On Tue, 8 Apr 2014, David Blank-Edelman wrote:

On Apr 8, 2014, at 9:48 AM, Paul Graydon <[email protected]> wrote:

There is ample proof this morning that it can be used to acquire yahoo credentials with ease as Yahoo remains unpatched.

So I’ve seen the screen shot too that went around, but I have to admit, I’m curious about the mechanics behind that. Would anyone care to speculate just how you use this bug to grab credentials in that way from them? I can hazard a partial guess, but I’d like to hear if others have any more technical detailed thoughts on how this was done.

Basically, this bug allows you to dump the entire address space of the server and then go digging through it.

So anything the server knows at that instant (including end-user passwords and other form data) can be dug out by the attacker if they are determined enough.

How hard or easy this is depends on a lot of things, but certs are stored in fairly standard places, so you should create new certs (and new passphrases to go along with them) if you think you may be a target of _anyone_

David Lang
_______________________________________________
Tech mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to