|
Message-ID: <j3kr95yppl491ta52iabvjpa.1396989798173@email.android.com> Date: Tue, 8 Apr 2014 16:44:00 -0400 From: Bobby Broughton <bobby@...ehosting.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: RE: OpenSSL 1.0.1 TLS/DTLS hearbeat information disclosure CVE-2014-0160 Once you gain a session id, you can hijack the person's session allowing for unauthorized access. Here's a good article: https://www.mattslifebytes.com/?p=533 Sent from my Verizon Wireless 4G LTE smartphone -------- Original message -------- From: Donald Stufft Date:04/08/2014 4:28 PM (GMT-05:00) To: oss-security@...ts.openwall.com Subject: Re: [oss-security] OpenSSL 1.0.1 TLS/DTLS hearbeat information disclosure CVE-2014-0160 On Apr 8, 2014, at 3:37 PM, Yves-Alexis Perez <corsac@...ian.org> wrote: > (for example, I'm still unsure how easy > it really is to find some valuable data in those 64kB of process heap > memory). Real easy, here’s a Python script which looks for cookies https://gist.github.com/mitsuhiko/10130454 ----------------- Donald Stufft PGP: 0x6E3CBCE93372DCFA // 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.