meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, March 5th 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 March 2019

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. MacOS Unpatches Priv. Esclation; Windows Exploit Suggester; GPS Jamming

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, March 5th, 2019 edition of the San Bernard Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:13.0

Google release details regarding an interesting copy on write vulnerability in a Mac OS. This vulnerability could be used to override files and

0:24.1

essentially gets you privilege escalation. Google notified Apple of the vulnerability and

0:31.4

released these details 90 days after Apple received notice. There is a proof of concept exploit that Google did publish

0:41.4

as part of these details. Not really much that you can do about this at this point other than

0:46.9

wait for Apple to release a patch. And then we have a new update for Windows Exploid Suggester.

0:57.0

This is a tool that many penetration testers may remember, but it stopped working about two years ago

1:05.0

because Microsoft switched from the bulletin-based vulnerability system to the new XML API and no longer

1:14.7

published bulletin.

1:16.0

So with that, essentially the parser that Windows Exploidsuggester used in order to learn

1:22.3

about new vulnerabilities broke.

1:24.5

Well, this latest update fixes this problem. It now uses the Microsoft XML API

1:31.3

to retrieve vulnerability data. But well, there are a lot of tools out there that will tell you

1:37.3

what you haven't patched on your system. What really makes Windows Exploids Suggester different is that it will actually tell you if any of these vulnerabilities are exploitable, and then it will suggest, as the name implies, exploits to use against these vulnerabilities.

1:54.8

This is, of course, really important if you're trying to prioritize what to patch, and if you're really sort of trying to determine

2:02.6

what risk you're exposing yourself to.

2:05.6

And of course it makes life easier for penetration testers if they don't already have a tool like this

2:10.6

that will match up vulnerabilities to exploits.

2:15.6

And then there are more reports of the recent Docker run C vulnerability being exploited

2:23.9

to install cryptocurrency miners.

2:26.8

The latest version of this discovery comes from Imperva, from Vitali Simonovic and Ori Nakar.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.