Pages: [1]   Go Down
  Print  
Author Topic: OpenSSL fixes severe flaw that could enable man-in-the-middle attacks  (Read 314 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: July 11, 2015, 09:00:11 pm »

OpenSSL fixes severe flaw that could enable man-in-the-middle attacks

<article>
   <section class="page">
<p>A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.</p><p>The OpenSSL 1.0.1p and 1.0.2d versions released Thursday fix an issue that could be used to bypass certain checks and trick OpenSSL to treat any valid certificates as belonging to certificate authorities. Attackers could exploit this to generate rogue certificates for any website that would be accepted by OpenSSL.</p><p>“This vulnerability is really only useful to an active attacker, who is already capable of performing a man-in-the-middle (MITM) attack, either locally or upstream from the victim,” said Tod Beardsley, security engineering manager at Rapid7, via email. “This limits the feasibility of attacks to actors who are already in a privileged position on one of the hops between the client and the server, or is on the same LAN and can impersonate DNS or gateways.”</p><p class="jumpTag"><a href="/article/2946272/openssl-fixes-serious-flaw-that-could-enable-maninthemiddle-attacks.html#jump">To read this article in full or to leave a comment, please click here[/url]</p></section></article>

Source: OpenSSL fixes severe flaw that could enable man-in-the-middle attacks
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: