meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, July 7th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 July 2022

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Max SANs; Fortinet July Updates; Ouch Phishing; Quantum Safe Ciphers; Apple Lockdown

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, July 7, 22 edition of the Sandstone Storm Center's Stormcast. My name is Johannes Ulrich, and I am recording from Frankfurt, Germany.

0:14.5

I wrote up a real quick diary today about subject alternate names. These are additional names that you can add to a TLS certificate in order to validate

0:26.6

multiple host names.

0:28.6

And the big question you tried to answer is how many subject alternate names are you able

0:34.3

to add to a certificate.

0:37.4

Turns out the specification actually is not very specific about this.

0:42.3

The RFCs kind of suggest that this is a implementation-dependent parameter,

0:48.3

and with that of course no compatibility and such comes to mind as a possible problem. Well, it turns out that the certificate

0:58.0

authorities typically allow at least 100. For example, let's encrypt. And now there are a couple

1:05.5

Komodo, for example, allows 1,000. And some sources say that Komodo actually allows 2,000, but overall you probably

1:14.7

want to stay at 100 or less to ensure that your certificate is compatible.

1:21.2

Most organizations will never get anywhere close to 100, but of course if you have things like

1:26.6

load balancers, proxies and such,

1:28.4

that are protecting a large number of websites, then 100 may easily be reached.

1:36.0

And FortyNet did release its monthly update for July, and with that we got patches for 11 vulnerabilities and four of them have a rating of high.

1:49.6

Among the high vulnerabilities one that sort of sticks out immediately is a MySQL issue that

1:55.7

there is no root user password configured which does allow an authenticated user to then get to the command

2:05.3

prompt and essentially just take over my SQL on the device.

2:09.9

The second interesting vulnerability is a code execution vulnerability via a stack-based buffer

2:16.6

overflow.

2:17.5

Not a reason. This is only rated as high, not critical is that it has a number of

2:22.7

dependencies, like for example, the attacker already has to have a privileged position and

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.