: TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)

[]


Systems Affected

  • OpenSSL 1.0.1 through 1.0.1f
  • OpenSSL 1.0.2-beta


Overview

A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension.


Description


Impact

This flaw allows a remote attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time.


Solution

OpenSSL 1.0.1g[2] has been released to address this vulnerability.  Any keys generated with a vulnerable version of OpenSSL should be considered compromised and regenerated and deployed after the patch has been applied.

US-CERT recommends system administrators consider implementing Perfect Forward Secrecy[3] to mitigate the damage that may be caused by future private key disclosures.


References


Revisions

This product is provided subject to this Notification[4] and this Privacy & Use[5] policy.

References

  1. ^ CERT/CC Vulnerability Note VU#720951 (www.kb.cert.org)
  2. ^ OpenSSL 1.0.1g (www.openssl.org)
  3. ^ Perfect Forward Secrecy (en.wikipedia.org)
  4. ^ Notification (www.us-cert.gov)
  5. ^ Privacy & Use (www.us-cert.gov)
LikeTweet

0 Response to ": TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)"

Post a Comment