meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, October 17th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 17 October 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Oracle CPU; libssh vulnerability; Vending Machine Mobile App; TLS1.0/1.1

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, October 17th, 2018 edition of the Sandstone Storm Center's

0:06.5

Stormcast. My name is Johannes Ulrich, and I'm recording from McLean, Virginia. Oracle today

0:14.2

released its quarterly critical patch update, and with that we have patches for over 300 different vulnerabilities. Before you

0:25.1

get excited about the large number of vulnerabilities being addressed, remember this is across

0:30.7

the entire portfolio of different applications released by Oracle, not just the database. However, there is one Java VM-related

0:41.6

flaw in the database that has a CVSS score of 9.8, allowing unauthenticated remote code

0:49.4

execution. In addition, we still have a lot of log for J-related vulnerabilities that are being addressed here.

0:57.4

This has been sort of an ongoing theme over the last few critical patch updates.

1:02.2

The underlying flaw goes back to 2017.

1:06.4

There also have been a number of components like struts and such that Oracle applications rely on

1:13.1

that are being updated with this critical patch update.

1:17.6

So I would say nothing terribly exciting here from Oracle,

1:20.6

but the difficult part usually is to figure out which of these patches do apply to you.

1:30.3

And then we have a real embarrassing vulnerability in Lib SSH,

1:34.3

a library to implement SSH clients and servers.

1:38.3

With SSH typically the client sends an SSH2 message user-auth request in order to start authentication.

1:48.6

With LIPSH, if your server is using the library, all you need to do is send instead an SSH message user-author success message and, well, you are logged in.

2:00.9

So in short, all the client has to do is say,

2:03.1

hey, I'm authenticated and the server will believe you.

2:06.4

Now, lip SSH is actually not used much for SSH servers,

2:13.0

which somewhat limits the impact of this vulnerability.

2:16.7

This is not your default library that's being used

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.