Beruflich Dokumente
Kultur Dokumente
1. About Heartbleed:
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library
Heartbleed is not based on any complex cryptography based error, basically due to the result of
relatively mundane coding error which makes devastation in Transport Layer Security (TLS)
encryption over the OpenSSL connection. This weakness allows stealing of information protected,
under normal conditions, by the SSL/TLS encryption used to secure the Internet.
2. The Problem:
The problem in Heartbleed is basically due to small vulnerability because of missing bounds checks in
the code that handles TLS heartbeat messages. Maltreating this mechanism, an attacker can easily
exploit the private memory space from the TLS server. As the same server is used for protecting the
servers key materials, an attacker could potentially obtain the long-term server private keys, (b) TLS
session keys, (c) confidential data like passwords, (d) session ticket keys. Stealing of above
information may allow the attacker to decrypt the ongoing TLS sessions. Far the worst, an attacker
who obtains the servers main private keys can potentially decrypt the past sessions or impersonate the
server going forward. Worst of all, the exploit leaves no trace.
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the
vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the
service providers and to encrypt the traffic, the names and passwords of the users and the actual content.
This allows attackers to eavesdrop on communications, steal data directly from the services and users
and to impersonate services and users. Bug is in the OpenSSL's implementation of the TLS/DTLS.
When it is exploited it leads to the leak of memory contents from the server to the client and from the
client to the server.
OpenSSL versions 1.0.1 through 1.0.1f contain a flaw in its implementation of the TLS/DTLS
heartbeat functionality. This flaw allows an attacker to retrieve private memory of an application that
uses the vulnerable OpenSSL library in chunks of 64k at a time. Note that an attacker can repeatedly
leverage the vulnerability to retrieve as many 64k chunks of memory as are necessary to retrieve the
intended secrets. The sensitive information that may be retrieved using this vulnerability include:
Secondary key material (user names and passwords used by vulnerable services)
Collateral (memory addresses and content that can be leveraged to bypass exploit mitigations)