Never mind - I should have known that the nmap folks would have one ready
to go.

Love that tool...

Kurt


On Wed, Apr 9, 2014 at 9:45 AM, Kurt Buff <[email protected]> wrote:

> Don't know, but it might be worthwhile checking on any equipment with a
> web server, including: switches, routers, ILO/DRAC, ESX/ESXi, web filters,
> spam filters, firewalls, SSL VPN appliances, 3rd party computer management
> software (Dell server administrator software, etc.).
>
> That's just off the top of my head...
>
> I'm looking for a script to run against my internal infrastructure -
> anyone know of one?
>
> Kurt
>
>
> On Wed, Apr 9, 2014 at 7:49 AM, David Lum <[email protected]>wrote:
>
>> *From:* David Lum
>> *Sent:* Wednesday, April 09, 2014 7:43 AM
>> *To:* '[email protected]'
>> *Subject:* Heartbleed vulnerability
>>
>>
>>
>> Are many of you guys affected by this?
>>
>>
>> https://isc.sans.edu/forums/diary/Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921
>>
>>
>>
>> Most likely vectors are apparently Linux-based appliances.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> *David Lum*
>>
>> *Network System Admin, Information Services*
>>
>> *office* 503-265-4728  |  modahealth.com <http://www.modahealth.com/>
>>
>> *I’m excited to announce that ODS Health is now Moda Health. Please make
>> a note of my new email address, [email protected]
>> <[email protected]>, so we can stay connected.*
>>
>> This message is intended for the sole use of the individual and entity to
>> whom it is addressed, and may contain information that is privileged,
>> confidential and exempt from disclosure under applicable law. If you are
>> not the intended addressee, nor authorized to receive for the intended
>> addressee, you are hereby notified that you may not use, copy, disclose or
>> distribute to anyone the message or any information contained in the
>> message. If you have received this message in error, please immediately
>> advise the sender by reply email and delete the message.
>>
>>
>>
>>
>>
>
>

<<inline: image001.jpg>>

Reply via email to