<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Web security disasters from NSA to Heartbleed</title>
	<atom:link href="http://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1520949</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 07:52:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1520949</guid>
		<description><![CDATA[CVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS 
http://seclists.org/oss-sec/2016/q4/224

In August, Shi Lei from Gear Team, Qihoo 360 Inc., found a Denial of Service issue in OpenSSL while openssl is handling 
&quot;SSL3_AL_WARNING&quot; undefined alerts.
This issue has been assigned with CVE number, CVE-2016-8610, and it was called &#039;SSL-Death-Alert&#039;.

We reported this issue to OpenSSL team in early September, and they told us they won&#039;t treat it as a security issue, 
but they allowed us to discuss it with whomever we wish.

BTW, the issue has been fixed in the official release on September 22nd.

Security researchers write exploits because they like the 
truth.

With further research in this flaw, we found that it could easily cause a DoS to those which use OpenSSL to support 
SSL(e.g, Nginx). For instance, visitors couldn&#039;t open the website powered by nginx until the attack stops.


Details about the security flaw:

=======

Product: OpenSSL

Affected Versions: 1.1.0, 1.0.2 - 1.0.2h, All 1.0.1, All 0.9.8

Vulnerability Type: DoS

Vendor URL: https://www.openssl.org/

CVE ID: CVE-2016-8610

Name: SSL Death Alert

It was found that function &quot;ssl3_read_bytes&quot; in ssl/s3_pkt.c might lead to higher CPU usage due to improper handling of 
warning packets.


An attacker could repeat the undefined plaintext warning packets of &quot;SSL3_AL_WARNING&quot; during the handshake, which will 
easily make to consume 100% CPU on the server. It is an implementation problem in OpenSSL that OpenSSL would ignore 
undefined warning, and continue dealing with the remaining data(if exist).

A successful exploitation of this vulnerability could easy cause a DoS attack to the server (such as openssl s_server, 
nginx, etc).

OpenSSL SSL3_AL_WARNING undefined alert remote DoS (seclists.org) 

https://news.ycombinator.com/item?id=12779082

&quot;All versions (SSL3.0, TLS1.0, TLS1.1, TLS1.2) are affected.&quot; according to http://security.360.cn/cve/CVE-2016-8610/
It would be helpful if the researchers clarified how potent this DoS attack vector is. Is sending &quot;a large number of these large records&quot; more efficient at denying availability than a naive flood using e.g. SYNs or UDP? 

so far nginx is the only server which is affected by this issue, but the latest version wasnt affected. 

CVE-2016-8610: SSL-Death-Alert 
OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert flood remote DoS
http://security.360.cn/cve/CVE-2016-8610/

It was found that function &quot;ssl3_read_bytes&quot; in ssl/s3_pkt.c might lead to higher CPU usage due to improper handling of warning packets. 
An attacker could repeat the undefined plaintext warning packets of &quot;SSL3_AL_WARNING&quot; during the handshake, which will cause a 100% CPU usage on the server. 

Q. What is the impact of the vulnerability?
A. The vulnerability affects most versions of OpenSSL. Any ssl supported server which used OpenSSL may be influenced. Nginx in particularly could be easily made to deny service. 
Q. What versions of OpenSSL are affected?
A. Affected Versions:
OpenSSL All 0.9.8
OpenSSL All 1.0.1
OpenSSL 1.0.2 through 1.0.2h
OpenSSL 1.1.0
Not Affected Versions:
OpenSSL 1.0.2i, 1.0.2j
OpenSSL 1.1.0a, 1.1.0b
Q. How to prevent the attacks?
A. Upgrade to the latest version.
. What protocol versions are affected?
A. All versions (SSL3.0, TLS1.0, TLS1.1, TLS1.2) are affected.
Q. What encryption algorithms are affected?
A. All encryption algorithms are affected. This bug is not related to any specific algorithms. 




CVE-2016-8610
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610]]></description>
		<content:encoded><![CDATA[<p>CVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS<br />
<a href="http://seclists.org/oss-sec/2016/q4/224" rel="nofollow">http://seclists.org/oss-sec/2016/q4/224</a></p>
<p>In August, Shi Lei from Gear Team, Qihoo 360 Inc., found a Denial of Service issue in OpenSSL while openssl is handling<br />
&#8220;SSL3_AL_WARNING&#8221; undefined alerts.<br />
This issue has been assigned with CVE number, CVE-2016-8610, and it was called &#8216;SSL-Death-Alert&#8217;.</p>
<p>We reported this issue to OpenSSL team in early September, and they told us they won&#8217;t treat it as a security issue,<br />
but they allowed us to discuss it with whomever we wish.</p>
<p>BTW, the issue has been fixed in the official release on September 22nd.</p>
<p>Security researchers write exploits because they like the<br />
truth.</p>
<p>With further research in this flaw, we found that it could easily cause a DoS to those which use OpenSSL to support<br />
SSL(e.g, Nginx). For instance, visitors couldn&#8217;t open the website powered by nginx until the attack stops.</p>
<p>Details about the security flaw:</p>
<p>=======</p>
<p>Product: OpenSSL</p>
<p>Affected Versions: 1.1.0, 1.0.2 &#8211; 1.0.2h, All 1.0.1, All 0.9.8</p>
<p>Vulnerability Type: DoS</p>
<p>Vendor URL: <a href="https://www.openssl.org/" rel="nofollow">https://www.openssl.org/</a></p>
<p>CVE ID: CVE-2016-8610</p>
<p>Name: SSL Death Alert</p>
<p>It was found that function &#8220;ssl3_read_bytes&#8221; in ssl/s3_pkt.c might lead to higher CPU usage due to improper handling of<br />
warning packets.</p>
<p>An attacker could repeat the undefined plaintext warning packets of &#8220;SSL3_AL_WARNING&#8221; during the handshake, which will<br />
easily make to consume 100% CPU on the server. It is an implementation problem in OpenSSL that OpenSSL would ignore<br />
undefined warning, and continue dealing with the remaining data(if exist).</p>
<p>A successful exploitation of this vulnerability could easy cause a DoS attack to the server (such as openssl s_server,<br />
nginx, etc).</p>
<p>OpenSSL SSL3_AL_WARNING undefined alert remote DoS (seclists.org) </p>
<p><a href="https://news.ycombinator.com/item?id=12779082" rel="nofollow">https://news.ycombinator.com/item?id=12779082</a></p>
<p>&#8220;All versions (SSL3.0, TLS1.0, TLS1.1, TLS1.2) are affected.&#8221; according to <a href="http://security.360.cn/cve/CVE-2016-8610/" rel="nofollow">http://security.360.cn/cve/CVE-2016-8610/</a><br />
It would be helpful if the researchers clarified how potent this DoS attack vector is. Is sending &#8220;a large number of these large records&#8221; more efficient at denying availability than a naive flood using e.g. SYNs or UDP? </p>
<p>so far nginx is the only server which is affected by this issue, but the latest version wasnt affected. </p>
<p>CVE-2016-8610: SSL-Death-Alert<br />
OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert flood remote DoS<br />
<a href="http://security.360.cn/cve/CVE-2016-8610/" rel="nofollow">http://security.360.cn/cve/CVE-2016-8610/</a></p>
<p>It was found that function &#8220;ssl3_read_bytes&#8221; in ssl/s3_pkt.c might lead to higher CPU usage due to improper handling of warning packets.<br />
An attacker could repeat the undefined plaintext warning packets of &#8220;SSL3_AL_WARNING&#8221; during the handshake, which will cause a 100% CPU usage on the server. </p>
<p>Q. What is the impact of the vulnerability?<br />
A. The vulnerability affects most versions of OpenSSL. Any ssl supported server which used OpenSSL may be influenced. Nginx in particularly could be easily made to deny service.<br />
Q. What versions of OpenSSL are affected?<br />
A. Affected Versions:<br />
OpenSSL All 0.9.8<br />
OpenSSL All 1.0.1<br />
OpenSSL 1.0.2 through 1.0.2h<br />
OpenSSL 1.1.0<br />
Not Affected Versions:<br />
OpenSSL 1.0.2i, 1.0.2j<br />
OpenSSL 1.1.0a, 1.1.0b<br />
Q. How to prevent the attacks?<br />
A. Upgrade to the latest version.<br />
. What protocol versions are affected?<br />
A. All versions (SSL3.0, TLS1.0, TLS1.1, TLS1.2) are affected.<br />
Q. What encryption algorithms are affected?<br />
A. All encryption algorithms are affected. This bug is not related to any specific algorithms. </p>
<p>CVE-2016-8610<br />
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" rel="nofollow">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1515471</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 28 Sep 2016 14:30:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1515471</guid>
		<description><![CDATA[I Got 99 Problems, But SWEET32 Isn&#039;t One
http://www.securityweek.com/i-got-99-problems-sweet32-isnt-one
Where does SWEET32 rank against other SSL vulnerabilities? 

Cryptographic attacks with cute names seem to come around every few months; so far in 2016 we have seen BICYCLE, DROWN, and now SWEET32.

A pair of researchers, Karthikeyan Bhargavan and Gaëtan Leurent with the French national research institute for computer science, published a cryptographic attack against older, 64-bit block ciphers such as triple-DES (3DES) and Blowfish. They called their attack SWEET32 (CVE-2016-2183) as the attack starts to become practical after 2^32 cipher blocks. 

The attack’s website explains that the basis for the SWEET32 attack involves the birthday paradox from probability theory.

Let’s see where SWEET32 would land in my ranking system, which is similar to the CVSS methodology in that it focuses on impact and exploitability.]]></description>
		<content:encoded><![CDATA[<p>I Got 99 Problems, But SWEET32 Isn&#8217;t One<br />
<a href="http://www.securityweek.com/i-got-99-problems-sweet32-isnt-one" rel="nofollow">http://www.securityweek.com/i-got-99-problems-sweet32-isnt-one</a><br />
Where does SWEET32 rank against other SSL vulnerabilities? </p>
<p>Cryptographic attacks with cute names seem to come around every few months; so far in 2016 we have seen BICYCLE, DROWN, and now SWEET32.</p>
<p>A pair of researchers, Karthikeyan Bhargavan and Gaëtan Leurent with the French national research institute for computer science, published a cryptographic attack against older, 64-bit block ciphers such as triple-DES (3DES) and Blowfish. They called their attack SWEET32 (CVE-2016-2183) as the attack starts to become practical after 2^32 cipher blocks. </p>
<p>The attack’s website explains that the basis for the SWEET32 attack involves the birthday paradox from probability theory.</p>
<p>Let’s see where SWEET32 would land in my ranking system, which is similar to the CVSS methodology in that it focuses on impact and exploitability.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1494497</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 13 Jun 2016 11:45:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1494497</guid>
		<description><![CDATA[Mozilla Launches Secure Open Source Fund
http://www.securityweek.com/mozilla-launches-secure-open-source-fund

In an effort to help secure open source software, Mozilla this week announced the creation of Secure Open Source (“SOS”) Fund, which kicks off with an initial $500,000 grant.

The SOS Fund was created to support security auditing, remediation, and verification for open source software projects, in an attempt to prevent major vulnerabilities from slipping into them, as Heartbleed and Shellshock have in the past. According to Mozilla, there hasn’t been adequate support for securing open source software until now, and the new initiative aims at changing that. 

The Fund is part of the Mozilla Open Source Support program (MOSS), and the initial $500,000 funding should cover audits of a series of widely-used open source libraries and programs, Mozilla said. However, Mozilla challenges the millions of organizations out there that leverage open source software to join the initiative and provide additional financial support.

“Open source software is used by millions of businesses and thousands of educational and government institutions for critical applications and services. From Google and Microsoft to the United Nations, open source code is now tightly woven into the fabric of the software that powers the world. Indeed, much of the Internet – including the network infrastructure that supports it – runs using open source technologies,” Chris Riley, Head of Public Policy, Mozilla, notes in a blog post.]]></description>
		<content:encoded><![CDATA[<p>Mozilla Launches Secure Open Source Fund<br />
<a href="http://www.securityweek.com/mozilla-launches-secure-open-source-fund" rel="nofollow">http://www.securityweek.com/mozilla-launches-secure-open-source-fund</a></p>
<p>In an effort to help secure open source software, Mozilla this week announced the creation of Secure Open Source (“SOS”) Fund, which kicks off with an initial $500,000 grant.</p>
<p>The SOS Fund was created to support security auditing, remediation, and verification for open source software projects, in an attempt to prevent major vulnerabilities from slipping into them, as Heartbleed and Shellshock have in the past. According to Mozilla, there hasn’t been adequate support for securing open source software until now, and the new initiative aims at changing that. </p>
<p>The Fund is part of the Mozilla Open Source Support program (MOSS), and the initial $500,000 funding should cover audits of a series of widely-used open source libraries and programs, Mozilla said. However, Mozilla challenges the millions of organizations out there that leverage open source software to join the initiative and provide additional financial support.</p>
<p>“Open source software is used by millions of businesses and thousands of educational and government institutions for critical applications and services. From Google and Microsoft to the United Nations, open source code is now tightly woven into the fabric of the software that powers the world. Indeed, much of the Internet – including the network infrastructure that supports it – runs using open source technologies,” Chris Riley, Head of Public Policy, Mozilla, notes in a blog post.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1463789</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jan 2016 07:02:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1463789</guid>
		<description><![CDATA[A top-secret document revealed that UK spy agency GCHQ exploited vulnerabilities in Juniper firewalls. Dated February 2011, it also makes clear that the exploitation went on with the knowledge and apparent cooperation of the NSA. The security vulnerabilities in 13 different models of firewalls made by Juniper Networks were disclosed earlier in December and contained a backdoor disguised to look like debug code.

Source: http://arstechnica.co.uk/business/2015/12/europes-top-tech-news-december-2015/

More: https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/]]></description>
		<content:encoded><![CDATA[<p>A top-secret document revealed that UK spy agency GCHQ exploited vulnerabilities in Juniper firewalls. Dated February 2011, it also makes clear that the exploitation went on with the knowledge and apparent cooperation of the NSA. The security vulnerabilities in 13 different models of firewalls made by Juniper Networks were disclosed earlier in December and contained a backdoor disguised to look like debug code.</p>
<p>Source: <a href="http://arstechnica.co.uk/business/2015/12/europes-top-tech-news-december-2015/" rel="nofollow">http://arstechnica.co.uk/business/2015/12/europes-top-tech-news-december-2015/</a></p>
<p>More: <a href="https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/" rel="nofollow">https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1450557</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Nov 2015 08:49:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1450557</guid>
		<description><![CDATA[Megan Geuss / Ars Technica:
US charges three men with widespread hacking whose targets included JP Morgan

US charges three men with widespread hacking whose targets included JP Morgan
Suspects allegedly used Heartbleed to hack into a global financial institution.
http://arstechnica.com/tech-policy/2015/11/us-charges-three-men-with-widespread-hacking-whose-targets-included-jp-morgan/

On Tuesday federal prosecutors unsealed charges against three men, revealing details of a sprawling criminal enterprise that involved hacking some of the US&#039; biggest financial institutions as well as the theft of personal information pertaining to 100 million customers. With that information, the men allegedly made off with hundreds of millions of dollars.

Although the indictment does not name the hacked financial institutions directly, Reuters reports that JP Morgan Chase, ETrade, and News Corp. (which owns The Wall Street Journal) have confirmed that they were party to the crimes described by the indictment.

The newly unsealed charges (PDF) accuse Gery Shalon, a 31-year-old Israeli, of masterminding the hacks that resulted in the loss of personal information pertaining to some 100 million customers of US financial institutions 

Chief among the allegations is that Shalon and Aaron used their unauthorized access to financial institution networks to artificially manipulate certain US stock prices through a “pump-and-dump” scheme. 

US authorities also charged that Shalon and his co-conspirators operated illegal gambling websites, processed payments for criminals selling anything from illegal pharmaceuticals to malware, and operated an illegal US-based Bitcoin exchange that ran afoul of US anti-money laundering laws.

These activities apparently earned the group hundreds of millions of dollars between 2007 and July 2015, &quot;of which Shalon concealed at least $100 million in Swiss and other bank accounts,” the indictment says.

Today’s unsealed indictment also paints an interesting picture of how some of the network intrusions allegedly occurred. The US Attorney General claims that Aaron was a customer of many of the hacked companies, and he gave his login credentials to Shalon and an unnamed co-conspirator who performed analysis of the companies&#039; networks. Shalon and the co-conspirator later accessed the companies’ networks and placed malware on them to allow them to steal information about customers over a period of months

http://www.justice.gov/usao-sdny/file/792506/download]]></description>
		<content:encoded><![CDATA[<p>Megan Geuss / Ars Technica:<br />
US charges three men with widespread hacking whose targets included JP Morgan</p>
<p>US charges three men with widespread hacking whose targets included JP Morgan<br />
Suspects allegedly used Heartbleed to hack into a global financial institution.<br />
<a href="http://arstechnica.com/tech-policy/2015/11/us-charges-three-men-with-widespread-hacking-whose-targets-included-jp-morgan/" rel="nofollow">http://arstechnica.com/tech-policy/2015/11/us-charges-three-men-with-widespread-hacking-whose-targets-included-jp-morgan/</a></p>
<p>On Tuesday federal prosecutors unsealed charges against three men, revealing details of a sprawling criminal enterprise that involved hacking some of the US&#8217; biggest financial institutions as well as the theft of personal information pertaining to 100 million customers. With that information, the men allegedly made off with hundreds of millions of dollars.</p>
<p>Although the indictment does not name the hacked financial institutions directly, Reuters reports that JP Morgan Chase, ETrade, and News Corp. (which owns The Wall Street Journal) have confirmed that they were party to the crimes described by the indictment.</p>
<p>The newly unsealed charges (PDF) accuse Gery Shalon, a 31-year-old Israeli, of masterminding the hacks that resulted in the loss of personal information pertaining to some 100 million customers of US financial institutions </p>
<p>Chief among the allegations is that Shalon and Aaron used their unauthorized access to financial institution networks to artificially manipulate certain US stock prices through a “pump-and-dump” scheme. </p>
<p>US authorities also charged that Shalon and his co-conspirators operated illegal gambling websites, processed payments for criminals selling anything from illegal pharmaceuticals to malware, and operated an illegal US-based Bitcoin exchange that ran afoul of US anti-money laundering laws.</p>
<p>These activities apparently earned the group hundreds of millions of dollars between 2007 and July 2015, &#8220;of which Shalon concealed at least $100 million in Swiss and other bank accounts,” the indictment says.</p>
<p>Today’s unsealed indictment also paints an interesting picture of how some of the network intrusions allegedly occurred. The US Attorney General claims that Aaron was a customer of many of the hacked companies, and he gave his login credentials to Shalon and an unnamed co-conspirator who performed analysis of the companies&#8217; networks. Shalon and the co-conspirator later accessed the companies’ networks and placed malware on them to allow them to steal information about customers over a period of months</p>
<p><a href="http://www.justice.gov/usao-sdny/file/792506/download" rel="nofollow">http://www.justice.gov/usao-sdny/file/792506/download</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1435702</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Sep 2015 20:51:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1435702</guid>
		<description><![CDATA[Thought Heartbleed was dead? Nope – hundreds of thousands of things still vulnerable to attack
IoT crawler reveals map of at-risk devices and computers
http://www.theregister.co.uk/2015/09/15/still_200k_iot_heartbleed_vulns/

More than a year after its introduction, the notorious HeartBleed security flaw remains a threat to more than 200,000 internet-connected devices.

This according to Shodan, a search tool that (among other things) seeks out internet-of-things (IoT) connected devices. Founder John Matherly posted a map the company built showing where many of the world&#039;s remaining vulnerable devices lay:

Heartbleed caused a minor panic when it was first uncovered in 2014. The flaw allowed an attacker to exploit weaknesses in the OpenSSL software library to extract passwords and other sensitive information from a targeted device.

Of the 200,000-plus vulnerable devices, 57,272 were housed in the United States. Germany was second with 21,060 Heartbleed-prone devices and China had 11,300. France was fourth with 10,094 followed by the UK with 9,125.

&quot;Clearly, some manufacturers and IT teams have dropped the ball, and failed to update vulnerable systems,&quot; noted security consultant Graham Cluley.

&quot;My bet is that there will always be devices attached to the internet which are vulnerable to Heartbleed.&quot;]]></description>
		<content:encoded><![CDATA[<p>Thought Heartbleed was dead? Nope – hundreds of thousands of things still vulnerable to attack<br />
IoT crawler reveals map of at-risk devices and computers<br />
<a href="http://www.theregister.co.uk/2015/09/15/still_200k_iot_heartbleed_vulns/" rel="nofollow">http://www.theregister.co.uk/2015/09/15/still_200k_iot_heartbleed_vulns/</a></p>
<p>More than a year after its introduction, the notorious HeartBleed security flaw remains a threat to more than 200,000 internet-connected devices.</p>
<p>This according to Shodan, a search tool that (among other things) seeks out internet-of-things (IoT) connected devices. Founder John Matherly posted a map the company built showing where many of the world&#8217;s remaining vulnerable devices lay:</p>
<p>Heartbleed caused a minor panic when it was first uncovered in 2014. The flaw allowed an attacker to exploit weaknesses in the OpenSSL software library to extract passwords and other sensitive information from a targeted device.</p>
<p>Of the 200,000-plus vulnerable devices, 57,272 were housed in the United States. Germany was second with 21,060 Heartbleed-prone devices and China had 11,300. France was fourth with 10,094 followed by the UK with 9,125.</p>
<p>&#8220;Clearly, some manufacturers and IT teams have dropped the ball, and failed to update vulnerable systems,&#8221; noted security consultant Graham Cluley.</p>
<p>&#8220;My bet is that there will always be devices attached to the internet which are vulnerable to Heartbleed.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1372709</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 Apr 2015 12:36:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1372709</guid>
		<description><![CDATA[How Heartbleed could&#039;ve been found
https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html

tl;dr With a reasonably simple fuzzing setup I was able to rediscover the Heartbleed bug. This uses state-of-the-art fuzzing and memory protection technology (american fuzzy lop and Address Sanitizer), but it doesn&#039;t require any prior knowledge about specifics of the Heartbleed bug or the TLS Heartbeat extension. We can learn from this to find similar bugs in the future


Fuzzing is a widely used strategy to find security issues and bugs in software. The basic idea is simple: Give the software lots of inputs with small errors and see what happens. If the software crashes you likely found a bug.

When buffer overflows happen an application doesn&#039;t always crash. Often it will just read (or write if it is a write overflow) to the memory that happens to be there. Whether it crashes depends on a lot of circumstances. Most of the time read overflows won&#039;t crash your application. That&#039;s also the case with Heartbleed. 

A better tool for our purpose is Address Sanitizer. David A. Wheeler calls it “nothing short of amazing”, and I want to reiterate that. I think it should be a tool that every C/C++ software developer should know and should use for testing.

Address Sanitizer is part of the C compiler and has been included into the two most common compilers in the free software world, gcc and llvm. To use Address Sanitizer one has to recompile the software with the command line parameter -fsanitize=address . It slows down applications, but only by a relatively small amount. According to their own numbers an application using Address Sanitizer is around 1.8 times slower. This makes it feasible for fuzzing tasks.

Conclusion

You may ask now what the point of all this is. Of course we already know where Heartbleed is, it has been patched, fixes have been deployed and it is mostly history. It&#039;s been analyzed thoroughly.

The question has been asked if Heartbleed could&#039;ve been found by fuzzing. I&#039;m confident to say the answer is yes. One thing I should mention here however: American fuzzy lop was already available back then, but it was barely known. It only received major attention later in 2014, after Michal Zalewski used it to find two variants of the Shellshock bug.]]></description>
		<content:encoded><![CDATA[<p>How Heartbleed could&#8217;ve been found<br />
<a href="https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html" rel="nofollow">https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html</a></p>
<p>tl;dr With a reasonably simple fuzzing setup I was able to rediscover the Heartbleed bug. This uses state-of-the-art fuzzing and memory protection technology (american fuzzy lop and Address Sanitizer), but it doesn&#8217;t require any prior knowledge about specifics of the Heartbleed bug or the TLS Heartbeat extension. We can learn from this to find similar bugs in the future</p>
<p>Fuzzing is a widely used strategy to find security issues and bugs in software. The basic idea is simple: Give the software lots of inputs with small errors and see what happens. If the software crashes you likely found a bug.</p>
<p>When buffer overflows happen an application doesn&#8217;t always crash. Often it will just read (or write if it is a write overflow) to the memory that happens to be there. Whether it crashes depends on a lot of circumstances. Most of the time read overflows won&#8217;t crash your application. That&#8217;s also the case with Heartbleed. </p>
<p>A better tool for our purpose is Address Sanitizer. David A. Wheeler calls it “nothing short of amazing”, and I want to reiterate that. I think it should be a tool that every C/C++ software developer should know and should use for testing.</p>
<p>Address Sanitizer is part of the C compiler and has been included into the two most common compilers in the free software world, gcc and llvm. To use Address Sanitizer one has to recompile the software with the command line parameter -fsanitize=address . It slows down applications, but only by a relatively small amount. According to their own numbers an application using Address Sanitizer is around 1.8 times slower. This makes it feasible for fuzzing tasks.</p>
<p>Conclusion</p>
<p>You may ask now what the point of all this is. Of course we already know where Heartbleed is, it has been patched, fixes have been deployed and it is mostly history. It&#8217;s been analyzed thoroughly.</p>
<p>The question has been asked if Heartbleed could&#8217;ve been found by fuzzing. I&#8217;m confident to say the answer is yes. One thing I should mention here however: American fuzzy lop was already available back then, but it was barely known. It only received major attention later in 2014, after Michal Zalewski used it to find two variants of the Shellshock bug.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1372707</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 Apr 2015 12:34:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1372707</guid>
		<description><![CDATA[Heartbleed One Year Later: Has Anything Changed?
http://it.slashdot.org/story/15/04/08/040204/heartbleed-one-year-later-has-anything-changed

It was on April 7, 2014 that the CVE-2014-0160 vulnerability titled &quot;TLS heartbeat read overrun&quot; in OpenSSL was first publicly disclosed — but to many its a bug known simply as Heartbleed.


 Qualys&#039; SSL Pulse claims that only 0.3 percent of sites are still at risk. Whatever the risk is today, the bottom line is that Heartbleed did change the security conversation — but did it change it for the better or the worse?

Heartbleed a Year Later: How the Security Conversation Changed
http://www.eweek.com/security/heartbleed-a-year-later-how-the-security-conversation-changed.html

Extraordinary branding, however, is not why Heartbleed was and still remains a non-trivial security issue. OpenSSL is a widely deployed open-source technology that is used on endpoints, mobile devices and servers. The promise of OpenSSL is that it provides the Secure Sockets Layer/Transport Layer Security (SSL/TLS) cryptographic libraries necessary to secure data transport. The danger of Heartbleed is that the SSL/TLS could be decrypted, leaving users at risk.

Since OpenSSL is open-source, many pundits were quick to criticize the open-source model as being at the core of the Heartbleed vulnerability. In response, the open-source community, led by the Linux Foundation, rallied and launched the Core Critical Infrastructure (CCI) effort. CCI raised $5.5 million in funding from Adobe, Bloomberg, Hewlett-Packard, VMware, Rackspace, NetApp, Microsoft, Intel, IBM, Google, Fujitsu, Facebook, Dell, Amazon and Cisco in an effort to secure open-source infrastructure and development. CCI is now providing some funding to OpenSSL developers to help prevent another Heartbleed.

The OpenSSL project itself has released multiple security updates over the course of the past year

Even with 12 months of time, there is still Heartbleed risk today.  In a new report, security vendor Venafi claims that 74 percent of the Global 2000 are still at risk from Heartbleed. Venafi&#039;s numbers, however, are not just about servers being updated with the latest OpenSSL milestone, but also about replacing SSL/TLS certificates.

&quot;It&#039;s akin to saying that even though you&#039;ve had heart bypass surgery to mitigate a clot in an artery, you are still in immediate danger of having a heart attack because you haven&#039;t stopped eating fatty and unhealthy foods,&quot; Alperovitch said at the time.

While Venafi claims that the majority of sites it surveyed are still at risk from Heartbleed, the Qualys-sponsored SSL Pulse site currently reports that only 0.3 percent of sites are currently at risk from Heartbleed.]]></description>
		<content:encoded><![CDATA[<p>Heartbleed One Year Later: Has Anything Changed?<br />
<a href="http://it.slashdot.org/story/15/04/08/040204/heartbleed-one-year-later-has-anything-changed" rel="nofollow">http://it.slashdot.org/story/15/04/08/040204/heartbleed-one-year-later-has-anything-changed</a></p>
<p>It was on April 7, 2014 that the CVE-2014-0160 vulnerability titled &#8220;TLS heartbeat read overrun&#8221; in OpenSSL was first publicly disclosed — but to many its a bug known simply as Heartbleed.</p>
<p> Qualys&#8217; SSL Pulse claims that only 0.3 percent of sites are still at risk. Whatever the risk is today, the bottom line is that Heartbleed did change the security conversation — but did it change it for the better or the worse?</p>
<p>Heartbleed a Year Later: How the Security Conversation Changed<br />
<a href="http://www.eweek.com/security/heartbleed-a-year-later-how-the-security-conversation-changed.html" rel="nofollow">http://www.eweek.com/security/heartbleed-a-year-later-how-the-security-conversation-changed.html</a></p>
<p>Extraordinary branding, however, is not why Heartbleed was and still remains a non-trivial security issue. OpenSSL is a widely deployed open-source technology that is used on endpoints, mobile devices and servers. The promise of OpenSSL is that it provides the Secure Sockets Layer/Transport Layer Security (SSL/TLS) cryptographic libraries necessary to secure data transport. The danger of Heartbleed is that the SSL/TLS could be decrypted, leaving users at risk.</p>
<p>Since OpenSSL is open-source, many pundits were quick to criticize the open-source model as being at the core of the Heartbleed vulnerability. In response, the open-source community, led by the Linux Foundation, rallied and launched the Core Critical Infrastructure (CCI) effort. CCI raised $5.5 million in funding from Adobe, Bloomberg, Hewlett-Packard, VMware, Rackspace, NetApp, Microsoft, Intel, IBM, Google, Fujitsu, Facebook, Dell, Amazon and Cisco in an effort to secure open-source infrastructure and development. CCI is now providing some funding to OpenSSL developers to help prevent another Heartbleed.</p>
<p>The OpenSSL project itself has released multiple security updates over the course of the past year</p>
<p>Even with 12 months of time, there is still Heartbleed risk today.  In a new report, security vendor Venafi claims that 74 percent of the Global 2000 are still at risk from Heartbleed. Venafi&#8217;s numbers, however, are not just about servers being updated with the latest OpenSSL milestone, but also about replacing SSL/TLS certificates.</p>
<p>&#8220;It&#8217;s akin to saying that even though you&#8217;ve had heart bypass surgery to mitigate a clot in an artery, you are still in immediate danger of having a heart attack because you haven&#8217;t stopped eating fatty and unhealthy foods,&#8221; Alperovitch said at the time.</p>
<p>While Venafi claims that the majority of sites it surveyed are still at risk from Heartbleed, the Qualys-sponsored SSL Pulse site currently reports that only 0.3 percent of sites are currently at risk from Heartbleed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1354957</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2015 09:07:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1354957</guid>
		<description><![CDATA[OpenSSL audit kicks off for post-Heartbleed strengthening program
We can rebuild him. We have the technology. We can make him better...stronger...faster
http://www.theregister.co.uk/2015/03/10/openssl_audit/

A major audit of the ubiquitous OpenSSL web security protocol is set to commence under a US$1.2 million industry commitment to harden open source technologies.

OpenSSL is first off the rank under the Linux Foundation’s Core Infrastructure Initiative given its popularity and lack of in-depth security review.

&quot;OpenSSL has been reviewed and improved by the academic community, commercial static analyser companies, validation organisations, and individual review over the years but this audit may be the largest effort to review it, and is definitely the most public,&quot; says security outfit Cryptography Services in post announcing their involvement in the audit.

&quot;Serious flaws in OpenSSL cause the whole Internet to upgrade, and in the case of flaws like Heartbleed and EarlyCCS, upgrade in a rush.

&quot;We know that with what may be the highest profile audit conducted on an open source piece of software, the internet is watching.&quot;

The audit organised by the Open Crypto Audit Project will first focus on TLS stacks examining protocol flow, state transitions, high-profile cryptographic algorithms, and memory management, the company says.

It will cover a sufficient amount of the codebase to be a &quot;useful component&quot; in the wider effort to secure OpenSSL.

First results of the audit are expected around July. The audit begins on the back of OpenSSL code reviews completed last month launched engineer Matt Caswell says on the realisation that coding was &quot;very unusual&quot;, &quot;inconsistently applied&quot; and not formally defined.]]></description>
		<content:encoded><![CDATA[<p>OpenSSL audit kicks off for post-Heartbleed strengthening program<br />
We can rebuild him. We have the technology. We can make him better&#8230;stronger&#8230;faster<br />
<a href="http://www.theregister.co.uk/2015/03/10/openssl_audit/" rel="nofollow">http://www.theregister.co.uk/2015/03/10/openssl_audit/</a></p>
<p>A major audit of the ubiquitous OpenSSL web security protocol is set to commence under a US$1.2 million industry commitment to harden open source technologies.</p>
<p>OpenSSL is first off the rank under the Linux Foundation’s Core Infrastructure Initiative given its popularity and lack of in-depth security review.</p>
<p>&#8220;OpenSSL has been reviewed and improved by the academic community, commercial static analyser companies, validation organisations, and individual review over the years but this audit may be the largest effort to review it, and is definitely the most public,&#8221; says security outfit Cryptography Services in post announcing their involvement in the audit.</p>
<p>&#8220;Serious flaws in OpenSSL cause the whole Internet to upgrade, and in the case of flaws like Heartbleed and EarlyCCS, upgrade in a rush.</p>
<p>&#8220;We know that with what may be the highest profile audit conducted on an open source piece of software, the internet is watching.&#8221;</p>
<p>The audit organised by the Open Crypto Audit Project will first focus on TLS stacks examining protocol flow, state transitions, high-profile cryptographic algorithms, and memory management, the company says.</p>
<p>It will cover a sufficient amount of the codebase to be a &#8220;useful component&#8221; in the wider effort to secure OpenSSL.</p>
<p>First results of the audit are expected around July. The audit begins on the back of OpenSSL code reviews completed last month launched engineer Matt Caswell says on the realisation that coding was &#8220;very unusual&#8221;, &#8220;inconsistently applied&#8221; and not formally defined.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/04/11/web-security-disasters-from-nsa-to-heartbleed/comment-page-2/#comment-1305871</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Dec 2014 09:33:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25622#comment-1305871</guid>
		<description><![CDATA[OpenVPN plugs DoS hole
VPN providers patch! Everyone else relax.
http://www.theregister.co.uk/2014/12/02/openvpn_critical_denial_of_service_vulnerability/

OpenVPN has patched a denial-of-service vulnerability which authenticated users could trigger by sending malicious packets.

The flaw (CVE-2014-8104) is most hurtful to VPN service providers and was reported by researcher Dragana Damjanovic to OpenVPN last month.

Maintainers said in an advisory issued this morning that the flaw affected versions back to at least 2005 and allowed TLS-authenticated clients to crash the server by sending a too-short control channel packet to the server.

“In other words this vulnerability is denial of service only,” they said.

“An OpenVPN server can be easily crashed using this vulnerability by an authenticated client. However, we are not aware of this exploit being in the wild before we released a fixed version.

A fixed version of OpenVPN (2.3.6) was released 1st Dec 2014 at around 18:00 UTC. The fix was also backported to the OpenVPN 2.2 branch and released in OpenVPN 2.2.3, a source-only release.]]></description>
		<content:encoded><![CDATA[<p>OpenVPN plugs DoS hole<br />
VPN providers patch! Everyone else relax.<br />
<a href="http://www.theregister.co.uk/2014/12/02/openvpn_critical_denial_of_service_vulnerability/" rel="nofollow">http://www.theregister.co.uk/2014/12/02/openvpn_critical_denial_of_service_vulnerability/</a></p>
<p>OpenVPN has patched a denial-of-service vulnerability which authenticated users could trigger by sending malicious packets.</p>
<p>The flaw (CVE-2014-8104) is most hurtful to VPN service providers and was reported by researcher Dragana Damjanovic to OpenVPN last month.</p>
<p>Maintainers said in an advisory issued this morning that the flaw affected versions back to at least 2005 and allowed TLS-authenticated clients to crash the server by sending a too-short control channel packet to the server.</p>
<p>“In other words this vulnerability is denial of service only,” they said.</p>
<p>“An OpenVPN server can be easily crashed using this vulnerability by an authenticated client. However, we are not aware of this exploit being in the wild before we released a fixed version.</p>
<p>A fixed version of OpenVPN (2.3.6) was released 1st Dec 2014 at around 18:00 UTC. The fix was also backported to the OpenVPN 2.2 branch and released in OpenVPN 2.2.3, a source-only release.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
