meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, September 13th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 September 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; OpenSSL 1.1.1 EoL; Adobe Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, September 13th, 2023 edition of the Sansonet Storm Center's Stormcast.

0:07.7

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.3

Big first item today, of course, is patch Tuesday, Microsoft released patches for 66 vulnerabilities. Five of them are critical and two are

0:24.6

already being exploited. As usual for our summary, it does include the chromium vulnerabilities

0:31.2

and batches that are included in Microsoft Edge. And typically, we're already been released a few days or a week or so ahead of

0:40.5

Patch Tuesday.

0:42.9

The two already exploited vulnerabilities are of course the ones that are of the headliners here.

0:49.2

One is a Microsoft Streaming Service Proxy vulnerability.

0:53.3

It's a privilege escalation vulnerability that

0:56.8

could help an attacker to gain system privileges after they initially compromised the system.

1:04.5

The second one is a bit more interesting, I think. It's labeled as only in an information disclosure

1:10.8

of vulnerability. That's true, but it does

1:14.7

disclose NTLM hashes. So it's not one of those information disclosure vulnerability that does

1:21.0

provide access to some internal kernel state or so to help with buffer overflows. But this one actually

1:27.2

releases NTLM hashes.

1:29.0

Given the weak hashing of those hashes, it does release your Windows password.

1:35.5

It's a very typical vulnerability in that essentially the attacker tricks the user into establishing

1:42.2

an outbound connection, which then requires off the occasional receiving

1:47.2

site, and automatically the NTLM hashes are being sent. We had this vulnerability in a number

1:53.7

of different contexts. This latest one happens in Microsoft VIRT as the user previews a document in the preview pane.

2:04.6

As we had very similar vulnerabilities before attacks are readily available, it typically is as

2:10.1

easy as including an SMB link in a document that is then automatically being accessed.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.