4.9 • 696 Ratings
🗓️ 19 July 2017
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, July 19th, 2017 edition of the Santernet Storm Center's Stormcast. My name is Johannes Ulrich and if I'm recording from Jacksonville, Florida. Today we got a number of patches to start out with, first of all, Oracle released its quarterly critical patch update or short CPU. |
0:24.0 | The one vulnerability is being addressed here among all the different vulnerabilities |
0:28.6 | that the Oracle did fix is a vulnerability in the Oracle Weblogic server. |
0:36.5 | It's the only vulnerability that reaches a base score of 10 |
0:40.1 | in the CVSS scale and it can lead to a full compromise of the web server without authentication. |
0:49.5 | There is not a lot of details here, but Oracle states that this is an easily exploitable |
0:57.0 | vulnerability that allows unauthenticated attackers with network access via HTTP to compromise |
1:04.0 | Oracle Weblogic server and that this vulnerability may also significantly impact additional products. |
1:13.4 | So pay attention to this patch. |
1:17.3 | Now probably the most popular piece of Oracle software is Java, |
1:21.8 | and yes, there is another update for Java, |
1:25.4 | so make sure you apply that. |
1:28.3 | And if you're running any of Cisco's WebEx browser extensions in Google Chrome or Mozilla |
1:35.8 | Firefox, again, time to update and unauthenticated remote attacker will be able to execute |
1:43.1 | arbitrary code due to a vulnerability in this plugin. |
1:48.0 | This vulnerability was found again by Google's project Zero, quite a bit of details in their |
1:55.5 | announcement about this vulnerability, so an exploit shouldn't really be all that difficult to come by. |
2:03.2 | Now, then we also have an update for Node.js. Now, this only fixes a denial of service |
2:10.1 | vulnerability, but definitely something you do want to address. It's not that difficult to exploit. |
2:16.5 | It's a problem in that they're using a constant hash table seat, which means it's pretty |
2:21.8 | easy to flood hash tables with data that an attacker may send you, which then leads to a progressively |
2:30.3 | slower application until it eventually is no longer usable. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.