Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

FREAK

From Wikipedia, the free encyclopedia
Security exploit
For the term referring to unusual people, seeFreak. For other uses, seeFreak (disambiguation).
FREAK
CVE identifier(s)CVE-2015-0204 (OpenSSL),

CVE-2015-1637 (Schannel),

CVE-2015-1067 (Secure Transport)
Date discoveredMarch 3, 2015; 10 years ago (2015-03-03)
DiscovererIMDEA Software Institute,INRIA,Microsoft Research
Affected softwareClientTLS libraries (includingOpenSSL,Schannel and Secure Transport)

FREAK ("Factoring RSA Export Keys") is asecurity exploit of a cryptographic weakness in theSSL/TLS protocols introduced decades earlier for compliance withU.S. cryptography export regulations. These involved limiting exportable software to use onlypublic key pairs withRSA moduli of 512 bits or fewer (so-calledRSA EXPORT keys), with the intention of allowing them to be broken easily by theNational Security Agency (NSA), but not by other organizations with lesser computing resources. However, by the early 2010s, increases in computing power meant that they could be broken by anyone with access to relatively modest computing resources using the well-knownNumber Field Sieve algorithm, using as little as $100 ofcloud computing services. Combined with the ability of aman-in-the-middle attack to manipulate the initialcipher suite negotiation between the endpoints in the connection and the fact that the finished hash only depended on the master secret, this meant that a man-in-the-middle attack with only a modest amount of computation could break the security of any website that allowed the use of 512-bit export-grade keys. While the exploit was only discovered in 2015, its underlying vulnerabilities had been present for many years, dating back to the 1990s.[1]

Vulnerability

[edit]

The flaw was found by researchers fromIMDEA Software Institute,INRIA andMicrosoft Research.[2][3] The FREAK attack in OpenSSL has the identifierCVE-2015-0204.[4]

Vulnerable software and devices includedApple'sSafari web browser, the default browser inGoogle'sAndroid operating system,Microsoft'sInternet Explorer, andOpenSSL.[5][6]Microsoft has also stated that itsSchannel implementation of transport-layer encryption is vulnerable to a version of the FREAK attack in all versions ofMicrosoft Windows.[7] The CVE ID for Microsoft's vulnerability inSchannel isCVE-2015-1637.[8] The CVE ID for Apple's vulnerability in Secure Transport isCVE-2015-1067.[9]

Sites affected by the vulnerability included the US federal government websites fbi.gov, whitehouse.gov and nsa.gov,[10] with around 36% of HTTPS-using websites tested by one security group shown as being vulnerable to the exploit.[11] Based on geolocation analysis using IP2Location LITE, 35% of vulnerable servers are located in the US.[12]

Press reports of the exploit have described its effects as "potentially catastrophic"[13] and an "unintended consequence" of US government efforts to control the spread of cryptographic technology.[10]

As of March 2015[update], vendors were in the process of releasing new software that would fix the flaw.[10][11] On March 9, 2015, Apple released security updates for bothiOS 8 andOS X operating systems which fixed this flaw.[14][15] On March 10, 2015, Microsoft released a patch which fixed this vulnerability for all supported versions of Windows (Server 2003, Vista and later).[16]Google Chrome 41 andOpera 28 has also mitigated against this flaw.[3]Mozilla Firefox is not vulnerable against this flaw.[17]

The research paper explaining this flaw has been published at the 36th IEEE Symposium on Security and Privacy and has been awarded the Distinguished Paper award.[18]

See also

[edit]

References

[edit]
  1. ^"The Dark Side of Microsoft Windows – Administrative..."BeyondTrust. Retrieved2023-09-05.
  2. ^B. Beurdouche & al (2015-05-18)."A Messy State of the Union: Taming the Composite State Machines of TLS"(PDF). IEEE Security and Privacy 2015.
  3. ^ab"State Machine AttACKs against TLS (SMACK TLS)".smacktls.com.
  4. ^"Vulnerability Summary for CVE-2015-0204". NIST. 20 February 2015.
  5. ^Thomas Fox-Brewster (2015-03-03)."What The FREAK? Why Android And iPhone Users Need To Pay Attention To The Latest Hot Vulnerability".Forbes.
  6. ^Steven J. Vaughan-Nichols (2015-03-03)."FREAK: Another day, another serious SSL security hole". ZDNet.
  7. ^Darren Pauli (6 March 2015)."All Microsoft Windows versions are vulnerable to FREAK". The Register.
  8. ^"Microsoft Security Advisory 3046015: Vulnerability in Schannel Could Allow Security Feature Bypass". Microsoft. March 5, 2015.
  9. ^"About the security content of iOS 8.2".apple.com. 23 January 2017.
  10. ^abcCraig Timberg (2015-03-03)."'FREAK' flaw undermines security for Apple and Google users, researchers discover".Washington Post.
  11. ^abDennis Fisher (2015-03-03)."New FREAK Attack Threatens Many SSL Clients". Threatpost.
  12. ^"FREAK Servers By Country". 2015-03-03.
  13. ^Dan Goodin (3 March 2015).""FREAK" flaw in Android and Apple devices cripples HTTPS crypto protection". Ars Technica.
  14. ^"About Security Update 2015-002". Apple. March 9, 2015.
  15. ^"About the security content of iOS 8.2". Apple. March 9, 2015.
  16. ^"Microsoft Security Bulletin MS15-031 - Important". Microsoft. March 10, 2015.
  17. ^"Microsoft Admits Windows Users Are Vulnerable to FREAK Attacks".eweek.com. Archived fromthe original on April 8, 2015.
  18. ^"IEEE Distinguished Paper award for A Messy State of the Union: Taming the Composite State Machines of TLS". 2015-05-18.

External links

[edit]
Protocols and technologies
Public-key infrastructure
See also
History
Implementations
Notaries
Vulnerabilities
Theory
Cipher
Protocol
Implementation
Retrieved from "https://en.wikipedia.org/w/index.php?title=FREAK&oldid=1232785656"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp