Following this week’s disclosure of the FREAK attack, and yesterday’s post where we covered impacts and remediation options Microsoft have now stepped up with this advisory https://technet.microsoft.com/en-us/library/security/3046015.
We did cover clients/browsers but here is a dedicated listing, current as of yesterday 5th March:
| Browser | Status |
| Internet Explorer | Security advisory |
| Chrome on Mac OS | Patch available now |
| Chrome on Android | … |
| Safari on Mac OS | Patch expected next week |
| Safari on iOS | Patch expected next week |
| Stock Android Browser | … |
| Blackberry Browser | … |
| Opera on Mac OS | … |
| Opera on Linux | … |
To check your browser to see if it’s vulnerable this tool gives a one-click answer:
https://freakattack.com/clienttest.html
Qualys’ SSL Labs also have a one-click client test tool:
https://dev.ssllabs.com/ssltest/viewMyClient.html