4.9 • 696 Ratings
🗓️ 12 April 2017
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, April 12, 2017 edition of the Sands and its Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Orlando, Florida. |
0:13.2 | Today, of course, Microsoft's Patch Tuesday, and this patch Tuesday quite a bit different than prior patch Tuesdays, you may have noticed there was no table, no summary on our side in part, because Microsoft went away with its traditional bulletin process. |
0:33.6 | Instead, Microsoft fully switched to a new security update guide, you have to log in to access it, |
0:41.4 | and even then it may not always come up. If it does come up, then you should see 644 updates, |
0:50.8 | with 210 of them listed as critical. |
0:56.0 | Lucky for Windows users, this update patches of vulnerability in Verde that already has been |
1:03.0 | pretty actively exploited these last few days by the Tridex Matter campaign. |
1:10.0 | This vulnerability, I mentioned it briefly on Monday, |
1:14.4 | does allow an attacker to execute arbitrary code |
1:17.8 | by tricking the victim into opening an RTF document. |
1:23.0 | There are actually three different vulnerabilities |
1:25.5 | that are being used by this particular attack, one in |
1:31.3 | Virt and VirtPad, one in Explore and one in Office. Probably of particular note is that |
1:39.4 | VortPat is affected too, so it's not just the full version of Word, but also WordPad. |
1:47.0 | In particular, if you don't have Office installed, then you may deem yourself safe, |
1:52.0 | but WordPad comes as part of Windows, so you're still vulnerable. |
1:58.0 | Also, for end users, no more individual patches instead just one patch that bundles |
2:05.3 | them all. So Microsoft kind of follows here in Apple's steps by releasing these large monolithic |
2:12.8 | patches. For enterprise customers, there are still options to apply patches individually. |
2:19.5 | And a couple other highlights from this month's patch set in addition to the already |
2:24.7 | mentioned Word in an Explorer office patch. |
2:28.1 | Hyper V also has a couple of remote code execution, vulnerabilities that are being addressed. Probably as severe as the |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.