Heartbleed: Serious OpenSSL zero day vulnerability revealed

Discussion in 'privacy technology' started by ronjor, Apr 7, 2014.

  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From A taxonomy of Heartbleed attacks:
     
  2. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    How To Detect Heartbleed Mutations.

    -- Tom
     
  4. hogndog

    hogndog Registered Member

    Joined:
    Jun 9, 2007
    Posts:
    632
    Location:
    In His Service
    Don't know if this has been posted somewhere but i found this while looking for a fix in Puppy Linux.. :)

    Find out if your server is affected
    Run the command:

    openssl version

    to get the version number of openssl. If the command shows e.g.:

    openssl version
    OpenSSL 1.0.1e 11 Feb 2013

    then your server might be vulnerable as the version is below 1.0.1g. But some Linux distributions patch packages, see below for instructions to find out if the package on your server has been patched.

    If your server uses a 0.9.8 release like it is used on Debian squeeze, then the server is not vulnerable as the heartbeat function has been implemented in OpenSSL 1.0.1 and later versions only.

    openssl version
    OpenSSL 0.9.8o 01 Jun 2010

    http://www.howtoforge.com/find_out_...ed_vulnerability_cve-2014-0160_and_how_to_fix
     
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,907
    Location:
    Slovenia, EU
  6. hogndog

    hogndog Registered Member

    Joined:
    Jun 9, 2007
    Posts:
    632
    Location:
    In His Service
    i found a fix "that works" in Linux and there's one for Mac as well.. :)

    steps ( For Linux )
    wget http://www.openssl.org/source/openssl-1.0.1g.tar.gz
    tar -xvzf openssl-1.0.1g.tar.gz
    cd openssl-1.0.1g
    ./config --prefix=/usr/
    make
    sudo make install

    steps ( for mac )
    wget http://www.openssl.org/source/openssl-1.0.1g.tar.gz
    tar -xvzf openssl-1.0.1g.tar.gz
    cd openssl-1.0.1g
    ./Configure darwin64-x86_64-cc --prefix=/usr
    make
    sudo make install

    http://www.computersnyou.com/3155/2014/04/update-install-openssl-source-latest-version/
     
  7. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,907
    Location:
    Slovenia, EU
    http://threatpost.com/siemens-update-on-heartbleed-patches-in-ics-scada
     
  8. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  9. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  10. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,907
    Location:
    Slovenia, EU
    http://threatpost.com/the-white-house-and-zero-day-sleight-of-hand
     
  12. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  13. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    177,032
    Location:
    Texas
  14. Justintime123

    Justintime123 Registered Member

    Joined:
    Jun 15, 2013
    Posts:
    99
    *NEW* Community Tool: CrowdStrike Heartbleed Scanner
    Apr 18, 2014 | Dmitri Alperovitch, Co-Founder & CTO
    Since last week, several researchers and security companies have released free web-based scanners for the OpenSSL Heartbleed (CVE-2014-0160) vulnerability independently revealed on April 7th. While these may be great and easy to use tools to determine if your public website may be vulnerable to this issue (although, some have been found not to be very accurate), we realized that there was a largely unmet demand for an easy to use UI tool capable of also scanning the internal networks and non-HTTPS services for this vulnerability since this problem is so much bigger than just external websites.

    Today we are happy to release a new free community CrowdStrike Heartbleed Scanner built by our very own Robin Keir, CrowdStrike community tool developer extraordinaire. With this tool, you can now easily scan your Intranet SSL websites, OpenSSL VPNs, Secure FTP servers, Databases, Secure SMTP/POP/IMAP email servers, routers, printers, phones, and anything else that may have been compiled with OpenSSL 1.0.1-1.0.1f.

    In addition to the ability to show the list of vulnerable servers, the scanner also outputs the contents of the the 64kb of memory that a vulnerable server returns back to the heartbeat SSL request allowing you to see the extent of the impact of this vulnerability on your devices and services.

    http://www.crowdstrike.com/blog/new-community-tool-crowdstrike-heartbleed-scanner/
     
  15. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    @ Justintime123

    Re - CrowdStrike Heartbleed Scanner

    Already posted by lotuseclat79 in Post #193. For some reason/s Nobody responded ? apart from me. I tried it in Post #196 & still no response ?
     
  16. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    What happend to Post #216 ?
     
  17. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    177,032
    Location:
    Texas
  18. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,907
    Location:
    Slovenia, EU
  19. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    177,032
    Location:
    Texas
    http://www.securityweek.com/heartbleed-vulnerability-still-beating-strong
     
  20. Compu KTed

    Compu KTed Registered Member

    Joined:
    Dec 18, 2013
    Posts:
    1,448
    CASC Heartbleed Response

    Google moved away from supporting OCSP without adequately informing Chrome users of this
    fact. Although IE and Safari also soft-fail if an OCSP response is not received, those
    browsers still use OCSP by default.
    The engineers creating those browsers apparently have not concluded that OCSP is broken.
    Even if revocation checking by OCSP isn’t 100 percent accurate, it can still protect a high
    percentage of users who navigate to a site with a revoked certificate and receive an OCSP
    response indicating revocation. Turning off revocation checking for everyone means that no
    one is protected.

    The CASC agrees that OCSP Stapling, and putting OCSP Must-Staple extensions in certificates, is
    one of the best solutions to address many issues with revocation at this time. But until
    that happens, we oppose browsers removing (non-stapled) OCSP checks.

    https://casecurity.org/2014/05/08/casc-heartbleed-response/
     
  21. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  22. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
  23. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,907
    Location:
    Slovenia, EU
    Critical industrial control systems remain vulnerable to Heartbleed exploits
    http://arstechnica.com/security/201...ems-remain-vulnerable-to-heartbleed-exploits/
     
  24. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    177,032
    Location:
    Texas
    http://www.net-security.org/secworld.php?id=17159
     
  25. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,907
    Location:
    Slovenia, EU
    97% of Global 2000 remain vulnerable to due to Heartbleed
    http://www.net-security.org/secworld.php?id=17180
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.