4.9 • 696 Ratings
🗓️ 19 May 2023
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, May 19th, 2020, edition of the Sands and at Storm Center's |
0:08.0 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:15.2 | Today we got a little bit as a surprise set of updates for Apple's operating systems and Safari. Now, this was |
0:24.4 | somewhat expected. I actually thought maybe they'll push it for next week because they released |
0:30.2 | another release candidate earlier this week, but well, we got it today. These updates patch about 60 different vulnerabilities. Three of the vulnerabilities |
0:42.2 | have already been exploited in the wild. That's, of course, the most interesting part of this |
0:49.1 | update, in particular the type of vulnerabilities that are being exploited here. The first one, |
0:57.0 | CVE 20203-323-3-3-3-7-3, is a web kit vulnerability. So typically this would be exploited as you |
1:07.0 | visit a malicious web page and it can lead to arbitrary code execution. Now, that code |
1:14.1 | execution would of course be constrained by your web browser sandbox. That's where the second |
1:21.3 | vulnerability comes in. And that's CVE 2020-209. |
1:28.2 | This vulnerability is an issue again with WebKit, |
1:33.0 | but it allows a remote ad hacker to break out of the Web sandbox. |
1:37.4 | So this is how an attacker would then actually start hitting the system. |
1:43.3 | And the third vulnerability is an out- bounds read that does allow the disclosure of sensitive |
1:51.8 | information. |
1:53.1 | Again, a WebKit vulnerability. |
1:55.6 | Not how to ensure what this refers to. |
1:58.0 | This can sometimes give the attacker hints as to, for example, how to exploit |
2:04.4 | one of these other vulnerabilities. And two of these vulnerabilities were actually the |
2:10.4 | mystery vulnerabilities that were addressed by the rapid update that was released a week or so ago. |
2:19.1 | So even if you installed the rapid security response update, you still have one of these |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.