meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, November 5th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 November 2021

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. October Packets Challenge Solution; Linux Kernel RCE; Cisco Patches; WebAssembly Security

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, November 5th, 2021 edition of the Sands and the Storm Center's Stormcast. My name is Johannes Ulrich.

0:09.5

I'm recording from Jacksonville, Florida.

0:13.5

And we do have a winner for the October Packet Challenge, a Brad that post the solution.

0:20.2

Congratulations to Amir Money for post the solution. Congratulations to mere money for winning the competition.

0:25.6

We had plenty of correct answers and just semi-randomely picked one of them as our winner of a Raspberry Pi.

0:35.6

This was actually a quite interesting and more evolved challenge than

0:41.7

Brad usually publishes. Three infected systems here, all part of an active directory, domain,

0:49.0

and different pieces of malware involved in this infection. So, congratulations to everybody who got the right answer, and if you want to check your answer,

0:59.0

or if you got stuck trying to solve it, then look at Brad's walkthrough for the solution.

1:07.0

And then we have an interesting vulnerability in Linux kernels that affects Linux kernels from version 5.10 through 5.15.

1:19.8

The vulnerability exists in the transparent inner process communication module or short TIPC.

1:26.3

This module is used in clusters to exchange messages

1:31.5

and also exchange cryptographic keys to encrypt these messages. Now, first of all, the good news

1:39.1

here is that this is nothing that's enabled by default and probably not enabled much at all, but it is potentially

1:48.1

exploitable across the network. These messages, they can be sent directly over Ethernet,

1:54.8

and then of course remote exploitation is limited to the local network, but they can also be

2:00.7

encapsulated in UDP, in which case

2:03.3

they're typically sent to port 6118.

2:08.7

So since this affects Linux setups that are configured as a cluster, that's the first thing

2:14.0

to check here, make sure if the TIPC module is actually loaded.

2:19.7

It's present in the effect that Linux versions, but not necessarily loaded, and the vulnerability

2:27.0

is really only exploitable if it's loaded.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.