meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday Mar 12th: Microsoft Patch Tuesday; Apple Patch; Espressif ESP32 Statement

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 March 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Wednesday Mar 12th: Microsoft Patch Tuesday; Apple Patch; Espressif ESP32 Statement

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, March 12, 2020, 5 edition of the Sands and its Storms on as Stormcast.

0:08.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.0

Well, today, we do have a Patch Tuesday, of course, but it's an interesting one,

0:18.7

and I don't just want to call it the Microsoft Patch Tuesday.

0:21.8

If you got, and I'll leave this a little bit sort of as a cliffhanger for later,

0:26.0

another company that released an interesting update today.

0:31.7

Microsoft did release an update for actually less vulnerable,

0:36.5

a normal, a little bit more than warnabilities were addressed in Microsoft's update.

0:42.4

But what made it interesting again was six of these vulnerabilities,

0:46.7

which may be a record, I haven't really looked back,

0:50.9

are already being exploited.

0:56.8

So let's talk a little bit about the already exploited vulnerabilities. Well, when we talk about these exploit vulnerabilities, they're heavy

1:02.5

on file system issues. Now, none of the export vulnerabilities are critical. They're all

1:08.2

important. The file system issues, there are three of them related to NTFS and one of them related to

1:16.7

fat, one of the NTFS vulnerabilities and one of the fat vulnerabilities will lead to code execution.

1:26.0

Microsoft labels them as remote code execution. So how would an exploit

1:31.1

work here? In order to trigger the exploit corrupt file system has to be mounted to the victim's

1:40.5

system. There are really two ways to do it. First of all, just trick the victim into

1:46.0

opening a VHD file. VHD files would be these virtual hard drive files that would then take

1:53.4

advantage of these vulnerability. But an attacker could also do it remotely if they have some

1:59.3

kind of access to the system, some remote shell, something like this, and then they could upload that VHD file and mount it.

2:09.2

So that's why they're classified as a remote code execution vulnerability.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.