|
BugTraq
Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 06:24PM Disclosure From OSSI (disclosure ossecurity ca) (4 replies) RE: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 10:42PM Oliver Lavery (olavery pivx com) RE: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 07:31PM Ward Taylor (rfdhomer windyplains com) (2 replies) Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 10 2004 04:40PM Nexus (nexus patrol i-way co uk) Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 10 2004 10:31AM Peter Pentchev (roam ringlet net) Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 07:20PM Seth Arnold (sarnold wirex com) |
|
Privacy Statement |
This is a total non-issue. Almost every attack vector that could place a
malicious DLL in the same directory as IE could replace IE itself or snap
screen captures. SSL is not intended to protect against attacks on either
endpoint.
This is like complaining that your safe doesn't keep people from breaking
your windows. Of course Microsoft has no intended fix, nothing is broken.
Ironically, the only real fix against someone replacing your browser with a
browser that steals data that is sent encrypted is to integrate the
retrieval/rendering logic into the operating system such that it cannot be
replaced. Something for which nearly every expert in the field has argued
that there is no rational technical justification.
In other words, if you can choose Netscape as your default browser, then an
attacker can choose a browser that tees off your decrypted data. The only
solution is for you to be unable to change your browser.
DS
[ reply ]