4.9 • 696 Ratings
🗓️ 21 July 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, July 21st, 2016 edition of the Sansanet Storm Center's Stormcast. |
0:08.0 | My name is Johannes Ulrich and today I'm recording from Minneapolis, Minnesota. |
0:13.0 | Oracle released its quarterly patch update again and this time it patches 276 different vulnerabilities across 84 products. |
0:26.6 | Of course, Java is affected as well from these updates, aside the database and all the other middleware components and Solaris and everything else that Oracle does. |
0:38.7 | If you are running Java, then you should be running Java 8 Update 101, build third. |
0:47.0 | And if you have a recursive DNS server that is validating responses using DNSSEC, |
0:53.7 | you probably do want to mark October 11, 2017 in your |
0:59.7 | calendars. |
1:01.1 | At that date, a new key signing key for the Root Zone will be made live, meaning it will start |
1:07.7 | to be used to sign responses. |
1:10.3 | The key itself will be added to the Root Zone starting July next year, so there should be plenty |
1:15.9 | of time for you to update your DNS server configuration if your DNS server does support |
1:22.6 | RFC-5011. |
1:25.1 | This is an algorithm that will automatically update trust anchors. Then you should be all set, |
1:30.6 | but you may want to make sure that this is all working correctly. Like I said, July through October |
1:37.4 | next year is of the window where you have to make sure all of this is working correctly. |
1:42.6 | I will link in the show notes to a presentation |
1:46.9 | given about the process. It also includes some test URLs. And then we have more vulnerabilities |
1:53.9 | in anti-malver. This time they're discovered by Udi Yavo and Tom are bitten. And it's not exactly just the fault of the anti-malver |
2:03.6 | but the Microsoft detours engine that's being used in order to allow anti-malver to establish hooks into various Windows APIs. |
2:15.6 | Essentially what anti-malver does is it intercept system calls in order to inspect them for malicious |
2:22.9 | behavior. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.