03:56 PM
George V. Hulme
George V. Hulme

New SSL Attacks Don't Change Your Web Risk

There's been a a lot of talk about SSL security since last week's Black Hat conference. While these attacks are significant, I don't see them as changing the security posture of the Web.

There's been a a lot of talk about SSL security since last week's Black Hat conference. While these attacks are significant, I don't see them as changing the security posture of the Web.At the Black Hat security conference last week, Dan Kaminsky, director of penetration testing for IOActive pointed out, once again, that the X.509 certificates used in SSL encryption and authentication too often rely on vulnerable MD2 cryptographic hash functions. Also, security researcher Moxie Marlinspike revealed how attackers can spoof SSL certificates by including a "null" string character inside the certificate field, which then tricks the users' Web browser into accepting the attacker's code.

According to Marlinspike, it's not the SSL protocol that's the problem, it's how so many site implementations of SSL that are insecure. This includes many of the major banks, email systems, social networking sites, and more. Even most software update mechanisms.

One of the concerning aspects of Marlinspike's research, just isn't how banks, email systems, or social network sites are running vulnerable implementations of SSL -- it's that software update systems are doing the same. This needs to be a trusted process. As most users have their systems set for automatic updates, and if a malicious someone were able to spoof the connection then malware could be easily sent to the system, rather than a patch. The solution for this is simple: software makers need to digitally sign their updates.

When it comes to the weak X.509 certificates we've known about this for some time, and the industry is moving away from MD2 hashes.

Second, regarding Marlinspike, one needs to understand that SSL merely creates the secure tunnel between your system and whatever web site you're interacting - and does nothing for the security of your end point or the Web site itself. That means most any SSL attack that would result from this flaw would be a man-in-the middle attack where the bad guy would capture traffic flowing between your PC and the Web site.

Unfortunately, the Web sites you're connecting to are already wide open and vulnerable, and has been pointed out many times. Same is true for most end user systems. It's just easier to drop malware on Web sites that will infect systems, and then capture that data, or infect end points directly -- than it is to conduct man-in-the-middle attacks. So, while interesting, and serious, and a hole that needs to be plugged, it's simply another hole in the hull of a ship already taking considerable water.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
3 Ways to Retain Security Operations Staff
Oliver Rochford, Vice President of Security Evangelism at DFLabs,  11/20/2017
A Call for Greater Regulation of Digital Currencies
Kelly Sheridan, Associate Editor, Dark Reading,  11/21/2017
New OWASP Top 10 List Includes Three New Web Vulns
Jai Vijayan, Freelance writer,  11/21/2017
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.