meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, November 15th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 November 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Win32k Exploit Details (CVE-2018-8589); Pwn2OWn; More Spectre/Meltdown

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, November 15th, 2018 edition of the Sands and its Storm Center's

0:07.0

Stormcast. My name is Johannes Ulrich and the damn recording from Jacksonville, Florida.

0:14.4

In yesterday's patch Tuesday updates, there was one vulnerability that was already exploited in the wild, according to Microsoft,

0:23.8

but we didn't really have a lot of details about it. Well, that changed now. Kerspersky published

0:29.4

a blog post about CVE 2018, 85, 89. This was this Wynn 32K Pervage Escalation escalation vulnerability. Well, it turns out that Kerski

0:41.5

did detect this particular vulnerability being exploited on a system that was protected by

0:49.0

Kerserski and high malware. So Kerski notified Microsoft and now publishes some details about the vulnerability

0:57.0

and the exploit that they found in the wild. They only saw it being exploited against 32-bit Windows

1:03.9

7. Well, I'm talking about exploiting Seredays yesterday, the Pone to Own contest, which is held as part of the Pax SAC conference, finished and with it, a number of devices fell as it is now quite common.

1:22.7

The original idea behind this contest was that if you're able to exploit the device you got to keep it

1:28.4

that's sort of where the name Pohn to own comes from but in recent years this

1:33.5

zero-day initiative has sponsored and has handed out quite nice cash prices this year the

1:40.6

winning team got away with $250,000 worth of price money.

1:47.0

Now all devices that were part of the contest did eventually fall to new exploits.

1:54.0

All these devices were fully patched.

1:57.0

For example, in iPhone 10, they also had a Galaxy S9 and a Xiaomi My6.

2:04.1

Altogether, 18 new vulnerabilities were released as part of this contest, and the SIRDA initiative did pay out a total of $325,000 for these exploits.

2:16.3

These exploits will not be released, at least not right away.

2:21.3

The Serity Initiative will use them and report them to respective manufacturers.

2:28.3

Now, we typically do see patches coming out for these vulnerabilities relatively quickly.

2:35.4

Now, as part of the contest, these phones were connected to a Wi-Fi access point that

2:41.3

the attacker controlled.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.