TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 14, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 18 May 2018 14:52:12 +0000

It’s one thing when your security solutions help protect your organization from a devastating cyberattack. It’s another thing when the company who develops your security solutions takes it to the next level to actually help catch those responsible for some of the biggest cyberattacks in the world. Earlier this week, Trend Micro disclosed the details of its exclusive investigative cooperation with the Federal Bureau of Investigation (FBI) to identify, arrest and bring to trial the individuals linked to the infamous Counter Antivirus (CAV) service Scan4You.

 

In 2012, Trend Micro began its research on Scan4You, which allowed cybercriminals to check the detection of their latest malware against more than 30 modern antivirus engines, enabling them to make attacks more successful. After close collaboration with the FBI, Scan4You went offline following the arrest of two suspected administrators in May 2017. Ruslans Bondars was found guilty as a result of the recent trial, while Jurijs Martisevs pleaded guilty in March 2018.

 

You can read more about “The Rise and Fall of {Scan4You}” here.

 

Red Hat Fedora DHCP Client Network Manager Vulnerability

Yesterday, Trend Micro released DVToolkit CSW file CVE-2018-1111.csw that contains the following filter:

 

  • Filter C1000001: DHCP: Red Hat Fedora DHCP Client Network Manager Input Validation Vulnerability

 

This command injection flaw found in a script included in the DHCP client (dhclient) packages affects Red Hat Enterprise Linux 6 and 7. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager, which is configured to obtain network configuration using the DHCP protocol.

 

Note: This filter will be obsoleted by MainlineDV filter 31851 in next week’s package.

 

Adobe Security Update

This week’s Digital Vaccine (DV) package includes coverage for Adobe updates released on or before May 8, 2018. The following table maps Digital Vaccine filters to the Microsoft updates. You can get more detailed information on this month’s security updates from Dustin Childs’ May 2018 Security Update Review from the Zero Day Initiative:

 

Bulletin #CVE #Digital Vaccine FilterStatus
APSB18-16CVE-2018-494431588 
APSB18-09CVE-2018-494631687 
APSB18-09CVE-2018-494731688 
APSB18-09CVE-2018-494831589 
APSB18-09CVE-2018-494931592 
APSB18-09CVE-2018-495031593 
APSB18-09CVE-2018-495131594 
APSB18-09CVE-2018-495231695 
APSB18-09CVE-2018-495331696 
APSB18-09CVE-2018-495431697 
APSB18-09CVE-2018-495531698 
APSB18-09CVE-2018-4956N/AVendor Deemed Reproducibility or Exploitation Unlikely
APSB18-09CVE-2018-495731699 
APSB18-09CVE-2018-495831700 
APSB18-09CVE-2018-495931701 
APSB18-09CVE-2018-496031702 
APSB18-09CVE-2018-496131703 
APSB18-09CVE-2018-496231704 
APSB18-09CVE-2018-496331705 
APSB18-09CVE-2018-496431706 
APSB18-09CVE-2018-496531707 
APSB18-09CVE-2018-496631708 
APSB18-09CVE-2018-496731709 
APSB18-09CVE-2018-496831710 
APSB18-09CVE-2018-496931711 
APSB18-09CVE-2018-497031712 
APSB18-09CVE-2018-497131713 
APSB18-09CVE-2018-497231714 
APSB18-09CVE-2018-497331715 
APSB18-09CVE-2018-497431716 
APSB18-09CVE-2018-497531717 
APSB18-09CVE-2018-497631718 
APSB18-09CVE-2018-497731719 
APSB18-09CVE-2018-497831720 
APSB18-09CVE-2018-497931721 
APSB18-09CVE-2018-498031722 
APSB18-09CVE-2018-498131723 
APSB18-09CVE-2018-498231724 
APSB18-09CVE-2018-498331725 
APSB18-09CVE-2018-498431726 
APSB18-09CVE-2018-498531727 
APSB18-09CVE-2018-498631597 
APSB18-09CVE-2018-498731598 
APSB18-09CVE-2018-498831596 
APSB18-09CVE-2018-498931595 
APSB18-09CVE-2018-499031591 
APSB18-09CVE-2018-499331570 

 

Zero-Day Filters

There are 11 new zero-day filters covering four vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative web site. You can also follow the Zero Day Initiative on Twitter @thezdi and on their blog.

 

Advantech (5)

  • 31622: ZDI-CAN-5587: Zero Day Initiative Vulnerability (Advantech WebAccess HMI Designer)
  • 31624: ZDI-CAN-5590: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
  • 31627: ZDI-CAN-5595: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
  • 31628: ZDI-CAN-5596: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
  • 31629: ZDI-CAN-5597: Zero Day Initiative Vulnerability (Advantech WebAccess Node)

 

Microsoft (2)

  • 31620: ZDI-CAN-5567: Zero Day Initiative Vulnerability (Microsoft Visual Studio)
  • 31623: ZDI-CAN-5589: Zero Day Initiative Vulnerability (Microsoft Teams)

 

Omron (1)

  • 30435: HTTP: Omron CX-One CX-FLnet Version Buffer Overflow Vulnerability (ZDI-18-289)

 

Trend Micro (3)

  • 31619: ZDI-CAN-5553: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
  • 31625: ZDI-CAN-5592: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
  • 31626: ZDI-CAN-5594: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)

 

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 14, 2018 appeared first on .

http://feeds.trendmicro.com/TrendMicroSimplySecurity