1

When I research about FREAK attack, most of them explain about the server and browser vulnerability, but how about native apps (e.g. Windows executable program, mobile apps)?

From Mark's answer on Can someone explain, in simple terms, how the FREAK attack on browsers works?,

As far as I can tell, the "FREAK" vulnerability affects the SChannel library (Internet Explorer and related Windows browsers), Apple's SSL library (Safari and other MacOSX/IOS browsers), and OpenSSL (most Android browsers and a scattering of Linux browsers). The NSS library (Firefox and Chrome) does not appear to be affected.

it seems that it's related to the TLS libraries they are using. Is it also the same for native apps?

If it is, then as a user, how can we detect that?

Andrew T.
  • 563
  • 5
  • 14

1 Answers1

2

Yes, it's the same for native apps.

On Windows, you can simply assume that the application is using SChannel and be right 99% of the time; the same for MacOSX/iOS and Secure Transport. On Linux, you can run ldd /path/to/program/binary and inspect the output for either libgnutls (GnuTLS) or libssl (OpenSSL/LibreSSL). I don't know how you'd figure it out for Android.

Mark
  • 34,390
  • 9
  • 85
  • 134