A week of Heartbleed

Posted by   Virus Bulletin on   Apr 14, 2014

OpenSSL vulnerability has kept the security community busy.

The 'Heartbleed' vulnerability has kept everyone on their toes over the last week or so - hitting the mainstream media, prompting widespread warnings for users to change their passwords, and causing many admins to review the security of their web servers.

Bruce Schneier, who is not known for over-hyping threats, described the severity of the Heartbleed vulnerability as 11 on a scale of 0 to 10. Whatever you think of his use of language, few experts would disagree that Heartbleed was particularly bad.

Since we blogged about it last week, many other good posts and articles have appeared. We thought it worth collating some of the better ones.

The Holy grail

CloudFlare's Nick Sullivan (who will speak at VB2014) was among many experts who were sceptical about the possibility of Heartbleed being used to obtain the holy grail: a server's private SSL signing keys. His company set up a vulnerable server and challenged the community to remotely read its private keys from memory. Much to their surprise, several people found the key. One researcher shared his method.

The only right thing to do if you are running a vulnerable (web) server is thus to revoke its SSL certificates. Unfortunately, some web browsers will happily let a user access the site, even when its certificate has been revoked. For some, however, this might be too late anyway: CBC reports that the Canada Revenue Agency has had social insurance numbers of 900 citizens stolen through a successful Heartbleed exploit.

Lack of funding

The fact that anyone can look at OpenSSL's code (because it's open source), yet barely anyone did, has not gone unnoticed. John Levine writes that too many large organisations are using OpenSSL because it's free and aren't paying for code audits, while Dan Kaminsky laments that OpenSSL wasn't treated as the critical infrastructure it had become. Steve Marquess, who calls himself the "money guy" at OpenSSL, also says that the project needs a lot more funding to be able to do its job properly.

Known to the NSA?

Of course, the fact that the vulnerability wasn't publicly disclosed until recently doesn't mean that no one had found it. The vulnerability was introduced in March 2012 and Bloomberg cites two anonymous sources who claim the NSA knew about it all the time and had used it regularly to gather critical intelligence - something the NSA subsequently denied.

Server security

A silver lining to Heartbleed might be that it will prompt many organisations to improve the security of their servers. F-Secure's Jarno Niemela suggests you review your config standards, while Sophos's Paul Ducklin looks at whether two-factor authentication would have helped.

Client security

Heartbleed isn't just a server-side problem though. Clients that run OpenSSL are also vulnerable if they connect to malicious servers, a point made by Rob VandenBrink of the SANS Internet Storm Center, who also lists some applications that use the OpenSSL library.

If you can't laugh...

Finally, no threat is too serious to make jokes about. Xkcd dedicated two comics to the subject, while Graham Cluley posted a new variant of an old joke.

Posted on 14 April 2014 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.