IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New new ssl breach
Any opinions expressed by me are mine alone, posted from my home computer, on my own time as a free American and do not reflect the opinions of any person or company that I have had professional relations with in the past 59 years. meep
New Only if running 6.X
There was an update for 5.X on TLS a couple days ago.
--
greg@gregfolkert.net
"No snowflake in an avalanche ever feels responsible." --Stanislaw Jerzy Lec
New a lot of the nix are affected
Any opinions expressed by me are mine alone, posted from my home computer, on my own time as a free American and do not reflect the opinions of any person or company that I have had professional relations with in the past 59 years. meep
New I don;t doubt that. But you've only...
Linked to the RH sources.

Yes it shows the CVE, but it would have been nice to have it here in one click rather than 2 and a ton of incessant RedHat blather.
--
greg@gregfolkert.net
"No snowflake in an avalanche ever feels responsible." --Stanislaw Jerzy Lec
New A more general story about it.
http://www.androidpolice.com/2014/06/05/heartbleed-fallout-continues-openssl-team-publishes-and-patches-7-more-vulnerabilities-some-serious/

It seems that ever since the Heartbleed bug was published earlier this Spring, OpenSSL just hasn't been able to catch a break. Today, it was announced that seven additional vulnerabilities had been discovered affecting OpenSSL 0.9.8, 1.0.0, 1.0.1, and 1.0.2 (meaning all versions, basically).

At least one of the bugs, a man-in-the-middle attack referred to as CCS injection (detailed here and here), has been dubbed "serious" by the team. Updated versions of OpenSSL have been published today patching these vulnerabilities, including new versions of OpenSSL 0.9.8, 1.0.0, and 1.0.1. The 1.0.2 beta release has not been updated and is still currently vulnerable.

Anyone running an affected version is advised to upgrade as soon as possible, though that's probably self-explanatory at this point.


Cheers,
Scott.
New It is finally a great thing...
The whole project is getting the needed influx of attention.

It has been languishing for a while.

gnuTLS has been also.

I really hate the computing industry now... coupled with PCI compliance, HIPPA, SAS70... and other reqs... it has become a landmine buffet.
--
greg@gregfolkert.net
"No snowflake in an avalanche ever feels responsible." --Stanislaw Jerzy Lec
New I heard...
that the OpenSSL codebase is a real dog's breakfast. Fixing it up is a mammoth task.

I also heard that the latest problem was traced back to the same programmer who did the Heartbleed one.

Oops.

Wade.
New There was actually 7 CVE announced today for OpenSSL
The MITM one... being the highest problem, the other 6 were all DoS attack vectors, causing the machine to run out of resources.

This one appears it was traced back to the same guy that did the Heartbleed... also, this isn't *REALLY* that big of a threat. Considering BOTH the Server *AND* the Client have to have matching versions and essentially same comile time options for it to function properly for the MITM to work.

But considering RHEL v5 and v6 are mostly used without recompiling the binary releases... you get this. The other thing is that OpenSSL is used in Android, they used the default compile options for Android's processors which closely matches that for 32-bit and 64-bit runtimes.

It isn't just RHEL/CentOS, it is Ubuntu, Debian, SuSE... etc. All having this issue.

But again, the MITM attack has to have both the Server *AND* the Client running same versions.

So it is *NO WHERE* close to Heartbleed in scope and range.
--
greg@gregfolkert.net
"No snowflake in an avalanche ever feels responsible." --Stanislaw Jerzy Lec
     new ssl breach - (boxley) - (7)
         Only if running 6.X - (folkert) - (2)
             a lot of the nix are affected -NT - (boxley) - (1)
                 I don;t doubt that. But you've only... - (folkert)
         A more general story about it. - (Another Scott) - (3)
             It is finally a great thing... - (folkert) - (2)
                 I heard... - (static) - (1)
                     There was actually 7 CVE announced today for OpenSSL - (folkert)

I seem to remember a rather Stupid rendition sometime back.
47 ms