When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Heartbleed - Wikipedia

    en.wikipedia.org/wiki/Heartbleed

    OpenSSL is a candidate to become the first recipient of the initiative's funding. [195] After the discovery Google established Project Zero which is tasked with finding zero-day vulnerabilities to help secure the Web and society. [197] [198]

  3. OpenSSL - Wikipedia

    en.wikipedia.org/wiki/OpenSSL

    This vulnerability (CVE-2015-0291) allows anyone to take a certificate, read its contents and modify it accurately to abuse the vulnerability causing a certificate to crash a client or server. If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension, a null-pointer dereference occurs.

  4. DROWN attack - Wikipedia

    en.wikipedia.org/wiki/DROWN_attack

    Until 2016, OpenSSL would also happily negotiate disabled SSLv2 ciphersuites. Unlike SSLv3 and later, in SSLv2 the client was supposed to choose from a list of ciphersuites offered by the server but OpenSSL would allow use of unlisted ciphersuites. The original reporters of the bug were the security researchers Nimrod Aviram and Sebastian Schinzel.

  5. Comparison of TLS implementations - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_TLS...

    Note that there are known vulnerabilities in SSL 2.0 and SSL 3.0. In 2021, IETF published RFC 8996 also forbidding negotiation of TLS 1.0, TLS 1.1, and DTLS 1.0 due to known vulnerabilities. NIST SP 800-52 requires support of TLS 1.3 by January 2024. Support of TLS 1.3 means that two compliant nodes will never negotiate TLS 1.2.

  6. Shellshock (software bug) - Wikipedia

    en.wikipedia.org/wiki/Shellshock_(software_bug)

    Shellshock, also known as Bashdoor, [1] is a family of security bugs [2] in the Unix Bash shell, the first of which was disclosed on 24 September 2014.Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access [3] to many Internet-facing services, such as web servers, that use Bash to process requests.

  7. Elliptic Curve Digital Signature Algorithm - Wikipedia

    en.wikipedia.org/wiki/Elliptic_Curve_Digital...

    On March 29, 2011, two researchers published an IACR paper [9] demonstrating that it is possible to retrieve a TLS private key of a server using OpenSSL that authenticates with Elliptic Curves DSA over a binary field via a timing attack. [10] The vulnerability was fixed in OpenSSL 1.0.0e. [11]

  8. Transport Layer Security - Wikipedia

    en.wikipedia.org/wiki/Transport_Layer_Security

    The vulnerability is caused by a buffer over-read bug in the OpenSSL software, rather than a defect in the SSL or TLS protocol specification. In September 2014, a variant of Daniel Bleichenbacher 's PKCS#1 v1.5 RSA Signature Forgery vulnerability [ 151 ] was announced by Intel Security Advanced Threat Research.

  9. Random number generator attack - Wikipedia

    en.wikipedia.org/wiki/Random_number_generator_attack

    The weak-key-generation vulnerability was promptly patched after it was reported, but any services still using keys that were generated by the old code remain vulnerable. A number of software packages now contain checks against a weak key blacklist to attempt to prevent use of any of these remaining weak keys, but researchers continue to find ...