Global Information Lookup Global Information

DROWN attack information


DROWN
Broken lock logo symbolizing DROWN attack
CVE identifier(s)CVE-2016-0800
Date discoveredMarch 2016; 8 years ago (2016-03)
DiscovererNimrod Aviram, Sebastian Schinzel
Affected softwareSSL (v2)
Websitedrownattack.com

The DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) attack is a cross-protocol security bug that attacks servers supporting modern SSLv3/TLS protocol suites by using their support for the obsolete, insecure, SSL v2 protocol to leverage an attack on connections using up-to-date protocols that would otherwise be secure.[1][2] DROWN can affect all types of servers that offer services encrypted with SSLv3/TLS yet still support SSLv2, provided they share the same public key credentials between the two protocols.[3] Additionally, if the same public key certificate is used on a different server that supports SSLv2, the TLS server is also vulnerable due to the SSLv2 server leaking key information that can be used against the TLS server.[3]

Full details of DROWN were announced in March 2016, along with a patch that disables SSLv2 in OpenSSL; the vulnerability was assigned the ID CVE-2016-0800.[4] The patch alone will not be sufficient to mitigate the attack if the certificate can be found on another SSLv2 host. The only viable countermeasure is to disable SSLv2 on all servers.

The researchers estimated that 33% of all HTTPS sites were affected by this vulnerability as of March 1, 2016.[5]

  1. ^ Leyden, John (1 March 2016). "One-third of all HTTPS websites open to DROWN attack". The Register. Retrieved 2016-03-02.
  2. ^ Goodin, Dan (1 March 2016). "More than 11 million HTTPS websites imperiled by new decryption attack". Ars Technica. Retrieved 2016-03-02.
  3. ^ a b Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt. DROWN: Breaking TLS using SSLv2, 2016
  4. ^ "National Cyber Awareness System Vulnerability Summary for CVE-2016-0800". web.nvd.nist.gov. Retrieved 2016-03-02.
  5. ^ "DROWN Attack". drownattack.com. Retrieved 2016-03-24.

and 25 Related for: DROWN attack information

Request time (Page generated in 0.8127 seconds.)

DROWN attack

Last Update:

The DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) attack is a cross-protocol security bug that attacks servers supporting modern SSLv3/TLS...

Word Count : 879

Transport Layer Security

Last Update:

attacker can then deduce the keys the client and server determine using the Diffie–Hellman key exchange. The DROWN attack is an exploit that attacks servers...

Word Count : 17631

Drowning

Last Update:

Drowning is a type of suffocation induced by the submersion of the mouth and nose in a liquid. Most instances of fatal drowning occur alone or in situations...

Word Count : 13661

Nadia Heninger

Last Update:

amounts of internet traffic via the Logjam vulnerability,[C] and for the DROWN attack, which uses servers supporting old and weak cryptography to decrypt traffic...

Word Count : 664

Tokyo subway sarin attack

Last Update:

The Tokyo subway sarin attack (地下鉄サリン事件, Chikatetsu Sarin Jiken, "Subway Sarin Incident") was an act of domestic terrorism perpetrated on 20 March 1995...

Word Count : 10783

Downgrade attack

Last Update:

ClientHello fragmentation, and a variant of the DROWN (aka "the special drown") downgrade attacks. [clarification needed] Removing backward compatibility...

Word Count : 792

List of drowning victims

Last Update:

This is a list of drowning victims in chronological order. The reasons for drowning are diverse and range from suicide, to accidents or murders. Tiberinus...

Word Count : 5798

Orca attacks

Last Update:

unconscious. Martínez drowned before fellow trainers could rescue him. The park repeatedly asserted that this was not an attack but an unfortunate accident...

Word Count : 5846

Pwnie Awards

Last Update:

Lifetime Achievement: Peiter Zatko aka Mudge Best Cryptographic Attack: DROWN attack Nimrod Aviram et al. Best Song: Cyberlier - Katie Moussouris Winner...

Word Count : 2836

Cephalopod attack

Last Update:

our regions they will attack men. Near Brecq-Hou, in Sark, they show a cave where a devil-fish a few years since seized and drowned a lobster-fisher. Peron...

Word Count : 2994

The Drowners

Last Update:

"The Drowners" is the debut single of English rock band Suede, released on 11 May 1992 on Nude Records. It was later included on the band's debut album...

Word Count : 549

Shark attack

Last Update:

A shark attack is an attack on a human by a shark. Every year, around 80 unprovoked attacks are reported worldwide. Despite their rarity, many people...

Word Count : 5907

Ben Drowned

Last Update:

Ben Drowned (originally published as Haunted Majora's Mask Cartridge) is a three-part multimedia alternate reality game (ARG) web serial and web series...

Word Count : 5944

Alternative versions of Batman

Last Update:

Amnesty Bay. When Aquaman is transported fathoms below Amnesty Bay, the Drowned attacks him, revealing that the infected Mera has mutated into a gargantuan...

Word Count : 5072

Attacks on parachutists

Last Update:

Attacks on parachutists, as defined by the law of war, occur when pilots, aircrew, and passengers are attacked while descending by parachute from disabled...

Word Count : 7091

2011 Norway attacks

Last Update:

The 2011 Norway attacks, also called 22 July (Norwegian: 22. juli) or 22/7 in Norway, were two domestic terrorist attacks by far-right extremist Anders...

Word Count : 19589

Drowning Mona

Last Update:

Drowning Mona is a 2000 American crime comedy film starring Danny DeVito as Wyatt Rash, a local police chief from Verplanck, New York, who investigates...

Word Count : 983

Dingo attack

Last Update:

Dingo attacks on humans are rare in Australia, and when they do occur are generally on young children. However, dingoes are much more of a danger to livestock...

Word Count : 2839

Piranha

Last Update:

Brazil. Whereas fatal attacks on humans are rare, piranhas will readily feed on bodies of people that already have died, such as drowning victims. Various...

Word Count : 3032

List of fatal shark attacks in the United States

Last Update:

This is a list of fatal shark attacks that occurred in United States territorial waters by decade in chronological order. Citations "White shark". "R-Damiscotte"...

Word Count : 2432

Feint

Last Update:

horsemen to meet the attackers but was eventually outmatched. Many of his soldiers were forced into the nearby Han River and drowned. The siege on Fancheng...

Word Count : 805

Walrus attack

Last Update:

Walrus attacks are attacks inflicted upon humans, other walruses and other animals by the walrus. They have been documented in the Arctic by the Inuit...

Word Count : 472

Tiger shark

Last Update:

sharks by holding them upside down to induce tonic immobility in order to drown the shark. The orcas bite off the shark's fins before disemboweling and...

Word Count : 5284

Shiregreen child murders

Last Update:

plastic bags over their heads. They then made an unsuccessful attempt to drown another child in the bath. Barrass texted a friend just after 7am alleging...

Word Count : 1642

Tombouctou and Bamba attacks

Last Update:

Gourma-Rharous. The attacks prompted the Malian junta that took power in 2021 to postpone the upcoming 2024 presidential election indefinitely. The attack on the Tombouctou...

Word Count : 1399

PDF Search Engine © AllGlobal.net