TechNews Pictorial PriceGrabber Video Wed Nov 27 20:23:39 2024

0


OpenSSL vulnerability 'Heartbleed' may have exposed encr
Source: Brandan Blevins


The OpenSSL Project has released a new version of its widely-used open-source SSL and TLS encryption library to fix a critical vulnerability that could potentially expose the sensitive Internet communications of millions of OpenSSL users.

Dubbed 'Heartbleed' by the researchers that uncovered it, the OpenSSL vulnerability, CVE-2014-0160, was first introduced in December of 2011 and is the result of a missing bounds check in the handling of the TLS heartbeat extension. According to the OpenSSL security advisory, the flaw can expose up to 64k of the memory of any connected client or server.

The vulnerability affects OpenSSL versions 1.0.1 through 1.0.1f, with the latest version, 1.0.1g, fixing the issue.

A Q&A website set up by those who reported the flaw, Google Security's Neel Mehta and three researchers from security vendor Codenomicon, explains that the Heartbleed vulnerability could expose some of the most sensitive data transmitted over the Internet, including the secret keys used for X.509 certificates, user names and passwords, emails and instant messages, any other communications supposedly protected by an OpenSSL implementation.

Even worse, an attacker taking advantage of the flaw could go undetected.

"We have tested some of our own services from attacker's perspective. We attacked ourselves from outside, without leaving a trace," said the researchers. "This bug has left large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously."

The researchers go on to warn that any sensitive communications that may have been intercepted in the past could still be in the hands of attackers, meaning that in addition to implementing the patched version of OpenSSL, organizations must also revoke potentially compromised keys, issue new keys and change passwords.

OpenSSL is found in open-source Web servers like Apache and nginx, which combined make up more than two-thirds of active sites according to the latest figures from analysis firm Netcraft, as well as a number of Linux distros, including Ubuntu 12.04.4 LTS, Fedora 18 and Debian Wheezy.

San Francisco-based content delivery network and DDoS mitigation provider CloudFlare also utilizes OpenSSL, but according to a blog post by engineer Nick Sullivan, the company was able to fix the vulnerability last week as key stakeholders were informed ahead of the general public. "All sites that use CloudFlare for SSL have received this fix and are automatically protected," said Sullivan.

Despite apparent early warnings to administrators, several of the world's key websites were vulnerable as news of Heartbleed went public. Example screenshots posted to Twitter, for example, showed Yahoo releasing login and password credentials.

For organizations that can't update their OpenSSL implementations immediately, the researchers suggest that an intrusion prevention/detection system can be "trained to detect use of the heartbeat request" based on a comparison of the size of such a request against the size of the corresponding reply. "This seems to imply that IDS/IPS can be programmed to detect the attack but not to block it unless heartbeat requests are blocked altogether," said the researchers.

Netherlands-based incident response and monitoring firm Fox-IT has offered up some signatures for the popular open-source IDS Snort, though the company's blog post warns that the rules might generate some false positives.

However, the critical nature of the data protected by OpenSSL means that organizations shouldn't rely on such measures longer than is absolutely necessary.

"Heartbleed is a rare bug: a failure in a crypto library that leaks data beyond what it's protecting," said Matt Blaze, associate professor at the University of Pennsylvania and cryptographic researcher, on Twitter. "So worse than no crypto at all."


}

© 2021 PopYard - Technology for Today!| about us | privacy policy |