Feeds

Revoke, reissue, invalidate: Stat! Security bods scramble to plug up Heartbleed

Paper is safe. Clay tablets too

Internet Security Threat Report 2014

Triage

All manner of attacks are possible as a result of the vulnerability.

"The 'Heartbleed' bug has epic repercussions since it affects one of the cryptographic suites that is used to run critical services on the Internet (OpenSSL 1.0.1)," explained Jaime Blasco, director at AlienVault Labs. "The bug permits an attacker to receive the contents of the server's memory, leading to compromise of critical information such as the digital keys that can be later used to decrypt communications or impersonate the real server."=

"By obtaining the memory of the server you can also access data such as username/passwords and even portions of the source code of the application running. The attack can be also combined with a Man-in-the-Middle attack to obtain credentials from the client before the server perform authentication," he added.

Vulnerable websites included Yahoo.com and OpenSSL.com among many others. Affected providers need to replace private keys and certificates after patching all OpenSSL services that rely on the vulnerable OpenSSL cryptographic library.

Mark Schloesser, security researcher at Rapid7, the developers of penetration-testing tool Metasploit, added: "The 'Heartbleed' SSL vulnerability affects widely deployed versions of the OpenSSL library which is used in the majority of software, including web-, email-, database- and chat-servers. It allows the attacker to read a portion of memory from the remote system without the need for any known credentials or other authentication forms.

"The leaked memory areas might contain a lot of different content, ranging from leftover data from previous communication over log messages, up to private key material employed by the service / daemon. For this reason, there are lots of possible attack scenarios that can result from the vulnerability.

"An attacker who gains access to the private key of the server certificate can subsequently mount man-in-the-middle attacks against clients and impersonate the server/service. Log messages might also contain credentials or affect the privacy of communications by other clients," he added.

OpenSSL 0.9.8 and 1.0.0 are still the most popular versions of the software on web servers, and these are not affected. "However we count at least a few hundred thousand servers using affected library versions so that it poses a significant threat," Schloesser warns.

"As the same problem affects other protocols / services such as mail servers and databases, we assume that overall we're looking at millions of vulnerable systems connected to the public internet.

"Affected systems get updated but that's just the start of security remediation. To mitigate against attacks resulting from leaked material, any SSL keys from affected systems should be replaced and revoked," he added.

A short video by ‪Zulfikar Ramzan‬, CTO at cloud security services firm Elastica, explaining how the ‪Heartbleed‬ vulnerability works can be found here.

The newly established ‪CERT UK‬ security clearing house put out its first major advisory on Heartbleed.

A statement by developers of OpenSSL can be found here.

The whole security emergency has already spawned a xkcd funny featuring the tongue-in-cheek observation that at least pen and paper are not affected by the megavuln. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.