Home page logo
/

basics logo Security Basics mailing list archives

PHP openssl_x509_parse POC Demo.... Is my Demo viable?
From: Jeffrey Roberts <jeffrey.l.roberts () gmail com>
Date: Tue, 17 Dec 2013 11:00:06 -0500

Greetings!

I am attempting to test my machines to see if they are vulnerable to

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420

I am using the example certificate from

http://www.exploit-db.com/exploits/30395/

My demo can be found at

https://gist.github.com/jeffreyroberts/8006715

My questions is, is my POC/Demo viable?

When I execute the gist, this is the output


[ec2-user () bakerscloud ~]$ php php_dos_poc_openssl_x509_parser.php
[ec2-user () bakerscloud ~]$

I was expecting some sort of error....

-- 
- Jeff

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
  • PHP openssl_x509_parse POC Demo.... Is my Demo viable? Jeffrey Roberts (Dec 18)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]