TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 12, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 16 Feb 2018 13:00:28 +0000

Valentine’s Day was earlier this week, and there was so much love in the air. There was also a lot of love in the Trend Micro world as our teams worked diligently to make sure our customers were protected from this month’s bevy of critical vulnerabilities across several vendors. This week, we focus on Microsoft, who issued a whopping 50 security patches covering Internet Explorer (IE), Microsoft Edge, ChakraCore, Microsoft Windows and Microsoft Office. Eight of the CVEs came through the Zero Day Initiative program!

There are some scary bugs out there! One of the interesting ones that Microsoft patched this month for Microsoft Outlook used the preview pane as an attack vector. That means an exploit of this vulnerability could allow code execution without even opening an email. You can get more information on this month’s Microsoft updates from Dustin Childs’ February 2018 Security Update Review from the Zero Day Initiative:

Microsoft Security Updates

This week’s Digital Vaccine® (DV) package includes coverage for Microsoft updates released on or before February 13, 2018. The following table maps Digital Vaccine filters to the Microsoft updates. Filters marked with * shipped prior to this week’s DV package, providing preemptive protection for our customers.

CVE #Digital Vaccine Filter #Status
CVE-2018-074230334
CVE-2018-0755*30237
CVE-2018-075630336
CVE-2018-0757Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0760*30241
CVE-2018-0761*30239
CVE-2018-0763*30275
CVE-2018-0771Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0809Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0810Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0820Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0821Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0822Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0823Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-082530341
CVE-2018-0826Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0827Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0828Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0829Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0830Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0831Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0832Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0833Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-083430345
CVE-2018-083530349
CVE-2018-0836Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-083730351
CVE-2018-083830362
CVE-2018-0839Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-084030365
CVE-2018-084130388
CVE-2018-084230367
CVE-2018-0843Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-084430366
CVE-2018-084630368
CVE-2018-0847Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0850Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0851Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0852Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0853Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0855*30242
CVE-2018-0856Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0857Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-085830331
CVE-2018-0859Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-086030342
CVE-2018-0861Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0864Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-086630410
CVE-2018-0869Vendor Deemed Reproducibility or Exploitation Unlikely

Offensivecon 2018

If you happen to be reading this and you’re in Berlin, Germany, three members of our Zero Day Initiative team (Brian Gorenc, Abdul-Aziz Hariri and Jasiel Spelman) will be speaking later today at Offensivecon 2018, an international security conference that brings the hacker community together for networking and sharing knowledge. Their session, “L’art de l’évasion: Modern VMWare Exploitation Techniques,” will dive into modern exploitation techniques of VMware vulnerabilities and take an in-depth look at the available attack surfaces on a virtual machine. Learn more by clicking here: https://www.offensivecon.org/speakers/2018/zdi-team.html

Zero-Day Filters

There are 13 new zero-day filters covering five vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website. You can also follow the Zero Day Initiative on Twitter @thezdi and on their blog.

Adobe (5)

  • 30359: ZDI-CAN-5381: Zero Day Initiative Vulnerability (Adobe Flash Player)
  • 30370: ZDI-CAN-5237: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 30371: ZDI-CAN-5238: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 30372: ZDI-CAN-5241: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 30373: ZDI-CAN-5291: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)

Delta (1)

  • 30391: ZDI-CAN-5389: Zero Day Initiative Vulnerability (Delta Industrial Automation TPEditor)

Foxit (3)

  • 30355: ZDI-CAN-5376,5377: Zero Day Initiative Vulnerability (Foxit Reader)
  • 30358: ZDI-CAN-5379: Zero Day Initiative Vulnerability (Foxit Reader)
  • 30360: ZDI-CAN-5382: Zero Day Initiative Vulnerability (Foxit Reader)

Microsoft (1)

  • 30357: ZDI-CAN-5378: Zero Day Initiative Vulnerability (Microsoft Windows)

OMRON (3)

  • 30392: ZDI-CAN-5402: Zero Day Initiative Vulnerability (OMRON CX-One)
  • 30393: ZDI-CAN-5403: Zero Day Initiative Vulnerability (OMRON CX-One)
  • 30394: ZDI-CAN-5404: Zero Day Initiative Vulnerability (OMRON CX-One)

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.

http://feeds.trendmicro.com/TrendMicroSimplySecurity