TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 16, 2017

I thought I was going to start a riot earlier this week. The Major League Baseball Hall of Fame was set to announce their 2017 class and my favorite player of all time was on the ballet again. His career statistics are those that many professional baseball players dream of (449 home runs and .540 slugging percentage, to name a few), but the accusation of using performance enhancing drugs (even though he NEVER failed any drug tests in his entire career) plagued his chances of being voted in for the last seven years. But finally, Jeff Bagwell is in the 2017 Hall of Fame.

Jeff Bagwell played for the Houston Astros for 15 years as a first baseman. He would have played longer, but a degenerative shoulder ended his career earlier than expected. What I loved about Bagwell was his work ethic. He, along with Craig Biggio (who is also in the Hall of Fame), were the leaders of the team and approached every game the same way: if you could play through pain or discomfort without risking further injury, everyone was expected to take one for team and do their part. So, what does Jeff Bagwell have to do with security? Nothing really. But in honor of his unrelenting work ethic, I’d like to give a shout out to the TippingPoint Customer Support Team. They do whatever it takes for our customers to make sure they have what they need to protect their networks. They are a great team and I’m honored to call them my colleagues.

Pwn2Own Returns for 2017 to Celebrate 10 Years of Exploits

In nine weeks, Pwn2Own 2017 returns to CanSecWest to celebrate 10 years of exploits. To celebrate 10 years of Pwn2Own, the Zero Day Initiative will be offering more than $1,000,000 across five different categories to see the latest research and again crown a Master of Pwn. It’s more money and more categories than ever before, and we can’t wait to see the research that comes to claim the prizes. Get all the details, including the complete rules of the contest, here. And don’t forget to follow the Zero Day Initiative on Twitter for all the latest updates! 

Trend Micro TippingPoint® Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Trend Micro TippingPoint has been named a Leader in the Gartner 2017 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). With improvements in both Completeness of Vision and Ability to Execute from previous years, we believe that placement in the Leaders’ quadrant illustrates the positive progress we’ve made since the acquisition of TippingPoint in March 2016 from Hewlett Packard Enterprise. Learn more.

Adobe Updates

This week’s Digital Vaccine (DV) package includes coverage for the Adobe Security Bulletins released earlier this month. The following table maps Digital Vaccine filters to the Adobe Security Bulletins. Filters designated with an asterisk (*) shipped prior to this week’s package, providing zero-day protection for our customers:

Bulletin #CVE #Digital Vaccine Filter #Status
APSB17-01CVE-2017-293926624
APSB17-01CVE-2017-2941*26340
APSB17-01CVE-2017-2946*25832, *25833
APSB17-01CVE-2017-294726565
APSB17-01CVE-2017-294826626
APSB17-01CVE-2017-2949*25815, *25816, *25817, *25819, *25820, *25821, *25822, *25823 *25827, *25828, *25830, *25834 *25835, *25836, *25837, *25838
APSB17-01CVE-2017-2950*25809
APSB17-01CVE-2017-2951*25811
APSB17-01CVE-2017-295526566
APSB17-01CVE-2017-295626567
APSB17-01CVE-2017-295726567
APSB17-01CVE-2017-295826566
APSB17-01CVE-2017-2959*26489
APSB17-01CVE-2017-296026512
APSB17-01CVE-2017-296126518
APSB17-01CVE-2017-296226622
APSB17-01CVE-2017-296326621
APSB17-01CVE-2017-296426538
APSB17-01CVE-2017-296526536
APSB17-01CVE-2017-296626561
APSB17-01CVE-2017-296726562
APSB17-02CVE-2017-292626548
APSB17-02CVE-2017-292726547
APSB17-02CVE-2017-292826559
APSB17-02CVE-2017-293026560
APSB17-02CVE-2017-293126550
APSB17-02CVE-2017-293226551
APSB17-02CVE-2017-293326555
APSB17-02CVE-2017-293426558
APSB17-02CVE-2017-293526563
APSB17-02CVE-2017-293626568
APSB17-02CVE-2017-293726569

 

Microsoft Patch Tuesday Update

This week’s Digital Vaccine (DV) package includes additional coverage for the Microsoft Security Bulletins released earlier this month. The following table maps Digital Vaccine filters to the Microsoft Security Bulletins.

Bulletin #CVE #Digital Vaccine Filter #Status
MS16-129CVE-2017-720226476
MS16-144CVE-2017-720226476
MS17-004CVE-2017-000425914, 26554

 

Zero Day Initiative Team Members Speaking at REcon Brussels 2017

RECon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. The conference will be held for the first time in Brussels, Belgium. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques. The Zero Day Initiative will be represented with two speaking slots during the conference that’s being held on January 27-29, 2017:

  • Transforming Open Source to Open Access in Closed Applications (Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri)
  • A Little Less Conversation, A Little More ActionScript (WanderingGlitch)

For more information on the conference, visit https://recon.cx/2017/brussels/.

Zero-Day Filters

There are 28 new zero-day filters covering five vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website.

Adobe (14)

  • 26510: ZDI-CAN-4202: Zero Day Initiative Vulnerability (Adobe Reader DC)
  • 26512: HTTP: Adobe Reader DC ImageConversion JPEG Parsing Information Disclosure Vulnerability (ZDI-17-024)
  • 26518: HTTP: Acrobat Reader DC XFA Field Font Size Use-After-Free Vulnerability (ZDI-17-025)
  • 26519: ZDI-CAN-4210: Zero Day Initiative Vulnerability (Adobe Flash)
  • 26521: ZDI-CAN-4212: Zero Day Initiative Vulnerability (Adobe Reader DC)
  • 26534: ZDI-CAN-4305: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 26535: ZDI-CAN-4306: Zero Day Initiative Vulnerability (Adobe Reader DC)
  • 26536: HTTP: Adobe Acrobat Pro DC ImageConversion TIFF Parsing Memory Corruption Vulnerability (ZDI-17-010)
  • 26537: ZDI-CAN-4310: Zero Day Initiative Vulnerability (Adobe Reader DC)
  • 26538: HTTP: Adobe Acrobat Pro DC ImageConversion JPEG Information Disclosure Vulnerability (ZDI-17-014)
  • 26561: HTTP: Adobe Acrobat Reader DC TIFF Memory Corruption Vulnerability (ZDI-17-030)
  • 26562: HTTP: Adobe Reader DC XFA template Out-of-Bounds Read Vulnerability (ZDI-17-031)
  • 26621: HTTP: Adobe Acrobat Pro DC ImageConversion TIFF Information Disclosure Vulnerability (ZDI-17-027)
  • 26622: HTTP: Adobe Reader DC XSLT lang Type Confusion Vulnerability (ZDI-17-026) 

Hewlett Packard Enterprise (1)

  • 26404: HTTP: Hewlett Packard Enterprise Network Automation RPCServlet Insecure Deserialization (ZDI-16-616) 

Microsoft (1)

  • 26476: HTTP: Microsoft Edge JavaScript reverse Buffer Overflow Vulnerability (ZDI-16-593) 

Novell (1)

  • 26540: HTTP: Novell NetIQ Sentinel SentinelContext Authentication Bypass Vulnerability (ZDI-16-406) 

Trend Micro (11)

  • 26506: ZDI-CAN-4137: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26507: ZDI-CAN-4138: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26509: ZDI-CAN-4141: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26511: ZDI-CAN-4142: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26513: ZDI-CAN-4143: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26514: ZDI-CAN-4144: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26515: ZDI-CAN-4145: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26516: ZDI-CAN-4146: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
  • 26520: ZDI-CAN-4300,4303: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA)
  • 26531: ZDI-CAN-4301,4302: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA)
  • 26533: ZDI-CAN-4304: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA) 

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.

http://feeds.trendmicro.com/TrendMicroSimplySecurity