meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, December 11th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 December 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Kubernetes 2nd PoC; WebAssembly Creates Client Side Buffer Overflow; Etherum scans

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, December 11th, 2018 edition of the Sansonet Storm Center's Stormcast.

0:07.9

My name is Johannes Ulrich.

0:09.3

And today I'm recording from Jacksonville, Florida.

0:13.5

Last week I talked about the privilege escalation vulnerability in the Kubernetes API server.

0:19.5

And if you remember, as the vulnerability was announced

0:22.4

and the patch was released, there was already a proof-of-concept exploit that was made public

0:27.8

for an authenticated version of this vulnerability. Well, it turns out we now also have an

0:35.9

unauthenticated version of the exploit, so this

0:40.4

exploit can be executed with an anonymous connection to the exposed API.

0:47.0

So as long as any of your APIs are exposed, this unauthenticated proof of concept exploit

0:53.2

will work and it can gain cluster admin rights.

0:59.0

So if you haven't done so yet, definitely make sure that you are patching this vulnerability

1:04.0

and also review who has access to these APIs and how they can be accessed. Now, if you have been coding web applications and have done so, for example, impart in JavaScript

1:17.6

on the client and maybe even JavaScript or other high-level languages on the server,

1:23.6

then people probably told you that things like format, string vulnerabilities, and buffer

1:28.3

overflows aren't really all that much for you to worry about, because after all, these

1:34.5

languages manage memory for you, and unless these languages have a flaw, which of course

1:40.1

sometimes happens, yes, you're safe from buffer overflows. Well, this is actually changing.

1:47.8

And the reason for that is a web assembly. John Bergbaum from Forcepoint came up with a real nice

1:54.5

article illustrating how some of these old vulnerabilities can affect web assembly by coding or allowing the developer

2:03.7

here again to code in C in other low-level languages and then have that code executed in the

2:10.1

browser.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.