NCSG-DISCUSS Archives

NCSG-Discuss

NCSG-DISCUSS@LISTSERV.SYR.EDU

Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Wisdom Donkor <[log in to unmask]>
Reply To:
Wisdom Donkor <[log in to unmask]>
Date:
Wed, 2 Mar 2016 11:09:18 +0000
Content-Type:
multipart/mixed
Parts/Attachments:
Dear All,

Network traffic encrypted using an RSA-based SSL certificate may be
decrypted if enough SSLv2 handshake data can be collected. Exploitation of
this vulnerability - referred to as DROWN in public reporting - may allow a
remote attacker to obtain the private key of a server supporting SSLv2.
CERT-GH encourages users and administrators to review the attached advisory
for additional information and mitigation details.

Find attached advisory

Kind Regards

CERT-GH
Operations
6th Floor,Ghana House,High Street
PMB, Ministries Post Office
Accra,Ghana
www.cert-gh.org
-----BEGIN PGP SIGNATURE-----
Version: BCPG v1.47

iGIEARECACIFAlYOq58bHENFUlQtR0ggPHRlYW1AY2VydC1naC5vcmc+AAoJEPSE
nVZ6ksPd5ZwAoKDSDLMJwdGtW63kUA7GbxvIn5nfAJwOoLHaf3fZB2ZOKu2rwMLo
PD99EA==
=/LMu
-----END PGP SIGNATURE-----


ATOM RSS1 RSS2