Executive Summary
Summary | |
---|---|
Title | Update For Minimum Certificate Key Length |
Informations | |||
---|---|---|---|
Name | KB2661254 | First vendor Publication | 2012-08-14 |
Vendor | Microsoft | Last vendor Modification | 2012-10-09 |
Severity (Vendor) | N/A | Revision | 2.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | Not Defined | Attack Range | Not Defined |
Cvss Impact Score | Not Defined | Attack Complexity | Not Defined |
Cvss Expoit Score | Not Defined | Authentication | Not Defined |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft is announcing the availability of an update to Windows that restricts the use of certificates with RSA keys less than 1024 bits in length. The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. Note This update impacts applications and services that use RSA keys for cryptography and call into the CertGetCertificateChain function. These applications and services will no longer trust certificates with RSA keys less than 1024 bits in length. Examples of impacted applications and services include but are not limited to encrypted email, SSL/TLS encryption channels, signed applications, and private PKI environments. Certificates that use cryptographic algorithms other than RSA are not affected by this update. For more information about applications and services impacted by this update, see Microsoft Knowledge Base Article 2661254. The update is available on the Download Center as well as the Microsoft Update Catalog for all supported releases of Microsoft Windows. In addition, as of October 9, 2012, this update is offered via automatic updating and through the Microsoft Update service. Recommendation. Microsoft recommends that customers apply the update at the earliest opportunity. Please see the Suggested Actions section of this advisory for more information. Known Issues. Microsoft Knowledge Base Article 2661254 documents the currently known issues that customers may experience when installing this update. The article also documents recommended solutions for these issues. For more information about this issue, see the following references: This advisory discusses the following software. Why was this advisory revised on October 9, 2012? Why was this advisory revised on September 11, 2012? For more information about the possible impact to customers and known issues that customers may experience when installing this update, see Microsoft Knowledge Base Article 2661254. What is the scope of the advisory? How might an attacker use certificates fraudulently? How might an attacker duplicate a certificate? What is a man-in-the-middle attack? What is a digital certificate? How do I prepare for this release? When will Microsoft release this update to Microsoft Update? What does the KB2661254 update do? Additionally, the update can be configured to log when certificates are blocked by the update. For more information regarding enabling this logging feature, please see the Suggested Actions section of this Advisory. For a complete list of scenarios on how this update will block the usage of RSA keys less than 1024 bits in length, please see the Microsoft Knowledge Base Article 2661254. Does this update apply to Windows 8 Release Preview or Windows Server 2012 Release Candidate? What if I find a certificate with a RSA key less than 1024 bits in length? What is a certification authority (CA)? A certification authority can refer to the following: For supported releases of Microsoft Windows Most customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871. For administrators and enterprise installations, or end users who want to install the KB2661254 update manually, Microsoft recommends that customers download the update and assess the impact of requiring that certificates with RSA keys use 1024 bit key length or greater. See Microsoft Knowledge Base Article 2661254 for download links to the update packages or search the Microsoft Update Catalog for the update packages. Administrators and enterprise installations should assess their environment for the existence of certificates with RSA keys less than 1024 bits in length and re-issue these certificates. For more information about applications and services impacted by this update, see Microsoft Knowledge Base Article 2661254. Customers who previously applied the original KB2661254 update, prior to October 9, 2012, need to apply the rereleased update packages to avoid an issue with digital certificates described in Microsoft Security Advisory 2749655. See the Advisory FAQ for more information. Please see Microsoft Knowledge Base Article 2661254 for detailed instructions on how to find RSA certificates that are currently in use in the enterprise. Examine Microsoft Knowledge Base Article 2661254 for a list of scenarios when this update will block certificates with RSA keys less than 1024 bits in length. By default, logging is not enabled. Logging can be enabled to help identify the usage of RSA keys less than 1024 bits in length by setting the logging directory in the registry. Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk. You can apply this .reg file to individual systems by double-clicking it. You can also apply it across domains by using Group Policy. For more information about Group Policy, see Core Group Policy Tools and Settings. Impact of Workaround: Enabling logging on a production system can cause performance issues and should be used with caution. Special attention should be given to the directory that logging is enabled on to avoid filling up the volume. This directory also needs to be configured to allow all appropriate systems to write to this location. Customers should never allow anonymous users to write to shares within the organization. We continue to encourage customers to follow our Protect Your Computer guidance of enabling a firewall, getting software updates, and installing antivirus software. For more information, see Microsoft Safety & Security Center. Users running Microsoft software should apply the latest Microsoft security updates to help make sure that their computers are as protected as possible. If you are not sure whether your software is up to date, visit Microsoft Update, scan your computer for available updates, and install any high-priority updates that are offered to you. If you have automatic updating enabled and configured to provide updates for Microsoft products, the updates are delivered to you when they are released, but you should verify that they are installed. |
Original Source
Url : http://www.microsoft.com/technet/security/advisory/2661254.mspx |
Alert History
Date | Informations |
---|---|
2014-02-17 11:38:39 |
|
2013-02-06 19:08:06 |
|