Freeware Files | Download Free Software

Tuesday, 17 June 2014 13:43

Popular websites still vulnerable to OpenSSL hijacking attack

Rate this item
(1 Vote)

Some of the Internet’s most visited websites that encrypt data with the SSL protocol are still susceptible to a recently announced vulnerability that could allow attackers to intercept and decrypt connections.

On June 5, developers of the widely used OpenSSL crypto library released emergency security patches to address several vulnerabilities, including one tracked as CVE-2014-0224 that could allow attackers to spy on encrypted connections if certain conditions are met.

Until a few years ago, full-session encryption via HTTPS (HTTP with SSL) was mainly used by financial, e-commerce, and other sites dealing with sensitive information. However, the increasing use of mobile devices that often connect over insecure wireless networks, coupled with the past year’s revelations of upstream bulk data collection by spy agencies, led to a large number of sites adding support for it.

OpenSSL is the most popular cryptographic library for implementing SSL/TLS support on Web servers.

In order to exploit CVE-2014-0224 to decrypt and modify SSL traffic, attackers would need to have a “man-in-the-middle” position between a client and a server that both use OpenSSL. Furthermore, the server would need to run an OpenSSL version from the 1.0.1 branch.

According to scans performed Thursday by Ivan Ristic, who runs the SSL Labs at security vendor Qualys, about 14 percent of sites monitored by the SSL Pulse project run a version of OpenSSL that allows exploiting the CVE-2014-0224 flaw.

The SSL Pulse project monitors the strength of SSL implementations on HTTPS-enabled sites from the list of top 1 million most visited sites as published by Internet statistics firm Alexa—154,406 sites as of June 2nd.

An additional 36 percent of websites from the SSL Pule data set run OpenSSL versions from the 0.9.x or 1.0.0 branches that also contain the flaw, but against which the exploit known so far doesn’t work.

Those servers should be upgraded too because it’s possible that there are other yet-to-be-discovered ways to exploit the problem, Ristic said in a blog post Friday.

The patching rate for CVE-2014-0224 does not appear to be as high as the one for Heartbleed, a more serious vulnerability revealed at the beginning of April that also affected OpenSSL clients and servers.

“The good news is that most browsers don’t rely on OpenSSL, which means that most browser users won’t be affected,” Ristic said. “However, Android browsers do use OpenSSL and are vulnerable to this attack. Additionally, many command-line and similar programmatic tools use OpenSSL. A particularly interesting target will be various VPN products, provided they are based on OpenSSL (like, for example, OpenVPN).”

Website administrators who want to check if their servers are vulnerable to CVE-2014-0224 can use a free online testing tool developed by Qualys SSL Labs.

Source

Subscribe via RSS or Email:

 
Read 1206 times Last modified on Wednesday, 18 June 2014 00:02
  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

Gain the Recognition You Deserve – Earn an Adobe Certification

27-12-2012 Hits:1687 Latest Panagiotis K. - avatar Panagiotis K.

Are you stuck in a job that leaves you hiding in the background? Are you yearning to break out of the mold and become an expert in your field? If so,...

How To Migrate Windows XP to Windows 7 with an External Or a USB Drive

12-02-2012 Hits:3325 Microsoft Panagiotis K. - avatar Panagiotis K.

How To Migrate Windows XP to Windows 7 with an External Or  a USB Drive

 If your current operating system is Windows XP and you want to transfer your your data in a Windows 7 OS, in this article i'm going to explain some easy...

In Force in Russia the Law for Monitoring the Internet

05-11-2012 Hits:1353 Security Vasia L. - avatar Vasia L.

In Force in Russia the Law for Monitoring the Internet

In July, the Russian parliament adopted a controversial bill that provided for the "black list" of all those websites deemed "illegal" while the libel had become a criminal offense. In their...

Google Has Planned to Correct the... 2010 Bug in Android

25-11-2012 Hits:2477 Software Panagiotis K. - avatar Panagiotis K.

Google Has Planned to Correct the... 2010 Bug in Android

Some bugs may take some time to correct, when their solution is complex and sometimes is even legitimate, to not disclose their existence, wherever there are safety reasons. A bug in...

The Origin of The Term Hacking

07-11-2012 Hits:3128 Hacking Vasia L. - avatar Vasia L.

The Origin of The Term Hacking

The terms hacking and hackers have taken the mythical. The past 20 years as they have to deal with disasters of computer networks, with spread of viruses, to break secret...