RSS
 Add News     Print  
Article List
‘Heartbleed’ catastrophic

SAN FRANCISCO, April 11, (AFP): The “Heartbleed” flaw in Internet security is as critical as the name implies and wider spread than first believed. Warnings about the danger exposed early this week reached widening circles on Thursday, with everyone from website operators and bank officials to Internet surfers and workers who tele-commute being told their data could be in danger. “Heartbleed is a catastrophic bug in OpenSSL,” well-known computer security specialist Bruce Schneier said in a post at his schneier.com website. OpenSSL is a commonly used software platform for encrypted transactions at “https” websites that Internet users have been taught to trust. The Heartbleed flaw lets hackers snatch packets of data from working memory in computers, creating the potential for them to steal passwords, encryption keys, or other valuable information.

Devastating
“This is going to be a pretty devastating bug,” Trustwave security research manager John Miller told AFP. “Even after the majority of it is fixed on the Internet, there will be internal services vulnerable.” The Heartbleed flaw can be found in virtual private network (VPN) software commonly used by workers on the go to securely link with company computer networks. Computer networking titans Cisco and Juniper put out advisories on Thursday that some of their data-handling gear is susceptible to the bug. “An exploit could allow the attacker to disclose a limited portion of memory from a connected client or server,” Californiabased Cisco said in an advisory note. “The disclosed portions of memory could contain sensitive information.” Canada’s tax agency shuttered its website Wednesday after warning that encrypted taxpayer data could be vulnerable.

Data
OpenSSL is commonly used to protect passwords, credit card numbers and other data sent via the Internet. Web masters have been scrambling to update to safe versions of OpenSSL. The vulnerability has existed for about two years, since the version of OpenSSL at issue was released. The Tor Project devoted to letting people use the Internet anonymously advised those in need of privacy to stay offline until the Heartbleed threat is ameliorated.

Information considered at risk includes source codes, passwords, and “keys” that could be used to impersonate websites or unlock encrypted data. “These are the crown jewels, the encryption keys themselves,” said a heartbleed.com website devoted to details of the vulnerability. “Leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will.” The flaw in OpenSSL allows a hacker to read the memory of a machine working the software, but no more than 64 kilobytes of data at a time, according to security specialists. However, hackers could repeatedly grab packets of memory to ramp up the odds of stealing valuable data. “We don’t know how actively Heartbleed was exploited before publication of the vulnerability,” Trustwave’s Miller told AFP. “Since Monday, when they published, it has been used a lot. People have been executing the attack all over the Internet.” OpenSSL is used by more than half of websites, but not all versions have the vulnerability, according to heartbleed.com.

The group behind open-source OpenSSL is urging users to upgrade to an improved version of the software and gave credit for finding the bug to Neel Mehta of Google Security. Major websites and services were given advanced word of the Heartbleed flaw to allow time for patches to be put in place before the flaw was made public. Miller and other security specialists said Heartbleed appeared to be the result of a mistake in writing the OpenSSL code. Software patches and updates were being rushed out, but it was expected to take time for websites, businesses, router makers and others on the growing list of those at risk to replace software keys used to prevent impersonation or safeguard encrypted data.

Read By: 2477
Comments: 0
Rated:

Comments
You must login to add comments ...
About Us   |   RSS   |   Contact Us   |   Feedback   |   Advertise With Us