Most of the system administrators and developers are re-directed to fix the openssl’s most threatening bug which is named as heart bleed.Heartbeat actually keep the session alive for a bit ,so that communication will not be broken.Where as in typical SSL, connection will be terminated immediately if the connection is inactive for a bit. Recently security team has discovered the issue with heartbeat extension. Using heartbeat protocol ,attackers can read the memory contents with the chunk of 64K . This information can be decry pt and they can read in text format. Assume if the server is using for credit card transactions and attackers can easily pull out all the details that they want by pulling number of 64k memory chunks.
Openssl 1.0.1 through 1.0.1f are vulnerable .For More info check this Heartbleed
The first heart bleed affected version of Redhat Linux is version 6.5 . Redat Linux 6.0 to redhat Linux 6.4 are unaffected.
As per redhat’s support documents , OpenSSL versions openssl-1.0.1e-15 through openssl-1.0.1e-16.el6_5.4 include a flawed libssl.so library vulnerable to the issue
(Here is the RedHat article regarding this - Click me)
Use the below method to find the version of openssl .
Openssl 1.0.1 through 1.0.1f are vulnerable .For More info check this Heartbleed
The first heart bleed affected version of Redhat Linux is version 6.5 . Redat Linux 6.0 to redhat Linux 6.4 are unaffected.
As per redhat’s support documents , OpenSSL versions openssl-1.0.1e-15 through openssl-1.0.1e-16.el6_5.4 include a flawed libssl.so library vulnerable to the issue
(Here is the RedHat article regarding this - Click me)
Use the below method to find the version of openssl .
0 comments:
Post a Comment