4.9 • 696 Ratings
🗓️ 20 July 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the July 20th, 2016 edition of the Sands and Storm Center's Stormcast. My name is Johannes O'Rich, and the I'm recording from Minneapolis, Minnesota. |
0:12.5 | Today, a vulnerability was made public in a very popular ASN.1 development tool. |
0:21.6 | The tool ASN 1C is published by objective systems, its commercial software, that will take an |
0:28.6 | ASN.1 specification and turn it into C code. |
0:33.6 | The sad part is that the C code that's created by this tool is vulnerable to a heap buffer overflow. |
0:41.7 | Now, the big deal here is that ASN.1 is the encoding scheme that's essentially behind most important internet protocols. |
0:50.1 | Think of it like XML but all binary. |
0:53.8 | For example, SSL uses ASN.1, SNMP uses ASN.1, but also protocols like LTE, for example, do use ASN.1 encoding. |
1:05.6 | And in particular, the later one, for example, is one protocol featured by objective systems as a possible |
1:14.3 | target for its ASN1C compiler. |
1:18.2 | So there is a huge range of systems that may be vulnerable because code used in these systems |
1:24.5 | was created using this particular tool. |
1:28.3 | ASN.1 vulnerabilities are certainly nothing new. |
1:32.3 | A lot of SSL vulnerabilities, for example, are at their core |
1:37.3 | ASN.1 parsing vulnerabilities. |
1:40.3 | It is a rather complex format and as a result, not always to parse in particular if you have to do it efficiently, quickly at wire speed, like for example in these LTE systems and in particular if then again minimum hardware is involved. So you have to be really efficient in how you write your |
2:03.0 | code. Oftentimes, security like basic input validation, is being sacrificed here for efficiency, |
2:10.7 | and in many cases the standard isn't really specifically pointing out some of the inconsistencies, for example, |
2:19.4 | in length fields that have to be dealt with by the parser. |
2:24.3 | As an end user, not really much you can do about this. |
2:27.8 | Just wait for vendors to come up with patches. |
2:30.8 | If you are using the objective system, ASNN1C compiler to create your own software, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.