{"id":11509,"date":"2018-02-16T06:00:47","date_gmt":"2018-02-16T14:00:47","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/16\/news-5280\/"},"modified":"2018-02-16T06:00:47","modified_gmt":"2018-02-16T14:00:47","slug":"news-5280","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/16\/news-5280\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of February 12, 2018"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 16 Feb 2018 13:00:28 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Valentine\u2019s Day was earlier this week, and there was so much love in the air. There was also a lot of love in the Trend Micro world as our teams worked diligently to make sure our customers were protected from this month\u2019s bevy of critical vulnerabilities across several vendors. This week, we focus on Microsoft, who issued a whopping 50 security patches covering Internet Explorer (IE), Microsoft Edge, ChakraCore, Microsoft Windows and Microsoft Office. Eight of the CVEs came through the Zero Day Initiative program!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-540690\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/security-hearts.jpg\" alt=\"\" width=\"242\" height=\"187\" \/><\/p>\n<p>There are some scary bugs out there! One of the interesting ones that Microsoft patched this month for Microsoft Outlook used the preview pane as an attack vector. That means an exploit of this vulnerability could allow code execution without even opening an email. You can get more information on this month\u2019s Microsoft updates from Dustin Childs\u2019 <a href=\"https:\/\/zerodayinitiative.com\/blog\/2018\/2\/13\/the-february-2018-security-update-review\">February 2018 Security Update Review<\/a> from the Zero Day Initiative:<\/p>\n<p><strong>Microsoft Security Updates<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for Microsoft updates released on or before February 13, 2018. The following table maps Digital Vaccine filters to the Microsoft updates. Filters marked with * shipped prior to this week\u2019s DV package, providing preemptive protection for our customers.<\/p>\n<div class=\"lightTable\">\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"126\"><strong>CVE #<\/strong><\/td>\n<td width=\"162\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"348\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0742<\/td>\n<td width=\"162\">30334<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0755<\/td>\n<td width=\"162\">*30237<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0756<\/td>\n<td width=\"162\">30336<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0757<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0760<\/td>\n<td width=\"162\">*30241<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0761<\/td>\n<td width=\"162\">*30239<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0763<\/td>\n<td width=\"162\">*30275<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0771<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0809<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0810<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0820<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0821<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0822<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0823<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0825<\/td>\n<td width=\"162\">30341<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0826<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0827<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0828<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0829<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0830<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0831<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0832<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0833<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0834<\/td>\n<td width=\"162\">30345<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0835<\/td>\n<td width=\"162\">30349<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0836<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0837<\/td>\n<td width=\"162\">30351<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0838<\/td>\n<td width=\"162\">30362<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0839<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0840<\/td>\n<td width=\"162\">30365<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0841<\/td>\n<td width=\"162\">30388<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0842<\/td>\n<td width=\"162\">30367<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0843<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0844<\/td>\n<td width=\"162\">30366<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0846<\/td>\n<td width=\"162\">30368<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0847<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0850<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0851<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0852<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0853<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0855<\/td>\n<td width=\"162\">*30242<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0856<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0857<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0858<\/td>\n<td width=\"162\">30331<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0859<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0860<\/td>\n<td width=\"162\">30342<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0861<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0864<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0866<\/td>\n<td width=\"162\">30410<\/td>\n<td width=\"348\"><\/td>\n<\/tr>\n<tr>\n<td width=\"126\">CVE-2018-0869<\/td>\n<td width=\"162\"><\/td>\n<td width=\"348\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p><strong>Offensivecon 2018<\/strong><\/p>\n<p>If you happen to be reading this and you\u2019re in Berlin, Germany, three members of our Zero Day Initiative team (Brian Gorenc, Abdul-Aziz Hariri and Jasiel Spelman) will be speaking later today at Offensivecon 2018, an international security conference that brings the hacker community together for networking and sharing knowledge. Their session, <strong><em>\u201cL&#8217;art de l&#8217;\u00e9vasion: Modern VMWare Exploitation Techniques,\u201d<\/em><\/strong> will dive into modern exploitation techniques of VMware vulnerabilities and take an in-depth look at the available attack surfaces on a virtual machine. Learn more by clicking here: <a href=\"https:\/\/www.offensivecon.org\/speakers\/2018\/zdi-team.html\">https:\/\/www.offensivecon.org\/speakers\/2018\/zdi-team.html<\/a><\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 13 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Adobe (5)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30359: ZDI-CAN-5381: Zero Day Initiative Vulnerability (Adobe Flash Player)<\/li>\n<li>30370: ZDI-CAN-5237: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30371: ZDI-CAN-5238: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30372: ZDI-CAN-5241: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30373: ZDI-CAN-5291: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Delta (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30391: ZDI-CAN-5389: Zero Day Initiative Vulnerability (Delta Industrial Automation TPEditor)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Foxit (3)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30355: ZDI-CAN-5376,5377: Zero Day Initiative Vulnerability (Foxit Reader)<\/li>\n<li>30358: ZDI-CAN-5379: Zero Day Initiative Vulnerability (Foxit Reader)<\/li>\n<li>30360: ZDI-CAN-5382: Zero Day Initiative Vulnerability (Foxit Reader)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30357: ZDI-CAN-5378: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>OMRON (3)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30392: ZDI-CAN-5402: Zero Day Initiative Vulnerability (OMRON CX-One)<\/li>\n<li>30393: ZDI-CAN-5403: Zero Day Initiative Vulnerability (OMRON CX-One)<\/li>\n<li>30394: ZDI-CAN-5404: Zero Day Initiative Vulnerability (OMRON CX-One)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-february-5-2018\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-february-12-2018\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 16 Feb 2018 13:00:28 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Valentine\u2019s Day was earlier this week, and there was so much love in the air. There was also a lot of love in the Trend Micro world as our teams worked diligently to make sure our customers were protected from this month\u2019s bevy of critical vulnerabilities across several vendors. This week, we focus on Microsoft,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-11509","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11509"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11509\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11509"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}