If you're running OpenSSL 1.0.1 in any Internet-facing services, then you'll want to:
(1) Read the advisories
(2) Deploy emergency updates (either 1.0.1g or with heartbeats disabled)
(3) Figure out if you want to do key/cert rotation on assumption of
compromise
Short version: length-checking flaw in TLS Heartbeats allows for 64kB of
memory disclosure, and the researchers have proven that they can use
this to exfiltrate the certificate's private key, and that this leaves
no audit log. Affects all releases of OpenSSL 1.0.1 prior to today's
"g" release.
http://www.openssl.org/news/vulnerabilities.html#2014-0160
http://heartbleed.com/
-Phil
pgpc_JkZgD6tj.pgp
Description: PGP signature
_______________________________________________ Tech mailing list [email protected] https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech This list provided by the League of Professional System Administrators http://lopsa.org/
