4.9 • 696 Ratings
🗓️ 8 November 2016
⏱️ 8 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, November 9th, 2016 edition of the Sands and its Storm Center's |
0:05.5 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:11.7 | Microsoft's Patch Tuesday, of course, kept me busy today trying to go through all of the different |
0:16.9 | bulletins, 14 total bulletins if you count the Adobe bulletin, which of course |
0:22.5 | is again included in Microsoft's set here. |
0:26.6 | Five of the Microsoft bulletins are rated critical and then the Adobe Flash bulletin, of |
0:32.6 | course, is also rated critical. |
0:35.3 | There are a total of four different vulnerabilities that are being |
0:38.4 | addressed in these bulletins that were either already released or have already |
0:44.2 | been exploited in the wild. The In An Explorer bulletin included one of them |
0:50.1 | and information disclosure vulnerability 2016 7199 that already has been publicly |
0:57.6 | disclosed it's sort of a cross-origin vulnerability where one site could get data that is open |
1:06.4 | in another browser window the second one is is CV 2016-7209. That only affects Microsoft Edge, |
1:16.6 | and it's also a publicly disclosed vulnerability that allows you to spoof the URL bar. |
1:23.5 | An MS-16-132, this is the one bulletin that I labeled as a patch now for clients, |
1:29.9 | because it does address a vulnerability that is actually already being exploited in the wild. |
1:35.8 | It's yet another open type font issue. |
1:39.0 | We have seen many of them in the past, many of them being successfully exploited in the past. |
1:43.3 | This is CVE 2016 |
1:45.7 | 7256. MS-16-135, that's a kernel mode driver patch. It does include a privilege escalation |
1:57.8 | vulnerability, CVE-2016-7255, that has already been public |
2:04.1 | disclosed and exploited. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.