 4.2<\/p>\n<p>Description: Security research firm MWR InfoSecurity released an advisory this week detailing a reflection attack against the addJavaScriptInterface functionality offered by the Android operating system&#8217;s WebKit component, which allows developers to define methods which can be called by JavaScript. Although the original intent of the functionality was to expose only clearly defined methods, a trivial sequence of calls could allow full command execution by malicious web pages if any methods are exported at all through this interface. While the issue has been fixed in Android 4.2, MWR&#8217;s research shows a wide array of popular apps and ad networks still vulnerable to attacks.<\/p>\n<p>&nbsp;<\/p>\n<p>Reference:<\/p>\n<p><a href=\"http:\/\/labs.mwrinfosecurity.com\/blog\/2013\/09\/24\/webview-addjavascriptinterface-remote-code-execution\/\">http:\/\/labs.mwrinfosecurity.com\/blog\/2013\/09\/24\/webview-addjavascriptinterface-remote-code-execution\/<\/a><\/p>\n<p>Snort SID: 28043<\/p>\n<p>ClamAV: Andr.Exploit.JavaReflect<\/p>\n<p>============================================================<\/p>\n<p>USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK<\/p>\n<p>F-Secure 1H13 threat report:<\/p>\n<p><a href=\"http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Threat_Report_H1_2013.pdf\">http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Threat_Report_H1_2013.pdf<\/a><\/p>\n<p>Format string exploitation tutorial:<\/p>\n<p><a href=\"http:\/\/packetstorm.igor.onlinedirect.bg\/papers\/attack\/formatstring-tutorial.pdf\">http:\/\/packetstorm.igor.onlinedirect.bg\/papers\/attack\/formatstring-tutorial.pdf<\/a><\/p>\n<p>Cracking WatchGuard passwords:<\/p>\n<p><a href=\"http:\/\/funoverip.net\/2013\/09\/cracking-watchguard-passwords\/\">http:\/\/funoverip.net\/2013\/09\/cracking-watchguard-passwords\/<\/a><\/p>\n<p>Data exfiltration in targeted attacks:<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/data-exfiltration-in-targeted-attacks\/\">http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/data-exfiltration-in-targeted-attacks\/<\/a><\/p>\n<p>Account hijacking with third-party login:<\/p>\n<p><a href=\"https:\/\/lightraft.com\/blog\/account-hijacking-with-third-party-login\/\">https:\/\/lightraft.com\/blog\/account-hijacking-with-third-party-login\/<\/a><\/p>\n<p>Building OS X trojans with AppleScript, homoglyphs, and iTunes:<\/p>\n<p><a href=\"http:\/\/www.tripwire.com\/state-of-security\/vulnerability-management\/trojan-mac-building-os-x-trojans-applescript-homoglyphs-itunes\/\">http:\/\/www.tripwire.com\/state-of-security\/vulnerability-management\/trojan-mac-building-os-x-trojans-applescript-homoglyphs-itunes\/<\/a><\/p>\n<p>Shylock financial malware back, targeting 2 dozen major banks:<\/p>\n<p><a href=\"http:\/\/threatpost.com\/shylock-financial-malware-back-and-targeting-two-dozen-major-banks\/102343#.Ujq5wFAkf2k.twitte\">http:\/\/threatpost.com\/shylock-financial-malware-back-and-targeting-two-dozen-major-banks\/102343#.Ujq5wFAkf2k.twitte<\/a><\/p>\n<p>Global phishing survey: trends and domain name use, 1H2013:<\/p>\n<p><a href=\"http:\/\/docs.apwg.org\/reports\/APWG_GlobalPhishingSurvey_1H2013.pdf\">http:\/\/docs.apwg.org\/reports\/APWG_GlobalPhishingSurvey_1H2013.pdf<\/a><\/p>\n<p>Affiliate network for mobile malware impersonates Google Play:<\/p>\n<p><a href=\"http:\/\/www.webroot.com\/blog\/2013\/09\/18\/affiliate-network-mobile-malware-impersonates-google-play-tricks-users-installing-premium-rate-sms-sending-rogue-apps\/\">http:\/\/www.webroot.com\/blog\/2013\/09\/18\/affiliate-network-mobile-malware-impersonates-google-play-tricks-users-installing-premium-rate-sms-sending-rogue-apps\/<\/a><\/p>\n<p>Apple ships OS X 10.8.5 security update, fixes sudo bug at last:<\/p>\n<p><a href=\"http:\/\/nakedsecurity.sophos.com\/2013\/09\/13\/apple-ships-os-x-10-8-5-security-update-fixes-sudo-bug-at-last\/\">http:\/\/nakedsecurity.sophos.com\/2013\/09\/13\/apple-ships-os-x-10-8-5-security-update-fixes-sudo-bug-at-last\/<\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-3336\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-3336\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20Alerta%20de%20Vulnerabilidades%20%28usuarios%20t%C3%A9cnicos%29&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D3336&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"d74cbbcac1\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-3336\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-3336\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Title: Attacks against Internet Explorer 0-day continuing in the wild Description: Despite a major wave of publicity following the discovery last week of a 0-day remote code execution flaw in Internet Explorer, and the release of a workaround by Microsoft, in-the-wild exploitation of the flaw (CVE-2013-3893) is continuing to take place, with security vendor FireEye &hellip;<br \/><a href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336\">Read more <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-3336\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-3336\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20Alerta%20de%20Vulnerabilidades%20%28usuarios%20t%C3%A9cnicos%29&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D3336&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"d74cbbcac1\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-3336\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-3336\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3336&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[3],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/3336"}],"collection":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3336"}],"version-history":[{"count":1,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/3336\/revisions"}],"predecessor-version":[{"id":3337,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/3336\/revisions\/3337"}],"wp:attachment":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}