Zero-Day Coverage Update – Week of July 9, 2018

Credit to Author: Elisa Lippincott (Global Threat Communications)| Date: Fri, 13 Jul 2018 14:10:20 +0000

Earlier this week, I wrote a blog covering a couple of the statistics from the Zero Day Initiative’s (ZDI) first half of 2018. One of the stats that I didn’t cover is the increasing focus on enterprise applications. The team is seeing consistent growth in submissions of Microsoft and Apple vulnerabilities, but now they’re also seeing an increase of submissions in virtualization software vulnerabilities from the likes of VMware and Oracle. With a 33% increase in published advisories compared to 2017, the ZDI has their hands full. With more than 500 new researchers registering to participate in the program this year, the internal ZDI team is growing as well to accommodate this growth. 2018 may just be the biggest year yet for ZDI!

In case you missed it, you can read Brian Gorenc’s blog covering the detailed stats from the ZDI’s first half of 2018.

Microsoft Security Updates

This week’s Digital Vaccine® (DV) package includes coverage for Microsoft updates released on or before July 10, 2018. It was another big month for Microsoft with 53 security patches covering both browsers (Internet Explorer, Edge), ChakraCore, Windows, .NET Framework, ASP.NET, PowerShell, Visual Studio, and Microsoft Office and Office Services. Of these 53 CVEs, 18 are listed as Critical, 33 are rated Important, one is rated as Moderate, and one is rated as Low in severity.

Five CVEs in this month’s Microsoft update came through the Zero Day Initiative:

The following table maps Digital Vaccine filters to Microsoft’s updates. You can get more detailed information on this month’s security updates from Dustin Childs’ July 2018 Security Update Review from the Zero Day Initiative:

CVE #Digital Vaccine Filter #Status
CVE-2018-094932494
CVE-2018-812532486
CVE-2018-8171Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8172Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8202Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8206Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8222Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8232Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8238Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-824232487
CVE-2018-8260Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-826232491
CVE-2018-827432492
CVE-2018-827532493
CVE-2018-8276Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-827832358
CVE-2018-827932359
CVE-2018-8280Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8281Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8282Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-828332361
CVE-2018-8284Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8286Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8287Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-828832488
CVE-2018-828932490
CVE-2018-8290Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-829132360
CVE-2018-8294Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-829632478
CVE-2018-829732551
CVE-2018-829832479
CVE-2018-8299Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8300Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8301Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8304Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8305Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8306Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8307Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8308Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8309Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8310Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8311Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8312Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8313Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8314Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8319Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8323Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-832432558
CVE-2018-8325Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8326Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8327Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8356Vendor Deemed Reproducibility or Exploitation Unlikely

 

Zero-Day Filters

There is one new zero-day filter covering one vendor in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website. You can also follow the Zero Day Initiative on Twitter @thezdi and on their blog.

Advantech (1)

  • 32341: RPC: Advantech Webaccess webvrpcs Directory Traversal Vulnerability (ZDI-18-024)

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.

The post Zero-Day Coverage Update – Week of July 9, 2018 appeared first on .

http://feeds.trendmicro.com/TrendMicroSimplySecurity