4.9 • 696 Ratings
🗓️ 26 April 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, April 26, 2020, 23 edition of the Sands and its Storms Center's Stormcast. My name is Johannes Ulrich and today I'm recording from San Francisco, California. |
0:15.4 | The quick diary that I wrote today is about an experiment that I ran with chat GPT. It's a quick defensive experiment. |
0:24.3 | The goal here is for vendors, like for example Apple, that have these very brief vulnerability |
0:30.7 | descriptions. Apple usually has one sentence for an impact and then a one sentence description, |
0:36.6 | but doesn't have anything like |
0:38.4 | CBSS scores or any rating of the vulnerability being patched here. So I basically asked |
0:46.1 | chat GPT to come up with a CBSS score for these Apple vulnerabilities. And it actually did a pretty |
0:53.2 | good job. I posted one of the examples here. |
0:57.4 | I think it probably rated a little bit to high the network impact that it saw in the description. |
1:03.8 | I didn't really see. But again, it was very limited information and I think good enough that |
1:10.3 | next time Apple will release some patches. I may give |
1:14.3 | it a spin and have it at CVSS scores to these vulnerabilities to see if that helps us a little bit |
1:22.6 | better. Then what do we have now is sort of when we are trying to rank these vulnerabilities. |
1:27.3 | The challenge of course always that there is a good number of vulnerabilities being patched. |
1:32.3 | So going through them rather quickly, rating them is usually really not all that reliable and consistent when I'm doing it. |
1:42.3 | And then we have, well, yet another UDP-based denial of service amplification vector. |
1:50.0 | This time it's the service location protocol. |
1:53.0 | If you haven't heard of the service location protocol, you're probably not alone. |
1:58.0 | It's an older service that shouldn't really be used anymore and definitely should |
2:02.8 | not be exposed to the internet. Well, according to BitSight, who found out about this vulnerability |
2:09.1 | and discovered it, there are actually 54,000 SLP-speaking devices connected to the public |
2:17.0 | internet. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.