[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFfYYx+TMLkuLXbpq4JbfCCB_UQkg3JV2i79p6kmVjESQ1rxtA@mail.gmail.com>
Date: Fri, 2 May 2014 15:00:48 +0200
From: Martin Boßlet <martin.bosslet@...il.com>
To: fulldisclosure@...lists.org
Subject: Re: [FD] Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
Hi,
after analyzing the PoC script we (maintainers of the Ruby OpenSSL
extension) consider CVE-2014-2734 to be invalid. Others have independently
arrived at the same conclusion: [1][2] You may find a summary of our
analysis at [3].
Regards,
Martin Boßlet
[1] https://github.com/adrienthebo/cve-2014-2734/
[2] https://news.ycombinator.com/item?id=7601973
[3] https://gist.github.com/emboss/91696b56cd227c8a0c13
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists