4.9 • 696 Ratings
🗓️ 23 October 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Tuesday, October 23rd, 2018 edition of the Sandtonet Storm Center's Stormcast. My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida. |
| 0:13.2 | I always love it when we get some interesting malware from readers and can actually write about it. Didier did so today. We received an email from |
| 0:24.6 | one of our readers that contained a compressed RTF attachment. Now, Didier is walking you through |
| 0:32.3 | how to analyze such an email and how to use his tools, the little Python scripts, to do so quite quickly |
| 0:39.8 | and efficiently. |
| 0:41.7 | So it should be easy for you to follow if you run into a similar attachment yourself. |
| 0:48.7 | Real-time operating systems or short RTOS are a popular family of operating systems that are often used for automation |
| 0:58.6 | or, well, what's often called the Internet of Things. |
| 1:03.1 | As of late 2017, Amazon took stewardship of free RTOS. |
| 1:10.3 | That's a free real-time operating systems, as the name implies, |
| 1:14.5 | and it's really based on sort of that same family of operating systems, like, for example, |
| 1:20.4 | open RTS, which is a commercial or for pay version of this operating system. Well, Simperium took a closer look at these operating systems, and they found a number |
| 1:32.9 | of remote code execution vulnerabilities and denial of service vulnerabilities that affected |
| 1:38.4 | the TCP IP stack that comes in particular with free RTOS. |
| 1:43.5 | That's the Amazon version that's also |
| 1:46.2 | deployed via Amazon's cloud. |
| 1:49.1 | Now, there are not a lot of details yet, and Sampyarium says that they'll wait a month |
| 1:53.8 | until they'll release any details, but out of the 13 CVs, so 13 vulnerabilities that were published, we have four remote code execution |
| 2:05.1 | vulnerabilities. |
| 2:07.0 | So without these details, really hard to say how exploitable these vulnerabilities are or how |
| 2:12.4 | an attacker would exactly go about exploiting them, but given that they are part of the TCP IP stack, |
| 2:20.3 | it's very likely that a system is exploitable as soon as it's connected to a network. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.