meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, August 29th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 August 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Windows Priv. Escalation 0 Day;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, August 29th, 2018 edition of the Sansonet Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich, and I'm recording from Sundvolden, Norway.

0:12.0

And we got a new seraday vulnerability in 64-bit Windows 10 and Windows Server Server 2016, so the most recent all-patched versions that can lead to

0:26.1

privilege escalation. The vulnerability lies in the Windows task scheduler and it is associated

0:33.7

with the handling of advanced local procedure calls our ALPC.

0:39.3

Now, the proof of concept that has been released that's fully functional works on Windows 10 in 2016 with 64 bits.

0:47.3

It has a few hard-coded parameters for these specific operating systems,

0:53.3

but it is very possible that the same vulnerability

0:57.0

is exploitable in a wider range of Windows operating system versions.

1:02.9

The way the exploit works is that an attacker who already has to have normal user access

1:07.6

to the system has to create a heartlink from Windows tasks, which is the

1:14.0

directory that's being used by the scheduler to an arbitrary file that the attacker has

1:21.1

read access to, and then essentially the task scheduler will rewrite the Daclesi, discretionary

1:27.2

access control list for this file for the attacker.

1:31.6

Kevin Baman did a real great job in his blog to sort of go over the details of this exploit.

1:37.9

He even set up a GitHub repository with the actual source code.

1:42.0

The original author only set up a GitHub repository with a rar file.

1:48.3

So probably you want to check out that annotated version of Kevin's in order to learn more about

1:55.0

how this particular exploit works. In the show notes, I'll link to the cert CC announcement about this flaw. It has links to

2:04.1

Kevin's blog as well as to the GitHub repository with the original exploit code. And then there

2:12.1

are certain applications that probably were never really intended to be connected to the open internet.

2:20.0

One such application is octoprint.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.