http://arstechnica.com/security/2014/06/meet-cupid-the-heartbleed-attack-spawns-evil-wi-fi-networks/
By Dan Goodin
Ars Technica
June 2, 2014
It just got easier to exploit the catastrophic Heartbleed vulnerability
against wireless networks and the devices that connect to them thanks to
the release last week of open source code that streamlines the process of
plucking passwords, e-mail addresses, and other sensitive information from
vulnerable routers and connected clients.
Dubbed Cupid, the code comes in the form of two software extensions. The
first gives wireless networks the ability to deploy "evil networks" that
surreptitiously send malicious packets to connected devices. Client
devices relying on vulnerable versions of the OpenSSL cryptography library
can then be forced to transmit contents stored in memory. The second
extension runs on client devices. When connecting to certain types of
wireless networks popular in corporations and other large organizations,
the devices send attack packets that similarly pilfer data from vulnerable
routers.
The release of Cupid comes eight weeks after the disclosure of Heartbleed,
one of the most serious vulnerabilities to ever hit the Internet. The
flaw, which existed for more than two years in OpenSSL, resides in
"heartbeat" functions designed to keep a transport layer security (TLS)
connection alive over an extended period of time.
Heartbleed is best known for giving end users the ability to pluck data
out of vulnerable servers. But it turns out that the bug can be used to
the same effect against virtually any device running an unpatched version
of OpenSSL. Cupid streamlines the process of exploiting devices connecting
over wireless networks that are secured using the extended authentication
protocol (EAP), which many large organizations use to password-protect
access.
[...]
--
Subscribe to InfoSec News
http://www.infosecnews.org/subscribe-to-infosec-news/