meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, August 9th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 August 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; Adobe Updates

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, August 9, 2020, 3 edition of the Sandtonet Storm Center's

0:06.5

Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:12.9

Well, it's Microsoft Patch Tuesday, so of course we do have to start here with Microsoft's

0:19.7

patches that were released today.

0:23.6

88 vulnerabilities being addressed, which includes the chromium vulnerabilities.

0:28.6

Six of these are critical and two are already being exploited.

0:32.6

Third one is not exploited, but has been made public already.

0:38.9

The most interesting part here is an advisory, actually not a patch,

0:43.5

that Microsoft released Advisory 230-003,

0:48.7

and this is in relation to CVE 2023-36884. This vulnerability was mentioned in last month's Microsoft

1:00.6

updates, but no patch was provided. Instead, Microsoft did offer a number of workarounds.

1:08.8

Microsoft now, first of all, gave us more details. This particular

1:12.7

vulnerability is related to the Windows search feature. And yes, as sort of expected back

1:20.3

in July, this is related to the mark of the web, where essentially an attacker could trick

1:27.0

a user to open a document and there would

1:29.4

be no warning that this executable was actually downloaded from the internet. We still don't really

1:39.2

have a patch for this instead, an advisory 23003 this advisory just breaks the exploit change chain as it states here

1:51.6

in the advisory not exactly sure what exactly it blocks here so without knowing that it's also

2:00.4

of course hard to assess if this could

2:02.4

possibly be bypassed. Again, do apply these patches. They're actively being exploited by what

2:10.0

Microsoft calls the Storm 3978 crew. Then inexploited vulnerabilities. We do have denial of service vulnerability in Dotnet Visual Studio.

2:21.3

Apparently, this affects the Kestral web server that is being included with dot net.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.