Categories: SecurityWorkspace

OpenSSL Patch Issued To Prevent Another Heartbleed

The ghost of the pernicious “Heartbleed” menace has made another appearance, following the discovery of fresh flaws in the OpenSSL Web encryption protocol.

The bugs could be exploited to allow hackers to spy on communications.

New Vulnerabilities

The new vulnerabilities came to light this week after the OpenSSL Project issued an update that contained seven security fixes.

Experts recommend that the update should be installed as quickly as possible. But there is also some concern because companies might need to conduct adequate testing of the update first.

“The dust has barely settled on Heartbleed, yet here we are hit with another major vulnerability,” blogged Nicholas Percoco, VP of Strategic Services at Rapid7. “The not-yet-catchily-named OpenSSL flaw allows spying on encrypted SSL/TLS communications, if the attacker can pull off a man-in-the-middle position.”

“The most discussed vulnerability is CVE-2014-0224, through which an eavesdropper can reduce the strength of the encryption through a Man-in-the-Middle (MITM) attack, putting the content of the transmitted data at risk,” said Percoco. “However, there are other vulnerabilities in the advisory that could be used for denial of service (DoS) attacks or remote code execution.”

Significant Threat

“These are significant threats, although harder to exploit than the recent Heartbleed vulnerabilities in OpenSSL,” Percoco warned.

“The newly disclosed MITM vulnerability (CVE-2014-0224) affects all OpenSSL clients and devices that communicate with vulnerable servers,” he wrote. “While all OpenSSL client versions are vulnerable, only the most recent OpenSSL server versions are affected. In order for the vulnerability to be exploited, both the client and the server must be vulnerable.”

“The second vulnerability (CVE-2014-0221) is likely only a Denial of Service (DoS) attack that would not expose encrypted data,” said Percoco. “Rapid7 rates it as a low threat generally, high for critical services.”

The “Heartbleed” bug was discovered in April, potentially exposing users of websites that adopted OpenSSL encryption for the past two years. It gave hackers the ability to steal large quantities of data without leaving a trace, however such attacks were not observed in the wild.

The crisis highlighted the fact that many open source technologies, while widely used, do not receive funding in line with their importance.

Are you a security pro? Try our quiz!

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

TSMC Denies Talks With Intel Over Chipmaking Joint Venture

Denial from TSMC, after multiple reports it was in talks with Intel over a joint…

5 hours ago

Apple iPhone Shipments In China Slide, As Cook Talks With Trump Official

CEO Tim Cook talks to Trump official, as IDC notes China's smartphone market growth, and…

6 hours ago

AMD Warns Of $800m Charge From US Chip Restrictions On China

Another big name chip maker expects a hefty financial charge, after the US tightened rules…

8 hours ago

Google Digital Ad Network Ruled Illegal Monopoly By Judge

More bad news for Google. Second time in less than a year that some part…

1 day ago

US State Dept Closes Office Flagging Russia, China Disinformation

Federal office that tackled misinformation and disinformation from hostile nations is closed down, after criticism…

1 day ago

Nvidia CEO Jensen Huang Makes Surprise Visit To China

After Nvidia admits it will take $5.5 billion charge as Trump export limits of slower…

1 day ago