4.9 • 696 Ratings
🗓️ 13 March 2019
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, March 13th, 2019 edition of the Sands and the Storm Center's |
0:06.8 | Stormcast. My name is Johannes Ulrich. And I'm recording from Jacksonville, Florida. |
0:14.4 | Today, of course, Microsoft patched Tuesday, and with that we got 64 vulnerabilities being |
0:20.6 | patched by Microsoft. Two of the vulnerabilities |
0:24.2 | have already been exploited in the wild and four vulnerabilities have been known prior to the patch |
0:31.9 | being released. Both of the exploited vulnerabilities are in Win 32K. These are privilege escalation vulnerabilities and one in particular has been used together with a bug in Google Chrome in some targeted attacks. |
0:49.3 | And this was the vulnerability I mentioned last week where Chrome already released a patch for it and now we got |
0:56.8 | the corresponding Microsoft patch for the exploited vulnerabilities. The already publicly |
1:03.5 | known vulnerabilities include an active directory elevation of privilege vulnerabilities, also |
1:09.2 | vulnerability in the Nuget packet manager. |
1:12.6 | That actually could be sort of interesting. |
1:15.6 | Nuget is published together with Visual Studio usually and used to either retrieve or build these Nuget packages. |
1:25.6 | We also have a separate code execution vulnerability in Visual Studio itself. |
1:31.6 | And well, probably the last one I would consider the least important one here is Windows |
1:37.4 | denial of service vulnerability, but an attacker already has to have local access to the system. |
1:45.0 | Among the 17 critical bugs that have been fixed here is again another DHCP client |
1:52.5 | remote code execution vulnerability. |
1:55.3 | These of course are always interesting because all it takes is a user connecting to a DHCP server, which essentially |
2:02.9 | you have to do if you are connecting to a public network. |
2:07.7 | So that's kind of an interesting little new twist that we see a lot of vulnerabilities lately |
2:13.9 | against DHCP clients. |
2:18.0 | Now as far as Adobe goes, things are a little bit confusing here. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.