📜 ⬆️ ⬇️

Heartbleed vulnerability: our recommendations to users

The Heartbleed vulnerability , which is present in the heartbeat component of some versions of OpenSSL, has already been written in sufficient detail. Its main feature is that the attacker can read a certain range of memory addresses (64KB in length) in the process on the server that uses this library. Using this vulnerability, attackers by sending a specially crafted request can:


Attackers can compromise HTTPS later (through a known MitM- type attack), having a private SSL / TLS key in their hands (to introduce themselves as a server).

An example of successful exploitation is Yahoo, which has been affected by this vulnerability. Using Heartbleed, it was possible to quickly access user logins and passwords in clear text. [The vulnerability has been fixed and the certificate for HTTPS has been re-released] .
')


We advise users to:


If you are using Google Chrome, activate the option "Check if the server certificate has been revoked" to update the information about the website certificate in the browser. By default, this setting is disabled.



Administrators:

Source: https://habr.com/ru/post/218907/


All Articles