Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Internet Explorer Mozilla The Internet Technology

Null-Prefix SSL Attacks Enabled In New sslsniff 48

An anonymous reader writes "Moxie Marlinspike, who recently published new attacks on SSL at Defcon 17, seems to have released the new version of sslsniff which supports these attacks. While the release appears to coincide with a patch from Mozilla, every product that uses the Microsoft CryptoAPI is still vulnerable, including Internet Explorer and Outlook. The new version of sslsniff also supports built-in modes for hijacking software auto-updates that depend on SSL, and apparently includes techniques for defeating OCSP as well — making the elimination of existing null-prefix certificates difficult."
This discussion has been archived. No new comments can be posted.

Null-Prefix SSL Attacks Enabled In New sslsniff

Comments Filter:

The moon is made of green cheese. -- John Heywood

Working...