[LACNIC/Seguridad] Fwd: TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)

Hector Aguirre hectoraguirre2006 en gmail.com
Mar Abr 8 19:00:51 BRT 2014


Gracias Fernando.

Aquí tienen una url donde pueden realizar la verificación :
http://possible.lv/tools/hb/?domain=<http://possible.lv/tools/hb/?domain=www.owasp.org>

Cordiales saludos.

Héctor A.


2014-04-08 17:42 GMT-03:00 Fernando Gont <fernando en gont.com.ar>:

> FYI
>
>
> -------- Original Message --------
> Subject:        TA14-098A: OpenSSL 'Heartbleed' vulnerability
> (CVE-2014-0160)
> Date:   Tue, 08 Apr 2014 15:12:40 -0500
> From:   US-CERT <US-CERT en ncas.us-cert.gov>
> Reply-To:       US-CERT en ncas.us-cert.gov
>
>
>
> TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
>
> NCCIC / US-CERT
>
> National Cyber Awareness System:
>
> TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
> <https://www.us-cert.gov/ncas/alerts/TA14-098A>
> 04/08/2014 08:46 AM EDT
>
> Original release date: April 08, 2014
>
>
>       Systems Affected
>
>   * OpenSSL 1.0.1 through 1.0.1f
>   * OpenSSL 1.0.2-beta
>
>
>       Overview
>
> A vulnerability in OpenSSL could allow a remote attacker to expose
> sensitive data, possibly including user authentication credentials and
> secret keys, through incorrect memory handling in the TLS heartbeat
> extension.
>
>
>       Description
>
> OpenSSL versions 1.0.1 through 1.0.1f contain a flaw in its
> implementation of the TLS/DTLS heartbeat functionality. This flaw allows
> an attacker to retrieve private memory of an application that uses the
> vulnerable OpenSSL library in chunks of 64k at a time. Note that an
> attacker can repeatedly leverage the vulnerability to retrieve as many
> 64k chunks of memory as are necessary to retrieve the intended secrets.
> The sensitive information that may be retrieved using this vulnerability
> include:
>
>   * Primary key material (secret keys)
>   * Secondary key material (user names and passwords used by vulnerable
>     services)
>   * Protected content (sensitive data used by vulnerable services)
>   * Collateral (memory addresses and content that can be leveraged to
>     bypass exploit mitigations)
>
> Exploit code is publicly available for this vulnerability.  Additional
> details may be found in CERT/CC Vulnerability Note VU#720951
> <http://www.kb.cert.org/vuls/id/720951>.
>
>
>       Impact
>
> This flaw allows a remote attacker to retrieve private memory of an
> application that uses the vulnerable OpenSSL library in chunks of 64k at
> a time.
>
>
>       Solution
>
> OpenSSL 1.0.1g <http://www.openssl.org/news/secadv_20140407.txt> has
> been released to address this vulnerability.  Any keys generated with a
> vulnerable version of OpenSSL should be considered compromised and
> regenerated and deployed after the patch has been applied.
>
> US-CERT recommends system administrators consider implementing Perfect
> Forward Secrecy <http://en.wikipedia.org/wiki/Perfect_forward_secrecy>
> to mitigate the damage that may be caused by future private key
> disclosures.
>
>
>       References
>
>   * OpenSSL Security Advisory
>     <http://www.openssl.org/news/secadv_20140407.txt>
>   * The Heartbleed Bug <http://heartbleed.com/>
>   * CERT/CC Vulnerability Note VU#720951
>     <http://www.kb.cert.org/vuls/id/720951>
>   * Perfect Forward Secrecy
>     <http://en.wikipedia.org/wiki/Perfect_forward_secrecy>
>   * RFC2409 Section 8 Perfect Forward Secrecy
>     <http://tools.ietf.org/html/rfc2409#section-8>
>
>
>       Revision History
>
>   * Initial Publication
>
> ------------------------------------------------------------------------
>
> This product is provided subject to this Notification
> <http://www.us-cert.gov/privacy/notification> and this Privacy & Use
> <http://www.us-cert.gov/privacy/> policy.
>
> ------------------------------------------------------------------------
> OTHER RESOURCES:
> Contact Us <http://www.us-cert.gov/contact-us/> | Security Publications
> <http://www.us-cert.gov/security-publications> | Alerts and Tips
> <http://www.us-cert.gov/ncas> | Related Resources
> <http://www.us-cert.gov/related-resources>
>
> STAY CONNECTED:
> Sign up for email updates
> <http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new>
>
>
> --
> Fernando Gont
> e-mail: fernando en gont.com.ar || fgont en si6networks.com
> PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
>
>
>
>
>
> _______________________________________________
> Seguridad mailing list
> Seguridad en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/seguridad
>
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/seguridad/attachments/20140408/d3ea47ac/attachment.html>


Más información sobre la lista de distribución Seguridad