Blog: Transport Layer Security [T.L.S.] Issues

On November 04, 2009, Marsh Ray published detailed information about a vulnerability that affects the TLS/SSL protocols and allows for limited man-in-the-middle (MITM) attacks. We say “limited” because the attack exploiting this issue would be different from traditionally viewed MITM attacks, which would involve an attacker placing themselves in the middle of the SSL session between a client and a server and being able to intercept, view, and modify any requests or responses exchanged by the two communicating parties. In an attack using this recent TLS vulnerability, due to the way SSL-enabled applications handle the session-renegotiation process, an attacker may inject arbitrary plaintext into the beginning of the application protocol stream. This can affect multiple protocols that can communicate over an SSL session, such as HTTPS, IMAP, POPS, SIP, etc. Note that in this attack, the attacker would have no ability (at least without additionally exploiting other vulnerabilities) to see or manipulate any responses from the server or consecutive client’s requests. They may only inject plaintext data into the session.

 

 

You can read the rest of this Blog here: Transport Layer Security Issues.

 

 

Message Edited by Floating_Red on 11-16-2009 10:59 PM