theregister.co.uk/2012/09/07 … ck_attack/ [anglais]
[quote]Juliano Rizzo and Thai Duong are due to present their work, dubbed CRIME, at the Ekoparty Security Conference in Argentina this month. The CRIME attack revolves around security shortcomings in TLS, but details are being withheld ahead of the presentation. The researchers warn that all versions of TLS/SSL are at risk – including TLS 1.2 which was resistant to their earlier BEAST (Browser Exploit Against SSL/TLS) technique.
The CRIME vulnerability involves exploiting cryptographic weaknesses present in the protocol. The information leaked provides enough clues to decrypt a user’s supposedly protected cookies, allowing attackers to pose as their victims and hijack secure connections to websites.
“By running JavaScript code in the browser of the victim and sniffing HTTPS traffic, we can decrypt session cookies,” Rizzo told Threatpost. “We don’t need to use any browser plugin and we use JavaScript to make the attack faster, but in theory we could do it with static HTML.”[/quote]
Pour les anglophobes : toutes les versions de SSL/TLS sont concernées, l’attaque fonctionne directement dans le navigateur de l’utilisateur (Javascript ou simple HTML) et permet de récupérer les cookies protégés (donc de réutiliser les sessions de la victime). L’attaque n’a été testée que sur Chrome et Firefox pour le moment. On en saura plus lors de la conférence Ekoparty les 19-20-21 septembre.