Overview
A vulnerability in the specification of the SSL 3.0 and TLS 1.0 protocols could allow an attacker to decrypt encrypted traffic.
Description
The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols are commonly used to provide authentication, encryption, integrity, and non-repudiation services to network application protocols such as HTTP, IMAP, POP3, LDAP, SMTP, and others. Several different versions of the SSL and TLS protocols have been standardized and are in widespread use. These protocols support the use of both block-based and stream-based ciphers. A vulnerability in the way the SSL 3.0 and TLS 1.0 protocols select the initialization vector (IV) when operating in cipher-block chaining (CBC) modes allows an attacker to perform a chosen-plaintext attack on encrypted traffic. This vulnerability has been addressed in the specification for the TLS 1.1 and TLS 1.2 protocols. |
Impact
An attacker with the ability to pose as a man-in-the-middle and to generate specially-crafted plaintext input could decrypt the contents of an SSL- or TLS-encrypted session. This could allow the attacker to recover potentially sensitive information (e.g., HTTP authentication cookies). |
Solution
We are currently unaware of a practical solution to this problem. |
Workarounds
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://www.openssl.org/~bodo/tls-cbc.txt
- http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
- http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php
- http://vnhacker.blogspot.com/2011/09/beast.html
- https://blog.torproject.org/blog/tor-and-beast-ssl-attack
- http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
- http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
- http://src.chromium.org/viewvc/chrome?view=rev&revision=97269
- https://bugzilla.mozilla.org/show_bug.cgi?id=665814
- http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
- http://www.ekoparty.org/2011/juliano-rizzo.php
Acknowledgements
Thanks to Thái Duong working with Matasano and Juliano Rizzo of Netifera for reporting the practical attack against this vulnerability. Wei Dai and Bodo Möller identified the underlying flaw in the context of SSL and TLS.
This document was written by Chad R Dougherty.
Other Information
CVE IDs: | CVE-2011-3389 |
Severity Metric: | 3.38 |
Date Public: | 2002-02-08 |
Date First Published: | 2011-09-27 |
Date Last Updated: | 2011-12-08 14:43 UTC |
Document Revision: | 37 |