4.9 • 696 Ratings
🗓️ 17 December 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, December 17th, 2018 edition of the Sanss and at Storm Center's |
| 0:06.3 | Stormcast. My name is Johannes Ulrich, and I'm recording from Washington, D.C. Earlier this week, |
| 0:14.6 | the Tencent Blade Security team released an interesting vulnerability in SQLite. Now, SQLite is a very |
| 0:25.4 | ubiquitous tool. It's used in many, many different products. So a vulnerability in this |
| 0:32.2 | particular tool is quite serious. And we already have a proof of concept exploit out there that will crash Google Chrome. |
| 0:42.3 | So SQL Lite offers the ability to store structure data in small files and then provides SQL or a subset of the SQL query language to allow you to query this data. |
| 0:57.1 | Now, this vulnerability may go beyond Chrome and beyond browsers. |
| 1:02.1 | As far as browsers are concerned, currently Chrome, Safari, and Opera are supporting SQLite. |
| 1:11.3 | Now, the WebSQL database, this support is based on that particular standard. |
| 1:16.7 | It's actually no longer maintained and is sort of on its way out. |
| 1:21.3 | But there are many, many other tools that are using SQLite databases to maintain configuration |
| 1:26.7 | information or just to store random data. |
| 1:30.3 | So get ready for various vendors to patch their products in the next few weeks. |
| 1:37.3 | Of course, the browser is as usual of the biggest target here. |
| 1:42.3 | If exploited, this particular vulnerability could lead to code execution. |
| 1:48.0 | And if you are using a Logitech keyboard or mouse and you have the Logitech options software installed, |
| 1:57.0 | be careful it is possible for arbitrary webpages to send keystrokes to your system the reason |
| 2:06.0 | this vulnerability exists is that logitech options does implement a web socket server and does not |
| 2:14.3 | actually verify any data that's being sent to this service. |
| 2:20.3 | So any webpage can run JavaScript that will then send data to this WebSockets server. |
| 2:27.5 | And again, the WebSocket server does not actually check the origin of the data. |
| 2:33.8 | The only security feature appears to be that the attacker needs to know the process ID of the software. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.