Twitter | Pretraživanje | |
Tavis Ormandy
Will confirms all X.509 validation broken, not just code signing. Okay, I'm back on the hype train, that's pretty bad.
Reply Retweet Označi sa "sviđa mi se" More
Dan Goodin 14. sij
Odgovor korisniku/ci @taviso
Any thoughts on why Microsoft rates it as important and not critical.
Reply Retweet Označi sa "sviđa mi se"
Tavis Ormandy 14. sij
Odgovor korisniku/ci @dangoodin001
It seems consistent with their scale, it means https is broken, not iis remote shell. Still, if you can't make exceptions for things like this, then maybe the scale is broken.
Reply Retweet Označi sa "sviđa mi se"
Jonathan Leitschuh → ShmooCon 14. sij
Odgovor korisniku/ci @taviso
The implications here are TLS certificate verification bypassing thus enabling a MITM? Or am I missing something?
Reply Retweet Označi sa "sviđa mi se"
Wes 14. sij
Odgovor korisniku/ci @JLLeitschuh @taviso
Yes, or any other way you want to tamper with code signing, etc. Anything that relies on certificate chains being valid.
Reply Retweet Označi sa "sviđa mi se"
Ug_0 Security 14. sij
Odgovor korisniku/ci @taviso
i.. am.. confused..
Reply Retweet Označi sa "sviđa mi se"
Rob Rosenberger 14. sij
Odgovor korisniku/ci @taviso @briankrebs
Reply Retweet Označi sa "sviđa mi se"
Maik Musall 14. sij
Odgovor korisniku/ci @taviso
That is some first class timing right after Win7 no longer receiving updates.
Reply Retweet Označi sa "sviđa mi se"
Fotis 15. sij
Odgovor korisniku/ci @taviso
From : "A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software."
Reply Retweet Označi sa "sviđa mi se"
(ca)sey 14. sij
Odgovor korisniku/ci @taviso
Reply Retweet Označi sa "sviđa mi se"
⬡liver 14. sij
Odgovor korisniku/ci @verbumrosini @taviso
Lol the MSRC site must be overloaded right now, it's taking forever to load
Reply Retweet Označi sa "sviđa mi se"