Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
More Than A Half-Million Servers Exposed To Heartbleed Flaw
Oldest First  |  Newest First  |  Threaded View
<<   <   Page 2 / 2
jaingverda
jaingverda,
User Rank: Moderator
4/10/2014 | 10:00:13 AM
Re: Password changes
While fillippo.io/HeartBleed/ is good it's not 100% accurate I tested it on several sites and it gave false results for some reason where ssllabs.com has been correctly reporting the status of sites that fillipo.io has been breaking on. Not to say that his isn't a good tool especially if your needing to run inside a corprate intranet. Just wanted to make people aware of known issues and provide a secondary option. This is one of those cases where we can't ever test enough.
jaingverda
jaingverda,
User Rank: Moderator
4/10/2014 | 10:10:28 AM
Re: Scope
@Rob Radina, My off the cuff reaction is that yes it does. But I am trying to understand what all your asking because the vulurability is more geared at servers than individual routers. I don't know the specfics of dd-wrt and linux without looking them up but I believe they support all known encryption schemes of SSL over TCP which is what your really asking. So unless your sleeping machines are for something a lot bigger than a home network the threat level for you personally from this vulurability is neglible.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/10/2014 | 11:26:46 AM
Re: Password changes
What I fear is a bunch of people changing passwords out of fear and giving up their credentials on vulnerable sites that did not previously have any data leaked.

@SaneIT -- That's a legitimate fear. Is someone changes their password on a site that hasn't been patched, they're not any more secure and maybe less so. 
SaneIT
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:13:10 AM
Re: Password changes
Thank you for the heads up on the false positives.  I've heard of people getting them but haven't run into one yet.  I think it's going to be hard to avoid false positives.  What I'm hoping happens is that sites using OpenSSL start making it a point to note that they have patched their servers so customers know.
SaneIT
SaneIT,
User Rank: Apprentice
4/11/2014 | 8:14:48 AM
Re: Password changes
Yes, especially those that rarely log on to a particular site.  If they haven't used it in 6 months then they log in to a vulnerable server just to change their password chances are they are putting themselves in a more risky position.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-46146
PUBLISHED: 2022-11-29
Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, i someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for...
CVE-2022-36433
PUBLISHED: 2022-11-29
The blog-post creation functionality in the Amasty Blog Pro 2.10.3 plugin for Magento 2 allows injection of JavaScript code in the short_content and full_content fields, leading to XSS attacks against admin panel users via posts/preview or posts/save.
CVE-2022-4202
PUBLISHED: 2022-11-29
A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclose...
CVE-2022-40799
PUBLISHED: 2022-11-29
Data Integrity Failure in 'Backup Config' in D-Link DNR-322L &lt;= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
CVE-2022-41568
PUBLISHED: 2022-11-29
LINE client for iOS before 12.17.0 might be crashed by sharing an invalid shared key of e2ee in group chat.