In April 9, TechCrunch, a tech blog website, reported that OpenSSL, a security protocol used by many enterprises and services to encrypt data, had a vulnerability in the past two years, hackers can exploit this vulnerability to steal 64 KB data from the server memory.
The 64 KB data volume is not large, but hackers can exploit this vulnerability repeatedly to steal data multiple times and obtain users' encryption keys to decrypt sensitive data.
Even worse, even if the vulnerability is fixed, users do not know whether their servers have been attacked. Users can eliminate the original key, but this can only protect users from attacks exploiting this vulnerability in the future.
"I believe that this vulnerability will still exist on a large number of servers in the next year and will not be corrected in a timely manner," said Nicolas Weaver, a security researcher ."
Yahoo said in a statement, "recently, a Heartbleed vulnerability was found to affect many platforms that use OpenSSL, including our platform. After hearing this message, we immediately began to fix this vulnerability. Our team has successfully taken appropriate corrective actions in the company's main services and is currently fixing this vulnerability in other services. We have been committed to providing users around the world with the best possible security experience. We will continue to work hard to ensure the security of user data ."
Editor's note: You can use the following URL to check whether your website has this vulnerability.
Http://possible.lv/tools/hb? Domain = www.bkjia.com
OpenSSL details: click here
OpenSSL: click here
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.