How Google Engineer Neel Mehta discovers the Heartbleed Vulnerability
Google Engineer Neel Mehta first discovered the OpenSSL Heartbleed vulnerability. He has disclosed the vulnerability for the first time. Mehta said that he was checking the SSL stack of OpenSSL line by line. He decided to check the SSL stack mainly because multiple encryption vulnerabilities were discovered earlier this year, one of which was GoToFail, the other is the buffer overflow bug of GnuTLS. Mehta said that the speed of SSL Stack Vulnerability discovery is accelerating. He is curious about the security status of the SSL stack, so he wants to know about it. He did not expect the mainstream media to have such enthusiasm for the bug, and thought that another security company's marketing method that found the vulnerability simultaneously attracted the attention of mainstream media. The security company Codenomicon created a logo for the vulnerability and named it Heartbleed.
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
OpenSSL Heartbleed vulnerability upgrade method
For more information about Heartbleed, click here.
Heartbleed: click here
This article permanently updates the link address: