{"id":10859,"date":"2017-12-15T09:00:37","date_gmt":"2017-12-15T17:00:37","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/15\/news-4631\/"},"modified":"2017-12-15T09:00:37","modified_gmt":"2017-12-15T17:00:37","slug":"news-4631","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/15\/news-4631\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of December 11, 2017"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 15 Dec 2017 16:06:45 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>If you read my weekly blog or follow me on <a href=\"https:\/\/twitter.com\/elisal\">Twitter<\/a>, you know that I\u2019m a huge sports fan. Unfortunately, when you don\u2019t live in the town of your favorite team, you can be subject to blackout rules. So, my husband and I decided to purchase NFL Sunday Ticket from DirecTV. Fast forward to a couple of years ago \u2013 I wanted to watch my team play, but the channel that the game was supposed to be on was showing another game featuring my least favorite team instead. Needless to say, I was a little upset. I called DirecTV and I wasn\u2019t shy about my feelings on the situation. The customer service representative put me on hold to figure out the problem. Why wasn\u2019t I able to see my game? The game was already over. I\u2019m sure the team at DirecTV had a big laugh over my mistake, but I owned up to it and apologized to the representative.<\/p>\n<p>When a vulnerability is submitted to the Zero Day Initiative (ZDI), the affected vendor is given 120 days to take action to patch the vulnerability. If the deadline is not met, the ZDI will publicly disclose the vulnerability in accordance with its disclosure policy. Earlier this week, the Zero Day Initiative (ZDI) published a zero-day vulnerability as a result of a vendor not patching a vulnerability. One of our internal researchers, <a href=\"https:\/\/twitter.com\/HeadlessZeke\">Ricky Lawshae<\/a>, submitted a vulnerability to the Zero Day Initiative in mid-June of this year involving equipment that DirecTV uses with its Wireless Genie devices. The affected equipment is a Linksys WVBR0-25 which is used as a wireless video bridge. Ricky reviewed the scripts running on the Linksys device and found one that he could to inject additional commands. He was able to implement a root shell on the box in less than 30 seconds by exploiting this command injection vulnerability, which ultimately granted him full remote unauthenticated administrator control over the device. The ZDI attempted to contact the vendor several times regarding the vulnerability but never received a reply. The ZDI informed Linksys that the vulnerability would be published on December 12, 2017. You can read <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/12\/13\/remote-root-in-directvs-wireless-video-bridge-a-tale-of-rage-and-despair\">Ricky\u2019s blog<\/a> to get more details on this vulnerability as well as view a video of the exploit in action.<strong>Microsoft Update<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for Microsoft updates released on or before December 12, 2017. Security patches were released by Microsoft covering Internet Explorer (IE), Edge, Windows, Office, SharePoint, and Exchange. Three of the Microsoft CVEs came through the ZDI program. The following table maps Digital Vaccine filters to the Microsoft updates. Filters marked with an asterisk (*) shipped prior to this DV package, providing preemptive zero-day protection for customers. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/12\/12\/the-december-2017-security-update-review\">December 2017 Security Update Review<\/a> from the Zero Day Initiative:<\/p>\n<div class=\"lightTable\">\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"126\"><strong>CVE #<\/strong><\/td>\n<td width=\"162\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"348\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11885<\/td>\n<td width=\"162\">30092<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11886<\/td>\n<td width=\"162\">30069<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11887<\/td>\n<td width=\"162\">20792<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11888<\/td>\n<td width=\"162\">30070<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11889<\/td>\n<td width=\"162\">30075<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11890<\/td>\n<td width=\"162\">30068<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11893<\/td>\n<td width=\"162\">30076<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11894<\/td>\n<td width=\"162\">30077<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11895<\/td>\n<td width=\"162\">30078<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11899<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11901<\/td>\n<td width=\"162\">*29900<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11903<\/td>\n<td width=\"162\">30079<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11905<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11906<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11907<\/td>\n<td width=\"162\">30081<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11908<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11909<\/td>\n<td width=\"162\">30082<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11910<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11911<\/td>\n<td width=\"162\">30083<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11912<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11913<\/td>\n<td width=\"162\">*29786<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11914<\/td>\n<td width=\"162\">30080<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11916<\/td>\n<td width=\"162\">30085<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11918<\/td>\n<td width=\"162\">30074<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11919<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11927<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11930<\/td>\n<td width=\"162\">30086<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11932<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11934<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11935<\/td>\n<td width=\"162\">30088<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11936<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11937<\/td>\n<td width=\"162\">30093<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2017-11939<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>End of Support Bulletin<\/strong><\/p>\n<p>Earlier this week, we announced the end of support for a number of TippingPoint software releases across various models.<\/p>\n<p>Date of Announcement: December 12, 2017<\/p>\n<p>&nbsp;<\/p>\n<p>Affected IPS (N\/NX-Series) TOS Versions: 3.7.0, 3.7.1, 3.7.2, 3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.9.0, 3.9.1<\/p>\n<p>End of Engineering: March 31, 2018<\/p>\n<p>End of Support: December 31, 2018<\/p>\n<p>&nbsp;<\/p>\n<p>Affected IPS (S-Series) TOS Versions: 3.6.4, 3.6.5, 3.6.6<\/p>\n<p>End of Engineering: March 31, 2018<\/p>\n<p>End of Support: December 31, 2018<\/p>\n<p>&nbsp;<\/p>\n<p>Affected TPS TOS Versions: 4.0.2, 4.1.0, 4.1.1, 4.1.2, 4.2.0<\/p>\n<p>End of Engineering: March 31, 2018<\/p>\n<p>End of Support: December 31, 2018<\/p>\n<p>&nbsp;<\/p>\n<p>Affected SMS TOS Versions: 4.4.0<\/p>\n<p>End of Engineering: March 31, 2018<\/p>\n<p>End of Support: December 31, 2018<\/p>\n<p>&nbsp;<\/p>\n<p>Factory Release of TPS 5.0.0: October 16, 2017<\/p>\n<p>Factory Release of SMS 5.0.0: March 31, 2018<\/p>\n<p>Factory Release of IPS 3.8.4: March 31, 2018<\/p>\n<p>Customers with any questions or need assistance with migration planning can contact the TippingPoint Technical Assistance Center. Release notes are also available on <a href=\"https:\/\/tmc.tippingpoint.com\">https:\/\/tmc.tippingpoint.com<\/a>.<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are no new zero-day filters in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong>Updated Existing Zero-Day Filters<\/strong><\/p>\n<p>This section highlights specific filter(s) of interest in this week\u2019s Digital Vaccine package that have been updated as a result of a vendor either issuing a patch for a vulnerability found via the Zero Day Initiative or a vulnerability that has been published by the Zero Day Initiative in accordance with its Disclosure Policy.<\/p>\n<p>This week\u2019s updated zero-day filters focus on two of the vulnerabilities from this month\u2019s Microsoft update. The updated filters reflect the fact that the vulnerabilities have been published because Microsoft has issued patches for them. The dates in parentheses after each filter reflects the date we had protection in place for our customers:<\/p>\n<p><strong><em>Microsoft (2)<\/em><\/strong><\/p>\n<p>\u2022\u00a0 29900: HTTP: Microsoft Chakra Javascript Array JIT Optimization Type Confusion Vulnerability (November 7, 2017)<\/p>\n<p>\u2022 29786: HTTP: Microsoft Windows VBScript VT_BSTR Use-After-Free Vulnerability (October 24, 2017)<\/p>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-december-4-2017\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-december-11-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 15 Dec 2017 16:06:45 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>If you read my weekly blog or follow me on Twitter, you know that I\u2019m a huge sports fan. Unfortunately, when you don\u2019t live in the town of your favorite team, you can be subject to blackout rules. So, my husband and I decided to purchase NFL Sunday Ticket from DirecTV. Fast forward to a&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-10859","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10859"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10859\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10859"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}