Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1319114047.31111.3.camel@scapa>
Date: Thu, 20 Oct 2011 14:34:07 +0200
From: Yves-Alexis Perez <corsac@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: PR attack against XML Encryption

On jeu., 2011-10-20 at 12:58 +0200, Florian Weimer wrote:
> A German university has released a press release, alleging a
> vulnerability in the W3C XML Encryption standard.  Apparently, error
> reporting from existing implementations can be used as an oracle to
> recover information from messages encrypted in CBC mode.
> 
> Details have not been published, as far as I know.  Does anybody know
> more? 

Paper was just presented at ACM CCS
(http://www.sigsac.org/ccs/CCS2011/paper_list.shtml). Proceedings are
available at
http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL&CFID=61633880&CFTOKEN=38378828

but afaict the paper is not (yet?) available freely.

Regards,
-- 
Yves-Alexis

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.