4.9 • 696 Ratings
🗓️ 11 July 2017
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, July 12th, 2017 edition of the Sands and at Storm Center's Stormcast. My name is Johannes Ulrich and I'm recording from Stockholm, Germany. |
0:11.8 | Well, with a patch Tuesday, let's first cover that part quickly. Microsoft released fixes for a total of 57 vulnerabilities, 19 of which Microsoft |
0:25.2 | rated as critical and 24 allowed for remote code execution. |
0:31.7 | Now out of these 57 vulnerabilities, four are actually already publicly known. |
0:38.8 | The publicly known ones are actually not the ones that I would consider the most critical |
0:43.4 | in this release. |
0:44.3 | The first one and the only publicly known vulnerability that Microsoft considers critical is |
0:51.2 | a remote code execution vulnerability in HoloLens that's Microsoft's |
0:56.7 | VR gear not very commonly used so I don't really see it as that super important |
1:03.5 | the next to public known vulnerabilities are spoofing vulnerabilities in Internet |
1:10.4 | Explorer and Microsoft Edge. Now, these |
1:15.1 | vulnerabilities can be used to impersonate another website. So again, nothing that's |
1:21.2 | super critical. Microsoft only rates them as important and moderate. The fourth one is a denial |
1:26.9 | of service vulnerability in Windows Explorer. |
1:29.8 | While annoying, I don't think it takes much of an exploit to crash any modern browser. |
1:36.3 | Now, the one that really confused me the most was CV 2017-85-89. This is a remote code execution vulnerability in Windows search. Now, we had a patch |
1:49.7 | for Windows search last month, and that was a vulnerability that was actually being already |
1:57.6 | exploited. So, was a little bit confused to see this again here? |
2:02.1 | Looks, according to the CVE, like a different vulnerability. |
2:06.3 | And Microsoft states that this vulnerability has not yet been exploited. |
2:11.4 | But this would probably be the one that I would fix first, |
2:15.7 | because it is somewhat remote exploitable if you do allow outbound |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.