meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, August 10th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 August 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. MSFT Patch Tuesday Summary; NO FLASH PATCH TODAY

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, August 10th, 2016 edition of the Sandstone Storm Center's Stormcast.

0:07.0

My name is Johannes Orich, and the day I'm recording from Jacksonville, Florida.

0:12.0

Microsoft, as expected, published its monthly security bulletins.

0:16.0

Today we got a total of nine security bulletins.

0:20.0

Five of these bulletins were rated

0:22.3

critical and the rest important the first two bulletins as usual are the

0:28.6

cumulative updates for in Explorer and Microsoft Edge for Microsoft's

0:35.1

browsers almost the same number of vulnerabilities between the 2-9 for

0:40.3

Explorer 8 for Edge.

0:43.4

And yes, this is the patch that I would prioritize as first patch just because of the large

0:51.1

footprint and, of course, the exposure via these browsers.

0:56.3

MS-1697, the second patch patches three vulnerabilities in Windows graphics components.

1:04.3

Well, this vulnerability can be reached via instant messaging applications like Microsoft, Skype

1:10.4

for business and link. Of course, Link and the Skype

1:14.9

for business are more and less the same product now. MS-1698, that patches for

1:22.4

approach escalation flaws in Windows kernel mode drivers. Now we are getting soft to the less critical

1:28.6

patches. This one is only rated important and given that this is release of a monthly

1:34.2

occurrence and it's only approach escalation volubly, I would rate this as one of the

1:41.2

updates that you can let slide until you patched all of the remote code execution or the critical vulnerabilities.

1:49.0

And well, they continue here with MS1699.

1:53.0

That's our patch for Microsoft Office.

1:56.0

Also applies to Office for the Mac and VIRD so if you have some limited use work

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.