Okay, we have confirmed @KudelskiSec with my colleague @Pelissier_S that CVE-2020-0601 (Windows CryptoAPI Spoofing Vulnerability), aka "Chain of Fools", allows for MITM attacks and some certificate spoofing. We have a working POC and a blog post will come soonish :)
-
-
“As usual in the cryptographic community, where flaws can be far-reaching, we practice full disclosure...” Errr, no. We typically practice *responsible* disclosure. (I’m not saying you’ve been irresponsible here, since CVE was already out. Just pointing out common practice.)
-
This was a reference to the Real World Crypto conferences where the topic came out multiple times. The idea is that crypto flaws can be present in other libs than the one directly affected and having an embargo on them is a bad idea.
- Još 2 druga odgovora
Novi razgovor -
-
-
Thanks for the writeup! Minor formatting issue herepic.twitter.com/SHdPKBnW3K
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Thanks! I don't get it, though... From where does CryptoAPI read the rogue generator? Is the server configured to send the CA certificate too (when it normally doesn't), and CryptoAPI gets the parameters from it? (also, https://chainoffools.wouaib.ch/ seems to be down)
- Još 2 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.