{"id":11258,"date":"2018-01-26T10:00:01","date_gmt":"2018-01-26T18:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/26\/news-5029\/"},"modified":"2018-01-26T10:00:01","modified_gmt":"2018-01-26T18:00:01","slug":"news-5029","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/26\/news-5029\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of January 22, 2018"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 26 Jan 2018 16:52:47 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Yesterday, the Zero Day Initiative (ZDI) announced the dates and contest rules for Pwn2Own 2018. Last year, we celebrated the 10<sup>th<\/sup> anniversary of the event and the 11<sup>th<\/sup> year is going to be bigger than ever! Pwn2Own will be returning to Vancouver, BC, at the <a href=\"https:\/\/cansecwest.com\/\">CanSecWest Conference<\/a> on March 14-16, 2018. ZDI is partnering with Microsoft for the event and VMware joins the competition as a sponsor for the first time.<\/p>\n<p>&nbsp;<\/p>\n<p>Up to $2,000,000 USD will be awarded in cash and prizes at this year\u2019s competition. Web browsers return as a target, as do virtual machine guest-to-host escapes. Enterprise applications remain as targets for this year, and Microsoft Outlook will finally make an appearance in this year\u2019s event. The virtualization category grows by two as Oracle becomes a target, and the Windows Insider Preview Challenge includes brand new targets for Microsoft\u2019s virtualization-based security stack. Server targets include Apache, NGINX, OpenSSL, and Windows SMB server. The title of Master of Pwn will be awarded to the contestant with the most points at the end of the contest. For more details and complete rules, visit <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/1\/25\/pwn2own-returns-for-2018-partners-with-microsoft-and-sponsored-by-vmware\">https:\/\/www.zerodayinitiative.com\/blog\/2018\/1\/25\/pwn2own-returns-for-2018-partners-with-microsoft-and-sponsored-by-vmware<\/a>.<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 18 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Microsoft (10)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30051: HTTP: Microsoft JET Database Engine Excel Component Buffer Overflow (ZDI-17-840)<\/li>\n<li>30236: ZDI-CAN-5313: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>30237: ZDI-CAN-5314: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>30238: ZDI-CAN-5315: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>30239: ZDI-CAN-5316: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>30240: ZDI-CAN-5317: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>30241: ZDI-CAN-5318: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>30242: ZDI-CAN-5319: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>30243: ZDI-CAN-5320: Zero Day Initiative Vulnerability (Microsoft Office)<\/li>\n<li>30257: SMB: Microsoft JET Database Engine Excel Component Buffer Overflow (ZDI-17-840)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>NetGain Systems (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30180: HTTP: NetGain Systems Enterprise Manager db.save_005fimage_jsp id Directory Traversal (ZDI-17-959)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Quest (2)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30182: HTTP: Quest NetVault Backup NVBUJobHistory Get Method SQL Injection Vulnerability (ZDI-17-995)<\/li>\n<li>30184: HTTP: Quest NetVault Backup NVBUEventHistory Get Method SQL Injection Vulnerability (ZDI-17-974)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Trend Micro (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30183: HTTP: Trend Micro Mobile Security for Enterprise clt_report_sms Information Disclosure (ZDI-17-972)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>WECON (4)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30232: ZDI-CAN-5217: Zero Day Initiative Vulnerability (WECON LeviStudio)<\/li>\n<li>30233: ZDI-CAN-5229: Zero Day Initiative Vulnerability (WECON LeviStudio)<\/li>\n<li>30234: ZDI-CAN-5230: Zero Day Initiative Vulnerability (WECON LeviStudio)<\/li>\n<li>30235: ZDI-CAN-5311: Zero Day Initiative Vulnerability (WECON LeviStudio)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-january-15-2018\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-january-22-2018\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 26 Jan 2018 16:52:47 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Yesterday, the Zero Day Initiative (ZDI) announced the dates and contest rules for Pwn2Own 2018. Last year, we celebrated the 10th anniversary of the event and the 11th year is going to be bigger than ever! Pwn2Own will be returning to Vancouver, BC, at the CanSecWest Conference on March 14-16, 2018. ZDI is partnering with&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-11258","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11258"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11258\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11258"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}