{"id":16204,"date":"2019-08-30T09:10:04","date_gmt":"2019-08-30T17:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/30\/news-9946\/"},"modified":"2019-08-30T09:10:04","modified_gmt":"2019-08-30T17:10:04","slug":"news-9946","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/30\/news-9946\/","title":{"rendered":"Everything you need to know about the Heartbleed vulnerability"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 30 Aug 2019 16:16:00 +0000<\/strong><\/p>\n<p><em>Guest post contributed by Ilai Bavati and Gilad Maayan of Agile SEO.<br \/><\/em><\/p>\n<p>The Heartbleed vulnerability was introduced into the OpenSSL crypto library in 2012. It was discovered and fixed in 2014, yet today\u2014five years later\u2014there are still unpatched systems.\u00a0<\/p>\n<p>This article will provide IT teams with the necessary information to decide whether or not to apply the Heartbleed vulnerability fix. However, we caution: The latter would continue to leave your users\u2019 data exposed to future attacks. <\/p>\n<h3>What is the Heartbleed vulnerability?<\/h3>\n<p>Heartbleed is a code flaw in the OpenSSL cryptography library. This is what it looks like:<\/p>\n<p>memcpy(bp, pl, payload);<\/p>\n<p>In 2014, a vulnerability was found in <a href=\"https:\/\/www.openssl.org\/blog\/blog\/2015\/09\/28\/critical-security-level\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OpenSSL<\/a>, which is a popular cryptography library. OpenSSL provides developers with tools and resources for the implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.\u00a0<\/p>\n<p>Websites, emails, instant messaging (IM) applications, and virtual private networks (VPNs) rely on SSL and TLS protocols for security and privacy of communication over the Internet. Applications with OpenSSL components were exposed to the Heartbleed vulnerability. At the time of discovery, that was 17 percent of all SSL servers.<\/p>\n<p>Upon discovery, the vulnerability was given the official vulnerability identifier CVE-2014-0160, but it\u2019s more commonly known by the name Heartbleed. The latter was invented by an engineer from Codenomicon, who was one of the people that discovered the vulnerability.<\/p>\n<p>The name Heartbleed is derived from the source of the exploit\u2014a buggy implementation of the RFC 6520 Heartbeat Extension, which packed inside it the SSL and TLS protocols for OpenSSL.<\/p>\n<h3>Heartbleed vulnerability behavior<\/h3>\n<p>The Heartbleed vulnerability weakens the security of the most common Internet communication protocols (<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.globalsign.com\/en\/blog\/ssl-vs-tls-difference\/\" target=\"_blank\">SSL and TSL<\/a>). Websites affected by  Heartbleed allow Internet users to read their memory. That means the encryption keys, which are supposed to protect data, are visible for anyone to see. <\/p>\n<p>With the encryption keys exposed, threat actors gain access to the credentials\u2014such as names and passwords\u2014required to hack into systems. From within the system, depending on the authorization level of the stolen credentials, threat actors can initiate more attacks, eavesdrop on communications, impersonate users, and steal data.<\/p>\n<h3>How Heartbleed works<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/QQ8196kxngskl1e5_KoR23MNumvMUjCSexdK2f8VtD2i8ZLinVDaeaEAB3UJy4RyG3fe5r8s6-AbQMZBTgAu19bs9dWgmU8xqDtFvdS2AU1FL3tG3w91drkUxjWGAMCWeDct0ApD\" alt=\"\"\/><\/figure>\n<p><a href=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/1\/11\/Simplified_Heartbleed_explanation.svg\/1920px-Simplified_Heartbleed_explanation.svg.png\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" data-rel=\"lightbox-0\" title=\"\">Image Source<\/a><\/p>\n<p>The Heartbleed vulnerability damages the security of communication between SSL and TLS servers and clients because it weakens the heartbeat extension.&nbsp;<\/p>\n<p>Ideally, the heartbeat extension is supposed to secure the SSL and TLS protocols by validating requests made to the server. It allows a computer on one end of the communication to send a Heartbeat Request message. <\/p>\n<p>Each message contains a payload\u2014a text string that contains the transmitted information\u2014and a number that represents the memory length of the payload\u2014usually as a 16-bit integer. Before providing the requested information, the heartbeat extension is supposed to do a bounds check that validates the input request and returns the exact payload length that was requested.<\/p>\n<p>The flaw in the OpenSSL heartbeat extension created an exploit in the validation process. Instead of doing a bounds check, the heartbeat extension allocated a memory buffer without going through the validation process. Threat actors could send a request and receive up to 64 kilobytes of any of the information available in the memory buffer. <\/p>\n<p>Memory buffers are temporary memory storage locations, created for the purpose of storing data in transit. They may contain batches of data types, which represent different stores of information. Essentially, a memory buffer keeps information before it\u2019s sent to its designated location.&nbsp;<\/p>\n<p>A memory buffer doesn\u2019t organize data\u2014it stores it in batches. One memory buffer may contain sensitive and financial information, as well as credentials, cookies, website pages and images, digital assets, and any data in transit. When threat actors exploit the Heartbleed vulnerability, they trick the heartbeat extension into providing them with all of the information available within the memory buffer.<\/p>\n<h3>The Heartbleed fix<\/h3>\n<p>Bodo Moeller and Adam Langley of Google created the fix for Heartbleed. They wrote a code that told the heartbeat extension to ignore any Heartbeat Request message that asks for more data than the payload needs.&nbsp;<\/p>\n<p>Here\u2019s an example of a <a href=\"https:\/\/git.openssl.org\/gitweb\/?p=openssl.git;a=commitdiff;h=96db902\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Heartbleed fix<\/a>:<\/p>\n<p>if (1 + 2 + payload + 16 &gt; s-&gt;s3-&gt;rrec.length) return 0; \/* silently discard per RFC 6520 sec. 4 *\/<\/p>\n<h3>How the Heartbleed vulnerability shaped OpenSSL as we know it<\/h3>\n<p>The <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/resources.whitesourcesoftware.com\/blog-whitesource\/how-the-heartbleed-vulnerability-shaped-openssl-as-we-know-it\" target=\"_blank\">discovery of the Heartbleed vulnerability<\/a> created worldwide panic. Once the fixes were applied, idle fingers started looking for the causes of the incident. Close scrutiny at OpenSSL revealed that this widely-popular library was maintained solely by two men with a shockingly low budget. <\/p>\n<p>This finding spurred two positive initiatives that changed the landscape of open-source:<\/p>\n<ul>\n<li>Organizations realized the importance of supporting open-source projects. There\u2019s only so much two people can do with their personal savings. Organizations, on the other hand, can provide the resources needed to maintain the security of open-source projects.<\/li>\n<li>To help finance important open-source projects, Linux started the Core Infrastructure Initiative (CII). The CII chooses the most critical open-source projects, which are deemed essential for the vitality of the Internet and other information systems. The CII receives donations from large organizations and offers them to OSS initiatives in the form of programs and grants.<\/li>\n<\/ul>\n<p>As with any change-leading crisis, the Heartbleed vulnerability also carried a negative side-effect: the rise of vulnerability brands. The Heartbleed vulnerability was discovered at the same time by two entities\u2014Google and Codenomicon. <\/p>\n<p>Google chose to disclose the vulnerability privately, sharing the information only with OpenSSL contributors. Codenomicon, on the other hand, chose to spread the news to the public. They named the vulnerability, created a logo and a website, and approached the announcement like a well-funded marketing event. <\/p>\n<p>In the following years, many of the disclosed vulnerabilities were given an almost celebrity-like treatment, with PR agencies building them up into brands, and marketing agencies deploying branded names, logos, and websites. While this can certainly help warn the public against <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/zero-day\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"zero-day  (opens in a new tab)\">zero-day <\/a>vulnerabilities, it can also create massive confusion. <\/p>\n<p>Nowadays, security experts and software developers are dealing with vulnerabilities in the thousands. To properly protect their systems, they need to prioritize vulnerabilities. That means deciding which vulnerability requires patching now, and which could be postponed. Sometimes, branded vulnerabilities are marketed as critical when they aren\u2019t. <\/p>\n<p>When that happens, not all affected parties have the time, skills, and resources to determine the true importance of the vulnerability. Instead of turning vulnerabilities into a buzz word, professionals could better serve the public by creating fixes.<\/p>\n<h3>Heartbleed Exploit Kits<\/h3>\n<p>Today, five years after the disclosure of the Heartbleed vulnerability, it still exists in many servers and systems. Current versions of OpenSSL, of course, were fixed. However, systems that didn\u2019t upgrade to the patched version of OpenSSL are still affected by the vulnerability and open to attack.<\/p>\n<p>For threat actors, finding the Heartbleed vulnerability is a prize. With today\u2019s automation capabilities, criminals can send bots to do the work for them. These bots are packed into <a rel=\"noreferrer noopener\" aria-label=\"Exploit Kits (EKs) (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/07\/exploit-kits-summer-2019-review\/\" target=\"_blank\">Exploit Kits (EKs)<\/a> which contain the resources needed to search, find, and then exploit the Heartbleed vulnerability. <\/p>\n<p>Once the threat actor finds a vulnerable system, it\u2019s relatively simple to exploit the vulnerability. When that happens, the threat actor gains access to information and\/or launches another attack by delivering malicious payloads, such as spyware, <a rel=\"noreferrer noopener\" aria-label=\"Trojans (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/trojans-whats-the-real-deal\/\" target=\"_blank\">Trojans<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ransomware (opens in a new tab)\">ransomware<\/a>. <\/p>\n<h3>Heartbleed attacks in 2019<\/h3>\n<p>The worst thing about Heartbleed is that you can\u2019t always control whether it affects you or not. Many websites and systems now run in public cloud computing environments. The reason why a public cloud is relatively cheaper than a private cloud is that you agree to share resources. And sharing resources means agreeing to let your digital assets roam in different servers.<\/p>\n<p>When you don\u2019t control which server you use, you also don\u2019t control which vulnerabilities you\u2019re exposed to at any given time. For a while, you\u2019ll be allocated a Heartbleed-free server, and then when there\u2019s another rotation of resources, you might get a server with the Heartbleed vulnerability. <\/p>\n<p>Once you\u2019re vulnerable, you\u2019ll be subjected to attacks such as <a rel=\"noreferrer noopener\" aria-label=\"malvertising (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/06\/truth-in-malvertising-how-to-beat-bad-ads\/\" target=\"_blank\">malvertising<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"phishing schemes (opens in a new tab)\">phishing schemes<\/a>, which will try to trick you into downloading malicious payloads. If you do, the threat actors won\u2019t be restricted only to the Heartbleed memory\u2014they\u2019ll get your session information and anything else you have stored on your system.<\/p>\n<h3>To patch or not to patch<\/h3>\n<p>The Heartbleed vulnerability is a security bug that was introduced into OpenSSL due to human error. Due to the popularity of OpenSSL, many applications were impacted, and threat actors were able to obtain a huge amount of data.&nbsp;<\/p>\n<p>Following the discovery of the vulnerability, Google employees found a solution and provided OpenSSL contributors with the code that fixed the issue. OpenSSL users were then instructed to upgrade to the latest OpenSSL version.\u00a0<\/p>\n<p>Today, however, the Heartbleed vulnerability can still be found in applications, systems, and devices, even though it\u2019s a matter of upgrading the OpenSSL version rather than editing the codebase. If you are concerned that you may be affected, you can <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/geekflare.com\/how-to-test-heart-bleed-ssl-vulnerabilities-cve-2014-0160\/\" target=\"_blank\">test your system<\/a> for the Heartbleed vulnerability and eliminate the risk with relative ease.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2019\/08\/everything-you-need-to-know-about-the-heartbleed-vulnerability\/\">Everything you need to know about the Heartbleed vulnerability<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2019\/08\/everything-you-need-to-know-about-the-heartbleed-vulnerability\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 30 Aug 2019 16:16:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2019\/08\/everything-you-need-to-know-about-the-heartbleed-vulnerability\/' title='Everything you need to know about the Heartbleed vulnerability'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/shutterstock_634380332.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The Heartbleed vulnerability was discovered and fixed in 2014, yet today\u2014five years later\u2014there are still unpatched systems. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/exploits-and-vulnerabilities\/\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptography\/\" rel=\"tag\">cryptography<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eks\/\" rel=\"tag\">EKs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/heartbeat-extension\/\" rel=\"tag\">heartbeat extension<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/heartbleed\/\" rel=\"tag\">heartbleed<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/heartbleed-vulnerability\/\" rel=\"tag\">heartbleed vulnerability<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/it\/\" rel=\"tag\">IT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/it-teams\/\" rel=\"tag\">IT teams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/open-source\/\" rel=\"tag\">open source<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/openssl\/\" rel=\"tag\">OpenSSL<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ssl\/\" rel=\"tag\">SSL<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tsl\/\" rel=\"tag\">TSL<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2019\/08\/everything-you-need-to-know-about-the-heartbleed-vulnerability\/' title='Everything you need to know about the Heartbleed vulnerability'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2019\/08\/everything-you-need-to-know-about-the-heartbleed-vulnerability\/\">Everything you need to know about the Heartbleed vulnerability<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11047,11787,10528,10987,22783,22784,11123,22785,12983,22786,11099,22787,17203,22788],"class_list":["post-16204","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cryptography","tag-eks","tag-exploit-kits","tag-exploits","tag-exploits-and-vulnerabilities","tag-heartbeat-extension","tag-heartbleed","tag-heartbleed-vulnerability","tag-it","tag-it-teams","tag-open-source","tag-openssl","tag-ssl","tag-tsl"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16204"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16204\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16204"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}