meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 24th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 July 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. More Spectre; IE 0Day Patch Patched; HTTP Insecure; DNS Rebinding Again;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 24th, 2018 edition of the Santernet Storm Center's Stormcast.

0:07.4

My name is Johannes Orich.

0:09.0

And today I'm recording from Jacksonville, Florida.

0:12.4

Just a quick update that we are still seeing the new web logic vulnerability being exploited.

0:19.1

We have now seen the obligatory crypto miner. Also

0:22.9

interestingly some DDoS malware not sure exactly why they are going after web logic

0:29.6

but I guess it's just part of the standard toolset being deployed to vulnerable

0:34.8

servers. Well probably the other thing we need as little as a new web logic vulnerability is a new

0:42.6

version of the Specter vulnerability.

0:46.6

This particular version, Specter, RSB, is targeting the return stack buffer and it's

0:53.6

well a yet another way how you can take advantage

0:56.1

of the speculative execution in modern processors.

1:01.7

The return stack buffer essentially holds the last 16 addresses that the processor worked on

1:08.5

and again it's sort of meant to optimize how the processor determines

1:13.4

what to do next. Well, this return stack buffer can be manipulated and as a result,

1:19.6

arbitrary code can be executed. As previous Spector attacks, this does not just affect Intel

1:26.2

CPUs, even though those were the ones that

1:28.8

were tested by these researchers, but it should affect AMD and arm processors as well, because

1:35.0

they pretty much use the same RSB mechanism.

1:38.3

Although since the nature of this Specter attack is quite different from previous attacks.

1:44.8

Existing patches do not really apply to this vulnerability.

1:50.6

And Chihu 360 is reporting that Microsoft patched a vulnerability in an Explorer in July

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.