HACKINTOSH.ORG | Macintosh discussion forums

Macintosh News => Apple News => Topic started by: HCK on July 11, 2015, 09:00:11 pm



Title: OpenSSL fixes severe flaw that could enable man-in-the-middle attacks
Post by: HCK on July 11, 2015, 09:00:11 pm
OpenSSL fixes severe flaw that could enable man-in-the-middle attacks

<article>
   <section class="page">
<p>A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.</p><p>The OpenSSL 1.0.1p and 1.0.2d versions released Thursday fix an issue that could be used to bypass certain checks and trick OpenSSL to treat any valid certificates as belonging to certificate authorities. Attackers could exploit this to generate rogue certificates for any website that would be accepted by OpenSSL.</p><p>“This vulnerability is really only useful to an active attacker, who is already capable of performing a man-in-the-middle (MITM) attack, either locally or upstream from the victim,” said Tod Beardsley, security engineering manager at Rapid7, via email. “This limits the feasibility of attacks to actors who are already in a privileged position on one of the hops between the client and the server, or is on the same LAN and can impersonate DNS or gateways.”</p><p class="jumpTag"><a href="/article/2946272/openssl-fixes-serious-flaw-that-could-enable-maninthemiddle-attacks.html#jump">To read this article in full or to leave a comment, please click here[/url]</p></section></article>

Source: OpenSSL fixes severe flaw that could enable man-in-the-middle attacks (http://www.macworld.com/article/2946272/openssl-fixes-serious-flaw-that-could-enable-maninthemiddle-attacks.html#tk.rss_all)