<<

4/14/2014 - Wikipedia, the free encyclopedia Heartbleed From Wikipedia, the free encyclopedia

Heartbleed is a security bug in the open-source OpenSSL cryptography library, widely used to implement the Internet's Transport Layer Security (TLS) protocol. This vulnerability is due to a missing bounds check in the handling of the Transport Layer Security (TLS) heartbeat extension.[3] A fixed version of OpenSSL was released on April 7, 2014, at the same time as Heartbleed was publicly disclosed. At that time, some 17 percent (around half a million) of the Internet's secure web servers certified by trusted authorities were believed to be vulnerable to the attack, allowing theft of the servers' private keys and users' session cookies and passwords.[4][5][6][7][8] The Electronic Frontier Foundation,[9] Ars Technica,[10] and Bruce Schneier[11] all deemed the Heartbleed bug "catastrophic". Forbes cybersecurity columnist Joseph Steinberg described the bug as potentially "the worst vulnerability found (at least in terms of its potential impact) since commercial traffic began to flow on the Internet", implying that it is worse than the Israeli spyware/ Logo representing Heartbleed. [12] pandemic of and Duqu combined. Finland's Codenomicon company gave Heartbleed both a name and a Heartbleed is registered in the Common Vulnerabilities and Exposures logo, contributing to public awareness system as CVE-2014-0160.[13] of the issue.[1][2]

Contents

1 History 1.1 Appearance 1.2 Resolution 1.3 Possible exploitation prior to disclosure 1.4 Reported exploitation subsequent to disclosure 2 Behavior 2.1 Impact 2.2 Affected OpenSSL versions 2.2.1 Vulnerable Program and Function 2.3 Patch 2.4 Vulnerability testing services 3 Affected services 3.1 Websites and web services 3.2 Software applications 4 Reaction 5 Root causes and possible lessons 6 References 7 External links http://en.wikipedia.org/wiki/Heartbleed 1/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia

History

Appearance

The Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols is a proposed standard specified by RFC 6520, published in February 2012. It provides a way to test and keep alive secure communication links without the need to renegotiate the connection each time.

In 2011, Dr. Robin Seggelmann, then a Ph.D. student at the University of Duisburg-Essen, implemented the Heartbeat Extension for OpenSSL. Following Seggelmann's request to put the result of his work into OpenSSL,[14][15][16] his change was reviewed by Dr. Stephen N. Henson, one of OpenSSL's four core developers. Henson apparently failed to notice a bug in Seggelmann's implementation, and introduced the resulting vulnerability, Heartbleed, into OpenSSL's source code repository on December 31, 2011. Heartbeat support was enabled by default, causing affected versions to be affected by default. The vulnerable code has been adopted to widespread use with the release of OpenSSL version 1.0.1 on March 14, 2012.[17][18][19]

Resolution

On March 21, 2014 Bodo Moeller and Adam Langley of Google wrote a patch that fixed the bug. The date of the patch is known from Red Hat's issue tracker.[20] The next chronological date available from the public evidence is the claim by performance and security company CloudFlare that they fixed the flaw on their systems on March 31, 2014.[21]

According to Mark J. Cox of OpenSSL, Neel Mehta of Google's security team reported Heartbleed on April 1, 2014.[22] The bug entailed a severe memory handling error in the implementation of the Transport Layer Security Heartbeat Extension.[23][24] This defect could be used to reveal up to 64 kilobytes of the application's memory with every heartbeat.[24]

The bug was named by an engineer at the firm Codenomicon, a Finnish cybersecurity company, which also created the bleeding heart logo, and launched the domain Heartbleed.com (http://heartbleed.com) to explain the bug to the public.[25] According to Codenomicon, Neel Mehta first reported the bug to OpenSSL, but both Google and Codenomicon discovered it independently.[17] Codenomicon reports April 3 as their date of discovery of the bug and as their date of notification of NCSC-FI (formerly known as CERT-FI) for vulnerability coordination.[17][26] Mehta also congratulated Codenomicon, without going into detail.[27]

On April 10, "Cisco Systems and Juniper Networks, two of the biggest creators of Internet equipment, announced on Thursday that their products had been affected by the Heartbleed bug. Routers, firewalls and switches ... have all likely been affected by the bug, leaving your personal information at risk of being stolen by ."[28]

On April 12, at least two independent researchers were able to steal private keys using this attack from an experimental server intentionally set up for that purpose by CloudFlare.[29][30]

Possible exploitation prior to disclosure http://en.wikipedia.org/wiki/Heartbleed 2/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia Many major web sites patched or disabled the bug within days of its announcement,[31] but it is unclear whether potential attackers were aware of it earlier and to what extent it was exploited. Based on examinations of audit logs by researchers, it has been reported that some attackers may have exploited the flaw for at least five months before discovery and announcement.[32][33] Errata Security has partially rejected this hypothesis,[34] whereas the Department of Homeland Security believes that as of April 11, "there have not been any reported attacks or malicious incidents involving this particular vulnerability confirmed".[35]

According to two insider sources speaking to Bloomberg.com, the United States National Security Agency was aware of the flaw since shortly after its introduction, but chose to keep it secret, instead of reporting it, in order to exploit it for their own purposes.[36][37][38] The NSA has denied this claim.[39]

Reported exploitation subsequent to disclosure

Revenue Canada reported the theft of 900 taxpayer social insurance numbers through an exploit of the bug during a 6-hour period on April 8.[40] When the attack was discovered, the agency shut down its web site and extended the taxpayer filing deadline from April 30 to May 5.[41] The agency said it will provide anyone affected with credit protection services at no cost. Behavior

The RFC 6520 Heartbeat Extension tests TLS/DTLS secure communication links by allowing a computer at one end of a connection to send a “Heartbeat Request” message, consisting of a payload, typically a text string, along with the payload’s length as a 16-bit integer. The receiving computer then must send the exact same payload back to the sender.

The affected versions of OpenSSL allocate a memory buffer for the message to be returned based on the length field in the requesting Depiction of Heartbleed message, without regard to the size of actual payload in that message. Because of this failure to do proper bounds checking, the message returned consists of the requested payload followed by whatever else happened to be in the allocated memory buffer. The problem was compounded by OpenSSL's decision to write its own version of the C dynamic memory allocation (malloc and free) routines. As a result, the oversized memory buffer returned to the requestor was likely to contain data from memory blocks that had been previously requested and freed by OpenSSL. Such memory blocks may contain sensitive data sent by users or even the private keys used by OpenSSL. In addition, by using its own memory management routines OpenSSL bypassed mitigation measures in some operating systems that might have detected or neutralized the bug.[42]

The heartbleed bug is exploited by sending a malformed heartbeat request with a small payload and large length field to the server in order to elicit the server's response permitting attackers to read up to 64 kilobytes of server memory that was likely to have been used previously by SSL.[43] Attackers in this way could receive sensitive data, compromising the security of the server and its users. Vulnerable data include the server's private master key,[17][19] which would enable attackers to decrypt current or stored traffic via passive man-in-the-middle attack (if perfect

http://en.wikipedia.org/wiki/Heartbleed 3/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia forward secrecy is not used by the server and client), or active man-in-the-middle if perfect forward secrecy is used. The attacker cannot control which data are returned, as OpenSSL typically responds with the chunks of memory it has most recently discarded.

The bug might also reveal unencrypted parts of users' requests and responses, including any form post data in users' requests, session cookies and passwords, which might allow attackers to hijack the identity of another user of the service.[44]

Impact

By attacking a service that uses a vulnerable version of OpenSSL, a remote, unauthenticated attacker may be able to retrieve sensitive information, such as secret keys. By leveraging this information, an attacker may be able to decrypt, spoof, or perform man-in-the-middle attacks on network traffic that would otherwise be protected by OpenSSL.[45]

Affected OpenSSL versions

The affected versions of OpenSSL include OpenSSL 1.0.1 through 1.0.1f (inclusive). OpenSSL 1.0.1g, OpenSSL 1.0.0 branch and OpenSSL 0.9.8 branch are not vulnerable.[46]

Vulnerable Program and Function

The vulnerable program source files are t1_lib.c and dl_both.c and the vulnerable functions are tls1_process_heartbeat() and dtls1_process_heartbeat().[47]

Patch

The bug is classified as a buffer over-read,[48] a situation where software allows more data to be read than should be allowed.[49] The problem can be fixed by ignoring Heartbeat Request messages that ask for more data than their payload needs.

Version 1.0.1g of OpenSSL adds some bounds checks to prevent the buffer over-read. For example, the test

if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */

has been added in front of the line

pl = p;

http://en.wikipedia.org/wiki/Heartbleed 4/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia A complete list of changes is available at git.openssl.org (http://git.openssl.org/gitweb/? p=openssl.git;a=commitdiff;h=96db902).[50]

Although patching software (the OpenSSL library and any statically linked binaries) fixes the bug, running software will continue to use its in-memory OpenSSL code with the bug until each application is shut down and restarted, so that the patched code can be loaded. Further, in order to regain privacy and secrecy, all private or secret data must be replaced, since it is not possible to know if they were compromised while the vulnerable code was in use:[51]

all possibly compromised private key-public key pairs must be regenerated, all certificates linked to those possibly compromised key pairs need to be revoked and replaced, and all passwords on the possibly compromised servers need to be changed.

Vulnerability testing services

Several services were made available to test whether the Heartbleed bug was present on a given site, including:

Heartbleed testing tool by a European IT security company[52] Heartbleed Scanner by Italian cryptologist Filippo Valsorda[53] Heartbleed Vulnerability Test by Cyberoam [54] Critical Watch Free Online Heartbleed Tester[55] Metasploit Heartbleed scanner module[56] Heartbleed Server Scanner by Rehmann[57] Lookout Mobile Security Heartbleed Detector, an app for Android devices that determines the OpenSSL version of the device and indicates whether the vulnerable heartbeat is enabled[58] Heartbleed checker hosted by LastPass[59] Online network range scanner for Heartbleed vulnerability by Pentest-Tools.com [60] Official offline scanner in Python from Redhat "https://access.redhat.com/labs/heartbleed/heartbleed-poc.py" (https://access.redhat.com/labs/heartbleed/heartbleed-poc.py). Qualys SSL Labs' SSL Server Test (https://www.ssllabs.com/ssltest/) which not only looks for the Heartbleed bug, but can also find other SSL/TLS implementation errors. Browser extensions, such as Chromebleed (https://chrome.google.com/webstore/detail/chromebleed/eeoekjnjgppnaegdjbcafdggilajhpic) and FoxBleed (https://addons.mozilla.org/en-US/firefox/addon/foxbleed/).

Other security tools have added support for finding this bug. For example, Sourcefire has released Snort rules to detect Heartbleed attack traffic and possible Heartbleed response traffic.[61] Tenable Network Security wrote a plugin for its Nessus vulnerability scanner that can scan for this fault.[62] Affected services

The following OpenSSL versions were determined to be vulnerable:

OpenSSL 1.0.2-beta OpenSSL 1.0.1 – OpenSSL 1.0.1f http://en.wikipedia.org/wiki/Heartbleed 5/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia Unless an operating system patch for CVE-2014-0160 has been installed that doesn't change the library version, which is the case for Debian (including derivatives such as Ubuntu and Linux Mint), openSUSE, FreeBSD and Fedora (including derivatives such as Red Hat Enterprise Linux, CentOS and Amazon Linux).

The following OpenSSL versions include patches to fix the Heartbleed bug:

OpenSSL 1.0.2-beta2 (upcoming) OpenSSL 1.0.1g

To resolve the bug, server administrators are advised to either use 1.0.1g or to recompile OpenSSL with - [24] DOPENSSL_NO_HEARTBEATS, thus disabling the vulnerable feature until the server software can be updated.

Websites and web services

The following sites have services affected or made announcements recommending that users update passwords in response to the bug:

Akamai Technologies[63] Amazon Web Services[64] Ars Technica[65] Bitbucket[66] BrandVerity[67] Freenode[68] GitHub[69] IFTTT[70] Internet Archive[71] Mojang [72] Mumsnet PeerJ[73] Prezi[74] Something Awful[75] SoundCloud[76] SourceForge[77] SparkFun[78] Stripe (company)[79]

Tumblr[80][81] Wattpad Wikimedia (including Wikipedia)[82][83] Wunderlist[84]

http://en.wikipedia.org/wiki/Heartbleed 6/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia Software applications

IPCop 2.1.4 was released on April 8, 2014 with a fix for "the OpenSSL library everybody is talking about".[85] LastPass Password Manager was not vulnerable, due its use of forward secrecy, but it recommended users change passwords that LastPass stored for vulnerable websites.[86] LibreOffice 4.2.3 was released on April 10, 2014 with a fix for CVE-2014-0160[87] LogMeIn claimed to have "updated many products and parts of our services that rely on OpenSSL".[88] Reaction

On the day of the announcement, April 7, 2014, the Tor Project issued an announcement on its blog and advised that anyone seeking "strong anonymity or privacy on the Internet" should "stay away from the Internet entirely for the next few days while things settle." They also recommended that Tor relay operators and hidden service operators revoke and generate fresh keys after patching OpenSSL, but noted that Tor relays use two sets of keys and that Tor's multi-hop design minimizes the impact of exploiting a single relay.[89]

The Canadian federal government temporarily shut online services of the Canada Revenue Agency (CRA) and several government departments over Heartbleed bug security concerns[90][91] and the federal Canadian Cyber Incident Response Centre issued a security bulletin advising system administrators about the bug.[92]

Platform maintainers like the Wikimedia Foundation advised their users to change passwords.[82] A US Cabinet spokesman recommended that "People should take advice on changing passwords from the websites they use...Most websites have corrected the bug and are best placed to advise what action, if any, people need to take."[93]

An analysis posted on GitHub of the top 1000 most visited websites on April 8, 2014 revealed vulnerabilities in sites including Yahoo!, Imgur, Stack Overflow, Slate, and DuckDuckGo.[94][95] Root causes and possible lessons

Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has criticized the OpenSSL developers for writing its own memory management routines and thereby circumventing OpenBSD C standard library exploit countermeasures, saying "OpenSSL is not developed by a responsible team."[96][42]

The author of the bug, Robin Seggelmann,[97] stated that he "missed validating a variable containing a length" and denied any intention to submit a flawed implementation.[14] Following Heartbleed's disclosure, Seggelmann has stated that OpenSSL is not reviewed by enough people.[98] References

1. ^ McKenzie, Patrick (April 9, 2014). "What Heartbleed Can Teach The OSS Community About Marketing" (http://www.kalzumeus.com/2014/04/09/what-heartbleed-can-teach-the-oss-community-about-marketing/). 2. ^ Biggs, John (April 9, 2014). "Heartbleed, The First Security Bug With A Cool Logo" http://en.wikipedia.org/wiki/Heartbleed 7/12 4/14/2201.4 ^ Biggs, John (April 9, 2014). "HeartbleedH, eTarhtbele Fedi r-s Wt iSkipeecduiar, itthye fBreue ge nWcyciltohp eAdia Cool Logo" (http://techcrunch.com/2014/04/09/heartbleed-the-first-consumer-grade-exploit/). TechCrunch. 3. ^ "Cyberoam Security Advisory - Heartbleed Vulnerability in OpenSSL" (http://kb.cyberoam.com/default.asp? id=2909&Lang=1). April 11, 2014. 4. ^ Mutton, Paul (April 8, 2014). "Half a million widely trusted websites vulnerable to Heartbleed bug" (http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed- bug.html). Netcraft Ltd. 5. ^ Perlroth, Nicole; Hardy, Quentin (April 11, 2014). "Heartbleed Flaw Could Reach to Digital Devices, Experts Say" (http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital- devices-experts-say.html). New York Times. 6. ^ Chen, Brian X. (April 9, 2014). "Q. and A. on Heartbleed: A Flaw Missed by the Masses" (http://bits.blogs.nytimes.com/2014/04/09/qa-on-heartbleed-a-flaw-missed-by-the-masses/). New York Times. 7. ^ Wood, Molly (April 10, 2014). "Flaw Calls for Altering Passwords, Experts Say" (http://www.nytimes.com/2014/04/10/technology/flaw-calls-for-altering-passwords-experts-say.html). New York Times. 8. ^ Manjoo, Farhad (April 10, 2014). "Users’ Stark Reminder: As Web Grows, It Grows Less Secure" (http://www.nytimes.com/2014/04/10/technology/users-stark-reminder-as-web-grows-it-grows-less-secure.html). New York Times. 9. ^ Zhu, Yan (April 8, 2014). "Why the Web Needs Perfect Forward Secrecy More Than Ever" (https://www.eff.org/deeplinks/2014/04/why-web-needs-perfect-forward-secrecy). Electronic Frontier Foundation. 10. ^ Goodin, Dan (April 8, 2014). "Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style" (http://arstechnica.com/security/2014/04/critical-crypto-bug-exposes-yahoo-mail-passwords-russian-roulette- style/). Ars Technica. 11. ^ "Schneier on Security: Heartbleed" (https://www.schneier.com/blog/archives/2014/04/heartbleed.html). Schneier on Security. April 11 2014. 12. ^ Steinberg, Joseph (April 10, 2014). "Massive Internet Security Vulnerability – Here's What You Need To Do" (http://www.forbes.com/sites/josephsteinberg/2014/04/10/massive-internet-security-vulnerability-you-are-at-risk- what-you-need-to-do/). Forbes. 13. ^ "CVE – CVE-2014-0160" (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160). Cve.mitre.org. Retrieved April 10, 2014. 14. ^ a b Grubb, Ben (April 11, 2014). "Man who introduced serious 'Heartbleed' security flaw denies he inserted it deliberately" (http://www.smh.com.au/it-pro/security-it/man-who-introduced-serious-heartbleed-security-flaw- denies-he-inserted-it-deliberately-20140410-zqta1.html). The Sydney Morning Herald. 15. ^ "#2658: [PATCH] Add TLS/DTLS Heartbeats" (http://rt.openssl.org/Ticket/Display.html? user=guest&pass=guest&id=2658). OpenSSL. 2011. 16. ^ "Meet the man who created the bug that almost broke the Internet" (http://www.theglobeandmail.com/news/national/meet-the-man-that-created-the-bug-that-almost-broke-the- internet/article17941003/). Globe and Mail. April 11, 2014. 17. ^ a b c d Codenomicon Ltd (April 8, 2014). "Heartbleed Bug" (http://heartbleed.com/). 18. ^ Goodin, Dan (April 8, 2014). "Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping" (http://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to- eavesdropping/). Ars Technica. 19. ^ a b Hagai Bar-El (April 9, 2014). "OpenSSL "Heartbleed" bug: what's at risk on the server and what is not" (http://www.hbarel.com/openssl-heartbleed-bug). 20. ^ "heartbeat_fix" (https://bugzilla.redhat.com/attachment.cgi?id=883475). Retrieved April 14, 2014. 21. ^ "CloudFlare – Update on the Heartbleed OpenSSL Vulnerability" (https://support.cloudflare.com/hc/en- us/articles/201660084-Update-on-the-Heartbleed-OpenSSL-Vulnerability). April 12, 2014. 22. ^ "Mark J Cox – #Heartbleed" (https://plus.google.com/+MarkJCox/posts/TmCbp3BhJma). Retrieved April 12, 2014. 23. ^ Seggelmann, R. et al. (February 2012). "Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension" (https://tools.ietf.org/html/rfc6520). RFC 6520. Internet Engineering Task Force (IETF). Retrieved April 8, 2014. http://en.wikipedia.org/wiki/Heartbleed 8/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia 24. ^ a b c The OpenSSL Project (April 7, 2014). "OpenSSL Security Advisory [07 Apr 2014]" (https://www.openssl.org/news/secadv_20140407.txt). 25. ^ "Why is it called the 'Heartbleed Bug'?" (http://www.washingtonpost.com/blogs/style-blog/wp/2014/04/09/why- is-it-called-the-heartbleed-bug/). 26. ^ "Näin suomalaistutkijat löysivät vakavan vuodon internetin sydämestä - transl/Finnish researchers found a serious leakage of the heart of the Internet" (http://www.digitoday.fi/tietoturva/2014/04/10/nain-suomalaistutkijat-loysivat- vakavan-vuodon-internetin-sydamesta/20145118/66?&n=2#commentsHere). April 10, 2014. Retrieved April 13, 2014. 27. ^ Mehta, Neel. "Don't forget to patch DTLS" (https://twitter.com/neelmehta/status/453542518584381440). Twitter. Retrieved April 11, 2014. 28. ^ Kleinman, Alexix (April 11, 2014). "The Heartbleed Bug Goes Even Deeper Than We Realized – Here's What You Should Do" (http://www.huffingtonpost.com/2014/04/11/heartbleed-routers_n_5132306.html). The Huffington Post. Retrieved April 12, 2014. 29. ^ Lawler, Richard (April 11, 2014). "Cloudflare Challenge proves 'worst case scenario' for Heartbleed is actually possible" (http://www.engadget.com/2014/04/11/heartbleed-openssl-cloudflare-challenge/). Engadget. Retrieved April 12, 2014. 30. ^ "The Heartbleed Challenge" (https://www.cloudflarechallenge.com/heartbleed). CloudFlare. 2014. 31. ^ Cipriani, Jason (April 9, 2014). "Heartbleed bug: Check which sites have been patched" (http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/). CNET. Retrieved April 14, 2014. 32. ^ Gallagher, Sean (April 9, 2014). "Heartbleed vulnerability may have been exploited months before patch" (http://arstechnica.com/security/2014/04/heartbleed-vulnerability-may-have-been-exploited-months-before-patch/). Ars Technica. Retrieved April 10, 2014. 33. ^ "Were Intelligence Agencies Using Heartbleed in November 2013?" (https://www.eff.org/deeplinks/2014/04/wild- heart-were-intelligence-agencies-using-heartbleed-november-2013), April 10, 2014, Peter Eckersley, EFF.org 34. ^ Graham, Robert (April 9, 2014). "No, we weren't scanning for hearbleed[sic] before April 7" (http://blog.erratasec.com/2014/04/no-we-werent-scanning-for-hearbleed.html). Errata Security. 35. ^ Staff 7:52 am (February 22, 1999). "Reaction on “Heartbleed”: Working Together to Mitigate Cybersecurity Vulnerabilities | Homeland Security" (http://www.dhs.gov/blog/2014/04/11/reaction- %E2%80%9Cheartbleed%E2%80%9D-working-together-mitigate-cybersecurity-vulnerabilities-0). Dhs.gov. Retrieved April 14, 2014. 36. ^ Riley, Michael. "NSA Said to Exploit Heartbleed Bug for Intelligence for Years" (http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html). Bloomberg. Retrieved April 11, 2014. 37. ^ "Report: NSA exploited Heartbleed for years" (http://www.usatoday.com/story/tech/2014/04/11/heartbleed- cisco-juniper/7589759/). USA Today. Retrieved April 11, 2014. 38. ^ "NSA exploited Heartbleed bug for two years to gather intelligence, sources say" (http://business.financialpost.com/2014/04/11/nsa-exploited-heartbleed-bug-for-two-years-to-gather-intelligence- sources-say/). Financial Post. Retrieved April 11, 2014. 39. ^ "Statement on Bloomberg News story that NSA knew about the 'Heartbleed bug' flaw and regularly used it to gather critical intelligence" (http://icontherecord.tumblr.com/post/82416436703/statement-on-bloomberg-news- story-that-nsa-knew). National Security Agency. April 11, 2014. 40. ^ Heartbleed bug: 900 SINs stolen from Revenue Canada (http://www.cbc.ca/news/business/heartbleed-bug-900- sins-stolen-from-revenue-canada-1.2609192), CBC News, Apr 14, 2014 Some of the details are in the video linked from the page. 41. ^ Canada Revenue Agency pushes tax deadline to May 5 after Heartbleed bug (http://www.vancouversun.com/technology/Canada+Revenue+Agency+pushes+deadline+after+Heartbleed/973477 3/story.html), Vancouver Sun, April 13, 2014 42. ^ a b "Re: FYA: http: heartbleed.com" (http://article.gmane.org/gmane.os.openbsd.misc/211963). Gmane. Retrieved April 11, 2014. 43. ^ Troy Hunt (April 9, 2014). "Everything you need to know about the Heartbleed SSL bug" (http://www.troyhunt.com/2014/04/everything-you-need-to-know-about.html). Retrieved April 10, 2014. 44. ^ "Why Heartbleed is dangerous? Exploiting CVE-2014-0160" (http://ipsec.pl/ssl-tls/2014/why-heartbleed- dangerous-exploiting-cve-2014-0160.html). IPSec.pl. 2014. http://en.wikipedia.org/wiki/Heartbleed 9/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia dangerous-exploiting-cve-2014-0160.html). IPSec.pl. 2014. 45. ^ "Vulnerability Note VU#720951" (http://www.kb.cert.org/vuls/id/720951). kb.cert.org. Retrieved April 07, 2014. 46. ^ "Spiceworks Community Discussions" (http://community.spiceworks.com/topic/474704-cyberoam-users-need- not-bleed-over-heartbleed-exploit? utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SpiceworksCommunity+ (Spiceworks+Community)). community.spiceworks.com. Retrieved April 11, 2014. 47. ^ "Cyberoam Users Need not Bleed over Heartbleed Exploit" (http://www.cyberoam.com/blog/cyberoam-users- need-not-bleed-over-heartbleed-exploit/). cyberoam.com. Retrieved April 11, 2014. 48. ^ "CVE – CVE-2014-0160" (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160). Cve.mitre.org. Retrieved April 10, 2014. 49. ^ "CWE – CWE-126: Buffer Over-read (2.6)" (http://cwe.mitre.org/data/definitions/126.html). Cwe.mitre.org. February 18, 2014. Retrieved April 10, 2014. 50. ^ "Git – openssl.git/commitdiff" (http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=96db902). Git.openssl.org. April 5, 2014. Retrieved April 10, 2014. 51. ^ "Patched Servers Remain Vulnerable to Heartbleed OpenSSL | Hayden James" (http://haydenjames.io/patched- servers-remain-vulnerable-heartbleed-openssl/). Haydenjames.io. Retrieved April 10, 2014. 52. ^ "Heartbleed OpenSSL extension testing tool, CVE-2014-0160" (http://possible.lv/tools/hb/). Possible.lv. Retrieved April 11, 2014. 53. ^ Heartbleed Scanner (http://filippo.io/Heartbleed)" by Italian cryptologist Filippo Valsorda 54. ^ Heartbleed Vulnerability Test Tool (http://csc.cyberoam.com/cyberoamsupport/webpages/webcat/2014- 0160.jsp)" by Cyberoam 55. ^ "Critical Watch :: Heartbleed Tester :: CVE-2014-0160" (http://heartbleed.criticalwatch.com/). Heartbleed.criticalwatch.com. Retrieved April 14, 2014. 56. ^ Metasploit module (https://github.com/rapid7/metasploit- framework/blob/master/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb) 57. ^ Heartbleed Server Scanner (http://rehmann.co/projects/heartbeat) by Rehmann 58. ^ "Heartbleed Detector: Check If Your Android OS Is Vulnerable with Our App" (https://blog.lookout.com/blog/2014/04/09/heartbleed-detector/). Lookout Mobile Security blog. April 9, 2014. Retrieved April 10, 2014. 59. ^ "Heartbleed checker" (https://lastpass.com/heartbleed/). LastPass. Retrieved April 11, 2014. 60. ^ "OpenSSL Heartbleed vulnerability scanner :: Online Penetration Testing Tools | Ethical Hacking Tools" (https://pentest-tools.com/vulnerability-scanning/openssl-heartbleed-scanner/). Pentest-tools.com. Retrieved April 11, 2014. 61. ^ "VRT: Heartbleed Memory Disclosure – Upgrade OpenSSL Now!" (http://vrt-blog.snort.org/2014/04/heartbleed- memory-disclosure-upgrade.html). April 8, 2014. Retrieved April 11, 2014. 62. ^ Mann, Jeffrey (April 9, 2014). "Tenable Facilitates Detection of OpenSSL Vulnerability Using Nessus and Nessus Perimeter Service" (http://www.tenable.com/blog/tenable-facilitates-detection-of-openssl-vulnerability-using- nessus-and-nessus-perimeter). Tenable Network Security. Retrieved April 11, 2014. 63. ^ "Heartbleed FAQ: Akamai Systems Patched" (https://blogs.akamai.com/2014/04/heartbleed-faq-akamai-systems- patched.html). Akamai Technologies. April 8, 2014. 64. ^ "AWS Services Updated to Address OpenSSL Vulnerability" (https://aws.amazon.com/security/security- bulletins/aws-services-updated-to-address-openssl-vulnerability/). Amazon Web Services. April 8, 2014. 65. ^ "Dear readers, please change your Ars account passwords ASAP" (http://arstechnica.com/security/2014/04/dear- readers-please-change-your-ars-account-passwords-asap/). Ars Technica. April 8, 2014. 66. ^ "All Heartbleed upgrades are now complete" (http://blog.bitbucket.org/2014/04/09/all-heartbleed-upgrades-are- now-complete/). BitBucket Blog. April 9, 2014. 67. ^ "Keeping Your BrandVerity Account Safe from the Heartbleed Bug" (http://blog.brandverity.com/2721/keeping- your-brandverity-account-safe-from-the-heartbleed-bug/). BrandVerity Blog. April 9, 2014. 68. ^ "Twitter / freenodestaff: we've had to restart a bunch..." (https://twitter.com/freenodestaff/status/453470038704795648). April 8, 2014. 69. ^ "Security: Heartbleed vulnerability" (https://github.com/blog/1818-security-heartbleed-vulnerability). GitHub. April 8, 2014. 70. ^ "IFTTT Says It Is 'No Longer Vulnerable' To Heartbleed" (http://www.lifehacker.com.au/2014/04/ifttt-says-it-is- http://en.wikipedia.org/wiki/Heartbleed 10/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia 70. ^ "IFTTT Says It Is 'No Longer Vulnerable' To Heartbleed" (http://www.lifehacker.com.au/2014/04/ifttt-says-it-is- no-longer-vulnerable-to-heartbleed/). LifeHacker. April 8, 2014. 71. ^ "Heartbleed bug and the Archive | Internet Archive Blogs" (https://blog.archive.org/2014/04/09/heartbleed-bug- and-the-archive/). Blog.archive.org. April 9, 2014. Retrieved April 14, 2014. 72. ^ "Twitter / KrisJelbring: If you logged in to any of" (https://twitter.com/KrisJelbring/status/453559871028613121). Twitter.com. April 8, 2014. Retrieved April 14, 2014. 73. ^ "The widespread OpenSSL ‘Heartbleed’ bug is patched in PeerJ" (http://blog.peerj.com/post/82185230692/the- widespread-openssl-heartbleed-bug-is-patched-in). PeerJ. April 9, 2014. 74. ^ "Heartbleed Defeated" (http://engineering.prezi.com/blog/2014/04/12/heartbleet/). Retrieved April 13, 2014. 75. ^ "IMPORTANT ANNOUNCEMENTS FROM THE MAKERS OF CHILI" (http://forums.somethingawful.com/announcement.php?forumid=1). Retrieved April 13, 2014. 76. ^ Codey, Brendan (April 9, 2014). "Security Update: We’re going to sign out everyone today, here’s why" (http://blog.soundcloud.com/2014/04/09/heartbleed/). SoundCloud. 77. ^ "ctsai" (April 10, 2014). "SourceForge response to Heartbleed" (https://sourceforge.net/blog/sourceforge- response-to-heartbleed/). SourceForge. 78. ^ "Heartbleed" (https://www.sparkfun.com/news/1455). SparkFun. April 9, 2014. 79. ^ "Heartbleed" (https://stripe.com/blog/heartbleed). Stripe (company). April 9, 2014. Retrieved April 10, 2014. 80. ^ "Tumblr Staff-Urgent security update" (http://staff.tumblr.com/post/82113034874/urgent-security-update). April 8, 2014. Retrieved April 9, 2014. 81. ^ Hern, Alex (April 9, 2014). "Heartbleed: don't rush to update passwords, security experts warn" (http://www.theguardian.com/technology/2014/apr/09/heartbleed-dont-rush-to-update-passwords-security-experts- warn). The Guardian. 82. ^ a b Grossmeier, Greg (April 8, 2014). "[Wikitech-l] Fwd: Security precaution – Resetting all user sessions today" (http://lists.wikimedia.org/pipermail/wikitech-l/2014-April/075801.html). Wikimedia Foundation. Retrieved April 9, 2014. 83. ^ Grossmeier, Greg (April 10, 2014). "Wikimedia's response to the "Heartbleed" security vulnerability" (https://blog.wikimedia.org/2014/04/10/wikimedias-response-to-the-heartbleed-security-vulnerability/). Wikimedia Foundation blog. Wikimedia Foundation. Retrieved April 10, 2014. 84. ^ "Wunderlist & the Heartbleed OpenSSL Vulnerability" (http://support.wunderlist.com/customer/portal/articles/1508382-sync-service-heartbleed---8th-of-april-2014). April 10, 2014. 85. ^ IPCop (April 8, 2014). "IPCop 2.1.4 is released" (http://marc.info/?l=ipcop-announce&m=139697815506679). SourceForge electronic mailing lists. 139697815506679. Retrieved April 11, 2014. 86. ^ Staff (April 8, 2014). "LastPass and the Heartbleed Bug" (http://blog.lastpass.com/2014/04/lastpass-and- heartbleed-bug.html). LastPass. Retrieved April 13, 2014. 87. ^ italovignoli (April 10, 2014). "LibreOffice 4.2.3 is now available for download" (http://blog.documentfoundation.org/2014/04/10/libreoffice-4-2-3-is-now-available-for-download/). The Document Foundation. Archived (http://web.archive.org/web/20140412013421/http://blog.documentfoundation.org/2014/04/10/libreoffice-4-2-3-is- now-available-for-download/) from the original on April 12, 2014. Retrieved April 11, 2014. 88. ^ "LogMeIn and OpenSSL" (http://blog.logmein.com/products/openssl). LogMeIn. Retrieved April 10, 2014. 89. ^ "OpenSSL bug CVE-2014-0160" (https://blog.torproject.org/blog/openssl-bug-cve-2014-0160). Tor Project. April 7, 2014. Retrieved April 9, 2014. 90. ^ "Security concerns prompts tax agency to shut down website" (http://www.ctvnews.ca/canada/security- concerns-prompts-tax-agency-to-shut-down-website-1.1767727). CTV News. April 9, 2014. Retrieved April 9, 2014. 91. ^ "Heartbleed: Canadian tax services back online" (http://www.cbc.ca/news/business/heartbleed-canadian-tax- services-back-online-1.2608781). CBC News. Retrieved 14 April 2014. 92. ^ "OpenSSL Heartbleed Vulnerability" (http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2014/al14-005-eng.aspx). Cyber Security Bulletins. Public Safety Canada. April 11, 2014. Retrieved April 14, 2014. 93. ^ Kelion, Leo. "BBC News - US government warns of Heartbleed bug danger" (http://www.bbc.com/news/technology-26985818). Bbc.com. Retrieved April 14, 2014. http:/9/e4n..w ik^ip e"dhiae.aorgtb/wliekei/Hde-amrtbalsesedtest/top1000.txt" (https://github.com/musalbas/heartbleed-masstest/blob/master/top1000.txt).11/12 4/14/2014 Heartbleed - Wikipedia, the free encyclopedia 94. ^ "heartbleed-masstest/top1000.txt" (https://github.com/musalbas/heartbleed-masstest/blob/master/top1000.txt). GitHub. April 8, 2014. Retrieved April 9, 2014. 95. ^ Cipriani, Jason (April 10, 2014). "Which sites have patched the Heartbleed bug?" (http://www.cnet.com/how- to/which-sites-have-patched-the-heartbleed-bug/). CNET. Retrieved April 10, 2014. 96. ^ "Theo De Raadt's Small Rant On OpenSSL – Slashdot" (http://it-beta.slashdot.org/story/14/04/10/1343236/theo- de-raadts-small-rant-on-openssl). It-beta.slashdot.org. Retrieved April 11, 2014. 97. ^ Lia Timson (April 11, 2014). "Who is Robin Seggelmann and did his Heartbleed break the internet?" (http://www.smh.com.au/it-pro/security-it/who-is-robin-seggelmann-and-did-his-heartbleed-break-the-internet- 20140411-zqtjj.html). The Sydney Morning Herald. 98. ^ Williams, Chris (April 11, 2014). "OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts" (http://www.theregister.co.uk/Print/2014/04/11/openssl_heartbleed_robin_seggelmann/). The Register.

External links

Summary and Q&A about the bug, (http://heartbleed.com/) – by Codenomicon Ltd The Heartbleed Hit List: The Passwords You Need to Change Right Now (http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/?utm_cid=mash-com-g+-pete-link%20) - by Mashable. Video (08:40) – Explanation of the Heartbleed bug (http://vimeo.com/91425662) PCMAG – Change Your Passwords (http://securitywatch.pcmag.com/hacking/322494-heartbleed-fallout-change- all-your-passwords) Heartbleed bug : Frequently Asked questions (http://www.adminschoice.com/heartbleed-bug-frequently-asked- questions) Heartbleed Infographic showing sites affected and those secured (https://twitter.com/scottdylan/status/455109361246162944) 'Heartbleed' Bug: The Most Serious Bug in Recent Years (http://www.hnkcnews.com/2014/04/09/heartbleed-bug- poses-major-threat-to-user-data/)

Retrieved from "http://en.wikipedia.org/w/index.php?title=Heartbleed&oldid=604169039" Categories: Computer security exploits Internet security Software bugs

This page was last modified on 14 April 2014 at 15:14. Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.

http://en.wikipedia.org/wiki/Heartbleed 12/12