Feeds

Revoke, reissue, invalidate: Stat! Security bods scramble to plug up Heartbleed

Paper is safe. Clay tablets too

Choosing a cloud hosting partner with confidence

Triage

All manner of attacks are possible as a result of the vulnerability.

"The 'Heartbleed' bug has epic repercussions since it affects one of the cryptographic suites that is used to run critical services on the Internet (OpenSSL 1.0.1)," explained Jaime Blasco, director at AlienVault Labs. "The bug permits an attacker to receive the contents of the server's memory, leading to compromise of critical information such as the digital keys that can be later used to decrypt communications or impersonate the real server."=

"By obtaining the memory of the server you can also access data such as username/passwords and even portions of the source code of the application running. The attack can be also combined with a Man-in-the-Middle attack to obtain credentials from the client before the server perform authentication," he added.

Vulnerable websites included Yahoo.com and OpenSSL.com among many others. Affected providers need to replace private keys and certificates after patching all OpenSSL services that rely on the vulnerable OpenSSL cryptographic library.

Mark Schloesser, security researcher at Rapid7, the developers of penetration-testing tool Metasploit, added: "The 'Heartbleed' SSL vulnerability affects widely deployed versions of the OpenSSL library which is used in the majority of software, including web-, email-, database- and chat-servers. It allows the attacker to read a portion of memory from the remote system without the need for any known credentials or other authentication forms.

"The leaked memory areas might contain a lot of different content, ranging from leftover data from previous communication over log messages, up to private key material employed by the service / daemon. For this reason, there are lots of possible attack scenarios that can result from the vulnerability.

"An attacker who gains access to the private key of the server certificate can subsequently mount man-in-the-middle attacks against clients and impersonate the server/service. Log messages might also contain credentials or affect the privacy of communications by other clients," he added.

OpenSSL 0.9.8 and 1.0.0 are still the most popular versions of the software on web servers, and these are not affected. "However we count at least a few hundred thousand servers using affected library versions so that it poses a significant threat," Schloesser warns.

"As the same problem affects other protocols / services such as mail servers and databases, we assume that overall we're looking at millions of vulnerable systems connected to the public internet.

"Affected systems get updated but that's just the start of security remediation. To mitigate against attacks resulting from leaked material, any SSL keys from affected systems should be replaced and revoked," he added.

A short video by ‪Zulfikar Ramzan‬, CTO at cloud security services firm Elastica, explaining how the ‪Heartbleed‬ vulnerability works can be found here.

The newly established ‪CERT UK‬ security clearing house put out its first major advisory on Heartbleed.

A statement by developers of OpenSSL can be found here.

The whole security emergency has already spawned a xkcd funny featuring the tongue-in-cheek observation that at least pen and paper are not affected by the megavuln. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.