{"id":11642,"date":"2018-03-02T10:00:01","date_gmt":"2018-03-02T18:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/02\/news-5413\/"},"modified":"2018-03-02T10:00:01","modified_gmt":"2018-03-02T18:00:01","slug":"news-5413","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/02\/news-5413\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of February 26, 2018"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 02 Mar 2018 16:22:09 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Pwn2Own 2018 is coming up in a couple of weeks and I am excited to see what interesting vulnerabilities will pop up at the contest. I attempted to explain the contest to my mom, and in the simplest terms, I told her that Pwn2Own is a contest where contestants are rewarded for breaking something. It\u2019s not as basic as me beating up a printer with a baseball bat &#8211; which I have done, by the way, paying homage to the 1999 movie Office Space.<\/p>\n<p>It\u2019s about breaking something, in this case, finding vulnerabilities in software, with the ultimate goal of making the software better.<\/p>\n<p>Attackers are always adapting their ways of exploiting vulnerabilities and the good guys out there are adapting with them to make sure they\u2019re not successful. At last year\u2019s event, we saw the first virtual machine escapes in contest history. For this year\u2019s contest, virtualization targets are on the list and we welcome VMWare as a sponsor. Microsoft isn\u2019t only a target in the enterprise application category, they have joined us as our partner in this year\u2019s contest.<\/p>\n<p style=\"text-align: left\">For more information on the upcoming contest, complete rules, and how to enter the contest, visit <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/1\/25\/pwn2own-returns-for-2018-partners-with-microsoft-and-sponsored-by-vmware\">https:\/\/www.zerodayinitiative.com\/blog\/2018\/1\/25\/pwn2own-returns-for-2018-partners-with-microsoft-and-sponsored-by-vmware<\/a>.<\/p>\n<p>Registration for the contest participation closes at 5pm Pacific Time on March 5, 2018. For the latest updates, follow the Zero Day Initiative on Twitter at <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a>.<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 21 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Adobe (13)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30436: ZDI-CAN-5455: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30437: ZDI-CAN-5456: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30438: ZDI-CAN-5457: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30440: ZDI-CAN-5463: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30441: ZDI-CAN-5464: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30442: ZDI-CAN-5465: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30443: ZDI-CAN-5466: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30446: ZDI-CAN-5467: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30447: ZDI-CAN-5468: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30448: ZDI-CAN-5469: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30449: ZDI-CAN-5470: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30451: ZDI-CAN-5474: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>30452: ZDI-CAN-5475: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Foxit (2)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30450: ZDI-CAN-5471: Zero Day Initiative Vulnerability (Foxit Reader)<\/li>\n<li>30470: ZDI-CAN-5488: Zero Day Initiative Vulnerability (Foxit Reader)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>OMRON (3)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30432: ZDI-CAN-5453: Zero Day Initiative Vulnerability (OMRON CX-One)<\/li>\n<li>30435: ZDI-CAN-5454: Zero Day Initiative Vulnerability (OMRON CX-One)<\/li>\n<li>30439: ZDI-CAN-5462: Zero Day Initiative Vulnerability (OMRON CX-One)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>SAP (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30467: ZDI-CAN-5478: Zero Day Initiative Vulnerability (SAP MaxDB)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>WECON (2)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>30468: ZDI-CAN-5480: Zero Day Initiative Vulnerability (WECON LeviStudio)<\/li>\n<li>30469: ZDI-CAN-5481,5482: Zero Day Initiative Vulnerability (WECON LeviStudio)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-february-19-2018\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-february-26-2018\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 02 Mar 2018 16:22:09 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Pwn2Own 2018 is coming up in a couple of weeks and I am excited to see what interesting vulnerabilities will pop up at the contest. I attempted to explain the contest to my mom, and in the simplest terms, I told her that Pwn2Own is a contest where contestants are rewarded for breaking something. It\u2019s&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-11642","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11642"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11642\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}