meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, September 12th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 September 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; Adobe Patches; URL Spooing; Exploit Search Engine

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, September 12, 2018 edition of the Sansanet Storm Center's

0:06.8

Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.1

Today, of course, Microsoft's patched Tuesday, and with that we got the usual patch from Adobe as well. Microsoft patched 61 different

0:26.1

vulnerabilities and in addition to this we got two advisories, one regarding the Adobe Flash

0:33.1

patch and a second one regarding Fragment Smack. Now smack was a war on a bill. It was announced

0:41.4

a month or so ago and essentially deals with fragmented packets that may cause a denial of service

0:49.7

condition. This also affected Unix. Now, what Microsoft suggests in this advisory is to change your registry to drop all out-of-order

1:01.2

fragments.

1:02.8

This seems a little bit extreme, but in modern networks you shouldn't really see any fragments.

1:09.7

You may see some fragments to your DNS servers.

1:13.6

That's fragmented UDP packets.

1:15.9

But aside from that, it may actually be safe to just drop all fragments at your firewall.

1:22.6

Yes, sounds extreme.

1:24.1

And I was a little bit skeptic about this at first as well.

1:29.9

But after some talking to our handlers and doing some experience myself, that actually seems to be a viable option.

1:36.4

Now, aside from this fragmentation issue, Microsoft also released a patch for the scheduler or

1:42.8

ALPC privilege escalation vulnerability that was already

1:47.2

exploited in the wild.

1:49.0

So that's definitely something you want to pay attention to.

1:52.4

And then two additional vulnerabilities that have been disclosed to the public.

1:58.7

But so far for these other two vulnerabilities, there haven't

2:02.5

been any public exploits form.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.