Gibson Index

2014-04-08: Heartbleed: To Panic Or Not?

News dropped this week of a critical bug dubbed "Heartbleed" in the widely used OpenSSL library - this bug essentially renders any SSL-enabled server vulnerable to memory sniffing, which can reveal things like usernames, passwords, and private SSL keys. In other words, it's pretty serious.

All over twitter, people are talking about how to use the Heartbleed vulnerability to scoop out the memory of remote servers, 64 kilobytes at a time. This appears to be more than enough bytespace to grab passwords and private keys - possibly even from e-commerce sites, Amazon ELB, yahoo services, etc. At the moment it's kind of open season with people (malicious and well-intentioned alike) exploring exactly what this bug can reveal.

This vulnerability was introduced in OpenSSL 1.0.1, as part of a "heartbeat" feature. If you run an SSL-enabled web service - this can be anything from IM servers to VPN servers to HTTPS servers - you should look into upgrading to the latest OpenSSL library immediately. (Note that older Linux distributions may not have this security update available; it might be wise to find a way to force the installation of a pre-1.0.1 library)

Related Tweets:

Related Links:


comments powered by Disqus