{"id":7106,"date":"2017-03-24T07:01:24","date_gmt":"2017-03-24T15:01:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/24\/news-897\/"},"modified":"2017-03-24T07:01:24","modified_gmt":"2017-03-24T15:01:24","slug":"news-897","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/03\/24\/news-897\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of March 20, 2017"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 24 Mar 2017 13:33:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The 10th anniversary of Pwn2Own is now in the books! It was a crazy week at the CanSecWest Conference, full of drama with the biggest contest ever with teams from Asia, Europe and North America! It was a tight race with only three points separating first and second place.<\/p>\n<p>In the end, we saw a record 51 bugs come through the contest, gave away $833,000 USD and 12 laptops to winners\u2026and the award for Master of Pwn.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>360 Security won \u201cMaster of Pwn\u201d with 63 points<\/li>\n<li>Tencent Security Team Sniper took second place with 60 points<\/li>\n<li>Chaitin Security Research Lab took third place with 26 points<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You can catch up on the contest by visiting the following blogs:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/15\/welcome-to-pwn2own-2017-the-schedule\">Welcome to Pwn2Own 2017 \u2013 The Schedule<\/a><\/li>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/15\/the-results-pwn2own-2017-day-one\">The Results \u2013 Pwn2Own 2017 Day One<\/a><\/li>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/15\/pwn2own-2017-day-two-schedule-and-results\">Pwn2Own 2017 \u2013 Day Two Schedule and Results<\/a><\/li>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/16\/the-results-pwn2own-2017-day-two\">The Results &#8211; Pwn2Own 2017 Day Two<\/a><\/li>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/16\/pwn2own-2017-day-three-schedule-and-results\">Pwn2Own 2017 \u2013 Day Three Schedule and Results<\/a><\/li>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/17\/the-results-pwn2own-2017-day-three\">The Results \u2013 Pwn2Own 2017 Day Three<\/a><\/li>\n<li><a href=\"http:\/\/blog.trendmicro.com\/the-view-from-dvlabs-pwn2own-2017\/\">The View from DVLabs \u2013 Pwn2Own 2017<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>If you take a look at the zero-day filters we have this week, you\u2019ll see a number of them that include \u201cPwn2Own\u201d in the filter name. You guessed it! TippingPoint customers are already protected from the very vulnerabilities discovered during the contest while the affected vendors are working on a patch.<\/p>\n<p>It was a grueling contest this year, but definitely one for the record books, with virtual machine escapes and a hacked touch bar. Brian Gorenc, who leads the Zero Day Initiative team, <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/23\/pwn2own-2017-an-event-for-the-ages\">gives his perspective<\/a> on the past 10 years of Pwn2Own and what the future holds. I can\u2019t wait to see what happens next year!<\/p>\n<p><strong>Virtual Threat Protection System (vTPS) v4.2.0 is Now Available!<\/strong><\/p>\n<p>Earlier this week, we released version 4.2.0 build 4654 for our TippingPoint Virtual Threat Protection System (vTPS).<\/p>\n<p>vTPS v4.2.0 includes the following:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Introduction of a single-disk architecture with a user disk partition.<\/li>\n<li>Reduced computer requirements (1 less core is now required for deployment)<\/li>\n<li>When configuring RADIUS, you can now set the Authentication Protocol.<\/li>\n<li>Flexibility to upgrade inspection throughput from 500Mbps to 1Gpbs.<\/li>\n<li>In addition, the v4.2.0 vTPS release inherits features of TPS v4.2.0, including:\n<ul>\n<li>The ability to collect a client&#8217;s true IP address.<\/li>\n<li>The ability to identify the HTTP URI and hostname information associated with an event.<\/li>\n<li>Enhanced SNMP support.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>For a complete list of enhancements and changes, customers can refer to the product Release Notes. For questions or technical assistance on any TippingPoint product, customers can contact the TippingPoint Technical Assistance Center (TAC).<\/p>\n<p><strong>Adobe Security Bulletins Update<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine (DV) package includes coverage for the Adobe Security Bulletins released on or before March 14, 2017. The following table maps TippingPoint filters to the Adobe Bulletins:<\/p>\n<div class=\"lightTable\">\n<table width=\"896\">\n<tbody>\n<tr>\n<td width=\"140\"><strong>Bulletin #<\/strong><\/td>\n<td width=\"183\"><strong>CVE #<\/strong><\/td>\n<td width=\"221\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"337\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-2997<\/td>\n<td width=\"221\">27499<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-2998<\/td>\n<td width=\"221\">27500<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-2999<\/td>\n<td width=\"221\">27501<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-3000<\/td>\n<td width=\"221\"><\/td>\n<td width=\"337\">Insufficient Information<\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-3001<\/td>\n<td width=\"221\">27493, 27511<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-3002<\/td>\n<td width=\"221\">27502<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-07<\/td>\n<td width=\"183\">CVE-2017-3003<\/td>\n<td width=\"221\">27503<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 27 new zero-day filters covering six vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website.<\/p>\n<p><strong><em>Adobe (5)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27520: PWN2OWN ZDI-CAN-4588: Zero Day Initiative Vulnerability (Adobe Reader)<\/li>\n<li>27521: PWN2OWN ZDI-CAN-4589: Zero Day Initiative Vulnerability (Adobe Reader)<\/li>\n<li>27522: PWN2OWN ZDI-CAN-4575: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>27533: PWN2OWN ZDI-CAN-4601: Zero Day Initiative Vulnerability (Adobe Flash)<\/li>\n<li>27534: PWN2OWN ZDI-CAN-4607: Zero Day Initiative Vulnerability (Adobe Flash)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Apple (10)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27518: PWN2OWN ZDI-CAN-4578: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27523: PWN2OWN ZDI-CAN-4591: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27524: PWN2OWN ZDI-CAN-4593: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27525: PWN2OWN ZDI-CAN-4594: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27526: PWN2OWN ZDI-CAN-4595: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27527: PWN2OWN ZDI-CAN-4596: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27528: ZDI-CAN-4597: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27529: ZDI-CAN-4598: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27535: PWN2OWN ZDI-CAN-4623: Zero Day Initiative Vulnerability (Apple Safari)<\/li>\n<li>27539: PWN2OWN ZDI-CAN-4613: Zero Day Initiative Vulnerability (Apple Safari)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Google (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27519: ZDI-CAN-4587: Zero Day Initiative Vulnerability (Google Chrome)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Mozilla (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27537: PWN2OWN ZDI-CAN-4620: Zero Day Initiative Vulnerability (Mozilla Firefox)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (6)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27532: PWN2OWN ZDI-CAN-4584: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>27536: PWN2OWN ZDI-CAN-4611: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>27538: PWN2OWN ZDI-CAN-4618: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>27540: PWN2OWN ZDI-CAN-4625: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>27541: PWN2OWN ZDI-CAN-4628: Zero Day Initiative Vulnerability (Microsoft Edge)<\/li>\n<li>27542: PWN2OWN ZDI-CAN-4629: Zero Day Initiative Vulnerability (Microsoft Edge)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Trend Micro (4)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27507: ZDI-CAN-4404: Zero Day Initiative Vulnerability (Trend Micro SafeSync for Enterprise)<\/li>\n<li>27508: ZDI-CAN-4408: Zero Day Initiative Vulnerability (Trend Micro SafeSync for Enterprise)<\/li>\n<li>27509: ZDI-CAN-4409: Zero Day Initiative Vulnerability (Trend Micro SafeSync for Enterprise)<\/li>\n<li>27512: ZDI-CAN-4410: Zero Day Initiative Vulnerability (Trend Micro SafeSync for Enterprise)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-march-13-2017\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-march-20-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 24 Mar 2017 13:33:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The 10th anniversary of Pwn2Own is now in the books! It was a crazy week at the CanSecWest Conference, full of drama with the biggest contest ever with teams from Asia, Europe and North America! It was a tight race with only three points separating first and second place. In the end, we saw a&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-7106","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7106"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7106\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}