查看: 3627|回复: 6
收起左侧

[转帖] Security experts are FREAKing out: new OpenSSL vulnerability

[复制链接]
诸葛亮
发表于 2015-3-7 11:16:39 | 显示全部楼层 |阅读模式
                      Security experts are FREAKing out: new OpenSSL vulnerability
After Heartbleed, a new security vulnerability in SSL is making headlines and producing again headaches for security experts.

As any good and mind blowing (for most people) vulnerability, it has a nice name – FREAK, a CVE number – CVE-2015-0204  and a dedicated website https://freakattack.com/ .

FREAK – Factoring RSA Export Keys – affects around 36% of all sites trusted by browsers and around 10% of the Alexa top one million domains, according to computer scientists at the University of Michigan.

This time, the vulnerability can allow hackers to perform a Man In The Middle(MITM)  attack on traffic routed between a device that uses the affected version of OpenSSL and many websites, by downgrading the encryption to an easy to crack 512 bits (64KB).

A connection is vulnerable if the server accepts RSA_EXPORT cipher suites and the client either offers an RSA_EXPORT suite or is using a version of OpenSSL that is vulnerable to CVE-2015-0204.

To be affected, devices must use the vulnerable version of OpenSSL. The problem is that OpenSSL is embedded sometimes in the firmware of the device like those running Apple’s iOS, Google’s Android. This makes the patching anything else than trivial. IfApple and Google will hurry up to patch their devices, not the same is going to happen with embedded devices that have the affected OpenSSL library in a firmware burned in a chip.

How is the attack happening?
If an attacker can monitor the traffic  flowing between vulnerable devices (that is, running the vulnerable OpenSSL) and websites (that use the same vulnerable OpenSSL) they could inject code which forces both sides to use 512-bit encryption, which they can then crack in a matter of hours using the power of cloud computing.

It would then be technically pretty straightforward to launch a MITM by pretending to be the official website.

OpenSSL released a patch to the problem in January 2015, while Apple plans to do so next week and Google has released one to its Android partners.

As you can see, it is not trival to perform the MITM attack: special skills, a special environment and special tools are required to make use of this vulnerability. So, this makes FREAK a more theoretical vulnerability.But, this doesn’t mean that it is less dangerous.

However, as many times in the past, good intentions are badly implemented and the page freakattack.com is generously helping attackers to find which servers are affected. On that page the researchers from University of Michigan have published the top 10K domains listed by Alexa.com website.

Who is affected?
Websites that support RSA export cipher suites (e.g., TLS_RSA_EXPORT_WITH_DES40_CBC_SHA) are at risk to having HTTPS connections intercepted.

You can check whether a website supports RSA_EXPORT suites using the SSL FREAK Check available at this page.


转自http://blog.avira.com/openssl-vulnerability/

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x

评分

参与人数 2经验 +5 人气 +3 收起 理由
明月丶舞白衣 + 5 版区有你更精彩: )
fireold + 3 版区有你更精彩: )

查看全部评分

zhaoye818
发表于 2015-3-7 12:29:17 | 显示全部楼层
看不懂???
八连杀
发表于 2015-3-7 13:43:29 | 显示全部楼层
表示6级都过了的看不懂
aaa839
发表于 2015-3-8 19:49:16 | 显示全部楼层
本帖最后由 aaa839 于 2015-3-8 19:50 编辑

主要介紹新的OpenSSL漏洞
較以前HeartBleed心血漏洞還要嚴重,
這次FREAK(怪物漏洞)加密影響嚴重
這次影響隨了Android和iOS外原瀏覽器外,
所有現存Windows 由XP~8,1均受影響冇一幸免
每顿需吃三大碗
发表于 2015-3-8 20:36:16 | 显示全部楼层
八连杀 发表于 2015-3-7 13:43
表示6级都过了的看不懂

不是吧?看来你是应试英语的高手捏!
八连杀
发表于 2015-3-8 21:01:10 | 显示全部楼层
每顿需吃三大碗 发表于 2015-3-8 20:36
不是吧?看来你是应试英语的高手捏!

刚过的,压着线~~~~~
每顿需吃三大碗
发表于 2015-3-8 21:03:18 | 显示全部楼层
八连杀 发表于 2015-3-8 21:01
刚过的,压着线~~~~~

四级的水平过六级的考试,是一种能力哦
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-24 08:25 , Processed in 0.113812 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表