Golfreeze.packetlove.com: Life style of Golfreeze Canon400D Family kammtan.com Jazz Freebsd Unix Linux System Admin guitar Music

All about unix linux freebsd and FAQ for Packetlove.com Web hosting , Mail hosting , VoIP + IP PBX server => All Security via cyber space relate golfreeze task. => Topic started by: golfreeze on มีนาคม 18, 2015, 02:31:34 PM

Title: openssl bug freak cve2015-0204
Post by: golfreeze on มีนาคม 18, 2015, 02:31:34 PM
#description
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

#server site checking
Check verify your ssl match with this bug here = https://tools.keycdn.com/freak (https://tools.keycdn.com/freak)
https://www.ssllabs.com (https://www.ssllabs.com)

#client site checking
https://freakattack.com/clienttest.html (https://freakattack.com/clienttest.html)

#how to fix
CentOS
#yum update openssl

Debian
#apt-get update openssl