<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: To what extent Threat Updates covers against the latest CVE's in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/to-what-extent-threat-updates-covers-against-the-latest-cve-s/m-p/191507#M57670</link>
    <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10360"&gt;@mario.chancay&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;some CVE may not have identifiable factors in the network packets: there may be legitimate packets that are able to buffer overflow a certain vulnerable version of client/server but are not malicious in nature, or they may not have been disclosed publicly yet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i've tried to review these CVE but they are marked as reserved on mitre, I then tried tracing the original bug bt I don't appear to have access to chromium bugs &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My assumption is these have not been disclosed yet, to allow google to fix the bugs&lt;/P&gt;</description>
    <pubDate>Wed, 13 Dec 2017 12:25:51 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-12-13T12:25:51Z</dc:date>
    <item>
      <title>To what extent Threat Updates covers against the latest CVE's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/to-what-extent-threat-updates-covers-against-the-latest-cve-s/m-p/191376#M57656</link>
      <description>&lt;P&gt;Hi, we have received notifications for the following vulnerabilities and related CVE's:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Multiple&amp;nbsp;Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Out of bounds write in QUIC (CVE-2017-15407)&lt;/LI&gt;&lt;LI&gt;Heap buffer overflow in PDFium (CVE-2017-15408)&lt;/LI&gt;&lt;LI&gt;Out of bounds write in Skia (CVE-2017-15409)&lt;/LI&gt;&lt;LI&gt;Use after free in PDFium (CVE-2017-15410, CVE-2017-15411)&lt;/LI&gt;&lt;LI&gt;Use after free in libXML (CVE-2017-15412)&lt;/LI&gt;&lt;LI&gt;Type confusion in WebAssembly (CVE-2017-15413)&lt;/LI&gt;&lt;LI&gt;Pointer information disclosure in IPC call (CVE-2017-15415)&lt;/LI&gt;&lt;LI&gt;Out of bounds read in Blink (CVE-2017-15416)&lt;/LI&gt;&lt;LI&gt;Cross origin information disclosure in Skia (CVE-2017-15417)&lt;/LI&gt;&lt;LI&gt;Use of uninitialized value in Skia (CVE-2017-15418)&lt;/LI&gt;&lt;LI&gt;Cross origin leak of redirect URL in Blink (CVE-2017-15419)&lt;/LI&gt;&lt;LI&gt;URL spoofing in Omnibox (CVE-2017-15420)&lt;/LI&gt;&lt;LI&gt;Integer overflow in ICU (CVE-2017-15422)&lt;/LI&gt;&lt;LI&gt;Issue with SPAKE implementation in BoringSSL (CVE-2017-15423)&lt;/LI&gt;&lt;LI&gt;URL Spoof in Omnibox (CVE-2017-15424, CVE-2017-15425, CVE-2017-15426)&lt;/LI&gt;&lt;LI&gt;Insufficient blocking of JavaScript in Omnibox (CVE-2017-15427)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Multiple Vulnerabilities in Apache Struts Could Allow for Remote Code Execution&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A denial of service vulnerability exists due to an outdated JSON-lib library utilized by a REST plugin. (CVE-2017-15707)&lt;/LI&gt;&lt;LI&gt;A remote code execution vulnerability exists because the REST Plugin utilizes Jackson JSON library for data binding. (CVE-2017-7525)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But could not find the CVE's in the Threat Vault.&amp;nbsp; Would like to understand how PaloAlto determines which CVE's should be included in the Threat Updates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mario&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 19:14:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/to-what-extent-threat-updates-covers-against-the-latest-cve-s/m-p/191376#M57656</guid>
      <dc:creator>mario.chancay</dc:creator>
      <dc:date>2017-12-12T19:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: To what extent Threat Updates covers against the latest CVE's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/to-what-extent-threat-updates-covers-against-the-latest-cve-s/m-p/191507#M57670</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10360"&gt;@mario.chancay&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;some CVE may not have identifiable factors in the network packets: there may be legitimate packets that are able to buffer overflow a certain vulnerable version of client/server but are not malicious in nature, or they may not have been disclosed publicly yet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i've tried to review these CVE but they are marked as reserved on mitre, I then tried tracing the original bug bt I don't appear to have access to chromium bugs &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My assumption is these have not been disclosed yet, to allow google to fix the bugs&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2017 12:25:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/to-what-extent-threat-updates-covers-against-the-latest-cve-s/m-p/191507#M57670</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-12-13T12:25:51Z</dc:date>
    </item>
  </channel>
</rss>

