📜 ⬆️ ⬇️

Implications of OpenSSL HeartBleed

image

HeartBleed can be, if not already, the biggest information vulnerability at all.
For some reason, the activity of the discussion in the original topic is not very high, which causes me a very high degree of surprise.

What happened?

On January 1, 2012, Robin Seggelmann sent and steve checked the commit , which added HeartBeat to OpenSSL. It is this commit that introduced the vulnerability, which was called HeartBleed.
')
How dangerous is she?
This vulnerability allows you to read operative memory in chunks up to 64KB in size. Moreover, the vulnerability is two-way, which means that not only can you read data from a vulnerable server, but an attacker’s server can get a part of your RAM if you are using a vulnerable version of OpenSSL.

An attacker can connect to, say, a vulnerable Internet bank, get a private SSL key from RAM and perform an MITM attack on you, and your browser will behave as if nothing had happened, because the certificate is correct. Or simply can get your username and password.

What is the scale of the tragedy?

I estimate that about of the websites use OpenSSL for HTTPS connections, and about of them have been vulnerable to this day.

Vulnerability was / is, at least, at:


Using the vulnerability, mail.yandex.ru could receive users' letters along with HTTP headers (and, substituting a cookie, log in as this user), and, for example, in AlphaBank, receive unencrypted POST data with a login and password from Alpha Click (Internet banking).

What did I do?

I could not just sit and watch as the personal data of users flow into the hands of intruders.
First of all, I wrote to some VPN providers that provide access via the OpenVPN protocol, since he could be vulnerable. Then, I began to look for vulnerabilities in systems where vulnerabilities pose the greatest threat: banks, payment systems, mail / jabber servers. I called and wrote to vulnerable services. As a rule, it is extremely difficult to get to the security service of banks, and they only respond to the mail.

ServiceThe time of sending the letterTime to make a callVulnerability closing timeReissued certificateLeaked data
mail.yandex.ru12:46, 13:27 (in bug bounty, to respond faster)12:4714:07NotMail, cookie
Alfa Bank12:51One to two2:00 pmNotUser logins and passwords, transactions, personal user data, cookies. Deny vulnerability !!
Liqpay13:15-15:15NotNo (garbage, pieces of perl-scripts)
Interkassa13:1513:2018:28YesTransactions, cookie
Raiffeisen13:3513:30~ 19: 00NotN / A
Bank opening"15:36-in the eveningNotN / A
Bank of Moscow-~ 15: 30~ 17: 00, only the site was vulnerable--
Yahoo.com--22:20YesUser logins and passwords, mail, cookie
Imani Bank-14:31, 20:2009.04 10:55YesUser logins and passwords, transactions, cookies, personal user data
Russian standard13:0019:36, 09.04 10:3809.04 13:00NotTransactions, cookies, personal user data
OTP Bank09.04 14:2009.04 14:1909.04 15:03NotTransactions, cookies, personal user data
Russlavbank~ 16: 00-09.04 ~ 12:00, only the site was vulnerable--
Bank Zenith-21:50, 09/04 11:15, 09/04 15:2509.04 18:20NotUser logins and passwords, cookies
Ak Bars Bank--11.04 15:30NotUser logins and passwords, transactions


What should I do as a user?

If you are using Linux , you need to upgrade to the latest available version of OpenSSL. Most distributions already contain a patched version in the repositories.
If you are on OSX , you are very likely to use OpenSSL 0.9.8, which is not vulnerable if you did not install the newer version manually.

If you are using Windows , then most likely you do not have OpenSSL. If you installed it manually (for example, via cygwin), then make sure that your version does not contain a vulnerability.

After you upgrade to OpenSSL, restart all applications that use it!

Keep in mind - there is a rather high probability that other people already have your passwords . Change them, but not now. Now do not go to vulnerable sites. Check the site for vulnerabilities can be on the links below.

What should I do as a site owner / system administrator?

First of all, you should immediately see if your version of OpenSSL is vulnerable or not. For HTTPS there are three services: filippo.io/Heartbleed , possible.lv/tools/hb and www.ssllabs.com/ssltest . Update the version if necessary. Make sure you install the patch version, or 1.0.1.g.

If you had a vulnerable version of OpenSSL, you should revoke the old SSL certificate - it is most likely compromised. If you had a vulnerability in the service - be sure to notify users that they change passwords, and reset the session if you use them (PHPSESSID, JSESSID)

And I want the details!

You can read the analysis of vulnerabilities here , get more information here and here .
629 sites from the top 10,000 are vulnerable .
News on cnet.com.
Article on banki.ru

Bonus: the conversation of the blind with the deaf , Michael

Source: https://habr.com/ru/post/218661/


All Articles