In case this helps, here's what our campus security folks sent out this morning.

==============================================================================

Mitigation:
"Affected users should upgrade to OpenSSL 1.0.1g. Users unable to
immediately upgrade can alternatively recompile OpenSSL with
- -DOPENSSL_NO_HEARTBEATS."

Quick remote test for potential vulnerability (from linux):
echo ""|openssl s_client -connect $MYHOST:443 -tlsextdebug 2>&1 \
 | egrep 'heartbeat'

An example response of a potentially vulnerable host would be:
TLS server extension "heartbeat" (id=15), len=1

Quick local check for vulnerability:
openssl version -a
Any version other than 1.0.1 through 1.0.1f should be safe. In any
1.0.1 version if the -DOPENSSL_NO_HEARTBEATS flag listed in the
compiler flags that should mean you're safe.

Spot check:

openssl version -a| grep -oE '1.0.1[a-g]{1}?|DOPENSSL_NO_HEARTBEATS'

This should give you the version, if it's 1.0.1, and if the
OPENSSL_NO_HEARTBEATS was listed.

Adding to the spot checks above, once you patch with the official
patches from Ubuntu/Debian/RHEL these simple openssl checks will still
show the heartbeat extension enabled but it shouldn't be vulnerable
anymore. If you have access to Qualys for scanning, the QID for
scanning for this vulnerability is 42430.

The http://heartbleed.com/ site recommends re-issuing certificates
in case of prior compromise of existing private keys as there is no
way to differentiate from normal traffic.

We are recommending to our users to do this as well as any credentials
used over the SSL connection, especially in the last few days. The
vulnerability is easily exploitable and a few tests have returned
valid session cookies at the very least. Supposedly the server's
private key can be exposed as well. Passively there's no way to
determine if this is being exploited. I haven't had time to test with
debugging enabled.

=======================================================================


Jamie Duncan wrote on 4/8/2014 12:44 PM:
The bug was only applicable to RHEL/CentOS/OEL/SL 6.5+
https://access.redhat.com/site/solutions/781793



On Tue, Apr 8, 2014 at 1:36 PM, Jeffrey Anderson <[email protected]
<mailto:[email protected]>> wrote:

    Is SL5 vulnerable, and will there be a patch?




    On Tue, Apr 8, 2014 at 7:10 AM, Pat Riehecky <[email protected]
    <mailto:[email protected]>> wrote:

        The updated package should be available now.

        Pat


        On 04/08/2014 05:43 AM, Adam Bishop wrote:

            Good Morning,

            I’ve not seen a fixed OpenSSL package drop into the repo’s as of 
yet.

            Apologies for asking the question, but how quickly will this be
            packaged and made available (i.e. should I start building the
            package myself)?

            Regards,

            Adam Bishop
            Systems Development Specialist

                gpg: 0x6609D460
                  t: +44 (0)1235 822 245 <tel:%2B44%20%280%291235%20822%20245>
               xmpp: [email protected] <mailto:[email protected]>

            Janet, the UK's research and education network.


            Janet(UK) is a trading name of Jisc Collections and Janet Limited, a
            not-for-profit company which is registered in England under No. 
2881024
            and whose Registered Office is at Lumen House, Library Avenue,
            Harwell Oxford, Didcot, Oxfordshire. OX11 0SG. VAT No. 614944238



        --
        Pat Riehecky

        Scientific Linux developer
        http://www.scientificlinux.__org/ <http://www.scientificlinux.org/>




    --
    --------------------------------------------------------------
    Jeffrey Anderson                        | [email protected]
    <mailto:[email protected]>
    Lawrence Berkeley National Laboratory   |
    Office: 50A-5104E                       | Mailstop 50A-5101
    Phone: 510 486-4208 <tel:510%20486-4208>                     | Fax: 510
    486-4204 <tel:510%20486-4204>




--
Thanks,

Jamie Duncan
@jamieeduncan



--
P. Larry Nelson (217-244-9855) | Systems/Network Administrator
461 Loomis Lab                 | High Energy Physics Group
1110 W. Green St., Urbana, IL  | Physics Dept., Univ. of Ill.
MailTo:[email protected]    | http://www.roadkill.com/lnelson/
-------------------------------------------------------------------
 "Information without accountability is just noise."  - P.L. Nelson

Reply via email to