Just for the sake of clarity, I will redundantly highlight some parts of 
Christopher's
recent message :

Christopher Schultz wrote:
...
* If you are on 1.1.24-1.1.29, then you have been vulnerable. *
...

I can't stress enough that once you update to a fixed version, *you
must re-key your server* and obtain a replacement certificate from
your CA.

You must also consider any communication that traversed your system
while vulnerable to be compromised. That means that every password
that went through your system during the period of vulnerability ought
to be changed.


As I understand it, the real bitch about this bug, is that *during the whole period in which your server was vulnerable* , a knowledgeable attacker would have been able to connect to your server and grab the contents of arbitrary 64 K chunks of memory. This could have contained *anything*, including SSL keys, certificates, decrypted passwords, user-id's, whatever was in such a 64K chunk at that time. And he could do that as often as he wanted, without ever being detected or leaving any trace to allow an analysis later.
And he could record this information, for leasurely inspection and analysis at 
any later time.

There are at least 3 consequences :

1) if you do not change your keys and/or passwords now, then in the future that 
attacker
(and whoever he gives or sells the information to) will be able to access your 
server with
the stolen credentials, and do whatever these credentials allow him to do.

2) if these stolen credentials apply to other systems too, even ones that are not vulnerable and have never been, he can use them there too.
(people use the same keys and passwords for multiple services, that's just a 
fact of life)

3) if he has recorded past encrypted traffic to/from your server, and saved
this recording, then he can at any time go back and decrypt this past traffic, 
and pick up
anything interesting from there, even without having the new keys. Such a recording could contain, for example, any number of submits
from HTML login pages, which were theoretically protected by being made on an 
encrypted
channel. That could probably also contain any communications which your server did with other servers over encrypted channels.

This is all fairly complex, and would require a knowledgeable attacker, one 
that knew
about this bug before "the good guys", one who had the technical means to do this kind of thing, and some serious dedication and planning on top.
That would not be your everyday script-kiddie.
But there are people like that out there, and it may explain a-posteriori a number of high-profile data theft incidents that happened over the last 2 years, and any number of low-profile ones that you never heard about. The point is, nobody knows really.

So I guess that the amount of damage that this can cause is very much dependent 
on what
you have been running on your server, and for whom, and how attractive your 
site may have
been for such a would-be serious attacker.
I would definitely not like to be in the position of having run a HTTPS-based
electronic-payment system over the last 2 years.



---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to