meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, October 16th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 16 October 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. CVE-2018-8495 PoE Exploit; Fake Mining Appsi; Fake Google Photo App

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, October 16th, 2018 edition of the San Sanct Storm Center's Stormcast.

0:07.5

My name is Johannes Ulrich and the day I'm recording from McLean, Virginia.

0:12.0

Today, Abdul Rahman Al-Kamandhi did publish a proof-of-concept exploit for one particular vulnerability that Microsoft patched last week.

0:25.2

This is actually one of those vulnerabilities that didn't really get a lot of attention

0:29.2

because it was one of many issues in Microsoft Edge that was patched.

0:35.0

And the vulnerability was described as an insufficient UI warning.

0:40.2

Now, what is really referred to was that with custom URL schemes, you can launch external

0:47.1

programs and load arbitrary scripts that are already present on the machine.

0:52.8

And in this particular case case the author of this

0:56.7

proof of concept exploit was actually able to use an existing script on the system that is

1:02.2

vulnerable to Windows shell injection to then leverage this flaw in Microsoft Edge.

1:08.7

So not a real straightforward exploit,

1:11.7

but once you see it working,

1:13.8

not really all that difficult

1:15.5

to actually get to work

1:16.9

with not too much user interaction,

1:20.0

so you can probably make this work

1:23.2

relatively reliable.

1:25.6

As so often, once you chain a number of vulnerabilities that by themselves,

1:30.2

don't really look all that severe together, you can, like in this case, have full remote code

1:36.8

execution. So again, this vulnerability was patched last week, so better get going and make

1:43.1

sure that all your systems are up to date.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.