Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Emergency SSL/TLS Patching Under Way
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/8/2014 | 2:56:14 PM
On the backend
This is very scary that this exploit has come to light. Especially since it is very difficult and will be extensive to make sure that this exploit is remediated based on some of the safeguards mentioned in the article. If you can spoof the server and step in as if you were that server from a malicious standpoint there is no end to the data that will be compromised. Also, does anyone know how this vulnerability came to be? Meaning I am sure there are many ways that a site can be checked for activity, what is it about the previous creation of the heartbeat extension that provided this hole?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
4/8/2014 | 2:59:41 PM
Re: On the backend
That's a great question, @Ryan Sepe. I know it was an implementation flaw in OpenSSL. It would be interesting to know what exactly introduced the problem in that version 2 years ago.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
4/8/2014 | 4:49:34 PM
Re: On the backend
Official voices referes to an implementation mistake ... but Snowden's revelations have sown the seeds of distrust. This is just the beginning.  The only certainty is that the flaw is very disconcerting ... and probably many Intelligence agencies have exploited it in the past.

 
Li Tan
50%
50%
Li Tan,
User Rank: Apprentice
4/8/2014 | 10:20:47 PM
Re: On the backend
I fully agree - now we are in the era of risk and uncertainty. Somehow as the normal people, we have to ignore something on purpose. If I think over about how many people/agencies have found my personal data during various exploration, I feel really deterred and cannot sleep well.:-(
sidd_452
50%
50%
sidd_452,
User Rank: Apprentice
4/9/2014 | 4:46:24 AM
OpenSSL TLS DTLS Heartbeat Extension
How important are the Antivirus Vendors in releasing the singatures for this vulnerablility as they use the webservers like apache?
Ed Moyle
50%
50%
Ed Moyle,
User Rank: Apprentice
4/9/2014 | 8:24:29 AM
Tip of the iceberg IMHO
Heartbleed is, without question, an "earthshattering" bug.  However, it strikes me that there's still another shoe to drop.  What I mean by that is that OpenSSL is open source, right?  Tons of other developers use it: they link against it, copy/paste it, set up web services to incorporate it, etc.  

Remember the ASN1 parsing vulnerability from a few years back (http://www.securityfocus.com/bid/8732)?  Take a look at the list of products impacted and you'll see what I mean (the list goes on for page after page).  Why were so many products impacted?  Becuase that source was reused - and reused - and reused again.  We were literally dealing with that bug for a decade after the fact because that code was used in everything from embedded devices to medical equipment to ICS systems. 

So what really concerns me is less the population of web servers that this impacts - because, impactful as that is, they can at least upgrade fairly easily.  What really makes me nervous is what else is vulnerable that can't be upgraded quite so easily.  This code is in a lot of stuff, in particular embedded systems.  Mark my words -- we'll be deling with this one for a while.  
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/9/2014 | 8:38:28 AM
Change passwords and user names?
Many news reports are quoting secruity gurus who recommendi that anyone using the Web immediately change their user names and passwords, particularly on ecommerce and financial sites. Is that overkill or an appropriate response? 
jaingverda
50%
50%
jaingverda,
User Rank: Moderator
4/9/2014 | 9:25:26 AM
Re: Change passwords and user names?
For once I don't think you can over stress the damage that has been done by this. As one write up put it we have no clue how long this could have been activily exploited. Changing passwords for everything would be great. Personally I know I am changing my passwords on anything that touches secure data ie finance, health history etc. Also I am going full tilt and finally getting last pass set up with the mobel app so I can have strong passwords for everything and doing the same for my family.

The other issue and it is germane to the discussion of the password reset is how to black list every single certification that was used during this time because we have to assume that they all have been compromised. I fear that were going to see a huge rise in man in the middle attacks here about a year or two from this.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/9/2014 | 9:33:44 AM
Re: Change passwords and user names?
Thanks for sharing your personal response to to Heartbleed, @jaingverda. What is your organization doing about the certification blacklist issue? What options are you considering.

Curious to hear from other readers about their and concerns...
jaingverda
50%
50%
jaingverda,
User Rank: Moderator
4/9/2014 | 9:50:02 AM
Re: Change passwords and user names?
@Marilyn cohodas, I believe we are re-issuing new certifications to all our domains right now as for the black listing; I am not sure I am trying to find out about that. It's not really in my perview with my job description.
Page 1 / 2   >   >>


News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32077
PUBLISHED: 2021-05-06
Primary Source Verification in VerityStream MSOW Solutions before 3.1.1 allows an anonymous internet user to discover Social Security Number (SSN) values via a brute-force attack on a (sometimes hidden) search field, because the last four SSN digits are part of the supported combination of search se...
CVE-2020-23263
PUBLISHED: 2021-05-06
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
CVE-2020-23264
PUBLISHED: 2021-05-06
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
CVE-2021-27941
PUBLISHED: 2021-05-06
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
CVE-2021-29203
PUBLISHED: 2021-05-06
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...