lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <003101c243ed$eec010f0$0164a8c0@hammerofgod.com>
From: fenris at HammerofGod.com (Fenris The Wolf)
Subject: Anyone buy this?

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/
news/IARWSV.asp

Information about Reported Web Security Vulnerability

There has been a good deal of discussion and speculation recently about a
reported security vulnerability involving how Internet Explorer identifies
secure web sites. The Microsoft Security Response Center has investigated
the report and we'd like to provide information about the issue and our
plans for addressing it.

The report discusses a problem in the way Internet Explorer establishes
secure web sessions via the Secure Socket Layer (SSL) protocol. SSL provides
a number of security features, but of particular interest in this case is
its ability to verify that a web site is indeed the site it purports to be.
A flaw in the SSL implementation could enable an attacker to create a web
site that bypasses this protection, and masquerades as a different web
site - one that the user might trust and provide with personal information
such as credit card numbers.

The flaw could enable an attacker who has been issued a valid SSL digital
certificate to create a seemingly valid additional certificate that purports
to belong to a different web site. When a user visited the site, the
attacker could present the second certificate in an attempt to convince the
user that he or she was actually at the site it claimed.

While Microsoft has confirmed that the flaw does exist, it's important to
note that actually exploiting it would be difficult, for several reasons:

The attack scenario is narrow. If a user arrived at the attacker's web site
in the belief that it was actually a different, legitimate site, the flaw
could allow the attacker to bolster this belief. But it provides no way to
make the user actually arrive at the attacker's site, let alone in the
belief that it is a different site. Doing this would likely require that the
attacker be able to modify the Internet infrastructure that the user
transited, via a technique such as DNS cache poisoning. However, such
techniques are difficult, temporary, and generally require favorable network
topology.

The identity of the attacker could easily be determined. To exploit the
vulnerability, the attacker would require a valid SSL digital certificate,
issued by a trusted Certificate Authority. However, most commercial
Certificate Authorities require substantial proof of identity before issuing
such a certificate, thereby making it possible for law enforcement
authorities to determine who the attacker was. (Information on verifying
certificates can be found here).

The user would always have the ability to determine the truth. Anytime an
SSL session has been established, an icon shaped like a lock is present in
the lower right corner of the screen. By double-clicking on the icon, the
user can see information about the site's digital certificate, including the
identity of the issuer. This would clearly show that, in contrast to the
norm, this one hadn't been directly issued by a commercial Certificate
Authority.

Despite the many challenges associated with exploiting the flaw, there is
indeed a flaw here and Microsoft is developing a patch that will eliminate
it. When the patch is available, we will release a security bulletin
discussing the overall issue and how to apply the patch.

We regret any anxiety that customers may have experienced regarding this
issue. Clearly, it would have been best if a balanced assessment of the
issue and its risk had been available from the start. However, the report,
which neglected to discuss any of the challenges associated with actually
exploiting the vulnerability, was made public without any advance warning to
Microsoft. Responsible security researchers have the safety of users in mind
and work with vendors to ensure that the information published about
potential vulnerabilities is balanced and, above all, correct. Had this been
done in this case, all users' interests would have been better served.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ