Freeware Files | Download Free Software

Tuesday, 17 June 2014 13:43

Popular websites still vulnerable to OpenSSL hijacking attack

Rate this item
(1 Vote)

Some of the Internet’s most visited websites that encrypt data with the SSL protocol are still susceptible to a recently announced vulnerability that could allow attackers to intercept and decrypt connections.

On June 5, developers of the widely used OpenSSL crypto library released emergency security patches to address several vulnerabilities, including one tracked as CVE-2014-0224 that could allow attackers to spy on encrypted connections if certain conditions are met.

Until a few years ago, full-session encryption via HTTPS (HTTP with SSL) was mainly used by financial, e-commerce, and other sites dealing with sensitive information. However, the increasing use of mobile devices that often connect over insecure wireless networks, coupled with the past year’s revelations of upstream bulk data collection by spy agencies, led to a large number of sites adding support for it.

OpenSSL is the most popular cryptographic library for implementing SSL/TLS support on Web servers.

In order to exploit CVE-2014-0224 to decrypt and modify SSL traffic, attackers would need to have a “man-in-the-middle” position between a client and a server that both use OpenSSL. Furthermore, the server would need to run an OpenSSL version from the 1.0.1 branch.

According to scans performed Thursday by Ivan Ristic, who runs the SSL Labs at security vendor Qualys, about 14 percent of sites monitored by the SSL Pulse project run a version of OpenSSL that allows exploiting the CVE-2014-0224 flaw.

The SSL Pulse project monitors the strength of SSL implementations on HTTPS-enabled sites from the list of top 1 million most visited sites as published by Internet statistics firm Alexa—154,406 sites as of June 2nd.

An additional 36 percent of websites from the SSL Pule data set run OpenSSL versions from the 0.9.x or 1.0.0 branches that also contain the flaw, but against which the exploit known so far doesn’t work.

Those servers should be upgraded too because it’s possible that there are other yet-to-be-discovered ways to exploit the problem, Ristic said in a blog post Friday.

The patching rate for CVE-2014-0224 does not appear to be as high as the one for Heartbleed, a more serious vulnerability revealed at the beginning of April that also affected OpenSSL clients and servers.

“The good news is that most browsers don’t rely on OpenSSL, which means that most browser users won’t be affected,” Ristic said. “However, Android browsers do use OpenSSL and are vulnerable to this attack. Additionally, many command-line and similar programmatic tools use OpenSSL. A particularly interesting target will be various VPN products, provided they are based on OpenSSL (like, for example, OpenVPN).”

Website administrators who want to check if their servers are vulnerable to CVE-2014-0224 can use a free online testing tool developed by Qualys SSL Labs.

Source

Subscribe via RSS or Email:

 
Read 1230 times Last modified on Wednesday, 18 June 2014 00:02
  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

Save your Word configurations

01-06-2014 Hits:1063 How To Panagiotis K. - avatar Panagiotis K.

Save your Word configurations

When some users set up Microsoft Word the way they like. Then, suddenly, everything went back to the default settings. Can they get their old settings back? Or at least...

What are DoS and DDoS Attacks

07-01-2013 Hits:1948 Hacking Vasia L. - avatar Vasia L.

What are DoS and DDoS Attacks

Some common ways to attack are the Denial of Service and the Distributed Denial of Service, which are used by hackers in order to collapse computer networks and websites...

Microsoft Has to Rename the Service of SkyDrive

27-09-2013 Hits:1217 Microsoft Panagiotis K. - avatar Panagiotis K.

Microsoft Has to Rename the Service of SkyDrive

The British Supreme Court is forcing Microsoft to rename the service of SkyDrive! This is happening because it considered that violated the commercial rights of the company British Sky Broadcasting Group.

Macintosh How to Troubleshooting - Reseting Your PRAM

10-12-2011 Hits:4075 Apple Panagiotis K. - avatar Panagiotis K.

Macintosh How to Troubleshooting - Reseting Your PRAM

Macintosh troubleshooting is something that many people who want a new Mac are thinking about. Unless you are a Mac fanatic the idea of getting repairs done and even getting some...

Updated: iPad Air 2: What we want to see

22-05-2014 Hits:2716 Apple Vasia L. - avatar Vasia L.

Updated: iPad Air 2: What we want to see

The iPad Air 2, the obvious follow up to the iPad Air, is set to be an iterative update to the current best tablet on the market right now. The fifth...