Sunday, September 28, 2014

Security Threat 2014 - Heartbleed


Heartbleed 

It is a security bug disclosed in April 2014 in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. Heartbleed may be exploited regardless of whether the party using a vulnerable OpenSSL instance for TLS is a server or a client. It results from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension, thus the bug's name derives from "heartbeat".
According to Mark J. Cox of OpenSSL, Neel Mehta of Google's security team reported Heartbleed on April 1, 2014.
The vulnerability is classified as a buffer over-read, a situation where software allows more data to be read than should be allowed.
Heartbleed is registered in the Common Vulnerabilities and Exposures system as CVE-2014-0160.The federal Canadian Cyber Incident Response Centre issued a security bulletin advising system administrators about the bug. The first fixed version of OpenSSL, 1.0.1g was released on April 7, 2014, on the same day Heartbleed was publicly disclosed.
At the time of disclosure, some 17% (around half a million) of the Internet's secure web servers certified by trusted authorities were believed to be vulnerable to the attack, allowing theft of the servers' private keys and users' session cookies and passwords. The Electronic Frontier FoundationArs Technica, and Bruce Schneier all deemed the Heartbleed bug "catastrophic". Forbes cybersecurity columnist Joseph Steinberg wrote, "Some might argue that [Heartbleed] is the worst vulnerability found (at least in terms of its potential impact) since commercial traffic began to flow on the Internet."
A British Cabinet spokesman recommended that "People should take advice on changing passwords from the websites they use... Most websites have corrected the bug and are best placed to advise what action, if any, people need to take." On the day of disclosure, the Tor Project advised anyone seeking "strong anonymity or privacy on the Internet" to "stay away from the Internet entirely for the next few days while things settle."
As of May 20, 2014, 1.5% of the 800,000 most popular TLS-enabled websites were still vulnerable to Heartbleed.
TLS implementations other than OpenSSL, such as GnuTLS and Mozilla's Network Security Services, are not affected, as the defect lies in OpenSSL's implementation rather than in the Internet protocol itself. Consequently, none of Microsoft's products or services is affected by Heartbleed.
Source:
http://en.wikipedia.org/wiki/Heartbleed
http://heartbleed.com/
http://blogs.mcafee.com/consumer/what-is-heartbleed

Also go through the security threat report 2014 made by sophos.com:
http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf 

No comments:

Post a Comment