meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, August 15th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 August 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. #MSFT Patch Tuesday; Oracle Patch; Intel Patch

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, August 15th, 2018 edition of the Sansanet Storms, Stormcast.

0:08.4

My name is Johannes Ulrich and I am recording from Jacksonville, Florida.

0:12.7

Of course, today we'll start with the Microsoft Patch Tuesday.

0:19.8

We got a total of 63 vulnerabilities addressed, so somewhat

0:25.3

average I believe.

0:27.4

What's not average is that actually two exploited vulnerabilities are being addressed in this

0:33.9

update.

0:34.9

The first one is yet another patch for the Settings.m.s file issue.

0:41.5

This was discovered a couple months ago and essentially what it refers to are these shortcuts

0:47.4

files for settings that can include code and can execute code. These are little XML files and Microsoft has already

0:57.5

addressed this in past patches. Pretty much as soon as this issue became public, we saw

1:04.6

malware that used office documents that embedded these files and the user initially didn't get any kind of warning or

1:13.4

so that the code was executed, not like macros or so, but the user first has to enable

1:19.7

macros for specific document.

1:22.3

Well, a Microsoft sort of addressed that in prior issues with this latest update, they sort of fix the last

1:30.2

hole here in that they now properly validate any paths inside the XML document. And that should

1:38.1

sort of put an end to these remote code execution exploits. The second public and already exploited vulnerability is a vulnerability in the Internet Explorer

1:49.2

scripting engine.

1:50.2

Now over the years of course there have been many, many flaws in the scripting engine, so this

1:56.1

is one more of course likely to get exploited via drive by exploits in order to infect and run code within the browser.

2:05.3

This one will only give access as the user running the browser.

2:11.5

Other than that, as usual, lots of browser and office vulnerabilities.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.