Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
More Than A Half-Million Servers Exposed To Heartbleed Flaw
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
SaneIT
50%
50%
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:14:48 AM
Re: Password changes
Yes, especially those that rarely log on to a particular site.  If they haven't used it in 6 months then they log in to a vulnerable server just to change their password chances are they are putting themselves in a more risky position.
SaneIT
50%
50%
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:13:10 AM
Re: Password changes
Thank you for the heads up on the false positives.  I've heard of people getting them but haven't run into one yet.  I think it's going to be hard to avoid false positives.  What I'm hoping happens is that sites using OpenSSL start making it a point to note that they have patched their servers so customers know.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/10/2014 | 11:26:46 AM
Re: Password changes
What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.

@SaneIT -- That's a legitimate fear. Is someone changes their password on a site that hasn't been patched, they're not any more secure and maybe less so. 
jaingverda
50%
50%
jaingverda,
User Rank: Moderator
4/10/2014 | 10:10:28 AM
Re: Scope
@Rob Radina, My off the cuff reaction is that yes it does. But I am trying to understand what all your asking because the vulurability is more geared at servers than individual routers. I don't know the specfics of dd-wrt and linux without looking them up but I believe they support all known encryption schemes of SSL over TCP which is what your really asking. So unless your sleeping machines are for something a lot bigger than a home network the threat level for you personally from this vulurability is neglible.
jaingverda
50%
50%
jaingverda,
User Rank: Moderator
4/10/2014 | 10:00:13 AM
Re: Password changes
While fillippo.io/HeartBleed/ is good it's not 100% accurate I tested it on several sites and it gave false results for some reason where ssllabs.com has been correctly reporting the status of sites that fillipo.io has been breaking on. Not to say that his isn't a good tool especially if your needing to run inside a corprate intranet. Just wanted to make people aware of known issues and provide a secondary option. This is one of those cases where we can't ever test enough.
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
4/10/2014 | 9:55:59 AM
Re: Password changes
@Laruianne Schneier goes Spinal Tap.
kblackma
50%
50%
kblackma,
User Rank: Apprentice
4/10/2014 | 9:08:20 AM
Reduce some heartache...
"Fixing HeartBleed isn't cheap..." so true, that's why OISTE/WISeKey is offering affected HeartBleed organisations a free SSL certificate to replace their most probably compromised prior cert... isn't that cool!
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
4/10/2014 | 8:15:55 AM
Re: Password changes
@Laurianne Amazon.com was not affected by Heartbleed, althought Amazon Web Services was. The big sites are alerting users, so the best bet is to be sure the SSL site has first patched/updated before bothering to change your passwords. Good news: Twitter and Google Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine,Chrome and Chrome OS, are among the sites/services not affected.

The only version of Android affected is the older 4.1.1 was affected, and Google is sending patching info to mobile partners who distribute that version.

I don't know if Bruce Schneier has ever given a bug such a high seveAndroid 4.1.1; patching information for 
SaneIT
50%
50%
SaneIT,
User Rank: Apprentice
4/10/2014 | 7:23:48 AM
Re: Password changes
Just to be sure you can check the sites to make sure they are patched  http://filippo.io/Heartbleed/  if it tests clean then yes you should go ahead and change your password.  If it does not test clean then try again in a few days.  What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.
Markus5
50%
50%
Markus5,
User Rank: Strategist
4/10/2014 | 4:03:51 AM
Re: Password changes
My password manager developer said in their official statement that we should change the passwords after the flaw has been fixed on the site you want the password to be changed.Big sites have fixed it already I think, but smaller ones will be a little bit slower so I will wait couple days. Do you think the same? Their thought on this can be read here: http://blogen.stickypassword.com/sticky-password-and-the-heartbleed-bug/
Page 1 / 2   >   >>


News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7856
PUBLISHED: 2021-04-20
A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient authentication validation.
CVE-2021-28793
PUBLISHED: 2021-04-20
vscode-restructuredtext before 146.0.0 contains an incorrect access control vulnerability, where a crafted project folder could execute arbitrary binaries via crafted workspace configuration.
CVE-2021-25679
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to an authenticated stored cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed....
CVE-2021-25680
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to multiple reflected cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed. Only...
CVE-2021-25681
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** AdTran Personal Phone Manager 10.8.1 software is vulnerable to an issue that allows for exfiltration of data over DNS. This could allow for exposed AdTran Personal Phone Manager web servers to be used as DNS redirectors to tunnel arbitrary data over DNS. NOTE: The aff...