The Heartbleed vulnerability is still not fixed on more than 0.3 million servers.
Message name from neowin:
Unfortunately, this huge security vulnerability seems to have been forgotten too quickly. According to the latest report from Errata Security blog, more than 0.3 million servers are still using the affected OpenSSL version, which completely exposes the server to the Heartbleed vulnerability.
By scanning HTTPS port 443, Errata can learn about the OpenSSL version running on the server through established connections and determine whether the server has this risk. When the vulnerability was discovered, more than 0.6 million servers were scanned. Although this number was reduced to 0.3 million in a month, it is still worrying because the number has not changed much recently.
Recommended Editing:
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
OpenSSL Heartbleed vulnerability upgrade method
For more information about Heartbleed, click here.
Heartbleed: click here
This article permanently updates the link address: