TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 1, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 05 May 2017 12:00:04 +0000

As you read this blog, I am probably sitting on a beach in Cancun, Mexico getting a nice tan and not thinking about security (well, maybe just a little). A couple of days before I left, I had to deal with the inevitable. It never fails – every time I am about to go on vacation, the urgency of things that need to get done rises exponentially. I had the nerve to go on vacation without my laptop, just like I did last year.

Whether I have my laptop or not, I’m always thinking about security when I’m on vacation. On my trip last year, I learned about Bluetooth skimmers in ATMs. This year, it’s “cardless ATM.” Ahh, the convenience of conducting “life” on a mobile phone, but with the added risk of having your credentials compromised. You can get your money from an ATM just by using an app on your smartphone. What can go wrong? Banks want to adopt the tools that customers are using, but they need to make sure that they are securing transactions and validating credentials (e.g. two factor authentication, etc.). The last time I checked, cash is still accepted in Cancun. I think I’ll stick to using my smartphone for taking pictures.

Zero-Day Filters

There are 12 new zero-day filters covering four vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website.

Adobe (6)

  • 24741: HTTP: Adobe Acrobat Reader DC app.launchURL Command Execution Vulnerability (ZDI-16-285)
  • 28011: ZDI-CAN-4550: Zero Day Initiative Vulnerability (Adobe Reader DC)
  • 28032: ZDI-CAN-4556: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 28034: ZDI-CAN-4557: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 28035: ZDI-CAN-4558: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 28092: ZDI-CAN-4559: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC) 

Eaton (2)

  • 28025: ZDI-CAN-4552: Zero Day Initiative Vulnerability (Eaton ELCSoft)
  • 28027: ZDI-CAN-4553: Zero Day Initiative Vulnerability (Eaton ELCSoft) 

Microsoft (1)

  • 43759: HTTP: Microsoft Internet Explorer and Edge CSS Information Disclosure Vulnerability (ZDI-16-513) 

Trend Micro (3)

  • 27942: HTTPS: Trend Micro Smart Protection Server wcs_bwlists_handler Command Injection (ZDI-17-243)
  • 28008: HTTPS: Trend Micro SafeSync for Enterprise rollback Command Injection Vulnerability (ZDI-17-129)
  • 28009: ZDI-CAN-4545,4549: Zero Day Initiative Vulnerability (Trend Micro Control Manager) 

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.

http://feeds.trendmicro.com/TrendMicroSimplySecurity