TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 14, 2018
It’s one thing when your security solutions help protect your organization from a devastating cyberattack. It’s another thing when the company who develops your security solutions takes it to the next level to actually help catch those responsible for some of the biggest cyberattacks in the world. Earlier this week, Trend Micro disclosed the details of its exclusive investigative cooperation with the Federal Bureau of Investigation (FBI) to identify, arrest and bring to trial the individuals linked to the infamous Counter Antivirus (CAV) service Scan4You.
In 2012, Trend Micro began its research on Scan4You, which allowed cybercriminals to check the detection of their latest malware against more than 30 modern antivirus engines, enabling them to make attacks more successful. After close collaboration with the FBI, Scan4You went offline following the arrest of two suspected administrators in May 2017. Ruslans Bondars was found guilty as a result of the recent trial, while Jurijs Martisevs pleaded guilty in March 2018.
You can read more about “The Rise and Fall of {Scan4You}” here.
Red Hat Fedora DHCP Client Network Manager Vulnerability
Yesterday, Trend Micro released DVToolkit CSW file CVE-2018-1111.csw that contains the following filter:
- Filter C1000001: DHCP: Red Hat Fedora DHCP Client Network Manager Input Validation Vulnerability
This command injection flaw found in a script included in the DHCP client (dhclient) packages affects Red Hat Enterprise Linux 6 and 7. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager, which is configured to obtain network configuration using the DHCP protocol.
Note: This filter will be obsoleted by MainlineDV filter 31851 in next week’s package.
Adobe Security Update
This week’s Digital Vaccine (DV) package includes coverage for Adobe updates released on or before May 8, 2018. The following table maps Digital Vaccine filters to the Microsoft updates. You can get more detailed information on this month’s security updates from Dustin Childs’ May 2018 Security Update Review from the Zero Day Initiative:
Bulletin # | CVE # | Digital Vaccine Filter | Status |
APSB18-16 | CVE-2018-4944 | 31588 | |
APSB18-09 | CVE-2018-4946 | 31687 | |
APSB18-09 | CVE-2018-4947 | 31688 | |
APSB18-09 | CVE-2018-4948 | 31589 | |
APSB18-09 | CVE-2018-4949 | 31592 | |
APSB18-09 | CVE-2018-4950 | 31593 | |
APSB18-09 | CVE-2018-4951 | 31594 | |
APSB18-09 | CVE-2018-4952 | 31695 | |
APSB18-09 | CVE-2018-4953 | 31696 | |
APSB18-09 | CVE-2018-4954 | 31697 | |
APSB18-09 | CVE-2018-4955 | 31698 | |
APSB18-09 | CVE-2018-4956 | N/A | Vendor Deemed Reproducibility or Exploitation Unlikely |
APSB18-09 | CVE-2018-4957 | 31699 | |
APSB18-09 | CVE-2018-4958 | 31700 | |
APSB18-09 | CVE-2018-4959 | 31701 | |
APSB18-09 | CVE-2018-4960 | 31702 | |
APSB18-09 | CVE-2018-4961 | 31703 | |
APSB18-09 | CVE-2018-4962 | 31704 | |
APSB18-09 | CVE-2018-4963 | 31705 | |
APSB18-09 | CVE-2018-4964 | 31706 | |
APSB18-09 | CVE-2018-4965 | 31707 | |
APSB18-09 | CVE-2018-4966 | 31708 | |
APSB18-09 | CVE-2018-4967 | 31709 | |
APSB18-09 | CVE-2018-4968 | 31710 | |
APSB18-09 | CVE-2018-4969 | 31711 | |
APSB18-09 | CVE-2018-4970 | 31712 | |
APSB18-09 | CVE-2018-4971 | 31713 | |
APSB18-09 | CVE-2018-4972 | 31714 | |
APSB18-09 | CVE-2018-4973 | 31715 | |
APSB18-09 | CVE-2018-4974 | 31716 | |
APSB18-09 | CVE-2018-4975 | 31717 | |
APSB18-09 | CVE-2018-4976 | 31718 | |
APSB18-09 | CVE-2018-4977 | 31719 | |
APSB18-09 | CVE-2018-4978 | 31720 | |
APSB18-09 | CVE-2018-4979 | 31721 | |
APSB18-09 | CVE-2018-4980 | 31722 | |
APSB18-09 | CVE-2018-4981 | 31723 | |
APSB18-09 | CVE-2018-4982 | 31724 | |
APSB18-09 | CVE-2018-4983 | 31725 | |
APSB18-09 | CVE-2018-4984 | 31726 | |
APSB18-09 | CVE-2018-4985 | 31727 | |
APSB18-09 | CVE-2018-4986 | 31597 | |
APSB18-09 | CVE-2018-4987 | 31598 | |
APSB18-09 | CVE-2018-4988 | 31596 | |
APSB18-09 | CVE-2018-4989 | 31595 | |
APSB18-09 | CVE-2018-4990 | 31591 | |
APSB18-09 | CVE-2018-4993 | 31570 |
Zero-Day Filters
There are 11 new zero-day filters covering four vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative web site. You can also follow the Zero Day Initiative on Twitter @thezdi and on their blog.
Advantech (5)
- 31622: ZDI-CAN-5587: Zero Day Initiative Vulnerability (Advantech WebAccess HMI Designer)
- 31624: ZDI-CAN-5590: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
- 31627: ZDI-CAN-5595: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
- 31628: ZDI-CAN-5596: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
- 31629: ZDI-CAN-5597: Zero Day Initiative Vulnerability (Advantech WebAccess Node)
Microsoft (2)
- 31620: ZDI-CAN-5567: Zero Day Initiative Vulnerability (Microsoft Visual Studio)
- 31623: ZDI-CAN-5589: Zero Day Initiative Vulnerability (Microsoft Teams)
Omron (1)
- 30435: HTTP: Omron CX-One CX-FLnet Version Buffer Overflow Vulnerability (ZDI-18-289)
Trend Micro (3)
- 31619: ZDI-CAN-5553: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
- 31625: ZDI-CAN-5592: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
- 31626: ZDI-CAN-5594: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
Missed Last Week’s News?
Catch up on last week’s news in my weekly recap.
Read More HERE