meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, May 18th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 May 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Exploit for IKEv1/IKEv2 Vulnerability

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, May 18th, 2016 edition of the Sandstone Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:13.0

We got a couple of high-profile vulnerabilities to start out with.

0:17.0

The first one is actually an older vulnerability while older in the sense that it was patched

0:22.1

by Cisco back in February.

0:25.2

And the vulnerability is a buffer overflow vulnerability in the Ike version 1 and version 2 code

0:31.5

in Cisco VPN concentrators.

0:34.5

Now the problem here is that we now have an exploit was published for this vulnerability

0:41.3

that will give an attacker a remote shell on your Cisco gear.

0:47.3

So certainly if you haven't patched yet, it's overdue and you should make sure that you

0:53.3

either patch or if you can disable the IPSEC functionality

0:58.0

if you don't happen to actually use it.

1:02.0

And the second vulnerability that we have is ironically also in security software.

1:07.0

In this case it's semantic antivirus and it is susceptible to a pretty straightforward,

1:14.3

actually, memory access violation due to malformed PE headers. Now, this has been patched by

1:23.0

Symantec, so make sure you download the patch. There is a proof of concept available.

1:29.3

It essentially just tests it and cause a kernel panic.

1:32.3

But a working exploit would lead to privilege escalation in this particular case.

1:38.3

An attacker that is already on your system and detects that you're running semantic antivirus could use

1:45.4

semantic antivirus to escalate privileges.

1:49.3

And Kasperski is continuing.

1:51.3

It's a wag the mole game with the Crypt-Triplex gang.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.