meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 15th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 September 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. qemu rPi emulation; ncurses vuln; windows themes PoC; 3AM ransomware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, September 15, 2023 edition of the Sansonet Stormer's Stormcast.

0:09.0

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.9

Ever wanted to debug software that was created for the Raspberry Pi on your X-86 Windows systems.

0:24.5

The challenge here is that not only do you need to run Linux on your Windows system,

0:30.1

that's pretty straightforward with Virtual Machine or the Windows subsystem for Linux,

0:35.2

but you also need to emulate the different architectures as Raspberry Pi's are

0:40.6

using ARM. One of our undergraduate interns now came up with a solution using QEMU.

0:48.1

QEMU is different from virtualization. It actually emulates a different hardware, and as such is able to emulate a Raspberry Pi arm

0:58.4

processor on your x86 Windows workstation.

1:03.8

Emulation is not a high performance solution, but certainly sufficient for things like debugging

1:08.8

where sometimes slower performance is actually preferred,

1:13.6

thanks to our intern Alan Engel for providing the detailed instructions.

1:21.1

If you ever used tools on the Linux command line, you may have run into tools that sort of display dialogue boxes

1:29.7

or even something that resembles Windows on a text-based terminal. In order to create these

1:37.3

effects, the software likely used a library called N curses, which is short for new curses.

1:45.4

So this is a library that you find on every single Unix system, probably even some

1:51.6

Windows versions or so on that, of that library that you may run into, and Microsoft now

1:58.3

published details regarding a set of different vulnerabilities that affect this library.

2:06.0

These vulnerabilities have been disclosed.

2:08.2

Patches have been made available.

2:11.3

But given that we now have more details available, you certainly need to make sure that everything is patched and up to date.

2:21.0

The vulnerabilities can lead to remote code execution.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.