Analytics // Threat Intelligence
4/22/2014
08:55 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

Free Scanning Tool Promises To Find Heartbleed On Any Device

CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.

CrowdStrike Friday released a free scanning tool that it says can find the Heartbleed vulnerability on any device that runs OpenSSL.

While a number of free scanning tools have been released since the serious Heartbleed vulnerability was disclosed earlier this month, most of them only scan for the bug on an external web server or a single device, notes Dmitri Alperovitch, co-founder and CTO of CrowdStrike in a blog about the free tools.

Some of the previously-released free tools have also come under fire for failing to detect Heartbleed in all instances. In a blog posted on the Internet Storm Center Monday, researcher Pedro Bueno said scanning tools may not always find the flaw.

CrowdStrike's tool can not only consistently identify the flaw on Web servers, but can find it on OpenSSL virtual private networks, Secure FTP servers, email servers, routers, printers, phones, or any other device that uses OpenSSL, Alperovitch says.

"In addition to the ability to show the list of vulnerable servers, the scanner also outputs the contents of the the 64Kb of memory that a vulnerable server returns back to the Heartbeat SSL request, allowing you to see the extent of the impact of this vulnerability on your devices and services," his blog states.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DarkReadingTim
100%
0%
DarkReadingTim,
User Rank: Strategist
4/23/2014 | 1:32:41 PM
Heartbleed scanners -- good step for the community
While there has been some criticism of the free Heartbleed scanners' ability to catch every instance of the vulnerability, I think it's worth giving the vendors some kudos for their efforts. Several of the free tools came out within days of the vulnerability disclosure, and most of the tools that were rolled out were at no cost. The tools may not be perfect, but it's good to see the community responding quickly to a big problem without necessarily looking to make a buck on it.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/23/2014 | 12:51:20 PM
Testing of Tool
After testing the CrowdStrike tool I can confirm that it was able to identify all of the servers I was able to identify previously.  However, at least in my environment, it did not identify any new servers which were vulnerable.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/22/2014 | 9:26:52 PM
Re: Narrowing the Scope
I have already tested my corporate environment using both the Nessus Heart Bleed plugin (http://www.tenable.com/plugins/index.php?view=single&id=73412) and this python script (https://gist.github.com/eelsivart/10174134) as well as actually attempting to exploit random machines with this exploit (http://www.exploit-db.com/exploits/32791/)

In all of my testing all three methods found the same machines vulnerable.  Tomorrow I will use the crowdstrike tool and compare the results.  I will report back then.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/22/2014 | 12:52:40 PM
Re: Narrowing the Scope
I hsve to second Ryan's call for someone to report on their experience with this tool. Is it working as promosed?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/22/2014 | 9:33:19 AM
Narrowing the Scope
I have not yet tested this tool but it seems very impressive. I would imagine their method of scanning is proprietary but I would be interested to see why, according to the article, their scanner can support these functionalities and why other scanners are failing to detect. Also, has anyone tested this tool and in the results of the scan will it provide you with the verion of OpenSSL or only the version with Heartbleed? The main functionality of this scanner is the Heartbleed vulnerability but from a business standpoint it would be helpful to quickly identify servers via a scanner.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2021
Published: 2014-10-24
Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.4.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.

CVE-2014-3604
Published: 2014-10-24
Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2014-6230
Published: 2014-10-24
WP-Ban plugin before 1.6.4 for WordPress, when running in certain configurations, allows remote attackers to bypass the IP blacklist via a crafted X-Forwarded-For header.

CVE-2014-6251
Published: 2014-10-24
Stack-based buffer overflow in CPUMiner before 2.4.1 allows remote attackers to have an unspecified impact by sending a mining.subscribe response with a large nonce2 length, then triggering the overflow with a mining.notify request.

CVE-2014-7180
Published: 2014-10-24
Electric Cloud ElectricCommander before 4.2.6 and 5.x before 5.0.3 uses world-writable permissions for (1) eccert.pl and (2) ecconfigure.pl, which allows local users to execute arbitrary Perl code by modifying these files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.