<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: OpenSSL will patch this week high severity vulnerability &#8211; Security Affairs</title>
	<atom:link href="http://www.epanorama.net/blog/2016/09/20/openssl-will-patch-this-week-high-severity-vulnerability-security-affairs/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/09/20/openssl-will-patch-this-week-high-severity-vulnerability-security-affairs/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 28 Apr 2026 09:05:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/20/openssl-will-patch-this-week-high-severity-vulnerability-security-affairs/comment-page-1/#comment-1515470</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 28 Sep 2016 14:29:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47256#comment-1515470</guid>
		<description><![CDATA[I Got 99 Problems, But SWEET32 Isn&#039;t One
http://www.securityweek.com/i-got-99-problems-sweet32-isnt-one
Where does SWEET32 rank against other SSL vulnerabilities? 

Cryptographic attacks with cute names seem to come around every few months; so far in 2016 we have seen BICYCLE, DROWN, and now SWEET32.

A pair of researchers, Karthikeyan Bhargavan and Gaëtan Leurent with the French national research institute for computer science, published a cryptographic attack against older, 64-bit block ciphers such as triple-DES (3DES) and Blowfish. They called their attack SWEET32 (CVE-2016-2183) as the attack starts to become practical after 2^32 cipher blocks. 

The attack’s website explains that the basis for the SWEET32 attack involves the birthday paradox from probability theory.

Let’s see where SWEET32 would land in my ranking system, which is similar to the CVSS methodology in that it focuses on impact and exploitability.]]></description>
		<content:encoded><![CDATA[<p>I Got 99 Problems, But SWEET32 Isn&#8217;t One<br />
<a href="http://www.securityweek.com/i-got-99-problems-sweet32-isnt-one" rel="nofollow">http://www.securityweek.com/i-got-99-problems-sweet32-isnt-one</a><br />
Where does SWEET32 rank against other SSL vulnerabilities? </p>
<p>Cryptographic attacks with cute names seem to come around every few months; so far in 2016 we have seen BICYCLE, DROWN, and now SWEET32.</p>
<p>A pair of researchers, Karthikeyan Bhargavan and Gaëtan Leurent with the French national research institute for computer science, published a cryptographic attack against older, 64-bit block ciphers such as triple-DES (3DES) and Blowfish. They called their attack SWEET32 (CVE-2016-2183) as the attack starts to become practical after 2^32 cipher blocks. </p>
<p>The attack’s website explains that the basis for the SWEET32 attack involves the birthday paradox from probability theory.</p>
<p>Let’s see where SWEET32 would land in my ranking system, which is similar to the CVSS methodology in that it focuses on impact and exploitability.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/20/openssl-will-patch-this-week-high-severity-vulnerability-security-affairs/comment-page-1/#comment-1514561</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 23 Sep 2016 11:40:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47256#comment-1514561</guid>
		<description><![CDATA[OpenSSL Security Advisory [22 Sep 2016]
https://www.openssl.org/news/secadv/20160922.txt

OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
A malicious client can send an excessively large OCSP Status Request extension.
If that client continually requests renegotiation, sending a large OCSP Status
Request extension each time, then there will be unbounded memory growth on the
server. This will eventually lead to a Denial Of Service attack through memory
exhaustion. Servers with a default configuration are vulnerable even if they do
not support OCSP. Builds using the &quot;no-ocsp&quot; build time option are not affected.
Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default
configuration, instead only if an application explicitly enables OCSP stapling
support.

Other solved issues:
SSL_peek() hang on empty record (CVE-2016-6305) - Moderate onlly 1.1.0
SWEET32 Mitigation (CVE-2016-2183) - Low severity attack on older block cipher algorithms]]></description>
		<content:encoded><![CDATA[<p>OpenSSL Security Advisory [22 Sep 2016]<br />
<a href="https://www.openssl.org/news/secadv/20160922.txt" rel="nofollow">https://www.openssl.org/news/secadv/20160922.txt</a></p>
<p>OCSP Status Request extension unbounded memory growth (CVE-2016-6304)<br />
A malicious client can send an excessively large OCSP Status Request extension.<br />
If that client continually requests renegotiation, sending a large OCSP Status<br />
Request extension each time, then there will be unbounded memory growth on the<br />
server. This will eventually lead to a Denial Of Service attack through memory<br />
exhaustion. Servers with a default configuration are vulnerable even if they do<br />
not support OCSP. Builds using the &#8220;no-ocsp&#8221; build time option are not affected.<br />
Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default<br />
configuration, instead only if an application explicitly enables OCSP stapling<br />
support.</p>
<p>Other solved issues:<br />
SSL_peek() hang on empty record (CVE-2016-6305) &#8211; Moderate onlly 1.1.0<br />
SWEET32 Mitigation (CVE-2016-2183) &#8211; Low severity attack on older block cipher algorithms</p>
]]></content:encoded>
	</item>
</channel>
</rss>
