---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Microsoft Windows TLS/SSL Session Renegotiation Plaintext Injection Vulnerability SECUNIA ADVISORY ID: SA38365 VERIFY ADVISORY: http://secunia.com/advisories/38365/ DESCRIPTION: Microsoft has acknowledged a vulnerability in Microsoft Windows, which can be exploited by malicious people to manipulate certain data. The vulnerability is caused due to an error in the TLS and SSL protocols while handling session renegotiations. This can be exploited to insert arbitrary plaintext before data sent by a legitimate client in an existing TLS session, via Man-in-the-Middle (MitM) attacks. This is related to: SA37291 The vulnerability is reported in the following products: * Microsoft Windows 2000 SP4 * Windows XP SP2 / SP3 * Windows XP Professional x64 Edition SP2 * Windows Server 2003 SP2 * Windows Server 2003 x64 Edition SP2 * Windows Server 2003 with SP2 for Itanium-based Systems * Windows Vista (optionally with SP1 / SP2) * Windows Vista x64 Edition (optionally with SP1 / SP2) * Windows Server 2008 for 32-bit Systems (optionally with SP2) * Windows Server 2008 for x64-based Systems (optionally with SP2) * Windows Server 2008 for Itanium-based Systems (optionally with SP2) * Windows 7 for 32-bit Systems * Windows 7 for x64-based Systems * Windows Server 2008 R2 for x64-based Systems * Windows Server 2008 R2 for Itanium-based Systems SOLUTION: The vendor recommends to disable support for TLS and SSL renegotiation, if applicable (please see the vendor's advisory for details). ORIGINAL ADVISORY: http://www.microsoft.com/technet/security/advisory/977377.mspx OTHER REFERENCES: SA37291: http://secunia.com/advisories/37291/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------