heartbleed-bug Questions

2

Following the Heartbleed bug, this post on ruby-lang.org describes how to check vulnerability and upgrade. It includes this advice: To verify which version of the OpenSSL library you link to Ru...
Burnsides asked 10/4, 2014 at 16:18

2

Solved

In one of our first CS lectures on security we were walked through C's issue with not checking alleged buffer lengths and some examples of the different ways in which this vulnerability could be ex...
Gussi asked 15/4, 2014 at 16:56

2

Solved

Soon after learning that recompiling with -DOPENSSL_NO_HEARTBEATS will disable TLSv1 Heartbeats in OpenSSL 1.0.1e, I wondered why it was not a run-time option instead, maybe called something like S...
Lemmy asked 13/4, 2014 at 10:24

2

Solved

I came across this Python script that tests the server for the HeartBleed vulnerability: Would someone be able to explain the content of the "hello", what is being sent and how was this content c...
Debarath asked 12/4, 2014 at 16:39

1

Solved

https://www.rfc-editor.org/rfc/rfc6520 does not explain why a heartbeat request/response round-trip is supposed to contain a payload. It just specifies that there is room for payload and that the r...
Seed asked 10/4, 2014 at 10:44

3

Solved

With all the chatter going on about the heartbleed bug, it's hard to find information on what exactly the exploited heartbeat extension for OpenSSL is used for. Also, is it possible to disable it ...
Sinusoidal asked 10/4, 2014 at 15:16

2

Solved

"OpenSSL 1.01 — the one production version affected — had been shipping since March 12, 2012" Does this (above) mean that a Windows 2012 R2 server we ordered a month ago, now running HTT...
Rowlett asked 8/4, 2014 at 21:42

1

I can't find information on what versions they're using. I'd expect AWS to make a statement about this, because it's a pretty big deal, but again, can't find anything. To answer my own quest...
1

© 2022 - 2024 — McMap. All rights reserved.