meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, August 29th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 August 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. WINRAR Exploit Analysis; Juniper PoC; Exchange EP Default; Rust Malware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, August 29th, 2020, 3 edition of the Sands and Storms anders Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.3

Today we got a very interesting and timely diary by Xavier. Xavier is looking closer at the Wynrarr Warnability, CVE 2020-23-38-831, how it's being

0:28.1

exploited and how you can detect it.

0:31.9

To detect it, Xavier uses zipdump.

0:34.9

PY, a quick Python script that analyzes zip files. And the trick that's being

0:42.9

abused here in order to exploit the vulnerability is space at the end of a directory name and

0:50.9

a space ahead of the extension. So the file that Xavier sipped here as part of his

0:58.8

exploit archive is test.ttXT space slash test.txtspace.combe, and that leads then to the execution

1:10.2

of the code in the dot bat file. In addition to use

1:15.7

this proof of concept exploit in order to show how exploitation works here, Xavier also is

1:22.6

looking at exploit that he found on virus total to show well it works for real samples,

1:31.0

and then also how to go further and extract the actual script being executed.

1:38.1

And Juniper, a little bit more than a week ago, did release a bulletin with an out-of-cycle fix for June OS.

1:48.3

This particular bulletin does fix a number of vulnerabilities.

1:53.9

The trick here is that by themselves, some of these vulnerabilities may not sound that bad,

2:00.2

but together they can actually then be exploited to gain full unauthenticated remote code execution.

2:09.1

I mentioned yesterday how hard it can be to just look at the CVSS score and figure out how severe vulnerability is.

2:16.4

Of course, there's nothing better than to bring home the severity of vulnerability

2:20.9

than an actual proof-of-concept exploit,

2:24.3

and we now have that thanks to Watchtower Labs.

2:28.4

And exploitation is actually not all that terribly difficult.

2:32.4

It is essentially an arbitrary remote code upload vulnerability that

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.