Last Updated: 2016-11-30 21:08:19 UTC
by Johannes Ullrich (Version: 1)
Update: Mozilla now released Firefox 50.0.2 to fix this issue, and the tor project released the corresponding tor browser 6.0.7.
Mozilla is working on a patch. And Tor Browser 6.0.7 which will hopefully be released later today is scheduled to include the fix.
Until then: Best not to use Firefox if you can help it. The current version of Firefox, 50.0.1, which was released on Monday, is still vulnerable. While the exploit hasn't been spotted yet outside of Tor, expect it to show up by the time you read this.
An analysis of the shell code used in the exploit by "Wack0" concluded that the code is very similar to an exploit used by law enforcement in 2013 against an older version of Firefox/Tor Browser. 
Last Updated: 2016-11-30 17:54:54 UTC
by Johannes Ullrich (Version: 1)
Got a couple of reports recently about an increase in port 1434 scanning for the infamous "Slammer" (aka "Saphire") MS-SQL Server vulnerability. Sad to say: It looks like it never went away... There appears to be still a "background" of about 50 source IPs/day that scan for port 1434. Now this is way down from the numbers we had in 2003/2004 (20-30,000 sources per day). But to put it in perspective: This was still about an order of magnitude lower than what we see for Mirai now. So let's look at this again in 13 years, and see how many DVRs are still sending Mirai style scans. Just like with Slammer, all it takes is a couple of them to survive to immediately infect new systems as they come online.
If you want a list of yesterday's sources, check here: https://isc.sans.edu/dailysources.html?mintargetport=1434&maxtargetport=1434
After removing some of the research scanners (Shodan, Shadowserver, Quadmetrics), I am left with this list:
ASN | IP Address | CT | Network Name 278 | 220.127.116.11 | MX | Universidad Nacional Autonoma de Mexico, MX 3462 | 18.104.22.168 | TW | HINET Data Communication Business Group, TW 3786 | 22.214.171.124 | KR | LGDACOM LG DACOM Corporation, KR 4134 | 126.96.36.199 | CN | CHINANET-BACKBONE No.31,Jin-rong Street, CN 4816 | 188.8.131.52 | CN | CHINANET-IDC-GD China Telecom (Group), CN 4837 | 184.108.40.206 | CN | CHINA169-BACKBONE CNCGROUP China169 Backbone, CN 5650 | 220.127.116.11 | US | FRONTIER-FRTR - Frontier Communications of America, Inc., US 6739 | 18.104.22.168 | ES | ONO-AS Cableuropa - ONO, ES 7018 | 22.214.171.124 | US | ATT-INTERNET4 - AT&T Services, Inc., US 7029 | 126.96.36.199 | US | WINDSTREAM - Windstream Communications Inc, US 7162 | 188.8.131.52 | BR | Universo Online S.A., BR 7418 | 184.108.40.206 | CL | TELEFÓNICA CHILE S.A., CL 7470 | 220.127.116.11 | TH | TRUEINTERNET-AS-AP TRUE INTERNET Co.,Ltd., TH 7643 | 18.104.22.168 | VN | VNPT-AS-VN Vietnam Posts and Telecommunications (VNPT), VN 7922 | 22.214.171.124 | US | COMCAST-7922 - Comcast Cable Communications, LLC, US 8342 | 126.96.36.199 | RU | RTCOMM-AS , RU 8560 | 188.8.131.52 | US | ONEANDONE-AS Brauerstrasse 48, DE 9808 | 184.108.40.206 | CN | CMNET-GD Guangdong Mobile Communication Co.Ltd., CN 11014 | 220.127.116.11 | AR | CPS, AR 11650 | 18.104.22.168 | US | PLDI - Pioneer Long Distance Inc., US 15311 | 22.214.171.124 | CL | Telefonica Empresas, CL 16276 | 126.96.36.199 | FR | OVH , FR 16509 | 188.8.131.52 | US | AMAZON-02 - Amazon.com, Inc., US 17676 | 184.108.40.206 | JP | GIGAINFRA Softbank BB Corp., JP 19108 | 220.127.116.11 | US | SUDDENLINK-COMMUNICATIONS - Suddenlink Communications, US 27892 | 18.104.22.168 | VE | Universidad del Zulia, VE 29073 | 22.214.171.124 | NL | QUASINETWORKS , NL 60781 | 126.96.36.199 | NL | LEASEWEB-NL Netherlands, NL
No idea if these are actually infected systems, or if these systems are just scanning for various "research projects" as well. Right now, none of the systems appears up.