You are here

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions

September 27, 2011 - 8:00am

Addthis

PROBLEM:

Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions.

PLATFORM:

Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

ABSTRACT:

A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions.

reference LINKS:

Microsoft Security Advisory (2588513)
SecurityTracker Alert ID: 1026103
CVE-2011-3389

IMPACT ASSESSMENT:

Medium

Discussion:

A vulnerability was reported in Windows SSL/TLS stack. A remote user can decrypt SSL/TLS sessions in certain cases.A remote user with the ability to conduct a man-in-the-middle attack on an HTTPS connection can decrypt SSL/TLS sessions. The vulnerability resides in the SSL 3.0 and TLS 1.0 specifications when using a Cipher-Block Chaining (CBC) based cryptographic algorithm.The TLS 1.1 and 1.2 protocols are not affected.

Impact:

A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions.

Solution:

No solution was available at the time of this entry.

Addthis