Questions tagged [heartbleed-bug]

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Source: http://heartbleed.com

OpenSSL Security Advisory [07 Apr 2014] 
========================================

TLS heartbeat read overrun (CVE-2014-0160)
==========================================

A missing bounds check in the handling of the TLS heartbeat extension can be
used to reveal up to 64k of memory to a connected client or server.

Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
1.0.1f and 1.0.2-beta1.

Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
preparing the fix.

Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.

1.0.2 will be fixed in 1.0.2-beta2.

* https://www.openssl.org/news/secadv_20140407.txt

82 questions
1
vote
3 answers

Heartbleed: Payloads and padding

I am left with a few questions after reading the RFC 6520 for Heartbeat: https://www.rfc-editor.org/rfc/rfc6520 Specifically, I don't understand why a heartbeat needs to include arbitrary payloads or even padding for that matter. From what I can…
Niels B.
  • 5,912
  • 3
  • 24
  • 44
1
vote
2 answers

Creating a valid heartbeat request

I've been messing around with the heartbleed bug (mainly the cloudflare challenge) and creating an invalid heartbeat has been easy, I've been sending as follows: ### HEATBEAT ### 0x18, # Content Type (Heartbeat) 0x03, 0x01, # TLS…
Puzzler3141
  • 1,682
  • 2
  • 14
  • 21
1
vote
1 answer

Verify protocol using OpenSSL command line

In light of the recent heartbleed flaw, I am trying to do some analysis of various systems that I connect with (email, login pages, etc). I am trying to use the OpenSSL commandline tool to verify what protocols the systems I connect with are…
Cronk
  • 453
  • 1
  • 6
  • 16
1
vote
2 answers

Does Docker contain the Heardbleed exploit?

Lets assume, I have an vulnerable OpenSSL server in a Docker.io Container. Does Docker prevent memory from the host being read? My assuption is, it does. Because the bug is in OpenSSL and not in the Kernel and Docker should isolate root access in…
Mathias
  • 1,470
  • 10
  • 20
0
votes
0 answers

TLS Heartbeat what is 'content-type'?

I am working on a heartbleed project for my studies to learn more about it. As an implemented example I got this git repository: https://github.com/mpgn/heartbleed-PoC. When the program gets a response from the server, it contains a value that is…
Paul02
  • 18
  • 2
0
votes
1 answer

Trying to recreate Heatbleed with AFL-FUZZ using OpenSSL 1.0.1f

I am here trying to recreate Heartbleed bug on openssl versions prior to 1.0.1g, so I selected openssl 1.0.1f. I installed AFL-FUZZ and then openssl. With help of this and this link I think I have installed openssl but in end it gave me a strange…
aneela
  • 1,457
  • 3
  • 24
  • 45
0
votes
0 answers

I'm testing heartbleed but to my web server

I'm planning to show how heartbleed bug work in my class by making small exercising web server. so using virtual machine, i installed Ubuntu 14.04 OS, which has vulnerable version of openssl(1.0.1f). and installed apache2, made small web site. But…
0
votes
0 answers

Degrading OpenSSL version on xampp to recreate Heartbleed

I'm trying to recreate the heartbleed attack on a localhost apache server. I'm running xampp 1.8.3-2 on my ubuntu, and I want to degrade my OpenSSL version from 1.0.1e to 1.0.1b. I found out some info on the net on how to do this on windows, but…
ZeroWave
  • 1
  • 2
0
votes
1 answer

Is the Ubuntu trusty public repo hosting a heartbleed vulnerable openssl version?

It looks like Ubuntu trusty is hosting OpenSSL Version: 1.0.1f-1ubuntu2.21 Is this actually vulnerable to heartbleed? http://packages.ubuntu.com/source/trusty/openssl http://heartbleed.com/ What versions of the OpenSSL are affected? Status of…
verdverm
  • 329
  • 4
  • 11
0
votes
1 answer

openssl Heart bleed Vulnerability

After SSL installation I found that my website is having Heart bleed Vulnerability. I am using openssl 1.0.1.6. When I am referred some sources it is showing that I need to update my openssl version and need to create new private key and then need…
Santhucool
  • 1,656
  • 2
  • 36
  • 92
0
votes
1 answer

Does enabling the openssl php extension make my server vulnerable to hearbleed bug?

So, on a client machine, we have Apache 2.2 installed that serves a single php application. Apache ssl_module is not enabled and there is no respective configuration for serving the application via https. As far as port 443 is concerned, I am not…
Argyro Kazaki
  • 631
  • 2
  • 6
  • 15
0
votes
1 answer

Cannot connect to the OpenSSL server with OPENSSL_NO_HEARTBEATS enabled

I have a server running OpenSSL v 0.9.8 and a client based on OpenSSL 1.0.1e. When the client OpenSSL library compiled with -DOPENSSL_NO_HEARTBEATS it cannot connect to server. The only thing I see is a error page. Please suggest something. What…
andigor
  • 722
  • 6
  • 17
0
votes
1 answer

non printable characters in memory

In heart bleed exploit, I basically get a lot of weird characters(non-printable) from server. Can somebody tell me, when I read a continuous memory segment, how to interpret those non-printable characters?
asit_dhal
  • 1,239
  • 19
  • 35
0
votes
1 answer

padding about OpenSSL heartbleed

I have something not understand about the padding part of the heartbeat in openSSL. In the code of openssl 1.0.1g, it shows as the followings: n2s(p, payload); if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC…
iceKing
  • 147
  • 3
  • 13
0
votes
1 answer

Python3 understanding ord() in following script... “TypeError: ord() expected string of length 1, but int found”

I have the following script, from a python 2.x based open project: # Heavily based on the work of Jared Stafford import sys import struct import socket import time import select import codecs decode_hex = codecs.getdecoder('hex_codec') def…
user2883656
  • 93
  • 2
  • 9