4.9 • 696 Ratings
🗓️ 19 September 2016
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, September 19th, 2016 edition of the Sansonet Storm Center's Stormcast. |
0:07.0 | My name is Johannes Ulrich and the day I'm recording from Baltimore, Maryland. |
0:13.0 | Let's start today with a security advisory by Cisco. |
0:18.0 | Cisco states in advisory that current versions of its iOS software suffer from a memory leakage |
0:26.3 | vulnerability, reminiscence of heart bleed, an unauthenticated attacker will be able to read |
0:33.6 | arbitrary memory using Ike version 1 security negotiation requests. |
0:40.5 | The list of vulnerable version is long and you should assume that your Cisco product is |
0:47.0 | vulnerable if it runs iOS and accepts Ike version 1 requests. |
0:53.6 | Cisco picks firewalls version 6 are vulnerable as well. |
0:58.1 | Version 7 should be okay. |
1:00.9 | An exploit for this vulnerability was released as part of the recent release of the related |
1:07.5 | exploits by the Shadowbroker Group. |
1:10.7 | So Cisco is a bit behind here with this advisory, |
1:15.6 | unlike for the SNMP issues where Cisco came out with advisories pretty much right away. |
1:22.6 | Most operating systems these days do provide a feature that allow users to take advantage of admin privileges after they provide a password. |
1:34.3 | This feature has been important to avoid having to run as an administrator all the time, and it has been integrated into various GUIs, like for example in OS10. |
1:47.0 | In OS10, if you would like to install software, you're often asked for your password in order |
1:54.0 | to allow the software to install features that require administrative privileges. |
2:00.0 | Even if you're not an administrator, you can then |
2:02.3 | just provide the administrator's username and password. While the user enters the password, |
2:08.7 | there is a chance that malware that runs with the user's privileges, records the password, |
2:15.3 | and uses the password later to escalate its own privilege. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.