But your passwords to the web site might... Still not good, though perhaps not as catastrophic as first thought - depending on how the web or other application using OpenSSL is written.
Thanks for that article. Kurt On Wed, Apr 9, 2014 at 10:22 AM, Kennedy, Jim <[email protected]>wrote: > The plot thickens. Maybe the private key doesn't leak. > > > > > http://blog.erratasec.com/2014/04/why-heartbleed-doesnt-leak-private-key.html > > > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Ziots, Edward > *Sent:* Wednesday, April 9, 2014 1:14 PM > *To:* [email protected] > *Subject:* RE: [NTSysADM] Heartbleed vulnerability > > > > http://isc.sans.edu/diary/Heartbleed+vendor+notifications/17929 > > > > Looks like there might be a NMAP script out for the vulnerability also per > the ISC sites > > > > Z > > > > Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network + > > Security Engineer > > Lifespan Organization > > [email protected] > > Work:401-255-2497 > > > > > > This electronic message and any attachments may be privileged and > confidential and protected from disclosure. If you are reading this > message, but are not the intended recipient, nor an employee or agent > responsible for delivering this message to the intended recipient, you are > hereby notified that you are strictly prohibited from copying, printing, > forwarding or otherwise disseminating this communication. If you have > received this communication in error, please immediately notify the sender > by replying to the message. Then, delete the message from your computer. > Thank you. > > > > > > *From:* [email protected] [ > mailto:[email protected] <[email protected]>] *On > Behalf Of *Kurt Buff > *Sent:* Wednesday, April 09, 2014 12:45 PM > *To:* [email protected] > *Subject:* Re: [NTSysADM] Heartbleed vulnerability > > > > Don't know, but it might be worthwhile checking on any equipment with a > web server, including: switches, routers, ILO/DRAC, ESX/ESXi, web filters, > spam filters, firewalls, SSL VPN appliances, 3rd party computer management > software (Dell server administrator software, etc.). > > That's just off the top of my head... > > I'm looking for a script to run against my internal infrastructure - > anyone know of one? > > Kurt > > > > On Wed, Apr 9, 2014 at 7:49 AM, David Lum <[email protected]> > wrote: > > *From:* David Lum > *Sent:* Wednesday, April 09, 2014 7:43 AM > *To:* '[email protected]' > *Subject:* Heartbleed vulnerability > > > > Are many of you guys affected by this? > > > https://isc.sans.edu/forums/diary/Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921 > > > > Most likely vectors are apparently Linux-based appliances. > > > > > > > > > > *David Lum* > > *Network System Admin, Information Services* > > *office* 503-265-4728 | modahealth.com <http://www.modahealth.com/> > > *I’m excited to announce that ODS Health is now Moda Health. Please make a > note of my new email address, [email protected] > <[email protected]>, so we can stay connected.* > > This message is intended for the sole use of the individual and entity to > whom it is addressed, and may contain information that is privileged, > confidential and exempt from disclosure under applicable law. If you are > not the intended addressee, nor authorized to receive for the intended > addressee, you are hereby notified that you may not use, copy, disclose or > distribute to anyone the message or any information contained in the > message. If you have received this message in error, please immediately > advise the sender by reply email and delete the message. > > > > > > >
<<inline: image002.jpg>>
<<inline: image001.png>>

