All, I just saw: http://www.kb.cert.org/vuls/id/987798 It is a scary sounding attack since so much banking etc. is conducted via SSL Can someone explain the lifecycle of this attack to me? Does the vulnerability mean that an attacker could: - infect s PC (obviously linux is more difficult than windows, but Java vulnerabilities exist anywhere it is used) - use malware introduced via infection to query various banks and break SSL encryption key without the user even being logged into the protected website - watch network activity until a login to one of the banks in question occurs, then capture the login / password (Obviously, any ssl protected website could be similarly attacked. eg. gmail, salesforce, etc.) I assume that for a bad guy with the exploit in hand the hardest part of the above is monitoring the network activity at a low enough level to observe the compressed packets? Can software running with normal user privileges observe their own packets in that much detail, or does this attack require root access on the victim computer? Greg -- Greg Freemyer -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org