PADDING-ORACLE-Vulnerability-IMAP/EN: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „=== {{:{{PAGENAME}}/Headline}} === If the result is positive, there is no need for further action. If the result is negative, please read the following inst…“)
 
 
Zeile 1: Zeile 1:
 +
 
=== {{:{{PAGENAME}}/Headline}} ===
 
=== {{:{{PAGENAME}}/Headline}} ===
  

Aktuelle Version vom 7. Mai 2020, 10:40 Uhr

Check for Padding Oracle Vulnerability

If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.

Result positive Not vulnerable to Padding Oracle Attacks.
Result negativ Vulnerable to Padding Oracle Attacks.
Description The server is vulnerable to a Padding-Oracle attack, which allows an attacker to decrypt the communication.
Background The Padding-Oracle Attack can be used by attackers to attack secured connections. It establishes a connection to the server and sends very specially prepared encrypted messages. These messages are almost correctly encrypted, but have errors in critical positions. A server that receives such a message must always reject these messages in the same way. An attacker evaluates the error messages sent and can use this information to partially decrypt the connection to the server, making the connection insecure.
Consequence The server is vulnerable to an implementation vulnerability that allows an attacker to decrypt the communication.
Solution/Tips If vulnerability has been reported, immediately install an update for your TLS implementation on your server.