{"id":27390,"date":"2014-11-13T21:42:01","date_gmt":"2014-11-14T02:42:01","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27390"},"modified":"2014-11-13T21:42:01","modified_gmt":"2014-11-14T02:42:01","slug":"microsoft-fixes-critical-crypto-flaw-strengthens-encryption-for-older-systems","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/microsoft-fixes-critical-crypto-flaw-strengthens-encryption-for-older-systems.php","title":{"rendered":"Microsoft fixes critical crypto flaw, strengthens encryption for older systems"},"content":{"rendered":"<p><p>    Microsoft fixed a critical vulnerability Tuesday in the Windows    cryptographic library that could expose Windows servers to    remote code execution attacks. The update also adds support for    stronger and more modern cryptographic ciphers to older Windows    versions.  <\/p>\n<p>    \"The vulnerability could allow remote code execution if an    attacker sends specially crafted packets to a Windows server,\"    Microsoft's said in a security bulletin called MS14-066.    However, the flaw is in the Microsoft Secure Channel (SChannel)    component that exists in all Windows versions and implements    the SSL and TLS cryptographic protocols.  <\/p>\n<p>    The Microsoft security bulletin makes it clear that an attacker    could exploit the vulnerability to execute arbitrary code on a    Windows system running as a server. However, it's not as clear    whether a malicious HTTPS website could exploit the    vulnerability to execute code on a Windows computer when a user    visits the site in Internet Explorer, which relies on SChannel    for SSL\/TLS connections.  <\/p>\n<p>    A separate Microsoft blog post about assessing the risk for the    November security updates suggests that this might be possible.    It contains a table that lists the most likely attack vector    for MS14-066 as \"user browses to a malicious webpage.\"  <\/p>\n<p>    Microsoft did not immediately respond to a request for    clarifications.  <\/p>\n<p>    \"The vulnerability bulletin provided calls out servers as the    potential victims, but the SSL\/TLS stack is used every time    your browser connects to a secure website (which most are these    days),\" said Jared DeMott, a security researcher at Bromium,    via email. \"And it would be straightforward for an attacker    with details of this vulnerability, to host a malicious site    that offers 'security' via the bogus SSL\/TLS packets. Could a    malicious website exploit IE with this bug? Until someone    reverse engineers the patch, we'll have to wait to hear about    how bad it is.\"  <\/p>\n<p>    This critical SChannel flaw comes after serious vulnerabilities    were found this year in other widely used SSL\/TLS libraries,    including OpenSSL, GnuTLS and the TLS library used by Apple in Mac OS X and    iOS.  <\/p>\n<p>    But the update described in MS14-066 doesn't only address a    security vulnerability. It also adds support for stronger    encryption ciphers on older Windows versions.  <\/p>\n<p>    \"This update includes new TLS cipher suites that offer more    robust encryption to protect customer information,\" the    security bulletin says. \"These new cipher suites all operate in    Galois\/counter mode (GCM), and two of them offer perfect    forward secrecy (PFS) by using DHE key exchange together with    RSA authentication.\"  <\/p>\n<p>    In recent years, researchers demonstrated attacks against TLS    configurations that use the RC4 stream    cipher or block ciphers like AES that operate in    cipher-block-chaining (CBC) mode. This leaves ciphers that    operate in Galois\/Counter Mode (GCM) and that are only    available in TLS 1.2 as one of the few fully secure    alternatives.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/news.techworld.com\/security\/3585773\/microsoft-fixes-critical-crypto-flaw-strengthens-encryption-for-older-systems\/?olo=rss\/RK=0\/RS=YKTL2mFrsmBWusQHmn_nXMel08s-\" title=\"Microsoft fixes critical crypto flaw, strengthens encryption for older systems\">Microsoft fixes critical crypto flaw, strengthens encryption for older systems<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsoft fixed a critical vulnerability Tuesday in the Windows cryptographic library that could expose Windows servers to remote code execution attacks. The update also adds support for stronger and more modern cryptographic ciphers to older Windows versions. \"The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server,\" Microsoft's said in a security bulletin called MS14-066<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27390","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27390"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27390"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27390\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}