Questions tagged [heartbleed-bug]

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Source: http://heartbleed.com

OpenSSL Security Advisory [07 Apr 2014] 
========================================

TLS heartbeat read overrun (CVE-2014-0160)
==========================================

A missing bounds check in the handling of the TLS heartbeat extension can be
used to reveal up to 64k of memory to a connected client or server.

Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
1.0.1f and 1.0.2-beta1.

Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
preparing the fix.

Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.

1.0.2 will be fixed in 1.0.2-beta2.

* https://www.openssl.org/news/secadv_20140407.txt

82 questions
-1
votes
1 answer

Apache2 and HeartBleed SSL issue

I am using apache2 server runing on a Ubuntu Server 12.04 LTS. In my apache2 conf file there is a host that looks like this. IfModule mod_ssl.c> VirtualHost *:443> //Every configuration for the virtual host working fine. /VirtualHost> /IfModule> I…
mdev
  • 472
  • 7
  • 18
-1
votes
1 answer

OpenSSL bug and linux process memory management

Wrt to recent OpenSSL bug, is it possible for a user-space app to read other's process memory via mmap? This is in reference to the bug description found at http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html I guess, the…
Jimm
  • 8,165
  • 16
  • 69
  • 118
-1
votes
1 answer

Was my AWS ELB SSL connection vulnerable to HeartBleed

I have an Elastic Load Balancer on AWS that does NOT terminate the SSL connection on the Load Balancer. Was my connection vulnerable to the HeartBleed bug before Amazon patched the ELB service? My understanding is that only connections that…
Shaun Bowe
  • 9,840
  • 11
  • 50
  • 71
-1
votes
2 answers

Are new SSL Certificates after patching Heartbleed?

We've upgraded our servers and regenerated any cpanel / dovecot / ssh keys. do our customers also need to regenerate a CSR and SSL certificates? I've not seen any information on this aspect of things. Thanks
TheBritishAreComing
  • 1,667
  • 2
  • 19
  • 38
-2
votes
2 answers

memcpy() not working as expected

I'm trying to make a simple implementation of the Heartbleed Bug in C/C++ over Linux (Using ElementaryOS on vmplayer). From my understanding of the heartbleed bug, it involves the client sending a heartbeat request to the server, specifying a…
Aamir Khan
  • 2,945
  • 2
  • 25
  • 32
-2
votes
1 answer

What versions (if any) of JBoss are affected by the Heartbleed vulnerability?

Anyone know the best way to determine whether my JBoss application is vulnerable to the heartbleed security bug? I am using JBoss versions 4.0.4 and 5.1.0.
Mike Kantor
  • 1,400
  • 4
  • 24
  • 45
-3
votes
2 answers

Is my openssl version vulnerable?

I just installed Centos 7, with the default settings and i'd like to be sure if my openssl version is affected by heartbleed. I guess it's not, because the version command says built on: Mon Dec 14 05:15:47 UTC 2015 and most of the vulnerable…
Jojo01
  • 1,269
  • 4
  • 14
  • 35
1 2 3 4 5
6