lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAFBVzu4fSQV2XLaUV7bn7C9u2aX5PpFrR62KtcuQcqS0g083=g@mail.gmail.com> Date: Sun, 25 Oct 2015 13:27:21 +0200 From: rotem kerner <nullfield@...il.com> To: bugtraq@...urityfocus.com Subject: Fwd: Timing attack vulnerability in most Zeus server-sides Hey list, The vulnerability I've discovered is basically a timing attack which enable a remote attacker to resolve the length in characters of the reports directory name by carefully measuring the response time of the server. While this vulnerability maybe considered as low risk, as well as found on fraudulent piece of software, I find its nature to be a very interesting and intriguing case-study which could be of a good use for future researchers. And so i share it with you good people - http://www.kerneronsec.com/2015/10/timing-attack-vulnerability-in-most.html -Rotem Kerner
Powered by blists - more mailing lists