Attacks/Breaches
1/3/2013
05:40 PM
Connect Directly
RSS
E-Mail
50%
50%

Phony Google Digital Certificate Blocked By Browser Vendors

Google, Microsoft, and Mozilla are each addressing the problem with security updates to protect users

Google, Microsoft, and Mozilla have decided to revoke trust in two digital certificates improperly issued by a Turkish certificate authority (CA).

The situation came to light Christmas Eve when Google Chrome detected and blocked an unauthorized digital certificate for the "*.google.com" domain.

"We investigated immediately and found the certificate was issued by an intermediate certificate authority (CA) linking back to TURKTRUST, a Turkish certificate authority," blogged Adam Langley, Google Software Engineer. "Intermediate CA certificates carry the full authority of the CA, so anyone who has one can use it to create a certificate for any website they wish to impersonate."

As a result of the detection of the rogue certificate, Google updated Chrome's certificate revocation metadata on Dec. 25 to block the intermediate CA, and then alerted TURKTRUST and other browser vendors.

"TURKTRUST told us that based on our information, they discovered that in August 2011 they had mistakenly issued two intermediate CA certificates to organizations that should have instead received regular SSL certificates," Langley continued. "On December 26, we pushed another Chrome metadata update to block the second mistaken CA certificate and informed the other browser vendors."

According to Microsoft, the intermediate certificate authorities TURKTRUST created were (*.EGO.GOV.TR and e-islam.kktcmerkezbankasi.org). It was the *.EGO.GOV.TR subsidiary CA then used to issue a fraudulent digital certificate to *.google.com, Microsoft notes in a customer advisory.

To address the issue, the company updated the Certificate Trust List (CTL) to remove the trust of the certificates causing the issue.

Mozilla, meanwhile, is "actively revoking trust" for the certificates in an update, blogged Michael Coates, Mozilla's director of security assurance, adding that users can expect a Firefox update Jan. 8.

"This is not a Firefox-specific issue," he explained. "Nevertheless, we are concerned that at least one of the mis-issued intermediate certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. We are also concerned that the private keys for these certificates were not kept as secure as would be expected for intermediate certificates."

"We have also suspended inclusion of the “TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007” root certificate, pending further review," he added.

In 2011, CA security received increased attention due to a number of security incidents, including an attack on DigiNotar that led to browser vendors revoking hundreds of fraudulent SSL certificates and ultimately forced the company into bankruptcy.

In light of the most recent situation, Google announced plans to update Chrome again later this month to no longer indicate Extended Validation status for certificates issued by TURKTRUST, though connections to TURKTRUST-validated HTTPS servers may continue to be allowed, Langley blogged.

"Since our priority is the security and privacy of our users, we may also decide to take additional action after further discussion and careful consideration," he added.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio