Announcement

Collapse
No announcement yet.

SSLv2 DROWN Attack

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • SSLv2 DROWN Attack

    Original release date: March 01, 2016
    Network traffic encrypted using an RSA-based SSL certificate may be decrypted if enough SSLv2 handshake data can be collected. Exploitation of this vulnerability - referred to as DROWN in public reporting - may allow a remote attacker to obtain the private key of a server supporting SSLv2.
    US-CERT encourages users and administrators to review Vulnerability Note VU#583776 and the US-CERT OpenSSL Current Activity for additional information and mitigation details.

    This product is provided subject to this Notification and this Privacy & Use policy.





    Click here to view the article.
Working...
X