This document discusses the DROWN attack in detail. It describes how the attack works by exploiting vulnerabilities in the SSLv2 protocol to decrypt TLS connections. Specifically, it uses a Bleichenbacher padding oracle attack and works by intercepting TLS handshake messages, transforming them, and sending them to an SSLv2 server to recover the premaster secret and decrypt traffic. The document provides information on the computational requirements, prevalence of vulnerable servers, variations of the attack that can decrypt more quickly, and recommendations for mitigation.
Related topics: