meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, June 14th 2017

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 June 2017

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information and cyber security. MSFT Patches Remaining #NSA Exploits (incl. Win XP); North Korea Builds DDoS Botnet

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, June 14th, 2017 edition of the Santernut Storm Center's

0:06.5

Stormcast. My name is Johannes Ulrich and I'm recording from Jackstville, Florida.

0:12.5

And today, second Tuesday of the month, so we do have updates from Microsoft and Adobe.

0:20.6

Total of 90 plus different vulnerabilities that Microsoft

0:25.3

patches this month out of those vulnerabilities, there are two that I think deserve special

0:32.9

attention. The first vulnerability CVE 2017-84-64, it is already being exploited in the wild, according to Microsoft, even though details about the vulnerabilities have not been released publicly yet.

0:49.3

The problem here are Windows shortcuts. Now in Windows these are small files. One of the things

0:57.0

that represented inside the file is a link to an icon that's being used to display the link.

1:05.0

Now if this file turns out to be malicious then code execution happens. I do remember reading something a

1:14.8

month or so ago and I think I mentioned it in the podcast about the image files being

1:21.0

confused for script files. Can't find it right now but there may actually have been some

1:26.7

details already been made public here.

1:29.8

Now, this isn't the first time that these link files cause problems.

1:35.4

Remember, the famous Stuxnet vulnerability, for example, to exploit this.

1:42.8

And attacker would, of course, first of all, give the victim a USB stick, for example, and just

1:49.9

by looking at the directory on the USB stick, this vulnerability would be triggered.

1:56.0

This can also be executed remotely if I'm sending the victim a link to an SMB file share, then this

2:04.4

vulnerability will be triggered as well if this file share contains a malicious link file.

2:11.9

The second vulnerability CVE 2017-8543, it's also already being exploited and it really has sort of all the

2:21.4

ingredients that made Eternal Blue and want to cry such a big deal again it's

2:29.1

SMB file shares that are at risk here in In this case, malicious search message will execute arbitrary

2:38.7

code. This apparently does not use any authentication. So an unauthenticated user can execute

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.