Analytics // Threat Intelligence
4/22/2014
08:55 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

Free Scanning Tool Promises To Find Heartbleed On Any Device

CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.

CrowdStrike Friday released a free scanning tool that it says can find the Heartbleed vulnerability on any device that runs OpenSSL.

While a number of free scanning tools have been released since the serious Heartbleed vulnerability was disclosed earlier this month, most of them only scan for the bug on an external web server or a single device, notes Dmitri Alperovitch, co-founder and CTO of CrowdStrike in a blog about the free tools.

Some of the previously-released free tools have also come under fire for failing to detect Heartbleed in all instances. In a blog posted on the Internet Storm Center Monday, researcher Pedro Bueno said scanning tools may not always find the flaw.

CrowdStrike's tool can not only consistently identify the flaw on Web servers, but can find it on OpenSSL virtual private networks, Secure FTP servers, email servers, routers, printers, phones, or any other device that uses OpenSSL, Alperovitch says.

"In addition to the ability to show the list of vulnerable servers, the scanner also outputs the contents of the the 64Kb of memory that a vulnerable server returns back to the Heartbeat SSL request, allowing you to see the extent of the impact of this vulnerability on your devices and services," his blog states.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DarkReadingTim
100%
0%
DarkReadingTim,
User Rank: Strategist
4/23/2014 | 1:32:41 PM
Heartbleed scanners -- good step for the community
While there has been some criticism of the free Heartbleed scanners' ability to catch every instance of the vulnerability, I think it's worth giving the vendors some kudos for their efforts. Several of the free tools came out within days of the vulnerability disclosure, and most of the tools that were rolled out were at no cost. The tools may not be perfect, but it's good to see the community responding quickly to a big problem without necessarily looking to make a buck on it.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/23/2014 | 12:51:20 PM
Testing of Tool
After testing the CrowdStrike tool I can confirm that it was able to identify all of the servers I was able to identify previously.  However, at least in my environment, it did not identify any new servers which were vulnerable.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/22/2014 | 9:26:52 PM
Re: Narrowing the Scope
I have already tested my corporate environment using both the Nessus Heart Bleed plugin (http://www.tenable.com/plugins/index.php?view=single&id=73412) and this python script (https://gist.github.com/eelsivart/10174134) as well as actually attempting to exploit random machines with this exploit (http://www.exploit-db.com/exploits/32791/)

In all of my testing all three methods found the same machines vulnerable.  Tomorrow I will use the crowdstrike tool and compare the results.  I will report back then.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/22/2014 | 12:52:40 PM
Re: Narrowing the Scope
I hsve to second Ryan's call for someone to report on their experience with this tool. Is it working as promosed?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/22/2014 | 9:33:19 AM
Narrowing the Scope
I have not yet tested this tool but it seems very impressive. I would imagine their method of scanning is proprietary but I would be interested to see why, according to the article, their scanner can support these functionalities and why other scanners are failing to detect. Also, has anyone tested this tool and in the results of the scan will it provide you with the verion of OpenSSL or only the version with Heartbleed? The main functionality of this scanner is the Heartbleed vulnerability but from a business standpoint it would be helpful to quickly identify servers via a scanner.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3562
Published: 2014-08-21
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.

CVE-2014-3577
Published: 2014-08-21
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-...

CVE-2014-5158
Published: 2014-08-21
The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors.

CVE-2014-5159
Published: 2014-08-21
SQL injection vulnerability in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary SQL commands via the ws_data parameter.

CVE-2014-5210
Published: 2014-08-21
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.