|Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs.|
New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com.
Note: This is an out-of-band DV release that addresses the Adobe Acrobat Reader patch for CVE-2019-7815. The regular weekly DV will be published as scheduled on Tuesday, February 26, 2019.
SMS customers can update the Digital Vaccine through the SMS client. From the top line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update.
|The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above, all NGFW and all TPS systems.The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters.|
|Adobe Security Bulletins|
This DV includes coverage for the Adobe vulnerabilities released on or before February 21, 2019. The following table maps TippingPoint filters to the Adobe CVEs.
|Bulletin #||CVE #||TippingPoint Filter #|
|Filters marked with * shipped prior to this DV, providing zero-day protection.|
|The Digital Vaccine can be manually downloaded from the following URLs:|
Table of Contents
New Filters - 1
Modified Filters (logic changes) - 0
Modified Filters (metadata changes only) - 0
Removed Filters - 0
34491: HTTP: Adobe Acrobat Reader UNC NTLM Information Disclosure Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an information disclosure vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2019-7815 Modified Filters (logic changes): None Modified Filters (metadata changes only): None Removed Filters: None
Top of the Page