Risk
8/3/2009
03:56 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

New SSL Attacks Don't Change Your Web Risk

There's been a a lot of talk about SSL security since last week's Black Hat conference. While these attacks are significant, I don't see them as changing the security posture of the Web.

There's been a a lot of talk about SSL security since last week's Black Hat conference. While these attacks are significant, I don't see them as changing the security posture of the Web.At the Black Hat security conference last week, Dan Kaminsky, director of penetration testing for IOActive pointed out, once again, that the X.509 certificates used in SSL encryption and authentication too often rely on vulnerable MD2 cryptographic hash functions. Also, security researcher Moxie Marlinspike revealed how attackers can spoof SSL certificates by including a "null" string character inside the certificate field, which then tricks the users' Web browser into accepting the attacker's code.

According to Marlinspike, it's not the SSL protocol that's the problem, it's how so many site implementations of SSL that are insecure. This includes many of the major banks, email systems, social networking sites, and more. Even most software update mechanisms.

One of the concerning aspects of Marlinspike's research, just isn't how banks, email systems, or social network sites are running vulnerable implementations of SSL -- it's that software update systems are doing the same. This needs to be a trusted process. As most users have their systems set for automatic updates, and if a malicious someone were able to spoof the connection then malware could be easily sent to the system, rather than a patch. The solution for this is simple: software makers need to digitally sign their updates.

When it comes to the weak X.509 certificates we've known about this for some time, and the industry is moving away from MD2 hashes.

Second, regarding Marlinspike, one needs to understand that SSL merely creates the secure tunnel between your system and whatever web site you're interacting - and does nothing for the security of your end point or the Web site itself. That means most any SSL attack that would result from this flaw would be a man-in-the middle attack where the bad guy would capture traffic flowing between your PC and the Web site.

Unfortunately, the Web sites you're connecting to are already wide open and vulnerable, and has been pointed out many times. Same is true for most end user systems. It's just easier to drop malware on Web sites that will infect systems, and then capture that data, or infect end points directly -- than it is to conduct man-in-the-middle attacks. So, while interesting, and serious, and a hole that needs to be plugged, it's simply another hole in the hull of a ship already taking considerable water.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio