Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
More Than A Half-Million Servers Exposed To Heartbleed Flaw
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
SaneIT
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:14:48 AM
Re: Password changes
Yes, especially those that rarely log on to a particular site.  If they haven't used it in 6 months then they log in to a vulnerable server just to change their password chances are they are putting themselves in a more risky position.
SaneIT
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:13:10 AM
Re: Password changes
Thank you for the heads up on the false positives.  I've heard of people getting them but haven't run into one yet.  I think it's going to be hard to avoid false positives.  What I'm hoping happens is that sites using OpenSSL start making it a point to note that they have patched their servers so customers know.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/10/2014 | 11:26:46 AM
Re: Password changes
What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.

@SaneIT -- That's a legitimate fear. Is someone changes their password on a site that hasn't been patched, they're not any more secure and maybe less so. 
jaingverda
jaingverda,
User Rank: Moderator
4/10/2014 | 10:10:28 AM
Re: Scope
@Rob Radina, My off the cuff reaction is that yes it does. But I am trying to understand what all your asking because the vulurability is more geared at servers than individual routers. I don't know the specfics of dd-wrt and linux without looking them up but I believe they support all known encryption schemes of SSL over TCP which is what your really asking. So unless your sleeping machines are for something a lot bigger than a home network the threat level for you personally from this vulurability is neglible.
jaingverda
jaingverda,
User Rank: Moderator
4/10/2014 | 10:00:13 AM
Re: Password changes
While fillippo.io/HeartBleed/ is good it's not 100% accurate I tested it on several sites and it gave false results for some reason where ssllabs.com has been correctly reporting the status of sites that fillipo.io has been breaking on. Not to say that his isn't a good tool especially if your needing to run inside a corprate intranet. Just wanted to make people aware of known issues and provide a secondary option. This is one of those cases where we can't ever test enough.
RobPreston
RobPreston,
User Rank: Apprentice
4/10/2014 | 9:55:59 AM
Re: Password changes
@Laruianne Schneier goes Spinal Tap.
kblackma
kblackma,
User Rank: Apprentice
4/10/2014 | 9:08:20 AM
Reduce some heartache...
"Fixing HeartBleed isn't cheap..." so true, that's why OISTE/WISeKey is offering affected HeartBleed organisations a free SSL certificate to replace their most probably compromised prior cert... isn't that cool!
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
4/10/2014 | 8:15:55 AM
Re: Password changes
@Laurianne Amazon.com was not affected by Heartbleed, althought Amazon Web Services was. The big sites are alerting users, so the best bet is to be sure the SSL site has first patched/updated before bothering to change your passwords. Good news: Twitter and Google Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine,Chrome and Chrome OS, are among the sites/services not affected.

The only version of Android affected is the older 4.1.1 was affected, and Google is sending patching info to mobile partners who distribute that version.

I don't know if Bruce Schneier has ever given a bug such a high seveAndroid 4.1.1; patching information for 
SaneIT
SaneIT,
User Rank: Apprentice
4/10/2014 | 7:23:48 AM
Re: Password changes
Just to be sure you can check the sites to make sure they are patched  http://filippo.io/Heartbleed/  if it tests clean then yes you should go ahead and change your password.  If it does not test clean then try again in a few days.  What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.
Markus5
Markus5,
User Rank: Strategist
4/10/2014 | 4:03:51 AM
Re: Password changes
My password manager developer said in their official statement that we should change the passwords after the flaw has been fixed on the site you want the password to be changed.Big sites have fixed it already I think, but smaller ones will be a little bit slower so I will wait couple days. Do you think the same? Their thought on this can be read here: http://blogen.stickypassword.com/sticky-password-and-the-heartbleed-bug/
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40922
PUBLISHED: 2022-10-03
A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file.
CVE-2022-38817
PUBLISHED: 2022-10-03
Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.
CVE-2022-40123
PUBLISHED: 2022-10-03
mojoPortal v2.7 was discovered to contain a path traversal vulnerability via the "f" parameter at /DesignTools/CssEditor.aspx. This vulnerability allows authenticated attackers to read arbitrary files in the system.
CVE-2022-32173
PUBLISHED: 2022-10-03
In OrchardCore rc1-11259 to v1.2.2 vulnerable to HTML injection, allow an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users.
CVE-2022-36551
PUBLISHED: 2022-10-03
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling ...