RE: TLS Renegotiation Vulnerability: Proof of Concept Code (Pyth

看板Bugtraq作者時間16年前 (2009/12/23 03:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/2 (看更多)
Also, can you change this: "Transport Layer Security (TLS) Renegotiation Indication Extension, IETF draft standard that addresses the vulnerability." To: "Transport Layer Security (TLS) Renegotiation Indication Extension, IETF = TLS Working Group draft that addresses the vulnerability." Where "IETF TLS Working Group" is hyperlinked to http://www.ietf.org/dyn/wg/charter/tls-charter.html That would help people who do not have a clue who the IETF or the TLS WG = or that both are open standards forums. Thanks, Barry > -----Original Message----- > From: RedTeam Pentesting GmbH [mailto:release@redteam-pentesting.de] > Sent: Monday, December 21, 2009 5:04 AM > To: bugtraq@securityfocus.com > Subject: TLS Renegotiation Vulnerability: Proof of Concept Code > (Python) >=20 > Information about a vulnerability in the TLS protocol was published in > the > beginning of November 2009. Attackers can take advantage of that > vulnerability > to inject arbitrary prefixes into a network connection protected by > TLS. This > can result in severe vulnerabilities, depending on the application > layer > protocol used over TLS. >=20 > RedTeam Pentesting used the Python module "TLS Lite" to develop proof > of concept > code that exploits this vulnerability. It is published at >=20 > http://www.redteam-pentesting.de/publications/tls-renegotiation >=20 > to raise awareness for the vulnerability and its potential impact. > Furthermore, > it shall give interested persons the opportunity to analyse > applications > employing TLS for further vulnerabilities. >=20 > -- > RedTeam Pentesting GmbH Tel.: +49 241 963-1300 > Dennewartstr. 25-27 Fax : +49 241 963-1304 > 52068 Aachen http://www.redteam-pentesting.de/ > Germany Registergericht: Aachen HRB 14004 > Gesch=E4ftsf=FChrer: Patrick Hof, Jens Liebchen, Claus R. F. Overbeck
文章代碼(AID): #1BCHTkZs (Bugtraq)
文章代碼(AID): #1BCHTkZs (Bugtraq)