meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, January 11th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 January 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. macOS "powerdir" vuln; URL Parser Vulns; npm libs sabotaged

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, January 11th, 2020 edition of the Sansonet Storm Center's Stormcast.

0:08.7

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.5

Well, thanks to Microsoft for providing us with more details regarding a recently patched macOS vulnerability that allows for bypassing

0:23.5

of the macOS transparency, consent and control, or TCC technology. This is the technology

0:30.6

that basically governs what files a program can access, and you may have seen that if you're a macOS

0:36.3

user, if you get pop-ups,

0:38.0

that a certain program, for example, would like to access your download directory or your

0:43.9

contacts.

0:45.2

And that information, whenever you give permission, is tracked in a database.

0:50.1

This database resides inside the home directory, more precisely in one of the library application

0:56.2

support directories, and past vulnerabilities in the system, for example, used changing

1:03.8

the home environment variable in order to fool the system what the home directory is.

1:10.9

Now, Apple has patched this.

1:12.8

It now looks at the actual GetPWUID system call, which gets the current home directory

1:19.9

for the user.

1:21.6

But that can be altered, so the exploit is kind of back where an attacker can set up a directory, place

1:29.7

database of the attackers choosing in that directory, and then just change the user's

1:36.6

home directory in order to have the system use that manipulated database file.

1:43.3

Patches around these issues were released by Apple,

1:46.0

but according to Microsoft,

1:49.0

are not completely mitigating these attack techniques.

1:54.0

I mean, teaching web application security

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.