Lucene search

K
trendmicroblogElisa Lippincott (TippingPoint Global Product Marketing)TRENDMICROBLOG:18F833F348C390ECE8E72A6CD895F63B
HistoryOct 20, 2017 - 1:29 p.m.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 16, 2017

2017-10-2013:29:23
Elisa Lippincott (TippingPoint Global Product Marketing)
blog.trendmicro.com
71

0.949 High

EPSS

Percentile

99.3%

Various forms of fuzzing techniques that search for vulnerabilities in software programs have been around for several decades, but it can a tedious task, especially when looking at an entire enterprise application. Earlier this week, Zero Day Initiative (ZDI) vulnerability researcher Abdul-Aziz Hariri published a blog detailing how to fuzz the image conversion feature of Foxit Reader without fuzzing the entire application. He goes into detail on why fuzzing components of an application separately is definitely a time saver, and how it can make case analysis easier to manage. The techniques covered can be applied to other software as well. In fact, ZDI researchers have implemented something similar for the Windows PDF Library that helps the team analyze cases faster, rather than going through Microsoft Edge. For a detailed analysis and demo on how this works, you can read the blog here.

Adobe Security Update

This week’s Digital Vaccine (DV) package includes coverage for Adobe updates released on or before October 17, 2017. The following table maps Digital Vaccine filters to the Adobe updates. You can get more detailed information on this month’s security updates from Dustin Childs’ October 2017 Security Update Review from the Zero Day Initiative:

Bulletin # CVE # Digital Vaccine Filter # Status
APSB17-32 CVE-2017-11292 29771

Microsoft Update

This week’s Digital Vaccine® (DV) package also includes additional coverage for Microsoft updates released on or before October 10, 2017.

CVE # Digital Vaccine Filter # Status
CVE-2017-11826 29766

Zero-Day Filters

There are 11 new zero-day filters covering eight vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website. You can also follow the Zero Day Initiative on Twitter @thezdi and on their blog.

Adobe (2)

|

  • 29742: ZDI-CAN-5074: Zero Day Initiative Vulnerability (Adobe Flash)
  • 29743: ZDI-CAN-5075: Zero Day Initiative Vulnerability (Adobe Flash)
    —|—
    |

Advantech (1)

|

  • 29711: HTTP: Advantech WebAccess rmTemplate.aspx SQL Injection Vulnerability (ZDI-17-712)
    —|—
    |

EMC (1)

|

  • 29736: HTTP: EMC Data Protection Advisor ScheduledReportResource preScript Parameter Usage (ZDI-17-812)_ _
    —|—
    |

Hewlett Packard Enterprise (3)

|

  • 27705: HTTP: HPE Application Performance Management System Health Authentication Bypass (ZDI-17-722)
  • 29748: TCP: HPE Intelligent Management Center imcwlandm SSID Buffer Overflow Vulnerability (ZDI-17-316)
  • 29749: TCP: HPE Intelligent Management Center imcwlandm UserName Buffer Overflow Vulnerability (ZDI-17-317)
    —|—
    |

Microsoft (1)

|

  • 29744: ZDI-CAN-5077: Zero Day Initiative Vulnerability (Microsoft Edge)
    —|—
    |

Netgear (1)

|

  • 29751: ZDI-CAN-5083: Zero Day Initiative Vulnerability (NETGEAR Nighthawk)
    —|—
    |

Trend Micro (1)

|

  • 29700: HTTP: Trend Micro Mobile Security Enterprise URI SQL Injection (ZDI-17-787,788,792-794,800-806)
    —|—
    |

Wecon (1)

|

  • 29752: ZDI-CAN-5085: Zero Day Initiative Vulnerability (WECON LeviStudio)
    —|—
    |

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.