Story 3HN Heartbleed OpenSSL Vulnerability

Heartbleed OpenSSL Vulnerability

by
in security on (#3HN)
A remote vulnerability in the OpenSSL library was disclosed yesterday. A missing bounds check in the Heartbeat Extension implementation can trigger a buffer over-read leading to the loss of sensitive data, including the disclosure of the private key.
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
More information:
Reply 4 comments

Oblig. (Score: 4, Informative)

by carguy@pipedot.org on 2014-04-09 10:43 (#112)

Let me be the first to say that XKCD also covers this topic today, http://xkcd.com/1353/

pipedot is safe (Score: 2, Interesting)

by omoc@pipedot.org on 2014-04-09 14:43 (#115)

thanks for even offering SSL

Heartbleed Hit List (Score: 3, Informative)

by dotdotdot@pipedot.org on 2014-04-10 15:40 (#11M)

Mashable has a page listing passwords that need to be changed.