Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping

Status
Not open for further replies.

Venustus

Level 59
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Dec 30, 2012
4,809
Man_in_the_middle_attack-640x454.png


Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data.

The warning about the bug in OpenSSL coincided with the release of version 1.0.1g of the open-source program, which is the default cryptographic library used in the Apache and nginx Web server applications, as well as a wide variety of operating systems and e-mail and instant-messaging clients. The bug, which has resided in production versions of OpenSSL for more than two years, could make it possible for people to recover the private encryption key at the heart of the digital certificates used to authenticate Internet servers and to encrypt data traveling between them and end users. Attacks leave no traces in server logs, so there's no way of knowing if the bug has been actively exploited. Still, the risk is extraordinary, given the ability to disclose keys, passwords, and other credentials that could be used in future compromises.

"Bugs in single software or library come and go and are fixed by new versions," the researchers who discovered the vulnerability wrote in a blog post published Monday. "However this bug has left a large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitations and attacks leaving no trace this exposure should be taken seriously."

More
 

Myna

Level 10
Verified
Jan 16, 2014
452
Got an email from a trusted source. But I guess, they're refering to the same bug that venustus posted about. So rather than creating a new thread, I'm just continuing here....

Quote from the email:
If you’re not already aware, an OpenSSL bug named “Heartbleed” has been identified that potentially exposes data being passed over the OpenSSL encryption protocol using TLS extension 15. This means that a malicious 3rd party attacker, with the right tools and knowledge, has the ability to exploit this bug and intercept private data being passed over any server using OpenSSL via TLS extension 15.

You can read more about the Heartbleed bug and get additional content ideas here.


A test site that enables users to enter domains to check their site's vulnerability status has been up since Monday.
 
Last edited:
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top