Zero-Day Coverage Update – Week of July 16, 2018

Credit to Author: Elisa Lippincott (Global Threat Communications)| Date: Fri, 20 Jul 2018 15:24:42 +0000

One night this week, I came across one of my favorite movies Willy Wonka and the Chocolate Factory. The world had gone crazy after the reclusive Willy Wonka announces that he has hidden five golden tickets in chocolate Wonka Bars that promised a factory tour and a lifetime supply of chocolate. There’s a scene at a school where a teacher, Mr. Turkentine, decides to teach the kids about percentages and uses the Wonka Bars as an example. He asks one student how many Wonka Bars she bought and she replied, “About a hundred.” Mr. Turkentine tells her that there are ten hundreds in a thousand so that’s 10 percent. He asks a couple of other students and the percentages are easy to figure out. Then he asks Charlie Bucket, a poor paperboy, how many Wonka Bars he bought, and he says “Two.” Mr. Turkentine replied, “Two? What do you mean you only opened two? I can’t figure out the percentage for just two, so let’s just pretend you opened two hundred.”

While Mr. Turkentine has trouble with percentages, the Zero Day Initiative (ZDI) doesn’t. This month, Adobe had a bigger than normal patch for their Acrobat product, covering 107 CVEs. 68 of those CVEs came through the ZDI program! I don’t have any trouble figuring out that percentage – that’s 63.6% of the Acrobat vulnerabilities that came through ZDI. The “golden ticket” for Trend Micro customers isn’t a lifetime of chocolate, but preemptive protection against these bugs!

MindshaRE: An Introduction to PyKD

Earlier this week, ZDI researcher Abdul-Aziz Hariri posted a blog covering the topic of using PyKD to help automate debugging tasks and crash dump analysis using Python. His post is part of the MindshaRE blog series that provides insight on various reversing techniques to security researchers and reverse engineers. The blog demonstrates the installation and basic configuration of PyKD and goes on the show how it can be used to execute Python script from inside WinDBG. You can read the full blog here.

Adobe Security Update

This week’s Digital Vaccine (DV) package includes coverage for Adobe updates released on or before July 10, 2018. The following table maps Digital Vaccine filters to the Microsoft updates. You can get more detailed information on this month’s security updates from Dustin Childs’ July 2018 Security Update Review from the Zero Day Initiative:

Bulletin # CVE # Digital Vaccine Filter Status
APSB18-21 CVE-2018-5009 32561
APSB18-21 CVE-2018-5010 32562
APSB18-21 CVE-2018-5011 32563
APSB18-21 CVE-2018-5012 32564
APSB18-21 CVE-2018-12799 32670
APSB18-21 CVE-2018-12803 32565
APSB18-21 CVE-2018-5014 32566
APSB18-21 CVE-2018-5015 32567
APSB18-21 CVE-2018-5016 32568
APSB18-21 CVE-2018-5017 32569
APSB18-21 CVE-2018-5018 32570
APSB18-21 CVE-2018-5019 32571
APSB18-21 CVE-2018-5020 32573
APSB18-21 CVE-2018-5021 32574
APSB18-21 CVE-2018-5022 32575
APSB18-21 CVE-2018-5023 32576
APSB18-21 CVE-2018-5024 32577
APSB18-21 CVE-2018-5025 32578
APSB18-21 CVE-2018-5026 32579
APSB18-21 CVE-2018-5027 32580
APSB18-21 CVE-2018-5028 32581
APSB18-21 CVE-2018-5029 32582
APSB18-21 CVE-2018-5030 32583
APSB18-21 CVE-2018-5031 32584
APSB18-21 CVE-2018-5032 32585
APSB18-21 CVE-2018-5033 32586
APSB18-21 CVE-2018-5034 32587
APSB18-21 CVE-2018-5035 32588
APSB18-21 CVE-2018-5036 32589
APSB18-21 CVE-2018-5037 32590
APSB18-21 CVE-2018-5038 32591
APSB18-21 CVE-2018-5039 32592
APSB18-21 CVE-2018-5040 32593
APSB18-21 CVE-2018-5041 32594
APSB18-21 CVE-2018-5042 32595
APSB18-21 CVE-2018-5043 32596
APSB18-21 CVE-2018-5044 32597
APSB18-21 CVE-2018-5045 32598
APSB18-21 CVE-2018-5046 32599
APSB18-21 CVE-2018-5047 32600
APSB18-21 CVE-2018-5048 32601
APSB18-21 CVE-2018-5049 32602
APSB18-21 CVE-2018-5050 32603
APSB18-21 CVE-2018-5051 32604
APSB18-21 CVE-2018-5052 32605
APSB18-21 CVE-2018-5053 32606
APSB18-21 CVE-2018-5054 32607
APSB18-21 CVE-2018-5055 32608
APSB18-21 CVE-2018-5056 32609
APSB18-21 CVE-2018-5057 32610
APSB18-21 CVE-2018-5058 32611
APSB18-21 CVE-2018-5059 32612
APSB18-21 CVE-2018-5060 32613
APSB18-21 CVE-2018-5061 32614
APSB18-21 CVE-2018-5062 32615
APSB18-21 CVE-2018-5063 32616
APSB18-21 CVE-2018-5064 32617
APSB18-21 CVE-2018-5065 32618
APSB18-21 CVE-2018-5066 32619
APSB18-21 CVE-2018-5067 32620
APSB18-21 CVE-2018-5068 32621
APSB18-21 CVE-2018-5069 32622
APSB18-21 CVE-2018-5070 32623
APSB18-21 CVE-2018-12754 32624
APSB18-21 CVE-2018-12755 32625
APSB18-21 CVE-2018-12756 32626
APSB18-21 CVE-2018-12757 32627
APSB18-21 CVE-2018-12758 32628
APSB18-21 CVE-2018-12760 32629
APSB18-21 CVE-2018-12761 32630
APSB18-21 CVE-2018-12762 32631
APSB18-21 CVE-2018-12763 32632
APSB18-21 CVE-2018-12764 32633
APSB18-21 CVE-2018-12765 32634
APSB18-21 CVE-2018-12766 32635
APSB18-21 CVE-2018-12767 32636
APSB18-21 CVE-2018-12768 32637
APSB18-21 CVE-2018-12770 32638
APSB18-21 CVE-2018-12771 32639
APSB18-21 CVE-2018-12772 32640
APSB18-21 CVE-2018-12773 32641
APSB18-21 CVE-2018-12774 32642
APSB18-21 CVE-2018-12776 32643
APSB18-21 CVE-2018-12777 32644
APSB18-21 CVE-2018-12779 32645
APSB18-21 CVE-2018-12780 32646
APSB18-21 CVE-2018-12781 32647
APSB18-21 CVE-2018-12782 32648
APSB18-21 CVE-2018-12783 32649
APSB18-21 CVE-2018-12784 Vendor Deemed Reproducibility or Exploitation Unlikely
APSB18-21 CVE-2018-12785 32650
APSB18-21 CVE-2018-12786 32651
APSB18-21 CVE-2018-12787 32652
APSB18-21 CVE-2018-12788 32653
APSB18-21 CVE-2018-12789 32654
APSB18-21 CVE-2018-12790 32655
APSB18-21 CVE-2018-12791 32656
APSB18-21 CVE-2018-12792 32657
APSB18-21 CVE-2018-12802 Vendor Deemed Reproducibility or Exploitation Unlikely
APSB18-21 CVE-2018-12793 32658
APSB18-21 CVE-2018-12794 32659
APSB18-21 CVE-2018-12795 32660
APSB18-21 CVE-2018-12796 32661
APSB18-21 CVE-2018-12797 32662
APSB18-21 CVE-2018-12798 32663
APSB18-24 CVE-2018-5007 32559
APSB18-24 CVE-2018-5008 32560

 

Zero-Day Filters

There are no new zero-day filters in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website. You can also follow the Zero Day Initiative on Twitter @thezdi and on their blog.

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.

The post Zero-Day Coverage Update – Week of July 16, 2018 appeared first on .

http://feeds.trendmicro.com/TrendMicroSimplySecurity