meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, August 1st 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 31 July 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Comodo Domain Validation Bug; SwiftKey Data Leak; WhatsApp; OPNSense

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, August 1st, 2016 edition of the Sandsenet Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich, and the day I'm recording from Boston, Massachusetts.

0:12.0

I got a quick update to a story from Friday.

0:14.9

Did he found a new version of the tool that he used to analyze that RTF document RTF object.

0:22.6

Philippe told him that there is a new version that will actually parse the document

0:27.6

just like Didi described it in his diary out of the box without having to apply some of the additional tricks that Didy had to apply.

0:38.3

So nice if you run into one of these RTF documents, they certainly are somewhat common

0:44.3

and are often to transmit malicious code.

0:47.3

A few weeks ago I mentioned that StartSSL had problems with its certificate portal that you used to verify whether or not

0:57.8

you're actually responsible for a particular domain. You could actually fake this verification

1:03.6

and be considered responsible for any domain out there. Well, it turns out StartSel is not the only one with vulnerabilities

1:13.0

like this. We have a new report here from Matthew Pryne who looked at Komodo's trial certificates

1:20.7

and how they are validated. The problem here was that Komodo, when you are trying to

1:27.3

verify yourself for a particular

1:29.1

domain, is sending you an email or sending an email to the contact that's listed for the

1:35.0

domain with a link that the user then has to click on.

1:39.5

Well, this is pretty much what all certificate authorities are doing.

1:43.6

The problem here was that due to vulnerability in how the email is being assembled, it is

1:51.0

possible for an attacker to try to verify domain name, but then use HTML as the company name,

1:58.7

and that HTML will be inserted into the email without properly escaping

2:04.5

it, leaking to the validation code to being leaked to the attacker.

2:10.2

Once the attacker knows that validation code, then of course they're able to inject this

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.