Stefan Esser, also known as i0n1c, has made a 'quick and dirty' patch available to fix the serious SSL vulnerability that Apple just patched in iOS but has yet to fix in OS X Mavericks.
The flaw is very serious because it totally compromises the security of SSL and allows for man in the middle attack on otherwise secure SSL connections without any warning on the client side. Unfortunately it has been discovered that this vulnerability is also present in OSX Mavericks. When you look at the following code snippet that is taken from Security.framework's sslKeyExchange.c you can spot a superfluous "goto fail;" statement. This statement is executed in all cases and completely bypasses the call to sslRawVerify. This means there is actually no verification performed on the signed server key exchange.
More at iHash.eu
Tuesday, February 25, 2014
I0n1c Releases 'Quick and Dirty' Patch to Fix Serious SSL Vulnerability in OS X Mavericks
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment