Analytics // Threat Intelligence
4/22/2014
08:55 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

Free Scanning Tool Promises To Find Heartbleed On Any Device

CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.

CrowdStrike Friday released a free scanning tool that it says can find the Heartbleed vulnerability on any device that runs OpenSSL.

While a number of free scanning tools have been released since the serious Heartbleed vulnerability was disclosed earlier this month, most of them only scan for the bug on an external web server or a single device, notes Dmitri Alperovitch, co-founder and CTO of CrowdStrike in a blog about the free tools.

Some of the previously-released free tools have also come under fire for failing to detect Heartbleed in all instances. In a blog posted on the Internet Storm Center Monday, researcher Pedro Bueno said scanning tools may not always find the flaw.

CrowdStrike's tool can not only consistently identify the flaw on Web servers, but can find it on OpenSSL virtual private networks, Secure FTP servers, email servers, routers, printers, phones, or any other device that uses OpenSSL, Alperovitch says.

"In addition to the ability to show the list of vulnerable servers, the scanner also outputs the contents of the the 64Kb of memory that a vulnerable server returns back to the Heartbeat SSL request, allowing you to see the extent of the impact of this vulnerability on your devices and services," his blog states.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DarkReadingTim
100%
0%
DarkReadingTim,
User Rank: Strategist
4/23/2014 | 1:32:41 PM
Heartbleed scanners -- good step for the community
While there has been some criticism of the free Heartbleed scanners' ability to catch every instance of the vulnerability, I think it's worth giving the vendors some kudos for their efforts. Several of the free tools came out within days of the vulnerability disclosure, and most of the tools that were rolled out were at no cost. The tools may not be perfect, but it's good to see the community responding quickly to a big problem without necessarily looking to make a buck on it.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/23/2014 | 12:51:20 PM
Testing of Tool
After testing the CrowdStrike tool I can confirm that it was able to identify all of the servers I was able to identify previously.  However, at least in my environment, it did not identify any new servers which were vulnerable.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/22/2014 | 9:26:52 PM
Re: Narrowing the Scope
I have already tested my corporate environment using both the Nessus Heart Bleed plugin (http://www.tenable.com/plugins/index.php?view=single&id=73412) and this python script (https://gist.github.com/eelsivart/10174134) as well as actually attempting to exploit random machines with this exploit (http://www.exploit-db.com/exploits/32791/)

In all of my testing all three methods found the same machines vulnerable.  Tomorrow I will use the crowdstrike tool and compare the results.  I will report back then.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/22/2014 | 12:52:40 PM
Re: Narrowing the Scope
I hsve to second Ryan's call for someone to report on their experience with this tool. Is it working as promosed?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/22/2014 | 9:33:19 AM
Narrowing the Scope
I have not yet tested this tool but it seems very impressive. I would imagine their method of scanning is proprietary but I would be interested to see why, according to the article, their scanner can support these functionalities and why other scanners are failing to detect. Also, has anyone tested this tool and in the results of the scan will it provide you with the verion of OpenSSL or only the version with Heartbleed? The main functionality of this scanner is the Heartbleed vulnerability but from a business standpoint it would be helpful to quickly identify servers via a scanner.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2174
Published: 2015-05-24
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors,...

CVE-2015-0713
Published: 2015-05-24
The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software befor...

CVE-2015-0722
Published: 2015-05-24
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.

CVE-2015-1894
Published: 2015-05-24
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2015-1895
Published: 2015-05-24
IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 relies on client-side code to verify authorization, which allows remote attackers to bypass intended access restrictions by modifying the client behavior.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.