oss-sec mailing list archives
Heartbleed, clients and Android
From: Hanno Böck <hanno () hboeck de>
Date: Wed, 9 Apr 2014 11:30:29 +0200
Hi, I was asking myself some questions and I think others with more insight into what heartbleed means may be able to answer quickly: How does this affect client software? The PoCs we see send some malicous payload to servers and get some memory dumps. That doesn't affect clients? Is this vulnerability exploitable by a Man-in-the-Middle in any way? Can someone send a package with a wrong authentication block inside an existing connection and therefore dump any memory from a client? I think it's a very obvious question to be asked if we need to push all server users of openssl or ALL users of openssl. Because the latter would include Android. We are all pretty aware that android updates are in large parts nonexistent. cu, -- Hanno Böck http://hboeck.de/ mail/jabber: hanno () hboeck de GPG: BBB51E42
Attachment:
signature.asc
Description:
Current thread:
- Heartbleed, clients and Android Hanno Böck (Apr 09)
- Re: Heartbleed, clients and Android Yves-Alexis Perez (Apr 09)
- Re: Heartbleed, clients and Android Hanno Böck (Apr 09)
- Re: Heartbleed, clients and Android Yves-Alexis Perez (Apr 09)
- Re: Heartbleed, clients and Android Nick Kralevich (Apr 09)
- Re: Heartbleed, clients and Android Eric Lacombe (Apr 09)
- Re: Heartbleed, clients and Android Hanno Böck (Apr 09)
- Re: Heartbleed, clients and Android Hanno Böck (Apr 09)
- Re: Heartbleed, clients and Android Yves-Alexis Perez (Apr 09)