Friday, 23. September 2016TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 19, 2016
September 22, 2016 marked the arrival of the autumn equinox: the first day of fall in the Northern Hemisphere and the start of spring in the Southern Hemisphere. It was also a day where things just did not go my way and I should have just stayed in bed. Traffic was especially heavy that morning, I had a slight wardrobe malfunction at work, and to top it off? My shoe strap came apart! Just like the moon’s phases and gravitational pull affects tides and human behavior, could the autumn equinox have an effect on us too? After some quick research, I found that many believe that the equinox can have an effect on us and one definite effect is the temporary disruption of communication satellites, due to the sun the sun going directly behind the satellite relative to Earth for a short period each day.
There will always be bad days when things just don’t go our way, so it’s always a good idea to have a backup plan. When traffic was bad that morning, I used a traffic app to find me an alternate route. I was able to borrow an extra t-shirt someone had at work to deal with my slight wardrobe malfunction, and when my shoe strap broke, I was able to wear the emergency flip flops I keep at my desk. You should take the same approach and deploy a defense-in-depth security strategy to protect your network for those bad days that may come.
Adobe Security Bulletins
This week’s Digital Vaccine (DV) package includes coverage for the Adobe Security Bulletins released on or before September 20, 2016. The following table maps Digital Vaccine filters to the Adobe Security Bulletins. Filters designated with an asterisk (*) shipped prior to this week’s package, providing zero-day protection for our customers:
Bulletin # CVE # Digital Vaccine Filter # Status APSB16-29 CVE-2016-4271 43746 APSB16-29 CVE-2016-4272 40730 APSB16-29 CVE-2016-4274 40731 APSB16-29 CVE-2016-4275 43747 APSB16-29 CVE-2016-4276 43745 APSB16-29 CVE-2016-4277 43748 APSB16-29 CVE-2016-4278 Insufficient Vendor Information APSB16-29 CVE-2016-4279 42263 APSB16-29 CVE-2016-4280 42269 APSB16-29 CVE-2016-4281 40735 APSB16-29 CVE-2016-4282 40734 APSB16-29 CVE-2016-4283 40733 APSB16-29 CVE-2016-4284 40729 APSB16-29 CVE-2016-4285 40728
TippingPoint Threat Management Center (TMC) and the ThreatLinQ Planned Maintenance Window
The Trend Micro TippingPoint Threat Management Center (TMC) (https://tmc.tippingpoint.com/TMC) and the ThreatLinQ web site (http://threatlinq.tippingpoint.com) will be undergoing maintenance on the following dates and times:
Website From Time To Time ThreatLinQ Monday
October 3, 2016 3:00PM (UTC)
10:00AM (CDT) Monday
October 3, 2016 6:00 PM (UTC)
1:00 PM (CDT) Threat Management Center (TMC) Wednesday
October 5, 2016 1:00 PM (UTC)
8:00 AM (CDT) Wednesday
October 5, 2016 11:00 PM (UTC)
5:00 PM (CDT)
During the maintenance window, only the user web access to the sites might be disrupted. The Security Management System (SMS), Intrusion Prevention System (IPS), Next Generation Firewall (NGFW), Threat Protection System (TPS) and ArcSight Enterprise Security Manager (ESM) connectivity to the TMC will not be disrupted, thus Digital Vaccine (DV), Threat Digital Vaccine (ThreatDV), Reputation Security Monitor (RepSM) and TippingPoint Operating System (TOS) automatic updates will still occur.
We appreciate your patience during the maintenance window. Customers with any questions or concerns can contact the TippingPoint Technical Assistance Center (TAC).
TippingPoint Security Management System (SMS) v4.4.0 Patch 1
Trend Micro™ TippingPoint has released patch 1 for SMS v22.214.171.124192 to correct a number of issues. For a complete list of enhancements and changes, refer to the product Release Notes. For Release Notes and other documentation, go to https://tmc.tippingpoint.com/TMC.
For questions or technical assistance on any TippingPoint product, customers can contact the TippingPoint Technical Assistance Center (TAC).
There are five new zero-day filters covering two vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website.
• 40717: ZDI-CAN-3858: Zero Day Initiative Vulnerability (Delta Industrial Automation WPLSoft)
• 40716: ZDI-CAN-3857: Zero Day Initiative Vulnerability (Microsoft Internet Explorer)
• 40723: HTTP: Samsung Security Manager ActiveMQ PUT Method Command Execution Vulnerability (ZDI-15-156)
Missed Last Week’s News?
Catch up on last week’s news in my weekly recap.