我有一个客户端正在运行PCI遵从性扫描,并得到以下结果:
BEAST (Browser Exploit Against SSL/TLS) Vulnerability
The SSL protocol encrypts data by using CBC mode with chained
initialization vectors. This allows an attacker, which is has gotten
access to an HTTPS session via man-in-the-middle (MITM) attacks or other means, to obtain plain text HTTP headers via
a blockwise chosen-boundary attack (BCBA) in conjunction with
Javascript code that uses the HTML5 WebSocket API, the Java
URLConnection API, or the Silverlight WebClient API. This
vulnerability is more commonly referred to as Browser Exploit Against
SSL/TLS or "BEAST".
CVE: CVE-2011-3389
NVD: CVE-2011-3389
Bugtraq: 49778
CVSSv2: AV:N/AC:M/Au:N/C:P/I:N/A:N(4.30)
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=665814,
http://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslciphersuite,
http://technet.microsoft.com/en-us/security/bulletin/ms12-006
Service: http
Evidence:
Cipher Suite: SSLv3 : DES-CBC3-SHA
Cipher Suite: SSLv3 : RC4-SHA
Cipher Suite: SSLv3 : RC4-MD5
Cipher Suite: TLSv1 : AES256-SHA
Cipher Suite: TLSv1 : AES128-SHA
Cipher Suite: TLSv1 : DES-CBC3-SHA
Cipher Suite: TLSv1 : RC4-SHA
Cipher Suite: TLSv1 : RC4-MD5他们的网站托管在Windows Azure上;既然这些服务器是托管的,有没有推荐的方法来填补这个漏洞?
发布于 2012-12-22 09:34:18
你在Azure中运行的到底是什么?它是一个Web角色吗?Azure网站?你自己的Windows服务器在IaaS模式下吗?
如果您运行的是Web角色,您是否正在运行最新的Windows操作系统?Microsoft于2012年4月在Web角色中修补了此问题。
http://msdn.microsoft.com/en-us/library/windowsazure/hh967599.aspx
如果您通过IaaS模式运行Windows server,则您自己负责为服务器打补丁。
https://stackoverflow.com/questions/13997599
复制相似问题