OpenSSL heartbeat packet out-of-bounds read sensitive information leakage Vulnerability

Source: Internet
Author: User
Tags openssl tls

Release date:

Cve id: CVE-2014-0160

Affected software and systems:
================================
OpenSSL 1.0.1-OpenSSL 1.0.1f
OpenSSL 1.0.2-beta
OpenSSL 1.0.2-beta1

Unaffected software and systems:
======================================
OpenSSL 0.9.8
OpenSSL 1.0.0
OpenSSL 1.0.1g
OpenSSL 1.0.2-beta2

Summary:
======
OpenSSL is an open-source SSL implementation that implements high-strength encryption for network communication. It is widely used in various network applications.

OpenSSL does not perform a boundary check in processing TLS heartbeat extensions, which may cause 64 KB of memory information to be leaked to connected clients or servers. Only 1.0.1 and 1.0.2-beta versions of OpenSSL are affected, including 1.0.1f and 1.0.2-beta1.

Considering the severity of this vulnerability, it is recommended that users of the affected version upgrade to the latest version immediately.

Analysis:
======
A tls heartbeat consists of a request packet, which includes a payload. The other party that communicates will read the packet and send a response containing the same load. In the code that processes heartbeat requests, the load size is read from the attacker's controllable package. OpenSSL does not check the load size value, leading to out-of-bounds reading, resulting in sensitive information leakage.
The leaked information may include the encrypted private key and other sensitive information such as the user name and password.

Solution:
============
We recommend that you upgrade NSFOCUS to OpenSSL 1.0.1g. However, if you cannot install or upgrade the patch immediately, you can take the following measures to reduce the threat:
* Use the-DOPENSSL_NO_HEARTBEATS option to re-compile OpenSSL.

Vendor status:
============
Openssl 1.0.1g has been released to fix this problem ,:

Vendor security announcement:
Https://www.openssl.org/news/secadv_20140407.txt

For OpenSSL 1.0.2 Releases, the vendor indicates that it will be fixed in 1.0.2-beta2.

Major Linux distributions have also released patches. Please upgrade them as soon as possible.

Additional information:
============
1. https://www.openssl.org/news/secadv_20140407.txt
2. http://heartbleed.com/

OpenSSL details: click here
OpenSSL: click here

OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)

Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian

OpenSSL "heartbleed" Security Vulnerability

Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.

Heartbleed test -- OpenSSL vulnerability testing tool

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.