meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, October 23rd 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 23 October 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Compressed RTF in MSG File; FreeRTOS TCP/IP Vuln; VLC Vulns; Yammer Update

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, October 23rd, 2018 edition of the Sandtonet Storm Center's Stormcast. My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida.

0:13.2

I always love it when we get some interesting malware from readers and can actually write about it. Didier did so today. We received an email from

0:24.6

one of our readers that contained a compressed RTF attachment. Now, Didier is walking you through

0:32.3

how to analyze such an email and how to use his tools, the little Python scripts, to do so quite quickly

0:39.8

and efficiently.

0:41.7

So it should be easy for you to follow if you run into a similar attachment yourself.

0:48.7

Real-time operating systems or short RTOS are a popular family of operating systems that are often used for automation

0:58.6

or, well, what's often called the Internet of Things.

1:03.1

As of late 2017, Amazon took stewardship of free RTOS.

1:10.3

That's a free real-time operating systems, as the name implies,

1:14.5

and it's really based on sort of that same family of operating systems, like, for example,

1:20.4

open RTS, which is a commercial or for pay version of this operating system. Well, Simperium took a closer look at these operating systems, and they found a number

1:32.9

of remote code execution vulnerabilities and denial of service vulnerabilities that affected

1:38.4

the TCP IP stack that comes in particular with free RTOS.

1:43.5

That's the Amazon version that's also

1:46.2

deployed via Amazon's cloud.

1:49.1

Now, there are not a lot of details yet, and Sampyarium says that they'll wait a month

1:53.8

until they'll release any details, but out of the 13 CVs, so 13 vulnerabilities that were published, we have four remote code execution

2:05.1

vulnerabilities.

2:07.0

So without these details, really hard to say how exploitable these vulnerabilities are or how

2:12.4

an attacker would exactly go about exploiting them, but given that they are part of the TCP IP stack,

2:20.3

it's very likely that a system is exploitable as soon as it's connected to a network.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.