Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Scan Shows Possible Heartbleed Fix Failures
Newest First  |  Oldest First  |  Threaded View
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
7/31/2014 | 5:21:20 PM
Re: patch only?
I have a few doubts related to the absolute data proposed. As said by Robert Grahamprobably the number of organizations that doesn't use OpenSSL in very high. 

This statement puzzles me about the quality of the "population" analyzed.
"only 3% of Their public-facing servers not have been fully and properly locked down from the Heartbleed vulnerability"
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
7/30/2014 | 10:59:45 AM
Project Zero
I wonder if major bugs like this that affect thousands of sites will become rarer in the future, thanks to efforts like Google's Project Zero security team. They've hired on the likes of Geohotz and several other amazing hackers, so it seems like they'll be able to really shore up the digital defenses of a lot of web properties. 
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 9:59:51 AM
Re: patch only?
Thank you for sharing that, Ryan. I'm also curious if any org has a good reason not to patch and reissue the cert.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 9:54:57 AM
Re: patch only?
My institution patched for Heartbleed and cycled the certs. Otherwise you won't be able to confidently say that your systems aren't exploited. The vulnerability may have allowed for forged certs to be applied and if you only patched you would not be able to detect the further exploits of the system. I would be interested to hear the validation for institutions that only patched as well. Might provide some perspective we couldn't think of.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/29/2014 | 5:19:16 PM
patch only?
Any of our readers willing to share whether they've only patched for Heartbleed, but not revoked their digital certs? We'd love to hear your perspective on this. 


7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5226
PUBLISHED: 2020-01-24
Cross-site scripting in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new SimpleSAML\Utils\EMail class was introduced to handle sending emails, implemented as a wrapp...
CVE-2019-1517
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-1518
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-1519
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-1520
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.