Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4EA012AF.2060608@redhat.com>
Date: Thu, 20 Oct 2011 14:23:11 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: Florian Weimer <fw@...eb.enyo.de>
CC: oss-security@...ts.openwall.com,
        Juraj Somorovsky <juraj.somorovsky@....de>
Subject: Re: PR attack against XML Encryption

Hi Florian,

   check with Juraj Somorovsky of the Ruhr University Bochum
for further details on this flaw.

Btw., the CVE identifier of CVE-2011-1096 has been already assigned
to this issue.

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

On 10/20/2011 12:58 PM, Florian Weimer wrote:
> A German university has released a press release, alleging a
> vulnerability in the W3C XML Encryption standard.  Apparently, error
> reporting from existing implementations can be used as an oracle to
> recover information from messages encrypted in CBC mode.
>
> Details have not been published, as far as I know.  Does anybody know
> more?

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.