meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, August 3rd 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 August 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Android Udpates; signout.llive.com remote code exec; Edge/IE Leak Credentials since 1997

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, August 3, 2016 edition of the Sands and the Storm Center's Stormcast.

0:07.8

My name is Johannes Ulrich and today I'm recording from Boston Message.

0:11.8

We didn't get a lot of feedback with problems with the Windows 10 anniversary edition.

0:18.5

Not sure how many people installed it already one reader

0:23.4

reported that MacAfee has a list of incompatible applications that it

0:29.6

publishes users of these applications should wait with installing this

0:36.1

latest Windows Service Pack.

0:38.3

So as you install it, if you run into any problems,

0:42.3

please let us know.

0:45.3

I expect that other security software may have problems

0:49.3

as well as it may not have added all these new binaries

0:53.3

to its particular white list.

0:56.6

And Google published an update for Android. That's its usual monthly update. As last month,

1:03.5

they split it into two packages. The first one applies to Android 444 itself. So to the core operating system, it does apply to all devices.

1:15.6

The second bundle they published does apply to various kernel drivers.

1:21.6

Now, which ones of these you need to patch depends on the hardware you're running whether or not they're actually using

1:28.8

these specific drivers.

1:31.0

Among the many, many patches or many, many vulnerabilities that are being patched here, the

1:35.7

once again that stick out are three remote code execution vulnerabilities in media

1:42.3

server.

1:43.3

So that is definitely exploitable. A simple MMS message

1:48.0

usually will allow you to deliver malicious code to the device that will then execute it.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.