4.9 • 696 Ratings
🗓️ 11 August 2021
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 11, 2021 edition of the Sandsonnet Storm Center's |
0:07.0 | Stormcast. My name is Johannes Ulrich. And I'm recording from Stockholm, Germany. Of course, it's |
0:14.1 | reboot Wednesday and with that, Microsoft's Patch Tuesday is at the top of the news. So let's quickly summarize what we got here. |
0:24.4 | We got a total of 51 vulnerabilities being addressed here. Seven of them are critical. Two |
0:31.4 | were previously disclosed and one is already being exploited according to Microsoft. |
0:38.8 | Well, first, what didn't get patched? |
0:40.7 | Microsoft Exchange did not receive an other patch this month. |
0:45.6 | Yesterday, I suggested it may happen, well, hasn't happened yet. |
0:50.2 | Among the previously disclosed already being exploited vulnerabilities, we first have the Windows |
0:55.4 | Update Medic Service. This is a service that maintains essentially the update process, |
1:01.6 | making sure it's working correctly. Secondly, we do have yes, yet another patch for the print |
1:10.3 | nightmare set of vulnerabilities. Now, the one issue that |
1:14.7 | sort of remained unpatched when it comes to print nightmare was Point to Print. Point |
1:20.7 | to Print allowed regular users to install printer drivers on a print server. Well, that's no longer possible after you're |
1:29.2 | installing this patch. So this patch may break some functionality. Secondly, we do have a fix |
1:38.3 | for the vulnerability that affects the petty potum exploit that we talked about a couple weeks ago. |
1:45.3 | I think that was released. |
1:47.4 | In particular, it does fix the issue where an unauthenticated user could trick your server |
1:53.8 | into sending an authentication request, which then can lead to these relay attacks. |
2:01.7 | And then also Noteworthy is the highest rated vulnerability this month. |
2:07.5 | It's rated with a CVSS score of 9.9 and can be triggered by a simple IPV6 echo request |
2:16.9 | from a Hyper V guest to a HyperV host and yes leads |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.