Attacks/Breaches
1/3/2013
05:40 PM
Connect Directly
RSS
E-Mail
50%
50%

Phony Google Digital Certificate Blocked By Browser Vendors

Google, Microsoft, and Mozilla are each addressing the problem with security updates to protect users

Google, Microsoft, and Mozilla have decided to revoke trust in two digital certificates improperly issued by a Turkish certificate authority (CA).

The situation came to light Christmas Eve when Google Chrome detected and blocked an unauthorized digital certificate for the "*.google.com" domain.

"We investigated immediately and found the certificate was issued by an intermediate certificate authority (CA) linking back to TURKTRUST, a Turkish certificate authority," blogged Adam Langley, Google Software Engineer. "Intermediate CA certificates carry the full authority of the CA, so anyone who has one can use it to create a certificate for any website they wish to impersonate."

As a result of the detection of the rogue certificate, Google updated Chrome's certificate revocation metadata on Dec. 25 to block the intermediate CA, and then alerted TURKTRUST and other browser vendors.

"TURKTRUST told us that based on our information, they discovered that in August 2011 they had mistakenly issued two intermediate CA certificates to organizations that should have instead received regular SSL certificates," Langley continued. "On December 26, we pushed another Chrome metadata update to block the second mistaken CA certificate and informed the other browser vendors."

According to Microsoft, the intermediate certificate authorities TURKTRUST created were (*.EGO.GOV.TR and e-islam.kktcmerkezbankasi.org). It was the *.EGO.GOV.TR subsidiary CA then used to issue a fraudulent digital certificate to *.google.com, Microsoft notes in a customer advisory.

To address the issue, the company updated the Certificate Trust List (CTL) to remove the trust of the certificates causing the issue.

Mozilla, meanwhile, is "actively revoking trust" for the certificates in an update, blogged Michael Coates, Mozilla's director of security assurance, adding that users can expect a Firefox update Jan. 8.

"This is not a Firefox-specific issue," he explained. "Nevertheless, we are concerned that at least one of the mis-issued intermediate certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. We are also concerned that the private keys for these certificates were not kept as secure as would be expected for intermediate certificates."

"We have also suspended inclusion of the “TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007” root certificate, pending further review," he added.

In 2011, CA security received increased attention due to a number of security incidents, including an attack on DigiNotar that led to browser vendors revoking hundreds of fraudulent SSL certificates and ultimately forced the company into bankruptcy.

In light of the most recent situation, Google announced plans to update Chrome again later this month to no longer indicate Extended Validation status for certificates issued by TURKTRUST, though connections to TURKTRUST-validated HTTPS servers may continue to be allowed, Langley blogged.

"Since our priority is the security and privacy of our users, we may also decide to take additional action after further discussion and careful consideration," he added.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.