• Websites, mail servers, and other TLS-dependent services are at risk for the DROWN attack. At the time of public disclosure, many popular sites were affected.
  • The investigators, who described the attack above as the general DROWN attack also found a specific weakness in the OpenSSL implementation of SSLv2 that...
  • The DROWN attack, a cross-protocol attack on TLS using SSLv2 vulnerability, was first reported to OpenSSL on December 29th 2015.
  • The researchers who discovered the flaw stated that as many as 11.5 million websites who use the HTTPS protocol may be at risk from DROWN attack.
  • Those already vulnerable to DROWN attack do not need to re-issue certificates but are recommended to take action in order to prevent the attack immediately.
  • In technical terms, DROWN is a new form of cross-protocol Bleichenbacher padding oracle attack. It allows an attacker to decrypt intercepted TLS connections by...
  • A DROWN attack is a type of Denial-of-Service (DoS) attack that targets a web application by flooding it with requests that contain large amounts of data.
  • We'll dive into the topic of DROWN attacks. 0:00 Introduction to the DROWN vulnerability0:55 What is the DROWN vulnerability?
  • It allows an attacker to decrypt modern TLS connections between up-to-date ... So how do you protect yourself and your company against a DROWN-type attack?
  • We also provide a brief technical summary below: In technical terms, DROWN is a new form of cross-protocol Bleichenbacher padding oracle attack.