Forgot your password?
typodupeerror
Encryption Security IT

One Month Later: 300,000 Servers Remain Vulnerable To Heartbleed 60

Posted by Soulskill
from the server-security-hipsters-don't-follow-the-crowd dept.
DavidGilbert99 writes: "The Heartbleed Bug cause widespread panic from internet users around the world worried their sensitive information was being targeted. While system administrators were warned to patch their systems, a security researcher notes that 300,000 servers remain vulnerable to the heartbleed flaw a full month later. He said, 'Last month, I found 1-million systems supporting the "heartbeat" feature (with one third patched). This time, I found 1.5-million systems supporting the "heartbeat" feature, with all but the 300k patched. This implies to me that the first response to the bug was to disable heartbeats, then later when people correctly patched the software, heartbeats were re-enabled. Note that only OpenSSL supports heartbeats, meaning that the vast majority of SSL-supporting servers are based on software other than OpenSSL.' A developer at Vivaldi Technologies AS also pointed out that a significant number of server administrators botched their response, going from safe to vulnerable."
This discussion has been archived. No new comments can be posted.

One Month Later: 300,000 Servers Remain Vulnerable To Heartbleed

Comments Filter:
  • Re:Browser plug-in (Score:4, Informative)

    by crow (16139) on Friday May 09, 2014 @11:30AM (#46959705) Homepage Journal

    Thanks! I see there's also one for Chrome:

    https://chrome.google.com/webs... [google.com]

    I just hope these plugins are trustworthy.

  • by Penguinisto (415985) on Friday May 09, 2014 @11:42AM (#46959817) Journal

    ...because we're waiting for vendors to issue patches.

    1) who is the "we" you refer to? 9 times out of 10, there are workarounds, ranging from shutting off the heartbeat feature in OpenSSL to parking an SSL proxy host or load-balancer (depending on application) in-between your affected box and the rest of the planet. And yes, it's that fucking important.

    2) The "new, latest security hole" in this instance can turn your company's reputation and sales into rancid mush should you get compromised, and in this case, there's no easy way to catch it before they get in. Oh, and don't ask about the potential for lawsuits that a data breach can generate from pissed-off customers.

    3) If a vendor hasn't coughed up a fix by now? Stop using the product, and/or learn enough about it to wedge in your own fix until you can replace the product with something whose vendor is more responsive.

    4) Sibling isn't entirely flamebait... a competent sysadmin is more than just a keyboard button actuator - he/she should have enough technical mojo to cook up a means to help protect his career and his company in cases like this. If one of my admins told me what you just wrote without providing solid proof that no workaround exists, I'd sit him down and ask him if he really wants to continue his career as a sysadmin.

Memory fault -- brain fried

Working...