Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. Heartbleed - A serious OpenSSL vulnerability

Heartbleed - A serious OpenSSL vulnerability

Scheduled Pinned Locked Moved The Insider News
securitycomhelp
7 Posts 6 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N Offline
    N Offline
    Nicholas Marty
    wrote on last edited by
    #1

    heartbleed[^]

    The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

    Sounds like the hearts of a lot security responsibles are bleeding!

    M M K 3 Replies Last reply
    0
    • N Nicholas Marty

      heartbleed[^]

      The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

      Sounds like the hearts of a lot security responsibles are bleeding!

      M Offline
      M Offline
      Marco Bertschi
      wrote on last edited by
      #2

      Great. We use OpenSSL.

      I will never again mention that Dalek Dave was the poster of the One Millionth Lounge Post, nor that it was complete drivel.

      How to ask a question

      1 Reply Last reply
      0
      • N Nicholas Marty

        heartbleed[^]

        The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

        Sounds like the hearts of a lot security responsibles are bleeding!

        M Offline
        M Offline
        mikepwilson
        wrote on last edited by
        #3

        ugh. What a world class pain in the ass THIS is going to be for the next couple/few months.

        1 Reply Last reply
        0
        • N Nicholas Marty

          heartbleed[^]

          The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

          Sounds like the hearts of a lot security responsibles are bleeding!

          K Offline
          K Offline
          Kamil Burzynski
          wrote on last edited by
          #4

          Indeed, this one was quite serious. Apparently lot of big names, including sites from Alexa's top 10 were (and some still are) vulnerable. The situation didn't spare CodeProject - some of our subsystems were vulnerable, but over past few hours we have already upgraded them. This is still unofficial, as we need to double and triple check all the servers and submodules, but so far all modules which we've reviewed are patched.

          C N R 3 Replies Last reply
          0
          • K Kamil Burzynski

            Indeed, this one was quite serious. Apparently lot of big names, including sites from Alexa's top 10 were (and some still are) vulnerable. The situation didn't spare CodeProject - some of our subsystems were vulnerable, but over past few hours we have already upgraded them. This is still unofficial, as we need to double and triple check all the servers and submodules, but so far all modules which we've reviewed are patched.

            C Offline
            C Offline
            Christopher Shields
            wrote on last edited by
            #5

            Ruh roh Raggy. This bug is actually pretty terrifying.

            1 Reply Last reply
            0
            • K Kamil Burzynski

              Indeed, this one was quite serious. Apparently lot of big names, including sites from Alexa's top 10 were (and some still are) vulnerable. The situation didn't spare CodeProject - some of our subsystems were vulnerable, but over past few hours we have already upgraded them. This is still unofficial, as we need to double and triple check all the servers and submodules, but so far all modules which we've reviewed are patched.

              N Offline
              N Offline
              Nicholas Marty
              wrote on last edited by
              #6

              :thumbsup: I hope you find every lingering unpatched version in your systems :) But still a pretty scary bug... considering that basically the whole traffic to OpenSSL could have been compromised for years... I guess the NSA and the like were pretty grateful for that bug :~

              1 Reply Last reply
              0
              • K Kamil Burzynski

                Indeed, this one was quite serious. Apparently lot of big names, including sites from Alexa's top 10 were (and some still are) vulnerable. The situation didn't spare CodeProject - some of our subsystems were vulnerable, but over past few hours we have already upgraded them. This is still unofficial, as we need to double and triple check all the servers and submodules, but so far all modules which we've reviewed are patched.

                R Offline
                R Offline
                Rob Grainger
                wrote on last edited by
                #7

                One serious consequence is that private keys may have leaked - it is worth considering re-registering for those, as otherwise you're potentially leaving user data exposed.

                "If you don't fail at least 90 percent of the time, you're not aiming high enough." Alan Kay.

                1 Reply Last reply
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Don't have an account? Register

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups