{"id":12700,"date":"2018-06-29T07:00:09","date_gmt":"2018-06-29T15:00:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/29\/news-6468\/"},"modified":"2018-06-29T07:00:09","modified_gmt":"2018-06-29T15:00:09","slug":"news-6468","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/06\/29\/news-6468\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 29 Jun 2018 14:18:45 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>I have never reverse engineered anything, but I did dismantle a Betamax VCR and put it back together without an instruction manual. My little brother liked to use the tape slot as a garage for his Hot Wheels\u00ae toy cars. We were usually able to take out the cars without any issues, but one day, he finally jammed enough cars in the tape slot and made it impossible to get them out. So, at the age of 10, I pulled out some tools, took the VCR apart, threw the cars at my little brother, and managed to rebuild the VCR so that it worked again.<\/p>\n<p>While I can only boast about my useless skill of repairing obsolete video players, Jasiel Spelman, also known as <a href=\"https:\/\/twitter.com\/wanderingglitch\">@WanderingGlitch<\/a>, does know a thing or two about reverse engineering. Earlier this week, he posted a blog on the Zero Day Initiative (ZDI) web site covering the topic of variant hunting as part of the MindshaRE blog series that provides insight on various reversing techniques to security researchers and reverse engineers. In his blog, he explores two Apple iOS vulnerabilities reported by two different teams from the most recent <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/11\/2\/the-results-mobile-pwn2own-2017-day-two\">Mobile Pwn2Own<\/a> contest. To get an introduction to variant hunting and find out why Apple determined that the two bugs were given the same CVE, click <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/6\/26\/mindshare-variant-hunting-with-ida-python\">here<\/a>.<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 33 new zero-day filters covering six vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Adobe (4)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>32227: ZDI-CAN-5743: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>32232: ZDI-CAN-6325: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>32233: ZDI-CAN-6339: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>32247: ZDI-CAN-6341: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Advantech (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>32250: TCP: Advantech WebAccess Node webvrpcs Arbitrary File Deletion Vulnerability (ZDI-18-499)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>GE (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>32222: HTTP: GE MDS PulseNET Remote Invocation Insecure Deserialization Vulnerability (ZDI-18-550)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (6)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>32236: ZDI-CAN-6262: Zero Day Initiative Vulnerability (Microsoft Internet Explorer)<\/li>\n<li>32249: ZDI-CAN-6344: Zero Day Initiative Vulnerability (Microsoft Internet Explorer)<\/li>\n<li>32252: ZDI-CAN-6340: Zero Day Initiative Vulnerability (Microsoft Office Excel)<\/li>\n<li>32254: ZDI-CAN-6255: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>32255: ZDI-CAN-6256: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<li>32256: ZDI-CAN-6258: Zero Day Initiative Vulnerability (Microsoft Windows)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Oracle (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>32234: HTTP: Oracle WebLogic Remote Diagnosis Assistant rda_tfa_ref_date Command Injection (ZDI-18-115)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>WECON (20)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>32237: ZDI-CAN-5898: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32238: ZDI-CAN-5899: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32239: ZDI-CAN-5900: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32240: ZDI-CAN-5901: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32241: ZDI-CAN-5902: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32243: ZDI-CAN-5903: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32244: ZDI-CAN-5904: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32245: ZDI-CAN-5905: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32246: ZDI-CAN-5906: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32248: ZDI-CAN-5907: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32258: ZDI-CAN-5955: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32260: ZDI-CAN-5909: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32261: ZDI-CAN-5910: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32262: ZDI-CAN-5911,5908: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32263: ZDI-CAN-5953: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32264: ZDI-CAN-5912: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32265: ZDI-CAN-5951: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32266: ZDI-CAN-5940,5941,5942,5945,5947,5949: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32267: ZDI-CAN-5913: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<li>32268: ZDI-CAN-5914-5923: Zero Day Initiative Vulnerability (WECON LeviStudioU)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-18-2018\/\">weekly recap<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/\">TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 29 Jun 2018 14:18:45 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/TippingPoint-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>I have never reverse engineered anything, but I did dismantle a Betamax VCR and put it back together without an instruction manual. My little brother liked to use the tape slot as a garage for his Hot Wheels\u00ae toy cars. We were usually able to take out the cars without any issues, but one day,&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-june-25-2018\/\">TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of June 25, 2018<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11414,18755,18255,18882,10516,10384,11548,714,18256,18610,10415,11524],"class_list":["post-12700","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-adobe","tag-advantech","tag-digital-vaccine","tag-ge","tag-microsoft","tag-network","tag-oracle","tag-security","tag-tippingpoint","tag-wecon","tag-zero-day-initiative","tag-zero-day"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12700"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12700\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}