Does the openSSL heartbleed bug effect jetty users?

See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do
not properly handle Heartbeat Extension packets, which allows remote
attackers to obtain sensitive information from process memory via crafted
packets that trigger a buffer over-read, as demonstrated by reading private
keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Greetings,
Maarten Ligtvoet
_______________________________________________
jetty-users mailing list
[email protected]
https://dev.eclipse.org/mailman/listinfo/jetty-users

Reply via email to