Questions tagged [heartbleed-bug]

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Source: http://heartbleed.com

OpenSSL Security Advisory [07 Apr 2014] 
========================================

TLS heartbeat read overrun (CVE-2014-0160)
==========================================

A missing bounds check in the handling of the TLS heartbeat extension can be
used to reveal up to 64k of memory to a connected client or server.

Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
1.0.1f and 1.0.2-beta1.

Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
preparing the fix.

Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.

1.0.2 will be fixed in 1.0.2-beta2.

* https://www.openssl.org/news/secadv_20140407.txt

82 questions
46
votes
2 answers

Windows Server 2012 R2 and IIS affected by Heartbleed exploit?

"OpenSSL 1.01 — the one production version affected — had been shipping since March 12, 2012" Does this (above) mean that a Windows 2012 R2 server we ordered a month ago, now running HTTPS sites in IIS, is vulnerable to Heartbleed…
adam
  • 2,930
  • 7
  • 54
  • 89
27
votes
2 answers

How can I ensure that Ruby uses an OpenSSL not vulnerable to Heartbleed?

Following the Heartbleed bug, this post on ruby-lang.org describes how to check vulnerability and upgrade. It includes this advice: To verify which version of the OpenSSL library you link to Ruby, use the following: ruby -v -ropenssl -rfiddle -e…
Nathan Long
  • 122,748
  • 97
  • 336
  • 451
16
votes
2 answers

Is the heartbleed bug a manifestation of the classic buffer overflow exploit in C?

In one of our first CS lectures on security we were walked through C's issue with not checking alleged buffer lengths and some examples of the different ways in which this vulnerability could be exploited. In this case, it looks like it was a case…
Rich
  • 3,781
  • 5
  • 34
  • 56
14
votes
3 answers

What are SSL heartbeats?

With all the chatter going on about the heartbleed bug, it's hard to find information on what exactly the exploited heartbeat extension for OpenSSL is used for. Also, is it possible to disable it for Apache w/ mod_ssl without recompling with the…
user193130
  • 8,009
  • 4
  • 36
  • 64
8
votes
1 answer

Is AWS, specifically the load balancer service affected by SSL "Heart Bleed" exploit?

I can't find information on what versions they're using. I'd expect AWS to make a statement about this, because it's a pretty big deal, but again, can't find anything. To answer my own question, YES it is vulnerable. Use this site to…
Abram
  • 413
  • 1
  • 3
  • 13
7
votes
2 answers

HeartBleed python test script

I came across this Python script that tests the server for the HeartBleed vulnerability: Would someone be able to explain the content of the "hello", what is being sent and how was this content constructed? I am not trying to use this script…
VilleLipponen
  • 636
  • 1
  • 13
  • 22
7
votes
1 answer

Heartbeat extension: does it make sense to allow for arbitrary payload?

https://www.rfc-editor.org/rfc/rfc6520 does not explain why a heartbeat request/response round-trip is supposed to contain a payload. It just specifies that there is room for payload and that the response has to contain the same payload as the…
Dr. Jan-Philip Gehrcke
  • 33,287
  • 14
  • 85
  • 130
5
votes
3 answers

Heroku Updating SSL endpoint failed - No key found that signs the certificate

I am trying to replace my SSL cert on my Heroku Rails app. I have reissued the SSL cert and am trying to update the SSL end point. However, When I run the following command I get this error. heroku certs:update server.crt intermediate.crt server.key…
Tyler
  • 678
  • 7
  • 22
4
votes
1 answer

SSL/TLS HeartBleed vulnerability

I am using Https and Tcp over SSL in java application with keystores and truststores. I use selfsigned certificates generated by java keytool. I am came to know about HeartBleed vulnerability with openSSL, do I need to change any implementation from…
DoIt
  • 313
  • 3
  • 12
4
votes
2 answers

heartbleed - Revoke or re-key SSL certificate?

With regards to the openSSL heartbleed issue and resolution, should I revoke OR re-key my existing SSL cert?
Dandan
  • 650
  • 1
  • 10
  • 17
3
votes
1 answer

How can I find the code which caused the Heartbleed Bug before the fix was made?

I can find the open source code for t1_lib.c, but is there a place where old code is stored? I need to do a project where I demonstrate to the class what can happen if this bounds check is not done, but I am not sure how much was added to the file…
3
votes
1 answer

How does Heartbleed affect Ruby on Rails?

Do Rails developers need to make any special changes or considerations based on the OpenSSL Heartbleed vulnerability? Do any of the core Rails libraries rely on the affected OpenSSL versions?
user1454117
3
votes
2 answers

Is SSL_CTX_set_options() the reason why OpenSSL folk used a compile time OPENSSL_NO_HEARTBEATS to disable TLSv1 Heartbeats?

Soon after learning that recompiling with -DOPENSSL_NO_HEARTBEATS will disable TLSv1 Heartbeats in OpenSSL 1.0.1e, I wondered why it was not a run-time option instead, maybe called something like SSL_OP_NO_TLS_HEARTBEATS. Therefore I looked into…
guilleamodeo
  • 270
  • 2
  • 10
3
votes
3 answers

How to set number of bytes with memcpy?

I read about the heartbleed exploit and that is was mistake with memcpy. void * memcpy( void * dest, const void *src, size_t len ); A proper call to memcpy can look like this int a[4711] [4711]; int b[4711] [4711]; /* initialize a */ (void)…
Niklas Rosencrantz
  • 25,640
  • 75
  • 229
  • 424
3
votes
1 answer

Does Jetty use OpenSSL and is it vulnerable to the Heartbleed bug?

Does the Jetty Servlet container use OpenSSL, and is it vulnerable to the Heartbleed bug? I think it should not be impacted as it is supposed to use its own implementation of SSL but I don't know enough of what's going on under the hood to be sure.
Usman Ismail
  • 17,999
  • 14
  • 83
  • 165
1
2 3 4 5 6