我有一个客户端正在运行PCI兼容性扫描并获得以下内容:
BEAST (Browser Exploit Against SSL/TLS) Vulnerability
The SSL protocol encrypts data by using CBC mode with chained
initialization vectors. This allows an attacker, which is has gotten
access to an HTTPS session via man-in-the-middle (MITM) attacks or other means, to obtain plain text HTTP headers via
a blockwise chosen-boundary attack (BCBA) in conjunction with
Javascript code that uses the HTML5 WebSocket API, the Java
URLConnection API, or the Silverlight WebClient API. This
vulnerability is more commonly referred to as Browser Exploit Against
SSL/TLS or "BEAST".
CVE: CVE-2011-3389
NVD: CVE-2011-3389
Bugtraq: 49778
CVSSv2: AV:N/AC:M/Au:N/C:P/I:N/A:N(4.30)
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=665814,
http://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslciphersuite,
http://technet.microsoft.com/en-us/security/bulletin/ms12-006
Service: http
Evidence:
Cipher Suite: SSLv3 : DES-CBC3-SHA
Cipher Suite: SSLv3 : RC4-SHA
Cipher Suite: SSLv3 : RC4-MD5
Cipher Suite: TLSv1 : AES256-SHA
Cipher Suite: TLSv1 : AES128-SHA
Cipher Suite: TLSv1 : DES-CBC3-SHA
Cipher Suite: TLSv1 : RC4-SHA
Cipher Suite: TLSv1 : RC4-MD5
Run Code Online (Sandbox Code Playgroud)
他们的网站托管在Windows Azure上; 既然管理这些服务器有推荐的方法来堵塞这个漏洞吗?
您在 Azure 中到底运行什么?它是网络角色吗?Azure 网站?您自己的 Windows 服务器处于 IaaS 模式吗?
如果您正在运行 Web 角色,您是否正在运行最新的 Windows 操作系统?Microsoft 于 2012 年 4 月在 Web Roles 中修复了此问题。
http://msdn.microsoft.com/en-us/library/windowsazure/hh967599.aspx
如果您通过 IaaS 模式运行 Windows Server,则您有责任修补服务器。
归档时间: |
|
查看次数: |
1287 次 |
最近记录: |