Handler on Duty: Didier Stevens
Threat Level: green
Podcast Detail
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9762.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Malicious Process Environment Block Manipulation
The process environment block contains metadata about particular processes, but can be manipulated.
https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/
YARA-X 1.11.0 Release: Hash Function Warnings
The latest version of YARA will warn users if a hash rule attempts to match an invalid hash.
https://isc.sans.edu/diary/YARA-X%201.11.0%20Release%3A%20Hash%20Function%20Warnings/32616
VideoLAN Security Bulletin VLC 3.0.22 CVE-2025-51602
VideoLAN fixed several vulnerabilities in its VLC software.
https://www.videolan.org/security/sb-vlc3022.html
Apache NimBLE Bluetooth vulnerabilities
NimBLE is a Bluetooth stack popular in IoT devices. An update fixes some eavesdropping and pairing vulnerabilities.
https://mynewt.apache.org/cve/
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Jul 31st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Monday, January 12, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu undergraduate certificate program in Applied Cybersecurity. Got some diaries to talk about from this weekend. First, Xavier, again, about malware analysis tricks here in this particular case about malicious process environment blocks. The process environment block is a data structure that's maintained with Windows processes holding things like, for example, the command line being used to execute the process and other metadata about the particular process. Now, of course, the process was started by the user. This structure is read-writable by the user, which means that any process can manipulate that structure as well and leave bad information in this structure. So Xavier is going a little bit over how to accomplish this, some proof of concept code here, how to rewrite the particular structure for a process that user can get a handle on. And well, then also how to hide this particular structure, not just to manipulate it. So interesting post for anybody doing malware analysis. If you wonder how do you actually get the real structure? Well, the trick here, as Xavier points out, is to actually log the structure on process creation before the process gets a chance to manipulate it. And Dirac wrote a quick diary about the latest version of Yara 1.11.0 and how it's adding hash function warnings. What this means is that if you're matching a hash function in a Yara rule, but the hash that you're using couldn't possibly match this particular hash function because it's too long, for example, then you'll get a warning that while this particular match will never be fulfilled. And well, it's supposed to catch things like typos in hashes that you may have like, you know, if you add an extra space or such, which of course often happens when you simple copy paste at these hashes. And the video LAN project did release an update for VLC, the video player that is sort of the showcase product off of video LAN. And yes, its code is used quite a bit and quite popular if you're trying to do things like video conversions or simple video streaming and the like. So there are about 16 issues that are being fixed in this update. There's only one CVE assigned to the update. They're a little bit vague on the exact impact of the vulnerabilities, but they're essentially memory corruption vulnerabilities. So what they're saying here is that yes, we know they'll crash the system, whether or not they can be used to do something like remote code execution or data leakage. Well, that depends a little bit on how this is actually compiled and you know what other kind of conditions exist on a particular system. I would definitely recommend updating VLC. It has been exploited in the past. So given its popularity, it's something that you want to maintain on a Linux system that should be pretty straightforward with just some simple app update or whatever your distribution uses. On other operating systems, it's often installed as of a third party product. So make sure that it's getting updated. And the Apache project did release a security update for its nimble Bluetooth low energy stack. This Bluetooth low energy stack is typically found in IOT devices. So it's one of those things where you have to usually wait for vendor updates to fix these issues for you. There are two particular interesting vulnerabilities. One allows the attacker to actually take over an existing pairing connection. So you have your phone or whatever connected to a particular Bluetooth low energy device, and then the attacker can inject the packet that will basically take over that connection. There's also sort of a pause encryption feature in Bluetooth low energy that's apparently badly implemented here and can lead to data being leaked in addition to a couple other lower priority vulnerabilities. And Redhead in an advisory is warning of a newly patched vulnerability in the Undertow HTTP server core. Undertow is basically a web server and it's often used with Java applications. Redhead is pointing out here Wildfly and JBoss EAP in their advisory. But other Java applications may be affected as well. And the problem here is that the Undertow is not validating the host header correctly in HTTP requests it receives. It just passes then on to the application. And if the application of course counts on the server doing the input validation here, well, then you end up with a problem. From an application developer point of view, it probably wouldn't hurt to validate data like that that you are receiving from the web server. But either way, probably something that you do want to update in particular, if you're running one of these explicitly named applications in the advisory. Well, and that's it for today. So thanks for listening. Thanks for subscribing. Thanks for recommending this podcast. Remember, we still have stuff that contest going on. If you find a mistake in the podcast, just send me an email or contact me via social media, and you're qualifying for an Internet Storm Center sticker. So that's it for today and talk to you again tomorrow. Bye.





