Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
More Than A Half-Million Servers Exposed To Heartbleed Flaw
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
SaneIT
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:14:48 AM
Re: Password changes
Yes, especially those that rarely log on to a particular site.  If they haven't used it in 6 months then they log in to a vulnerable server just to change their password chances are they are putting themselves in a more risky position.
SaneIT
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:13:10 AM
Re: Password changes
Thank you for the heads up on the false positives.  I've heard of people getting them but haven't run into one yet.  I think it's going to be hard to avoid false positives.  What I'm hoping happens is that sites using OpenSSL start making it a point to note that they have patched their servers so customers know.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/10/2014 | 11:26:46 AM
Re: Password changes
What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.

@SaneIT -- That's a legitimate fear. Is someone changes their password on a site that hasn't been patched, they're not any more secure and maybe less so. 
jaingverda
jaingverda,
User Rank: Moderator
4/10/2014 | 10:10:28 AM
Re: Scope
@Rob Radina, My off the cuff reaction is that yes it does. But I am trying to understand what all your asking because the vulurability is more geared at servers than individual routers. I don't know the specfics of dd-wrt and linux without looking them up but I believe they support all known encryption schemes of SSL over TCP which is what your really asking. So unless your sleeping machines are for something a lot bigger than a home network the threat level for you personally from this vulurability is neglible.
jaingverda
jaingverda,
User Rank: Moderator
4/10/2014 | 10:00:13 AM
Re: Password changes
While fillippo.io/HeartBleed/ is good it's not 100% accurate I tested it on several sites and it gave false results for some reason where ssllabs.com has been correctly reporting the status of sites that fillipo.io has been breaking on. Not to say that his isn't a good tool especially if your needing to run inside a corprate intranet. Just wanted to make people aware of known issues and provide a secondary option. This is one of those cases where we can't ever test enough.
RobPreston
RobPreston,
User Rank: Apprentice
4/10/2014 | 9:55:59 AM
Re: Password changes
@Laruianne Schneier goes Spinal Tap.
kblackma
kblackma,
User Rank: Apprentice
4/10/2014 | 9:08:20 AM
Reduce some heartache...
"Fixing HeartBleed isn't cheap..." so true, that's why OISTE/WISeKey is offering affected HeartBleed organisations a free SSL certificate to replace their most probably compromised prior cert... isn't that cool!
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
4/10/2014 | 8:15:55 AM
Re: Password changes
@Laurianne Amazon.com was not affected by Heartbleed, althought Amazon Web Services was. The big sites are alerting users, so the best bet is to be sure the SSL site has first patched/updated before bothering to change your passwords. Good news: Twitter and Google Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine,Chrome and Chrome OS, are among the sites/services not affected.

The only version of Android affected is the older 4.1.1 was affected, and Google is sending patching info to mobile partners who distribute that version.

I don't know if Bruce Schneier has ever given a bug such a high seveAndroid 4.1.1; patching information for 
SaneIT
SaneIT,
User Rank: Apprentice
4/10/2014 | 7:23:48 AM
Re: Password changes
Just to be sure you can check the sites to make sure they are patched  http://filippo.io/Heartbleed/  if it tests clean then yes you should go ahead and change your password.  If it does not test clean then try again in a few days.  What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.
Markus5
Markus5,
User Rank: Strategist
4/10/2014 | 4:03:51 AM
Re: Password changes
My password manager developer said in their official statement that we should change the passwords after the flaw has been fixed on the site you want the password to be changed.Big sites have fixed it already I think, but smaller ones will be a little bit slower so I will wait couple days. Do you think the same? Their thought on this can be read here: http://blogen.stickypassword.com/sticky-password-and-the-heartbleed-bug/
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-41807
PUBLISHED: 2022-12-05
Missing authorization vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to alter the product settings without authentication by sending a specially crafted request. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASK...
CVE-2022-41830
PUBLISHED: 2022-12-05
Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKa...
CVE-2022-42496
PUBLISHED: 2022-12-05
OS command injection vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to obtain appkey of the product and execute an arbitrary OS command on the product.
CVE-2022-43442
PUBLISHED: 2022-12-05
Plaintext storage of a password vulnerability exists in +F FS040U software versions v2.3.4 and earlier, which may allow an attacker to obtain the login password of +F FS040U and log in to the management console.
CVE-2022-43470
PUBLISHED: 2022-12-05
Cross-site request forgery (CSRF) vulnerability in +F FS040U software versions v2.3.4 and earlier, +F FS020W software versions v4.0.0 and earlier, +F FS030W software versions v3.3.5 and earlier, and +F FS040W software versions v1.4.1 and earlier allows an adjacent attacker to hijack the authenticati...