Group administrators:
Heartbleed OpenSSL Vulnerability CVE-2014-0160
We have responded to the announcement of the OpenSSL vulnerability today, 8th April 2014.
Technical advice (detailed below) has been issued to colleagues across the sector to assist them in responding to this vulnerability.
In addition, replacement certificates, for those organisations affected by this vulnerability, will be issued at no cost by the Janet Certificate Service. If your organisation is affected by the OpenSSL vulnerability and is taking steps to address this, and requiring a replacement certificate, then please visit the following url for further information.
Technical advice
Versions of OpenSSL 1.0.1 through to 1.0.1f have a critical vulnerability, which can be used to force the server to disclose its private key, and other sensitive material.
The effort and resources required to execute this attack are trivial and leave no evidence trail.
This affects all modern operating systems running the affected version of OpenSSL, including Solaris, CentOS, Ubuntu, and Debian - therefore will affect any services based on these platforms.
All services relying on these versions of OpenSSL should be considered at risk, including SSL VPNs, RADIUS, HTTPS, IMAP, SMTP, XMPP .....
Proprietary appliances (such as Systems & DNS Management tools) may also be running affected versions of OpenSSL.
We have confirmed that ESXi 5.5 is vulnerable to this and access to this should be heavily restricted until a patch is available.
If a patch is available, it should be applied immediately. Otherwise access to any affected services should be heavily restricted or disabled.
Further information on the vulnerability is available at the following URLs
http://www.kb.cert.org/vuls/id/720951
If you identify a system that is vulnerable to this exploit our advice is to:
1) Patch the system first either by installing a patched version of OpenSSL (1.0.1g and 1.0.2-beta2) or by compiling with the - -DOPENSSL_NO_HEARTBEATS flag
2) Generate a new private key
3) Replace the certificates on the concerned system (Including revoking the old certifacte).
Any queries then please contact us at irt@csirt.ja.net
Comments
We have had a discussion about the versioning within CentOS,
After looking at the update they have done thay have recompiled the existing package with the -DOPENSSL_NO_HEARTBEATS flag and as such they have not used a new version of OpenSSL and so the latest version of OpenSSL 1.0.1e-fips in CentOS is safe to use.
Quick clarification:
Both, vulnerable and patched openSSL versions are 1.0.1e-fips.
Vulnerable rpm openSSL package is openssl-1.0.1e-16.el6_5.4.x86_64 (for 64bit system)
Patched: openssl.x86_64 0:1.0.1e-16.el6_5.7