FreeBSD Security Advisory - FreeBSD-SA-16:12.openssl

Discussion in 'News Aggregator' started by Packet Storm, 15 Mar 2016.

  1. Packet Storm

    Packet Storm Guest

    FreeBSD Security Advisory - A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability is known as DROWN. Various other issues were also addressed.

    Continue reading...
     

Share This Page

Loading...