[LACNIC/Seguridad] Fwd: TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)

Carlos Pantelides carlos_pantelides en yahoo.com
Mar Abr 8 21:36:01 BRT 2014


Hola, 

¿Puede ser que esté muy inflada la noticia? Me ha costado horrores hallar un sitio vulnerable, cerca de uno en cincuenta. 

 
Carlos Pantelides


@dev4sec


http://seguridad-agile.blogspot.com/
On Tuesday, April 8, 2014 7:01 PM, Hector Aguirre <hectoraguirre2006 en gmail.com> wrote:
 
Gracias Fernando.

Aquí tienen una url donde pueden realizar la verificación : http://possible.lv/tools/hb/?domain=

Cordiales saludos.

Héctor A.




2014-04-08 17:42 GMT-03:00 Fernando Gont <fernando en gont.com.ar>:

FYI
>
>
>-------- Original Message --------
>Subject:        TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
>Date:   Tue, 08 Apr 2014 15:12:40 -0500
>From:   US-CERT <US-CERT en ncas.us-cert.gov>
>Reply-To:       US-CERT en ncas.us-cert.gov
>
>
>
>TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
>
>NCCIC / US-CERT
>
>National Cyber Awareness System:
>
>TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
><https://www.us-cert.gov/ncas/alerts/TA14-098A>
>04/08/2014 08:46 AM EDT
>
>Original release date: April 08, 2014
>
>
>      Systems Affected
>
>  * OpenSSL 1.0.1 through 1.0.1f
>  * OpenSSL 1.0.2-beta
>
>
>      Overview
>
>A vulnerability in OpenSSL could allow a remote attacker to expose
>sensitive data, possibly including user authentication credentials and
>secret keys, through incorrect memory handling in the TLS heartbeat
>extension.
>
>
>      Description
>
>OpenSSL versions 1.0.1 through 1.0.1f contain a flaw in its
>implementation of the TLS/DTLS heartbeat functionality. This flaw allows
>an attacker to retrieve private memory of an application that uses the
>vulnerable OpenSSL library in chunks of 64k at a time. Note that an
>attacker can repeatedly leverage the vulnerability to retrieve as many
>64k chunks of memory as are necessary to retrieve the intended secrets.
>The sensitive information that may be retrieved using this vulnerability
>include:
>
>  * Primary key material (secret keys)
>  * Secondary key material (user names and passwords used by vulnerable
>    services)
>  * Protected content (sensitive data used by vulnerable services)
>  * Collateral (memory addresses and content that can be leveraged to
>    bypass exploit mitigations)
>
>Exploit code is publicly available for this vulnerability.  Additional
>details may be found in CERT/CC Vulnerability Note VU#720951
><http://www.kb.cert.org/vuls/id/720951>.
>
>
>      Impact
>
>This flaw allows a remote attacker to retrieve private memory of an
>application that uses the vulnerable OpenSSL library in chunks of 64k at
>a time.
>
>
>      Solution
>
>OpenSSL 1.0.1g <http://www.openssl.org/news/secadv_20140407.txt> has
>been released to address this vulnerability.  Any keys generated with a
>vulnerable version of OpenSSL should be considered compromised and
>regenerated and deployed after the patch has been applied.
>
>US-CERT recommends system administrators consider implementing Perfect
>Forward Secrecy <http://en.wikipedia.org/wiki/Perfect_forward_secrecy>
>to mitigate the damage that may be caused by future private key disclosures.
>
>
>      References
>
>  * OpenSSL Security Advisory
>    <http://www.openssl.org/news/secadv_20140407.txt>
>  * The Heartbleed Bug <http://heartbleed.com/>
>  * CERT/CC Vulnerability Note VU#720951
>    <http://www.kb.cert.org/vuls/id/720951>
>  * Perfect Forward Secrecy
>    <http://en.wikipedia.org/wiki/Perfect_forward_secrecy>
>  * RFC2409 Section 8 Perfect Forward Secrecy
>    <http://tools.ietf.org/html/rfc2409#section-8>
>
>
>      Revision History
>
>  * Initial Publication
>
>------------------------------------------------------------------------
>
>This product is provided subject to this Notification
><http://www.us-cert.gov/privacy/notification> and this Privacy & Use
><http://www.us-cert.gov/privacy/> policy.
>
>------------------------------------------------------------------------
>OTHER RESOURCES:
>Contact Us <http://www.us-cert.gov/contact-us/> | Security Publications
><http://www.us-cert.gov/security-publications> | Alerts and Tips
><http://www.us-cert.gov/ncas> | Related Resources
><http://www.us-cert.gov/related-resources>
>
>STAY CONNECTED:
>Sign up for email updates
><http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new>
>
>
>--
>Fernando Gont
>e-mail: fernando en gont.com.ar || fgont en si6networks.com
>PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
>
>
>
>
>
>_______________________________________________
>Seguridad mailing list
>Seguridad en lacnic.net
>https://mail.lacnic.net/mailman/listinfo/seguridad
>


_______________________________________________
Seguridad mailing list
Seguridad en lacnic.net
https://mail.lacnic.net/mailman/listinfo/seguridad
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/seguridad/attachments/20140408/919b2fb9/attachment.html>


Más información sobre la lista de distribución Seguridad