4.9 • 696 Ratings
🗓️ 22 June 2017
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, June 22nd, 2017 edition of the Sansanet Storms anders Stormcast. |
0:08.1 | My name is Johannes Ulrich and the name am recording from Minneapolis, Minnesota. |
0:12.9 | A few weeks ago, I reported about OpenVPN undergoing a code review and security audit, which resulted in only relatively minor vulnerabilities |
0:24.6 | being found and of course fixed within OpenVPN. |
0:29.6 | Well, a big surprise today we got four more vulnerabilities in OpenVPN that were found |
0:36.6 | independently of the security audit via |
0:39.9 | fusing kind of the point of the author here is that the security audits using |
0:46.4 | code review only get you so far that with the complexity of some of the software |
0:51.4 | fusing appears to be a more thorough and more efficient way of |
0:56.6 | finding security vulnerabilities. So really, yet another great example about how fusing can |
1:02.8 | augment some of the more traditional techniques like code review. Luckily, none of the four |
1:09.8 | vulnerabilities I would consider really critical. |
1:12.8 | Three of them are pretty much denial of service vulnerabilities. |
1:16.7 | The fourth one is remote client stack buffer corruption, which may in some cases be exploitable, |
1:25.0 | not really sure, but as the author here of the report states that it's |
1:29.6 | very unlikely to actually happen in order for this fourth vulnerability to be |
1:35.0 | exploited and to actually to be vulnerable you need to have NtLM version 2 used and |
1:40.9 | the user actually needs to specify a username ending in backslash. |
1:48.0 | And it depends on a very specific stack layout. |
1:52.0 | So overall, don't panic, apply patches as they are being released. |
1:57.0 | These vulnerabilities have been disclosed to the open VPN team and patches are available. |
2:04.6 | So thanks to Guido Franken for actually taking the time to find and report these vulnerabilities. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.