Fwd: [Dailydave] More info on SSLMAGEDON
17 Nov
2014
17 Nov
'14
6:06 p.m.
---------- Forwarded message ---------- From: Dave Aitel <dave@immunityinc.com> Date: Mon, 17 Nov 2014 10:59:50 -0500 Subject: [Dailydave] More info on SSLMAGEDON Our friends at BeyondTrust have a page on the bug now: http://blog.beyondtrust.com/triggering-ms14-066 One thing I think people are missing is that this bug works by default on Windows 7 and above. You can force a client cert down Window's throat, which triggers the vulnerability regardless of configuration settings. Of course, what you do next, is the fun part. Immunity's researchers are investigating many techniques, one of which is to attack the crypto variables directly. This may allow a Heartbleed-or-worse style exploitation without code execution at all...
3688
Age (days ago)
3688
Last active (days ago)
0 comments
1 participants
participants (1)
-
coderman