{"id":922,"date":"2016-03-01T18:26:27","date_gmt":"2016-03-01T16:26:27","guid":{"rendered":"https:\/\/blog.nav.ro\/?p=69"},"modified":"2019-02-19T12:17:02","modified_gmt":"2019-02-19T10:17:02","slug":"actualizarea-openssl-remediaza-vulnerabilitatea-drown","status":"publish","type":"post","link":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/","title":{"rendered":"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown"},"content":{"rendered":"<p>Atacul numit &#8222;Drown&#8221; decripteaz\u0103 sesiunile TLS ce ruleaz\u0103 pe serverele care suport\u0103 SSL v2 \u015fi folosesc RSA key exchange.<\/p>\n<p>O echipa interna\u0163ional\u0103 de cercet\u0103tori a descoperit un atac care poate compromite traficul de re\u0163ea criptat \u00een numai c\u00e2teva ore.<\/p>\n<p>&#8222;Drown&#8221; (Decrypting RSA with Obsolete and Weakened Encryption) decripteaz\u0103 cu succes sesiunile TLS (Transport layer security) eploatand o vulnerabilitate \u00een protocolul mai vechi SSL v2 ce las\u0103 descoperite cheile private RSA. \u00cenc\u0103 o dat\u0103, vechea criptografie afecteaz\u0103 securitatea tuturor comunica\u0163iilor online.<\/p>\n<p>Drown se diferen\u0163iaz\u0103 de alte atacuri TLS prin faptul c\u0103 nu este necesar ca serverle s\u0103 utilizeze versiunea mai veche; atacul va reu\u015fi at\u00e2ta timp c\u00e2t sistemul vizat suport\u0103 SSL v2. Atacul trans-protocol (CVE-2106-0800) ar putea duce la decriptarea oric\u0103rei sesiuni ce folose\u015fte protocolul SSL \/ TLS at\u00e2ta timp c\u00e2t serverul suport\u0103 SSL v2 \u015fi folosetse chei private RSA, au afirmat cercet\u0103torii \u00eentr-un raport tehnic.<\/p>\n<p>Prin efectuarea unor solicit\u0103ri repetate de conexiune SSL v2, cercet\u0103torii au descoperit fragmente de informa\u0163ii despre cheia RSA privat\u0103 a serverului. Dup\u0103 mai multe solicit\u0103ri, ei au reu\u015fit s\u0103 ob\u0163in\u0103 cheia privat\u0103 pentru a decoda sesiunile TLS. Scopul atacului se extinde dac\u0103 organiza\u0163ia reutilizeaz\u0103 cheia privat\u0103 RSA pe servere, chiar dac\u0103 sunt utilizate certificate diferite.<\/p>\n<p>SSL v2, lansat \u00een 1995 \u015fi retras \u00een mai pu\u0163in de un an din cauza sl\u0103biciunilor majore, este suficient de vechi \u00eenc\u00e2t e pu\u0163in probabil ca cineva s\u0103 mai foloseasc\u0103 aceast\u0103 versiune. Browserele \u015fi clien\u0163ii de email nu accept\u0103 SSL v2, \u00eens\u0103 multe servere \u015fi echipamente de re\u0163ea \u00eenc\u0103 mai pot folosi aceast\u0103 versiune. Dac\u0103 un computer solicit\u0103 \u00een mod specific s\u0103 stabileasc\u0103 o sesiune SSL v2, acele servere ar trece pe protocolul vulnerabil \u00een loc s\u0103 utilizeze protocolul implicit \u015fi sigur TLS.<\/p>\n<p>&#8222;De mai mul\u0163i ani, argumentul pentru a nu dezactiva SSL v2 a fost c\u0103 oricum nu \u00eel folose\u015fte nici un browser, deci nu exist\u0103 un pericol iminent&#8221;, a declarat Ivan Ristic, director de inginerie la Qualys.<\/p>\n<p>Drown ilustreaz\u0103 incon\u015ftien\u0163a acestui mod de a g\u00e2ndi, deoarece criptarea \u00eenvechit\u0103 poate fi periculoas\u0103 chiar dac\u0103 nu este folosit\u0103 \u00een mod activ. To\u0163i administratorii trebuie s\u0103 dezactiveze imediat SSL v2 de pe toate serverele lor, \u00een cazul \u00een care ace\u015ftia mai folosesc acest protocol.<\/p>\n<p>Atacul este agravat de dou\u0103 implement\u0103ri adi\u0163ionale \u00een OpenSSL, determin\u00e2nd echipa de proiect s\u0103 lanseze versiunile 1.0.2g \u015fi 1.0.1s pentru a rezolva problemele.<\/p>\n<p><strong>Problema cu OpenSSL<\/strong><\/p>\n<p>OpenSSL versiunile 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze, c\u00e2t \u015fi cele anterioare au o vulnerabilitate ce face mai u\u015foar\u0103 rularea de versiuni mai ieftine dar mai eficiente ale lui Drown (CVE-1026-0703 \u015fi CVE 2016-0704). \u00cen cazul unui atac, cel care vizeaz\u0103 un server vulnerabil ar trebui s\u0103 urm\u0103reasc\u0103 1000 de apeluri TLS, s\u0103 ini\u0163ieze 40.000 de conexiuni SSL v2, \u015fi s\u0103 opereze 250 de comenzi offline pentru a decripta un text cifru RSA TLS de 2048-bi\u0163i. Pe sistemele ce ruleaz\u0103 versiuni vulnerabile de OpenSSL, atacatorul poate ob\u0163ine o cheie pentru una din 260 de conexiuni dup\u0103 ce ruleaz\u0103 aproximativ 17.000 de conexiuni sond\u0103. Calculul dureaz\u0103 mai pu\u0163in de un minut pe un PC rapid.<\/p>\n<p>&#8222;\u00cen cazul \u00een care condi\u0163iile sunt corecte, acela\u015fi defect SSLv2 poate fi folosit \u015fi pentru atacuri MITM \u00een timp real \u015fi chiar \u00eempotriva unor servere care nu accept\u0103 deloc schimburi de chei RSA&#8221;, a mai declarat Ristic.<\/p>\n<p>OpenSSL versiunile 1.0.2a, 1.0.1m, 1.0.0r \u015fi 0.9.8zf lansate \u00een martie 2015 \u015fi mai t\u00e2rziu nu sunt vulnerabile la aceast\u0103 versiune eficient\u0103 a atacului Drown. \u00cen actualizarea din martie 2015 a fost ref\u0103cut codul care con\u0163ine vulnerabilitatea pentru a remedia un defect diferit (CVE 2015-0293), \u00eenchiz\u00e2nd astfel calea atacului.<\/p>\n<p>\u00cen cea mai recent\u0103 actualizare, Open SSL a dezactivat implicit protocolul SSL v2 \u015fi a \u015fters cifrurile SSL v2 EXPORT. Administratorii sunt ruga\u0163i s\u0103 actualizeze versiunile vulnerabile ale OpenSSL c\u00e2t mai cur\u00e2nd posibil.<\/p>\n<p>&#8222;Utilizatorii pot evita aceast\u0103 problem\u0103 dezactiv\u00e2nd protocolul SSLv2 pe toate serverele SSL \/ TLS, \u00een cazul \u00een care nu au f\u0103cut-o deja.&#8221;, a scris echipa de proiect OpenSSL \u00een avizul s\u0103u de securitate.<\/p>\n<p><strong>Detalii despre actualizarea OpenSSL<\/strong><\/p>\n<p>Conform recomand\u0103rii OpenSSL, exist\u0103 c\u00e2teva avertismente pentru serverele ce ruleaz\u0103 versiuni vulnerabile ale OpenSSL. Pentru servere ce ruleaz\u0103 OpenSSL 1.0.1r, 1.0.2f sau ulterioare este suficient\u0103 dezactivarea tuturor cifrurilor SSLv2. Pentru versiunile mai vechi, dezactivarea acestora nu va fi suficient\u0103 deoarece clien\u0163ii r\u0103u-inten\u0163iona\u0163i pot for\u0163a serverul s\u0103 utilizeze SSLv2 folosind cifruri EXPORT. \u00cen aceste cazuri, SSLv2 va trebui dezactivat\u0103.<\/p>\n<p>Actualizarea OpenSSL a abordat, de asemenea, alte cinci vulnerabilit\u0103\u0163i cu sveritate redus\u0103: un bug dublu-free (CVE 2016-0705) care ar putea duce la un atac &#8222;denial-of-service&#8221; sau de corupere a memoriei pentru aplica\u0163iile care primesc chei private DSA din surse suspecte; o scurgere de memorie \u00een metoda de c\u0103utare SRP_VBASE_get_by_user (CVE-2016-0798); un atac de canal secundar care utilizeaz\u0103 conflicte de tip cache-bank pe microarhitectura Intel Sandy Bridge (CVE 2016-0702); probleme de memorie \u00een func\u0163iile BIO_*printf (CVE 2016-0799); \u015fi un bug null pointer deref\/heap corupt \u00een func\u0163ia BN_hex2bn (CVE 2016-0797).<\/p>\n<p>Exist\u0103 tendin\u0163a de a p\u0103stra versiuni mai vechi de tehnologie &#8222;doar ca s\u0103 fie&#8221;, \u00een caz c\u0103 cineva are nevoie sau \u00een caz c\u0103 un proces se bazeaz\u0103 pe aceasta. Modul de a g\u00e2ndi c\u0103 at\u00e2ta timp c\u00e2t nu este utilizat \u00een mod curent, un program nu poate pune siguran\u0163a online \u00een pericol este complet gre\u015fit. Drown se al\u0103tur\u0103 \u00een topul tipurilor de atac recente, Logjam \u015fi FREAK, demonstr\u00e2nd astfel c\u0103 \u015fi protocoalele scoase din uz pot fi atacate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atacul numit &#8222;Drown&#8221; decripteaz\u0103 sesiunile TLS ce ruleaz\u0103 pe serverele care suport\u0103 SSL v2 \u015fi folosesc RSA key exchange. O echipa interna\u0163ional\u0103 de cercet\u0103tori a descoperit un atac care poate compromite traficul de re\u0163ea criptat \u00een numai c\u00e2teva ore. &#8222;Drown&#8221; (Decrypting RSA with Obsolete and Weakened Encryption) decripteaz\u0103 cu succes sesiunile TLS (Transport layer security)<\/p>\n","protected":false},"author":1,"featured_media":996,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[149],"tags":[47,121,69,48],"class_list":["post-922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ssl","tag-certificate-ssl","tag-hacking","tag-infrastructura","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown - NAV.RO Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown - NAV.RO Blog\" \/>\n<meta property=\"og:description\" content=\"Atacul numit &#8222;Drown&#8221; decripteaz\u0103 sesiunile TLS ce ruleaz\u0103 pe serverele care suport\u0103 SSL v2 \u015fi folosesc RSA key exchange. O echipa interna\u0163ional\u0103 de cercet\u0103tori a descoperit un atac care poate compromite traficul de re\u0163ea criptat \u00een numai c\u00e2teva ore. &#8222;Drown&#8221; (Decrypting RSA with Obsolete and Weakened Encryption) decripteaz\u0103 cu succes sesiunile TLS (Transport layer security)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\" \/>\n<meta property=\"og:site_name\" content=\"NAV.RO Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nav6718\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-01T16:26:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-19T10:17:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAV.RO\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nav6718\" \/>\n<meta name=\"twitter:site\" content=\"@nav6718\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAV.RO\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\"},\"author\":{\"name\":\"NAV.RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\"},\"headline\":\"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown\",\"datePublished\":\"2016-03-01T16:26:27+00:00\",\"dateModified\":\"2019-02-19T10:17:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg\",\"keywords\":[\"certificate ssl\",\"Hacking\",\"infrastructura\",\"ransomware\"],\"articleSection\":[\"SSL\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\",\"name\":\"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown - NAV.RO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg\",\"datePublished\":\"2016-03-01T16:26:27+00:00\",\"dateModified\":\"2019-02-19T10:17:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\/\/www.nav.ro\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"name\":\"NAV.RO Blog\",\"description\":\"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO\",\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nav.ro\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\",\"name\":\"NAV Communications\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"width\":1120,\"height\":800,\"caption\":\"NAV Communications\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nav6718\",\"https:\/\/x.com\/nav6718\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\",\"name\":\"NAV.RO\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"caption\":\"NAV.RO\"},\"sameAs\":[\"https:\/\/www.nav.ro\"],\"url\":\"https:\/\/www.nav.ro\/blog\/author\/useradmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown - NAV.RO Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/","og_locale":"ro_RO","og_type":"article","og_title":"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown - NAV.RO Blog","og_description":"Atacul numit &#8222;Drown&#8221; decripteaz\u0103 sesiunile TLS ce ruleaz\u0103 pe serverele care suport\u0103 SSL v2 \u015fi folosesc RSA key exchange. O echipa interna\u0163ional\u0103 de cercet\u0103tori a descoperit un atac care poate compromite traficul de re\u0163ea criptat \u00een numai c\u00e2teva ore. &#8222;Drown&#8221; (Decrypting RSA with Obsolete and Weakened Encryption) decripteaz\u0103 cu succes sesiunile TLS (Transport layer security)","og_url":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/","og_site_name":"NAV.RO Blog","article_publisher":"https:\/\/www.facebook.com\/nav6718","article_published_time":"2016-03-01T16:26:27+00:00","article_modified_time":"2019-02-19T10:17:02+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg","type":"image\/jpeg"}],"author":"NAV.RO","twitter_card":"summary_large_image","twitter_creator":"@nav6718","twitter_site":"@nav6718","twitter_misc":{"Scris de":"NAV.RO","Timp estimat pentru citire":"5 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#article","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/"},"author":{"name":"NAV.RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e"},"headline":"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown","datePublished":"2016-03-01T16:26:27+00:00","dateModified":"2019-02-19T10:17:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/"},"wordCount":963,"publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg","keywords":["certificate ssl","Hacking","infrastructura","ransomware"],"articleSection":["SSL"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/","url":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/","name":"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown - NAV.RO Blog","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg","datePublished":"2016-03-01T16:26:27+00:00","dateModified":"2019-02-19T10:17:02+00:00","breadcrumb":{"@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#primaryimage","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2016\/03\/openssl.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.nav.ro\/blog\/actualizarea-openssl-remediaza-vulnerabilitatea-drown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/www.nav.ro\/blog\/"},{"@type":"ListItem","position":2,"name":"Actualizarea OpenSSL remediaz\u0103 vulnerabilitatea Drown"}]},{"@type":"WebSite","@id":"https:\/\/www.nav.ro\/blog\/#website","url":"https:\/\/www.nav.ro\/blog\/","name":"NAV.RO Blog","description":"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO","publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nav.ro\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.nav.ro\/blog\/#organization","name":"NAV Communications","url":"https:\/\/www.nav.ro\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","width":1120,"height":800,"caption":"NAV Communications"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nav6718","https:\/\/x.com\/nav6718"]},{"@type":"Person","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e","name":"NAV.RO","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","caption":"NAV.RO"},"sameAs":["https:\/\/www.nav.ro"],"url":"https:\/\/www.nav.ro\/blog\/author\/useradmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":1,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/922\/revisions"}],"predecessor-version":[{"id":997,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/922\/revisions\/997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media\/996"}],"wp:attachment":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media?parent=922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/categories?post=922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/tags?post=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}