Windows Azure Beast漏洞攻击

Windows Azure Beast漏洞攻击,azure,Azure,我有一个客户端正在运行PCI合规性扫描并恢复以下内容: BEAST (Browser Exploit Against SSL/TLS) Vulnerability The SSL protocol encrypts data by using CBC mode with chained initialization vectors. This allows an attacker, which is has gotten access to an HTTPS session via man-in

我有一个客户端正在运行PCI合规性扫描并恢复以下内容:

BEAST (Browser Exploit Against SSL/TLS) Vulnerability
The SSL protocol encrypts data by using CBC mode with chained
initialization vectors. This allows an attacker, which is has gotten
access to an HTTPS session via man-in-the-middle (MITM) attacks or other means, to obtain plain text HTTP headers via
a blockwise chosen-boundary attack (BCBA) in conjunction with
Javascript code that uses the HTML5 WebSocket API, the Java
URLConnection API, or the Silverlight WebClient API. This
vulnerability is more commonly referred to as Browser Exploit Against
SSL/TLS or "BEAST".
CVE: CVE-2011-3389
NVD: CVE-2011-3389
Bugtraq: 49778
CVSSv2: AV:N/AC:M/Au:N/C:P/I:N/A:N(4.30)
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=665814,
http://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslciphersuite,
http://technet.microsoft.com/en-us/security/bulletin/ms12-006
Service: http
Evidence:
Cipher Suite: SSLv3 : DES-CBC3-SHA
Cipher Suite: SSLv3 : RC4-SHA
Cipher Suite: SSLv3 : RC4-MD5
Cipher Suite: TLSv1 : AES256-SHA
Cipher Suite: TLSv1 : AES128-SHA
Cipher Suite: TLSv1 : DES-CBC3-SHA
Cipher Suite: TLSv1 : RC4-SHA
Cipher Suite: TLSv1 : RC4-MD5

他们的网站托管在WindowsAzure上;既然这些服务器是被管理的,那么有没有一种推荐的方法来填补这个漏洞呢?

你在Azure中运行的到底是什么?它是一个网络角色吗?Azure网站?您自己的Windows服务器是否处于IaaS模式

如果您正在运行Web角色,您是否正在运行最新的Windows操作系统?2012年4月,Microsoft在Web角色中修补了此问题


如果您是通过IaaS模式运行Windows Server,则修补服务器是您自己的责任。

-建议的方法是不要在Azure上托管需要PCI遵从性的内容。嗯,这非常有用。非常感谢。操作系统系列:Windows Server 2008 R2-----操作系统版本:AutomaticI我正在运行azure网站。