meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, July 19th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 July 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. BaseXX Obfuscation; Juniper Radius Issue; NSO Group Leak; Password Autofill Dangers

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, July 19th, 2021 edition of the Sands and Storm Center's Stormcast. My name is Johannes Ulrich. And I'm recording from Jacksonville, Florida.

0:13.6

A couple different diaries this weekend from Xavier talking about various ways to base encode different strings in order to obfuscate them and evade

0:26.0

malware detection. Most commonly, of course, we're dealing with base 64 encoding, but the idea

0:32.8

basically is that we may have various character sets that are being used for encoding, not just the standard

0:39.7

base 64 character set in particular. Xavier is introducing here base 85 as a possible alternative

0:48.6

to evade detection tools. And on Friday, Juniper released a number of patches.

0:57.5

Probably the most interesting and severe vulnerability that's being addressed here is a

1:03.6

vulnerability in steel-belted radius, which of course is used for authentication in

1:09.4

Juniper's ecosystem.

1:10.9

This vulnerability has a CVSS score of 9.8,

1:15.8

and apparently it is a buffer overflow vulnerability

1:20.6

that can lead to arbitrary code execution on the radius server.

1:27.3

Luckily, this vulnerability is only exploitable if enhanced

1:30.5

e-blogging with a trace level of 2 is enabled. Patches are available for affected systems,

1:39.2

but as an immediate fix, you could also just check the logging settings.

1:50.6

And a remote code execution vulnerability was also disclosed for fail to ban. Fail to ban, very popular package that allows you to automatically add firewall rules

1:55.9

for IP addresses that continually fail authentication, for example, and one particular module of the

2:05.7

fail-to-ban package allows the lookup of WHOIS information and sending emails to an administrator

2:13.2

including that information. Sadly, the input received from the WHOIS data is not properly escaped,

2:23.0

so theoretically someone would be able to construct a malicious WHOIS record, and then as the system

2:31.1

locks it up after being attacked from an affected IP address, it would

2:36.8

execute the code embedded in the who is data.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.