<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zero-day vulnerability in Adobe Flash, CVE-2015-0313 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/zero-day-vulnerability-in-adobe-flash-cve-2015-0313/m-p/17966#M13079</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-style: inherit; font-family: inherit;"&gt;Vulnerability Coverage:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Wildfire AV - WF 52532 (today) (PAN-OS 5.0+), and AV 1478 (tomorrow). Virus/Win32.CVE-2015-0313.a &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;IPS Signature- Planning to release with 2/3 IPS signature release&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;URLs associated with Malicious SWF samples:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Malicious domains added to PAN-DB/malware already (PAN-OS 5.0 +) &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;CnC/Spyware:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Malicious DNS signatures added for domains associated with malicious samples (PAN-OS 5.0+)&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;WildFire:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Forward SWF flash files to Wildfire for analysis.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Traps Advanced Endpoint Protection:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Traps was able to mitigate the last zero-day vulnerability.&amp;nbsp; Palo Alto Networks has not confirmed this yet.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A class="jive-link-external-small" href="http://researchcenter.paloaltonetworks.com/2015/01/unpatched-flash-vulnerability-cve-2015-0311-blocked-palo-alto-networks-traps/" rel="nofollow" style="font-style: inherit; font-family: inherit; color: #006595;"&gt;http://researchcenter.paloaltonetworks.com/2015/01/unpatched-flash-vulnerability-cve-2015-0311-blocked-palo-alto-networks-traps/&lt;/A&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Other mitigations:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Investigate removing Adobe Flash if not required. YouTube is now moving to html5 so more sites will continue to follow.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A class="jive-link-external-small" href="https://helpx.adobe.com/security/products/flash-player/apsa15-02.html" rel="nofollow" style="font-style: inherit; font-family: inherit; color: #006595;"&gt;https://helpx.adobe.com/security/products/flash-player/apsa15-02.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Feb 2015 23:33:03 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2015-02-02T23:33:03Z</dc:date>
    <item>
      <title>Zero-day vulnerability in Adobe Flash, CVE-2015-0313</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zero-day-vulnerability-in-adobe-flash-cve-2015-0313/m-p/17966#M13079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-style: inherit; font-family: inherit;"&gt;Vulnerability Coverage:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Wildfire AV - WF 52532 (today) (PAN-OS 5.0+), and AV 1478 (tomorrow). Virus/Win32.CVE-2015-0313.a &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;IPS Signature- Planning to release with 2/3 IPS signature release&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;URLs associated with Malicious SWF samples:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Malicious domains added to PAN-DB/malware already (PAN-OS 5.0 +) &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;CnC/Spyware:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Malicious DNS signatures added for domains associated with malicious samples (PAN-OS 5.0+)&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;WildFire:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Forward SWF flash files to Wildfire for analysis.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Traps Advanced Endpoint Protection:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Traps was able to mitigate the last zero-day vulnerability.&amp;nbsp; Palo Alto Networks has not confirmed this yet.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A class="jive-link-external-small" href="http://researchcenter.paloaltonetworks.com/2015/01/unpatched-flash-vulnerability-cve-2015-0311-blocked-palo-alto-networks-traps/" rel="nofollow" style="font-style: inherit; font-family: inherit; color: #006595;"&gt;http://researchcenter.paloaltonetworks.com/2015/01/unpatched-flash-vulnerability-cve-2015-0311-blocked-palo-alto-networks-traps/&lt;/A&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Other mitigations:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Investigate removing Adobe Flash if not required. YouTube is now moving to html5 so more sites will continue to follow.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A class="jive-link-external-small" href="https://helpx.adobe.com/security/products/flash-player/apsa15-02.html" rel="nofollow" style="font-style: inherit; font-family: inherit; color: #006595;"&gt;https://helpx.adobe.com/security/products/flash-player/apsa15-02.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Feb 2015 23:33:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zero-day-vulnerability-in-adobe-flash-cve-2015-0313/m-p/17966#M13079</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2015-02-02T23:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: Zero-day vulnerability in Adobe Flash, CVE-2015-0313</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zero-day-vulnerability-in-adobe-flash-cve-2015-0313/m-p/17967#M13080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Vuln Protection was added with Apps+Threats Content package 484&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P class="p1" style="font-size: 13.3333330154419px;"&gt;On Release Notes, New Vulnerability Signature:&lt;/P&gt;&lt;P class="p1" style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P class="p1" style="font-size: 13.3333330154419px;"&gt;Threat ID 37364&lt;/P&gt;&lt;P class="p1" style="font-size: 13.3333330154419px;"&gt;Adobe Flash Player Memory Corruption Vulnerability&lt;/P&gt;&lt;P class="p1" style="font-size: 13.3333330154419px;"&gt;CVE-2015-0313&lt;/P&gt;&lt;P class="p1" style="font-size: 13.3333330154419px;"&gt;&lt;IMG __jive_id="18182" alt="Screen Shot 2015-02-05 at 12.05.05 PM.png" class="image-0 jive-image jiveImage" height="16" src="https://live.paloaltonetworks.com/legacyfs/online/18183_Screen Shot 2015-02-05 at 12.05.05 PM.png" style="height: 16px; width: 901.818181818182px;" width="902" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Feb 2015 20:07:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zero-day-vulnerability-in-adobe-flash-cve-2015-0313/m-p/17967#M13080</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2015-02-05T20:07:57Z</dc:date>
    </item>
  </channel>
</rss>

