Don't know, but it might be worthwhile checking on any equipment with a web server, including: switches, routers, ILO/DRAC, ESX/ESXi, web filters, spam filters, firewalls, SSL VPN appliances, 3rd party computer management software (Dell server administrator software, etc.).
That's just off the top of my head... I'm looking for a script to run against my internal infrastructure - anyone know of one? Kurt On Wed, Apr 9, 2014 at 7:49 AM, David Lum <[email protected]> wrote: > *From:* David Lum > *Sent:* Wednesday, April 09, 2014 7:43 AM > *To:* '[email protected]' > *Subject:* Heartbleed vulnerability > > > > Are many of you guys affected by this? > > > https://isc.sans.edu/forums/diary/Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921 > > > > Most likely vectors are apparently Linux-based appliances. > > > > > > > > > > *David Lum* > > *Network System Admin, Information Services* > > *office* 503-265-4728 | modahealth.com <http://www.modahealth.com/> > > *I’m excited to announce that ODS Health is now Moda Health. Please make a > note of my new email address, [email protected] > <[email protected]>, so we can stay connected.* > > This message is intended for the sole use of the individual and entity to > whom it is addressed, and may contain information that is privileged, > confidential and exempt from disclosure under applicable law. If you are > not the intended addressee, nor authorized to receive for the intended > addressee, you are hereby notified that you may not use, copy, disclose or > distribute to anyone the message or any information contained in the > message. If you have received this message in error, please immediately > advise the sender by reply email and delete the message. > > > > >
<<inline: image001.jpg>>

